Some key scenarios that are expected as part of the commercial launch of the access control service are.
以下一些重要的解决方案可以作为访问控制服务商业发布的一部分。
In this paper, we solve the problem how to integrate access control service into work flow systems.
本文论述了如何在工作流系统中实现存取控制的问题。
Perhaps you need to access an existing inventory control system, a legacy customer database, or a mainframe-based security access control service.
或许您需要访问现有的库存控制系统、旧的客户数据库或基于大型机的安全性访问控制服务。
It also offers some flexible security mapping interface to combine with other security systems easily and confess access control service for the applications of enterprises.
并提供灵活的安全映射接口,使其易于和其他安全系统相结合,为企业及企业间的应用提供访问控制服务。
With access control service, we can restrict the approach to critical resource, avoiding damage brought by illegal user's intrusions or legal user's inappropriate operations.
通过访问控制,既可以限制对关键资源的访问,也能够防止非法用户的侵入或者因合法用户的不慎操作而造成的破坏。
The security problems of information systems include identity authentication service, access control service, data secrecy service, data integrality service, non-negation service, etc.
信息系统中的安全性问题主要包含身份认证服务、访问控制服务、数据保密服务、数据完整牲服务和不可否认服务等几个方面。
Especially in-depth study the communication mechanism between services, the access control service and traffic statistics service, given the corresponding design models and test results.
并特别针对服务之间的通信机制、流量统计与访问控制服务做了深入研究,给出了相应的设计模型和测试结果。
So, there must be a uniform platform to realize the user authorization and access control, to provide the uniform user authorization and access control service for all the other systems.
因此,必须要有一种统一的授权访问控制平台,为各应用系统实现统一授权管理和访问控制。
For example, there is an access control policy that allows all users that fulfill the customer Service Representative role to perform customer management operations.
例如,存在这样一个访问控制策略,其允许担当客户服务代表角色的所有用户执行客户管理操作。
Access Control list (ACL) : An ACL is a data structure that associates to a set of principals a list of permissions for a service.
访问控制列表(acl): ACL是一种数据结构,它将一个服务的权限列表与一组主体相关联。
Service interfaces are typically coarse-grained but the client often wants more control over their granularity of access.
服务接口通常是粗粒度的,但客户端通常希望对其访问的粒度进行更多的控制。
The architecture needs to cover a range of directives from security, access control, and service level agreements to business workflow, event processing, and information management and business rules.
架构师需要涉及许多问题,从安全性、访问控制和服务水平协议,直到业务工作流、事件处理、信息管理和业务规则。
Additional access control is required for fine-grained protection of the assets associated with that service.
对与该服务相关联的资产的细粒度保护还需要其它访问控制。
A utilization service support tenants to maintain and configure their specific organization structure and access control data.
利用服务支持租户维护和配置自己的组织结构和访问控制数据。
Not surprisingly, in this article's example, the subject of access control is the user calling an MDM service.
在本文的例子中,访问控制主体就是调用MDM 服务的用户,这毫不奇怪。
When config service runs outside the server, access control is not enforced, since the administrative security infrastructure runs inside the server.
当配置服务在服务器外运行时,并没有对其实施访问控制,因为管理安全基础结构是在服务器内运行。
Service security focuses on managing the federated identity and access control across services, securing access to services and applications, and consistently enforcing security policies for services.
服务安全性的重点是管理联合标识和跨服务的访问控制、确保能安全访问服务和应用程序,以及使服务的安全策略得到一致执行。
Middleware technology is available to orchestrate services and control access to specific functionalities in the service.
可以使用中间件技术对服务进行组合,并对服务中的特定功能进行访问控制。
You will also learn how to configure Acegi to interact with the directory service to implement your access control policy.
您还将了解到如何配置Acegi,使它与目录服务交互,从而实现您的访问控制策略。
Control access and visibility to business service models and policies within the business Services Repository.
控制对BusinessServicesRepository中的业务服务模型和策略的访问和可视性。
Data tampering — Exploiting weakness in the access control mechanism that permits the attacker to make unauthorized calls to the Web service to alter data.
数据篡改——利用访问控制机制中允许攻击者对Web服务进行未经授权调用的弱点来更改数据。
Step 3: the DataPower appliance checks if the user is allowed to call the requested service by evaluating the access control policy written in XACML.
步骤3:DataPower设备通过计算用XACML编写的访问控制策略,检查是否允许用户调用所请求的服务。
Security and management: Provides a single point of control, access, and validation of web service requests.
安全和管理:提供Web服务请求的单点控制、访问和验证。
The next article in this series shows you how to design access control policies, how to host them on a directory service, and how to configure Acegi to read your access control policy.
本系列的下一篇文章将展示如何设计访问控制策略,如何将它们托管在目录服务中,以及如何配置Acegi以读取您的访问控制策略。
The service provider USES the management UI to control access to the Web service.
服务提供者使用管理UI来控制对Web服务的访问。
Identity provider or IdP based on a request of some sort from a relying party A.K.A. Service provider or SP, and they contain statements that service providers use to make access control decisions.
断言通常通过基于某种依赖方(也称为服务提供商或SP)请求的断言方(也称为身份提供商或IdP)创建,它们包含服务提供者用于访问控制决策的语句。
This process configures Tivoli access Manager to update access control lists to allow the service subscriber to invoke the subscribed service.
该流程可配置TivoliAccessManager来更新访问控制列表,以允许服务订阅者调用所订阅的服务。
Seamless integration with Tivoli access Manager for better management of access control policies and with WebSphere Services Registry and Repository for better management of service meta-data.
无缝集成TivoliAccessManager以更好地管理访问控制策略,无缝集成WebSphereServicesRegistry andRepository以更好地管理服务元数据。
If only the identity of the middle tier service is propagated to the downstream service, the downstream service does not have proper control over audit and authorization of access to the service.
如果只有中间层服务的标识传播到下游服务,则下游服务不能对服务访问审核和授权进行正确的控制。
Data governance: With the SOA approach, the service enablement middleware provides control points and built-in capabilities to audit and control access to services.
数据治理:对于SOA方法,服务支持中间件提供了审核和控制服务访问的控制点和内置功能。
应用推荐