It is possible that through authentication, a user can log in to a system but, through authorization, not be allowed to do anything.
所以,有这样的可能性:用户虽然通过了身份验证可以登录到一个系统,但是未经过授权,不准做任何事情。
It is also possible to have a certain level of authorization for users that have not been authenticated.
还有一种可能是用户虽然具有了某种程度的授权,却并未经过身份验证。
A typical access control and authorization scenario includes three main entities — a subject, a resource, and an action — and their attributes.
典型的访问控制和授权场景包括三个主要实体:主体、资源和动作以及它们的属性。
Static SQL can provide more consistent or even better performance and a better authorization model for DB2 applications.
静态SQL能够提供更加一致或者甚至更好的性能,以及更好的DB 2应用程序授权模型。
In a real-world scenario, most RPs would check a user's authorization before granting access.
在真实的场景中,大多数rp会在授予访问权之前检查用户的授权。
Users require root-level authorization and a working knowledge of AIX system administration.
用户需要具有根级别授权并且具有AIX系统管理的应用知识。
Secondly, it may be necessary to set the MCAUSER property on the channel being used to a user with authorization to access queue manager resources.
其次,可能需要将正在使用的通道上的MCAUSER属性设置为授权访问队列管理器资源的用户。
Any authorization framework of substantial capability will enable an application to implement a complex and rich set of authorization rules.
任何具有强大功能的授权框架都将使应用程序能够实现一组复杂且丰富的授权规则。
CM USES privilege sets and ACLs to provide a stringent and granular authorization mechanism.
CM使用权限集合和ACL提供了一种严格的粒度级授权机制。
Consider a view that includes the name of every table on which a user's authorization id has been explicitly granted the SELECT privilege.
考虑一个包含每个表的名称的视图,并且用户的授权id被显式地授予了这些表上的SELECT权限。
Otherwise, a failure message about an 403 authorization failed error appears.
否则,显示一个失败消息,指出出现了403授权失败错误。
There is always a clear mapping between any given system authorization ID used to establish a connection and a specific trusted context.
在用于建立一个连接的任何给定系统授权id与一个特定的受信任上下文之间,总是有一个明显的映射。
Such a mapping between application and user ID is only possible if each user has a separate database authorization ID.
只有当每个用户都有一个单独的数据库授权ID时,才可能出现那样的应用程序与用户ID之间的映射。
Let's review the basics of authorization in a distributed environment and some PLAM architecture terminology.
现在让我们来复习一下关于分布式环境中授权的一些基础知识,以及PLAM架构的一些术语。
While this approach fixes the URL authorization and forms authentication anomalies, it introduces a new wrinkle: file authorization no longer works.
此方法解决了URL授权和窗体身份验证的一些问题,但同时也产生了新的问题:文件授权无法工作。
I've documented a discrepancy in the JAAS authorization model and also described a practical workaround, offering a real-world implementation as its example.
我介绍了JAAS授权模型中的一个矛盾之处,并描述了一种解决它的实用方法,并提供了它的现实世界实现的一个例子。
This article continues with the virtual campus scenario, used to illustrate the earlier articles in the series, to show how a complex authorization model can be implemented through EAz.
本文将继续介绍虚拟校园场景,用于对本系列前面的文章进行阐述,说明如何通过EAz实现复杂的授权模型。
A transaction authorization provider class has to implement the com.dwl.base.security.AuthorizationProvider interface.
事务授权provider类必须实现com . dwl . base . security . AuthorizationProvider接口。
For every transaction, you’ll likely pay a base authorization fee ($0.15-$0.30) plus an additional percentage.
对于每一笔交易,你要支付一个基准授权费(0.15—0.30美元)再加一个额外的百分比费用。
It defines a new authorization role called administrator.
它定义一个新的授权角色,名为administrator。
Kerberos also provides a system for authorization in the form of administering tokens or credentials.
Kerberos还以管理令牌或凭据的形式提供了一种授权系统。
Auth - a hash containing authorization parameters.
auth-包含授权参数的一个hash。
To use transaction authorization, you configure InfoSphere MDM Server to use a transaction authorization provider class.
为了使用事务授权,可以将InfoSphereMDMServer配置为使用一个事务授权provider类。
Remember that currently MDM Server provides a simple form of authorization using a single J2EE role called ServiceConsumer for all of its services.
记住,现在MDMServer使用一个J2EE角色ServiceConsumer 向它的所有服务提供简单的授权。
This usually requires some form of authorization and authentication against a user registry.
这通常需要某种形式的授权和对用户注册的身份验证。
You have a proxy server that performs important authorization to limit who can access what applications at a coarse grained level.
有一个代理服务器,它执行重要的授权,以很粗的粒度限制谁可以访问什么应用程序。
In a short amount of time you have set up a skeleton application that implements authorization.
在很短的时间里,您就已经建立了一个能实现授权的骨架应用程序。
While not truly a type of authorization, a closely related problem is that of customizing a user interface to only show the specific functions that a specific user should be allowed to see.
虽然这不是真正的授权类型,但与此紧密相关的一个问题是对用户界面进行自定义,以使其仅显示允许特定用户看到的特定功能。
SAML defines a standard format to deliver authentication, authorization, and attribute data in a distributed environment.
SAML定义了一种在分布式环境中传递验证、授权和属性数据标准格式。
At a minimum, the existence of a contract would serve as an authorization check; without a valid contract, the service cannot be invoked.
最低限度,合同的存在将起到授权核查的作用;如果没有有效的合同,将不能调用服务。
应用推荐