System component includes authorization management system, identification authentication server and access control server.
系统组件由授权管理系统、身份认证服务器和访问控制服务器三大部分组成。
When it translates a form into HTML, the Translator stores the original XFDL form in the file cache, and metadata in the access control server.
在将表单转换为HTML 时,Translator 将原来的XFDL 表单存储在文件缓存中,并将元数据存储在访问控制服务器中。
I mention them here because they do have one crucial use: they can help control access to state that's being stored on the server.
我在这里提到它们是因为它们有一个重要的用途:它们有助于控制对存储在服务器上的状态的访问。
When config service runs outside the server, access control is not enforced, since the administrative security infrastructure runs inside the server.
当配置服务在服务器外运行时,并没有对其实施访问控制,因为管理安全基础结构是在服务器内运行。
I also show you how to configure Acegi to interact with the directory server to implement your access control policy.
我还将展示配置acegi的方法,使它能够与目录服务器交互并实现您的访问控制策略。
In this second article, I begin to discuss the more advanced USES of Acegi, starting with writing an access control policy and storing it in ApacheDS, an open source LDAP directory server.
在第二篇文章中,我将讨论Acegi的更加高级的应用,首先我将编写一个访问控制策略并将其存储在ApacheDS中,ApacheDS是一个开源的LDAP目录服务器。
The kind of authorization provided by a Web server like Apache might be called coarse-grained access control because it provides only an outer layer of security.
诸如apache等Web服务器提供的授权类型可以称为粗粒度访问控制,因为它只提供了一个外部安全层。
Security infrastructure of WebSphere Application Server, such as role-based access control and encryption.
WebSphereApplicationServer的安全基础结构,比如基于角色的访问控制和加密。
Once a session object is obtained, it can be used to interact with the Lotus Domino server using the access control level granted to the user defined by the LTPAToken.
获得会话对象之后,可以使用由LTPAToken定义的授权给用户的访问控制级别在它与LotusDomino服务器之间实现交互。
The Lotus Domino server setup recommends that you configure access control lists of all databases and templates to prohibit anonymous access.
LotusDomino服务器设置程序建议,将所有数据库和模板的访问控制列表配置为禁止匿名访问。
Protects back-end server resources by providing fine-grained access control for local and back-end server Web space.
通过为本地和后端服务器Web空间提供细颗度的访问控制来保护后端服务器资源。
Thus, when it is deployed, the mashup server is easily able to control access through the integration of the WebSphere Application Server VMM capability.
因此,部署mashup应用程序后,mashup服务器可以通过集成的WebSphere Application Server VMM 功能轻松地控制访问。
The server side requires a complete implementation of the query syntax, selection as well as access control and transaction support required to expose the data safely.
服务器端需要查询语法、选择操作的完整实现,以及为了数据安全而需要的访问控制和事务支持功能。
It control what users can log on to the server and access control of the cyber source, user access time and network in which workstations.
它控制哪些用户能够登录到服务器并获取网络资源,控制用户入网的时间和在哪台工作站入网。
Through tracing this malware and also gaining access to a "command and control" computer server used by the intruders, McAfee identified 72 compromised companies and organisations.
通过跟踪这个恶意程序并获得对入侵者使用的服务器电脑的访问权限,McAfee识别出了72个受危害的公司和组织。
Publishing Server Access Control - This widget is used to grant rights to users to publish and view models in Publishing Server, as shown in Figure 3.
PublishingServer Access Control——此小部件用于向用户授予在Publishing Server中发布和查看模型的权限,如图3所示。
Products softswitch involves mainly include: softswitch equipment for core control, application server, media server, access gateway, relay gateway, signaling gateway, and IAD equipment.
软交换涉及的产品主要有负责核心控制的软交换设备、应用服务器、媒体服务器、接入网关、中继网关、信令网关、IAD设备。
At last, it achieved user authentication access control system on the foundation of scheme design, and constructing experiment platform combining RADIUS authentication server.
最后,在方案设计基础上实现本认证与访问控制系统,结合RADIUS认证服务器构建实验系统平台。
Introduced into the specialized video allocation server, the system can control and allocate the connection and access of video, and ensure the safe and reliable operation of the system.
引入专门的视频调配服务器以有效地控制和调配监控视频的接入和访问服务,确保了整个系统运行的安全可靠。
Finally, combining RADIUS authentication server efficiently, the port control of user access in wireless security gateway is analyzed.
最后,本文分析了在有效结合RADIUS认证服务器时,无线安全网关上的用户访问的端口控制。
This article describes the device server software used to provide device access service in distributed control system.
讲述了分布式控制系统中用于提供设备访问服务的设备服务器软件的实现方法。
The model can be used to solve the problem of access control to server and secure communication between browser and server.
可用于解决浏览器服务器访问模式下的服务器方的访问控制以及浏览器和服务器间的安全通信问题。
Utilizing transparent memory address mapping technology and selecting suitable MCU, server computer can access VXI instrument memory directly and control VXI module.
采用“透明存储器空间映射访问技术”和选择合适的MCU芯片使得服务器能直接访问VXI模块的内存和控制VXI模块的工作状况。
The server can impersonate the client for access control list (ACL) checking, but it cannot access system objects as the client.
服务器可以模拟客户端以进行访问控制列表(acl)检查,但是无法作为客户端访问系统对象。
In side of server, the administrator can control the number of users and the access right, and can analyze what the user do.
服务器端可以控制用户数量和用户访问权限,并可对用户行为进行统计分析。
Additionally, you cannot access other server controls when this method is called, regardless of whether it is a child or parent of this control.
此外,呼叫这个方法时,您无法存取其他伺服器控制项,不论是这个控制项的子控制项还是父控制项都一样。
Additionally, you cannot access other server controls when this method is called, regardless of whether it is a child or parent to this control.
另外,在调用此方法时无法访问其他服务器控件,不论它是此控件的子控件还是父控件。
The interceptor can ensure that access control will occur before any request gets to the server operation.
访问控制拦截器能够保证调用请求在对目标对象调用操作之前进行拦截并执行访问控制策略。
Additionally, you cannot access other server controls when this method is called either, regardless of whether it is a child or parent to this control.
另外,在调用此方法时不能访问其他服务器控件,不论此方法是该控件的子控件还是父控件。
Usually a hacker using different server hardware and software vulnerabilities to get access to the server and control over sensitive information.
通常黑客利用各种服务器软硬件漏洞,获得服务器的控制权与敏感信息。
应用推荐