• Some key scenarios that are expected as part of the commercial launch of the access control service are.

    以下一些重要解决方案可以作为访问控制服务商业发布一部分

    youdao

  • In this paper, we solve the problem how to integrate access control service into work flow systems.

    本文论述了如何工作流系统中实现存取控制问题

    youdao

  • Perhaps you need to access an existing inventory control system, a legacy customer database, or a mainframe-based security access control service.

    或许需要访问现有库存控制系统客户数据库基于大型机安全性访问控制服务

    youdao

  • It also offers some flexible security mapping interface to combine with other security systems easily and confess access control service for the applications of enterprises.

    提供灵活安全映射接口,使其易于其他安全系统相结合,企业及企业间应用提供访问控制服务

    youdao

  • With access control service, we can restrict the approach to critical resource, avoiding damage brought by illegal user's intrusions or legal user's inappropriate operations.

    通过访问控制可以限制关键资源访问,也能够防止非法用户侵入或者合法用户的不慎操作而造成的破坏

    youdao

  • The security problems of information systems include identity authentication service, access control service, data secrecy service, data integrality service, non-negation service, etc.

    信息系统中的安全性问题主要包含身份认证服务访问控制服务、数据保密服务、数据完整牲服务和不可否认服务几个方面。

    youdao

  • Especially in-depth study the communication mechanism between services, the access control service and traffic statistics service, given the corresponding design models and test results.

    特别针对服务之间通信机制流量统计访问控制服务做了深入研究给出了相应设计模型测试结果

    youdao

  • So, there must be a uniform platform to realize the user authorization and access control, to provide the uniform user authorization and access control service for all the other systems.

    因此必须一种统一授权访问控制平台应用系统实现统一授权管理访问控制。

    youdao

  • For example, there is an access control policy that allows all users that fulfill the customer Service Representative role to perform customer management operations.

    例如存在这样一个访问控制策略其允许担当客户服务代表角色所有用户执行客户管理操作

    youdao

  • Access Control list (ACL) : An ACL is a data structure that associates to a set of principals a list of permissions for a service.

    访问控制列表(acl): ACL数据结构将一个服务权限列表与一主体相关联。

    youdao

  • Service interfaces are typically coarse-grained but the client often wants more control over their granularity of access.

    服务接口通常粒度的,客户通常希望访问的粒度进行更多控制

    youdao

  • The architecture needs to cover a range of directives from security, access control, and service level agreements to business workflow, event processing, and information management and business rules.

    架构需要涉及许多问题安全性访问控制服务水平协议,直到业务工作流事件处理信息管理和业务规则。

    youdao

  • Additional access control is required for fine-grained protection of the assets associated with that service.

    服务相关联资产细粒度保护需要其它访问控制

    youdao

  • A utilization service support tenants to maintain and configure their specific organization structure and access control data.

    利用服务支持租户维护配置自己组织结构访问控制数据

    youdao

  • Not surprisingly, in this article's example, the subject of access control is the user calling an MDM service.

    本文例子中,访问控制主体就是调用MDM 服务用户,这毫不奇怪。

    youdao

  • When config service runs outside the server, access control is not enforced, since the administrative security infrastructure runs inside the server.

    配置服务服务器外运行时,没有其实施访问控制因为管理安全基础结构是在服务器内运行

    youdao

  • Service security focuses on managing the federated identity and access control across services, securing access to services and applications, and consistently enforcing security policies for services.

    服务安全性重点管理联合标识服务访问控制确保能安全访问服务和应用程序以及使服务的安全策略得到一致执行

    youdao

  • Middleware technology is available to orchestrate services and control access to specific functionalities in the service.

    可以使用中间件技术服务进行组合,服务中的特定功能进行访问控制

    youdao

  • You will also learn how to configure Acegi to interact with the directory service to implement your access control policy.

    了解到如何配置Acegi,使它目录服务交互,从而实现访问控制策略。

    youdao

  • Control access and visibility to business service models and policies within the business Services Repository.

    控制BusinessServicesRepository中的业务服务模型策略访问可视性

    youdao

  • Data tamperingExploiting weakness in the access control mechanism that permits the attacker to make unauthorized calls to the Web service to alter data.

    数据篡改——利用访问控制机制允许攻击者Web服务进行未经授权调用弱点更改数据。

    youdao

  • Step 3: the DataPower appliance checks if the user is allowed to call the requested service by evaluating the access control policy written in XACML.

    步骤3DataPower设备通过计算用XACML编写访问控制策略检查是否允许用户调用请求的服务

    youdao

  • Security and management: Provides a single point of control, access, and validation of web service requests.

    安全和管理提供Web服务请求控制访问验证

    youdao

  • The next article in this series shows you how to design access control policies, how to host them on a directory service, and how to configure Acegi to read your access control policy.

    系列下一文章将展示如何设计访问控制策略,如何将它们托管目录服务中,以及如何配置Acegi读取的访问控制策略。

    youdao

  • The service provider USES the management UI to control access to the Web service.

    服务提供者使用管理UI控制Web服务的访问

    youdao

  • Identity provider or IdP based on a request of some sort from a relying party A.K.A. Service provider or SP, and they contain statements that service providers use to make access control decisions.

    断言通常通过基于某种依赖(也称为服务提供商SP)请求断言方(也称为身份提供商或IdP)创建,它们包含服务提供者用于访问控制决策语句

    youdao

  • This process configures Tivoli access Manager to update access control lists to allow the service subscriber to invoke the subscribed service.

    流程可配置TivoliAccessManager更新访问控制列表允许服务订阅者调用订阅的服务。

    youdao

  • Seamless integration with Tivoli access Manager for better management of access control policies and with WebSphere Services Registry and Repository for better management of service meta-data.

    无缝集成TivoliAccessManager更好管理访问控制策略,无缝集成WebSphereServicesRegistry andRepository以更好地管理服务元数据。

    youdao

  • If only the identity of the middle tier service is propagated to the downstream service, the downstream service does not have proper control over audit and authorization of access to the service.

    如果只有中间层服务标识传播下游服务,则下游服务不能对服务访问审核授权进行正确控制

    youdao

  • Data governance: With the SOA approach, the service enablement middleware provides control points and built-in capabilities to audit and control access to services.

    数据治理对于SOA方法服务支持中间件提供了审核控制服务访问控制点内置功能

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定