The authorization policy database contains a representation of all resources in the domain.
授权策略数据库包含域内所有资源的表示。
The problem with this is that it forces us to embed the authorization policy into the physical network.
这种方法的问题在于,它迫使我们将授权策略嵌入物理网络。
In this way, a single static class declares the entire extended authorization policy of an EAz application.
通过这种方法,单个静态类可以声明EAz应用程序的完整扩展授权策略。
Be aware that SCA authorization policy is not supported in composites packaged as war (Web Archives) files.
请注意,打包为WAR (WebArchives)文件的组合中不支持SCA授权策略。
The authorization policy that it generates contains one claim, an SPN; hence, no identity in the claim.
它所产生的授权原则包含一个宣告 (即 SPN),因此宣告中没有身分识别。
You will get a failure response, as shown in Listing 7, which means the authorization policy was successfully enforced
您将收到一个失败响应,如 清单7 所示,这意味着授权策略已经成功实施
If the Permissions class embodies the authorization policy of an application, the ACL class implements the process of authorization.
如果permissions类包含了应用程序的授权策略,则acl类实现了授权处理。
The Subscriber is also authorized to invoke the subscribed service in the Tivoli Access Manager-based authorization policy decision point.
还授权订阅者在基于TivoliAccessManager的授权策略决策点调用已订阅的服务。
Understanding and maintaining the authorization policy will be an order of magnitude more difficult, even if the code is free from defects.
了解和维护授权策略更加困难,即使代码没有任何缺陷。
A developer can authorize or deny arbitrary functionality as needed, but the application's authorization policy is now partially or completely embedded in its code.
开发人员可以根据需要授权或拒绝任意功能,但是应用程序授权策略现在部分或全部嵌入在其代码中。
The domain is governed by two security structures: The user registry, such as LDAP, Lotus Domino, or Microsoft Active Directory, and a master authorization policy database.
这个域由两个安全结构主导:用户注册表(比如LDAP、LotusDomino或MicrosoftActiveDirectory)和一个授权策略数据库。
The disclosure control method of RFIDIC realizes this suggestion by providing special authorization policy rules that assign the right to execute certain types of queries to certain user groups.
RFIDIC的公开控制方法为实现这个建议提供了特殊的授权策略规则,这些规则将执行某些类型的查询的权力授予某些用户组。
We need to add one thing to this file to extend the policy definition for class instance-level authorization: an optional relationship parameter associated with a permission statement.
我们需要向这个文件添加一个东西为类实例级授权扩展策略定义:一个与许可权语句相关的可选关系参数。
Together, the default role and default policy make up the default authorization: the implicit rule of access on the cube for users with no explicit rule of access.
默认角色和默认策略共同构成默认授权:多维数据集上针对没有显式访问规则的用户的隐式访问规则。
Program elements carrying annotation of these types can be captured by not only authorization and authentication aspects, but also other implementations such as privacy policy enforcement aspects.
包含这些类型的注释的程序元素不仅能被授权和身份验证方面所捕获,而且还可被其他实现捕获,比如隐私策略增强方面。
XACML builds on SAML by providing the actual semantics used to define access control policy and authorization request and response messages.
XACML构建于SAML之上,提供了用于定义访问控制和授权请求及响应消息的实际语义。
XACML not only processes the authorization requests, but it defines the mechanism for creating the complete infrastructure of rules, policies, and policy sets to arrive at the authorization decisions.
XACML不但处理授权请求,而且还定义了一种机制,来创建进行授权决策所需的规则、策略和策略集的完整基础设施。
Listing 4 shows the results of an authorization request using the JAAS policy file shown in Listing 3.
清单4显示一个授权请求的结果,该请求使用清单3中显示的JAAS策略文件。
After a policy has been evaluated, specific obligations are sent to the PEP along with the authorization decision.
在评估策略之后,特定的义务与授权决策一起发送给PEP。
All users who do not belong to a role with explicit authorization on the dimension are members of the default role, and they are able to access the dimension according to the default policy.
只要用户不属于对维度具有显式授权的角色,它就属于默认角色的成员,可以根据默认策略访问该维度。
As the name implies, a PEP is a point in the security architecture where authentication and authorization rules are enforced, based upon the policy defined in the PDP.
顾名思义,PEP是安全体系结构中基于PD p中定义的策略执行身份验证和授权规则的位置。
Pointing AAA Policy to the transformation stylesheet is the last piece of configuration you need to do to implement the transactional authorization, as shown in Figure 9.
将AAAPolicy指向转换样式表是实现事务授权的最后配置步骤,如图9所示。
It means that authorization rules can be declared in a policy using standard language like XACML and then distributed to DataPower Appliance for enforcement.
这意味着可以在使用标准语言(比如XACML)的策略中声明授权规则,然后将其分发到DataPower Appliances进行实施。
Each time a client tries to connect to the chat, the Flash client will request the policy authorization to the server.
每当客户机试图连接到此聊天时,Flash客户机都将会向此服务器请求策略授权。
SCA policy sets, defined in the definitions.xml file, can be attached to the implementation to enforce authorization and security identity policies.
xml文件中定义的SCA策略集可以被附加到这个实现以实施授权和安全身份策略。
Authorize the requests based on the user credentials from the request header and called MDM service, where a policy expressed in XACML is used as a basis for the authorization decision making.
基于来自请求头的用户凭证和调用的MDM服务授权请求,其中以XACML表示的策略用作进行授权决策的根据。
IBM's SOA Security Expert Dr. Raj Nagaratnam explained in a recent interview that services are based on a trust model where authorization is delegated to a policy layer external to the application.
IBM的SOA安全专家RajNagaratnam博士在最近的采访中解释说,服务基于一种信任模型,其中将授权委托给应用程序外部的策略层。
Our DataPower configurations take care of user authentication and policy-based authorization of user requests.
我们的DataPower配置关注用户身份验证和基于策略的用户请求授权。
This section describes how to configure an AAA Policy instance for use by DataPower to do the authorization based on the MDM service name.
这个小节描述如何配置AAAPolicy,DataPower 将通过它基于MDM服务名执行身份验证。
That would mean the Pentagon would not be beholden to a long list of reporting requirements and policy provisions that each year are packed into the authorization bill.
这意味着五角大楼不会对每年都写入法案中的一系列相关要求和政策规定感到满意。
应用推荐