For example, there is an access control policy that allows all users that fulfill the customer Service Representative role to perform customer management operations.
例如,存在这样一个访问控制策略,其允许担当客户服务代表角色的所有用户执行客户管理操作。
Access Control list (ACL) : An ACL is a data structure that associates to a set of principals a list of permissions for a service.
访问控制列表(acl): ACL是一种数据结构,它将一个服务的权限列表与一组主体相关联。
The architecture needs to cover a range of directives from security, access control, and service level agreements to business workflow, event processing, and information management and business rules.
架构师需要涉及许多问题,从安全性、访问控制和服务水平协议,直到业务工作流、事件处理、信息管理和业务规则。
A utilization service support tenants to maintain and configure their specific organization structure and access control data.
利用服务支持租户维护和配置自己的组织结构和访问控制数据。
Not surprisingly, in this article's example, the subject of access control is the user calling an MDM service.
在本文的例子中,访问控制主体就是调用MDM 服务的用户,这毫不奇怪。
When config service runs outside the server, access control is not enforced, since the administrative security infrastructure runs inside the server.
当配置服务在服务器外运行时,并没有对其实施访问控制,因为管理安全基础结构是在服务器内运行。
Service security focuses on managing the federated identity and access control across services, securing access to services and applications, and consistently enforcing security policies for services.
服务安全性的重点是管理联合标识和跨服务的访问控制、确保能安全访问服务和应用程序,以及使服务的安全策略得到一致执行。
Middleware technology is available to orchestrate services and control access to specific functionalities in the service.
可以使用中间件技术对服务进行组合,并对服务中的特定功能进行访问控制。
Some key scenarios that are expected as part of the commercial launch of the access control service are.
以下一些重要的解决方案可以作为访问控制服务商业发布的一部分。
You will also learn how to configure Acegi to interact with the directory service to implement your access control policy.
您还将了解到如何配置Acegi,使它与目录服务交互,从而实现您的访问控制策略。
Control access and visibility to business service models and policies within the business Services Repository.
控制对BusinessServicesRepository中的业务服务模型和策略的访问和可视性。
Data tampering — Exploiting weakness in the access control mechanism that permits the attacker to make unauthorized calls to the Web service to alter data.
数据篡改——利用访问控制机制中允许攻击者对Web服务进行未经授权调用的弱点来更改数据。
Step 3: the DataPower appliance checks if the user is allowed to call the requested service by evaluating the access control policy written in XACML.
步骤3:DataPower设备通过计算用XACML编写的访问控制策略,检查是否允许用户调用所请求的服务。
Security and management: Provides a single point of control, access, and validation of web service requests.
安全和管理:提供Web服务请求的单点控制、访问和验证。
The next article in this series shows you how to design access control policies, how to host them on a directory service, and how to configure Acegi to read your access control policy.
本系列的下一篇文章将展示如何设计访问控制策略,如何将它们托管在目录服务中,以及如何配置Acegi以读取您的访问控制策略。
The service provider USES the management UI to control access to the Web service.
服务提供者使用管理UI来控制对Web服务的访问。
Identity provider or IdP based on a request of some sort from a relying party A.K.A. Service provider or SP, and they contain statements that service providers use to make access control decisions.
断言通常通过基于某种依赖方(也称为服务提供商或SP)请求的断言方(也称为身份提供商或IdP)创建,它们包含服务提供者用于访问控制决策的语句。
This process configures Tivoli access Manager to update access control lists to allow the service subscriber to invoke the subscribed service.
该流程可配置TivoliAccessManager来更新访问控制列表,以允许服务订阅者调用所订阅的服务。
If only the identity of the middle tier service is propagated to the downstream service, the downstream service does not have proper control over audit and authorization of access to the service.
如果只有中间层服务的标识传播到下游服务,则下游服务不能对服务访问审核和授权进行正确的控制。
Service interfaces are typically coarse-grained but the client often wants more control over their granularity of access.
服务接口通常是粗粒度的,但客户端通常希望对其访问的粒度进行更多的控制。
Additional access control is required for fine-grained protection of the assets associated with that service.
对与该服务相关联的资产的细粒度保护还需要其它访问控制。
Perhaps you need to access an existing inventory control system, a legacy customer database, or a mainframe-based security access control service.
或许您需要访问现有的库存控制系统、旧的客户数据库或基于大型机的安全性访问控制服务。
Security measures, including access to portions of the network, or control over quality of the service, are best addressed through policies.
可以通过策略实现安全措施(包括对部分网络的访问)或控制服务质量。
Data governance: With the SOA approach, the service enablement middleware provides control points and built-in capabilities to audit and control access to services.
数据治理:对于SOA方法,服务支持中间件提供了审核和控制服务访问的控制点和内置功能。
Access control: Fine-grained access control might be necessary via a database lookup primitive, or a service invoke to an application specific authorization service.
访问控制:细粒度的访问控制可能是必须的,通过一个数据库查找原语或对特定于应用程序的授权服务的调用实现。
The next article in this series will get you started with some more advanced uses of Acegi, beginning with writing an access control policy and storing it in a directory service.
本系列的下一文章将开始介绍 Acegi 的一些较为高级的应用,首先是编写访问控制协议并将其存储到目录服务中。
You learned how WebSphere service Registry and Repository provides role-based access control and how it can be used to manage services and service-related entities such as contracts.
您已经了解到WebSphereServiceRegistry andRepository如何提供基于角色的访问控制,以及如何使用它来管理服务以及与服务相关的实体(如契约)。
Seamless integration with Tivoli access Manager for better management of access control policies and with WebSphere Services Registry and Repository for better management of service meta-data.
无缝集成TivoliAccessManager以更好地管理访问控制策略,无缝集成WebSphereServicesRegistry andRepository以更好地管理服务元数据。
Identity service scopes - The Identity service now allows for creating per-service access control management scopes with delegation of management authority between users.
身份识别服务作用域(IdentityService Scopes)——通过代理各用户间的授权管理,身份识别服务(Identity Service)现在允许为每个服务访问控制创建管理作用域。
At last, some key technologies of new generation Internet are discussed, such as access control, trustworthy route, quality of service, multi-homing and network management.
并对新互联网体系中的接入控制管理、可信路由及服务质量、多流传输、网络监测管理等关键技术进行了研究和探讨。
应用推荐