A remote access policy can either grant or deny access to users who match the specified conditions.
远程访问策略可授予或拒绝符合指定条件的用户的访问权。
You still need a way to enforce a low-privileged access policy on inbound messages, and that is usually through MCAUSER.
您还需要一种方式对入站消息执行较低权限的访问策略,这通常可以通过MCAUSER来实现。
It deals with user's attribute certificate and implements the access control based on access policy and user's attributes.
访问决策子系统负责解析用户属性证书和提取用户属性,并根据访问策略信息和用户属性实现对资源的访问控制。
How do you deal with the development of inventory of records? What are your storage facility, digital media, and access policy for electronic records?
电子档案库存做法如何?电子档案之储存设备、数位媒体、与存取政策为何?
The cache engine also provides network administrators with a simple method to enforce a site-wide access policy through URL filtering. See also Cache.
高速缓存引擎还为网络管理员提供了一种简单方法,通过URL滤波增强了工作站范围内的访问手段。
The policy element is used to define an access policy for a specific URL pattern, as shown in Figure 41. It includes the following sub-elements, as shown in Figure 42.
这些政策元素用于为特定的URL模式定义访问政策,如图41所示。
All of these issues are solved in the thesis, including how to generate secure access policy rules centralized and how to enforce secure policy distribution efficiently.
由此,本文需要解决如何集中定制安全访问策略规则,以及有效实施安全策略交互。
For example, there is an access control policy that allows all users that fulfill the customer Service Representative role to perform customer management operations.
例如,存在这样一个访问控制策略,其允许担当客户服务代表角色的所有用户执行客户管理操作。
These actions can be security configuration changes, key and certificate management, access control policy changes, bus and other system resources management, and so on.
这些操作可以是安全配置更改、密钥和证书管理、访问控制策略更改、总线和其他系统资源管理等等。
Exemptions provide a way to allow users to bypass one or more access rules for a security policy.
豁免权为用户绕过一个安全策略中的一个或多个访问规则提供了一种方式。
The isolation level is set on the database connection and, as we will see later, the access intent policy in use will determine how the application server will set this parameter.
在接下来的部分,我们不仅会对置于数据库连接上的隔离级有所了解,还将会使用访问意图策略来确定应用服务器是怎样设置这些隔离级的。
XACML builds on SAML by providing the actual semantics used to define access control policy and authorization request and response messages.
XACML构建于SAML之上,提供了用于定义访问控制和授权请求及响应消息的实际语义。
Technology capabilities, like store and access capability, policy enforcement capability, or monitoring capability, may be satisfied by manual or software.
像存储和访问功能、策略执行功能或监视功能一样,技术功能也可以通过手工或者软件来实现。
Any application that is allowed access by the policy can access the files that are under guard points as long as the application USES system libraries to access the files.
策略允许访问的任何应用程序都可以访问保护点下的文件,前提是该应用程序使用系统库来访问文件。
Later in the article, you'll see the simple access control policy used in building a sample application.
在本文后面的部分,您将看到使用简单的访问控制策略构建一个样例应用程序。
Each access intent policy defined is an aggregate of a set of properties used to control different aspects of the persistence and concurrency handling involved in dealing with EJB entities.
每个已定义的访问意图策略都是一组属性的集合,用来控制e JB实体的持久性和并发性处理的不同方面。
As part of a broad push toward transparency, the Bank recently instituted a new access to Information policy and launched Aidflows, a web-based tool to provide easy access to aid data.
作为推动透明度提升广泛工作的一部分,世行最近颁布实行了信息获取政策,开通了方便获取援助数据的援助流站点。
On the client side, access the policy sets and binding panel by following the same path as the service side, but choose the client BLA, composite, and service instead.
在客户端上,按照与服务端相同的步骤访问策略集,但选择客户端BLA、组合和服务。
Define policies governing access to the service using WS-Policy.
使用WS - Policy来定义访问服务的管理策略。
July 1, 2011 marked the one-year anniversary of the Bank's landmark Access to Information policy.
2011年7月1日是世行标志性的信息获取政策生效一周年。
To get to the policies, the PDP uses the Policy Access Point (PAP), which writes policies and policy sets, and makes them available to the PDP.
为了获得策略,PDP 要用到策略访问点(PAP),PAP编写策略和策略集,供 PDP使用。
The next article in this series shows you how to design access control policies, how to host them on a directory service, and how to configure Acegi to read your access control policy.
本系列的下一篇文章将展示如何设计访问控制策略,如何将它们托管在目录服务中,以及如何配置Acegi以读取您的访问控制策略。
I also show you how to configure Acegi to interact with the directory server to implement your access control policy.
我还将展示配置acegi的方法,使它能够与目录服务器交互并实现您的访问控制策略。
You will also learn how to configure Acegi to interact with the directory service to implement your access control policy.
您还将了解到如何配置Acegi,使它与目录服务交互,从而实现您的访问控制策略。
In this second article, I begin to discuss the more advanced USES of Acegi, starting with writing an access control policy and storing it in ApacheDS, an open source LDAP directory server.
在第二篇文章中,我将讨论Acegi的更加高级的应用,首先我将编写一个访问控制策略并将其存储在ApacheDS中,ApacheDS是一个开源的LDAP目录服务器。
In Figure 9, you see two policies, an all Allowed policy that permits access to all members of the dimension and an all Denied policy that denies access to all members of the dimension.
图9显示了两个策略:一个AllAllowed策略允许访问维度的所有成员,一个AllDenied策略拒绝访问维度的所有成员。
Tivoli Access Manager contains a security policy which defines access to a domain.
TivoliAccessManager包含一个安全策略,它定义了对域的访问。
For the moment, however, I'll stick to showing you how to configure a simple access control policy using Acegi.
但是,目前我将继续向您展示如何使用Acegi配置一个简单的访问控制策略。
Step 3: the DataPower appliance checks if the user is allowed to call the requested service by evaluating the access control policy written in XACML.
步骤3:DataPower设备通过计算用XACML编写的访问控制策略,检查是否允许用户调用所请求的服务。
However each access intent policy in WebSphere Application Server will choose an appropriate isolation level for supported databases, relieving the developer from this level of detail.
然而WebSphereApplicationServer中不同的访问意图策略将会为所支持的数据库选择一个合适的隔离级,为开发人员减轻了该细节上的不少麻烦。
应用推荐