The United Nations will approve his request for authorization to use military force to deliver aid.
联合国将同意他的请求,批准他动用军队来运送救援物资。
You can use it to process claims on either side of an authorization transaction (requestor or responder).
你可以用它来处理对任何一方的授权事务(请求或响应)。
Other service providers take advantage of the framework and use custom authentication/authorization mechanisms.
其他服务提供者利用框架并使用定制的身份验证/授权机制。
It is possible that the offending client could even be authorized to use your system, but is trying to exploit that authorization in some inappropriate way.
这些攻击型的客户甚至可能是经过授权可以使用您的系统的用户,但却试图以一种不适当的方式来利用这种授权。
You would use the implicit subject technique for the typical case of requesting authorization for the current user.
对于请求当前用户授权这一典型情况,您将使用隐式主题技术。
Authorization assesses whether the requestor is allowed to use the service.
授权判断是否允许请求者使用服务。
Component developers can use either programmatic or declarative security to define authorization policies.
组件开发者可以使用程序的或声明的安全来定义授权策略。
This change is reflected in other applications that also use LDAP for authentication and authorization.
这种更改会反映在其他同样使用LDAP进行身份验证和授权的应用程序中。
Most AOP practitioners are currently implementing transactional and authorization concerns with existing AOP support, typically through the use of design patterns utilizing aspect inheritance.
大多数AOP实践者目前用现有的AOP支持实现事务和授权功能,通常是通过使用方面继承的设计模式。
Reproduction or translation of substantial portions of the web site, or any use other than for educational or other non-commercial purposes, require explicit, prior authorization in writing.
复制或翻译网站的大量内容或者用于除教育或其它非商业目的之外的用途,需要事先获得明确的书面授权。
The declarative method offers ease of use, while the programmatic method provides finer levels of security control with respect to resource authentication and authorization.
声明方法提供易用性,编程方法为资源的身份验证和授权提供更好的安全控制级别。
There were a lot of shortcomings with JAAS - while its authentication capabilities were somewhat tolerable, the authorization aspects were obtuse and frustrating to use.
JAAS有太多的缺点-尽管它的认证功能尚可忍受,但授权方面却显得拙劣,用起来令人沮丧。
Given that SAML is a multi-party authentication and authorization system, it's possible for a valid participant in an SAML transaction to use the information maliciously in another transaction.
既然SAML是一种多方验证和授权系统,一个SAML事务中的合法参与者就有可能是用对其他事务有威胁的信息。
This authorization determines whether the user of the request is granted or denied the use of a transaction.
这种授权决定是否允许请求用户使用一个事务。
And once you have authorization, you'll want to store that connection for long-term use so that you don't have to ask the user for permission to access their resources again.
一旦通过了授权,就会去想如何把这种长连接持久化,以至于不用每次在访问资源时都要再授权。
Use your normal J2EE authorization procedures to authorize access to Web services implemented as EJBs.
请使用常规的J2EE授权过程授予对实现为ejb的Web服务的访问权。
Interceptor filters use three components to make authorization decisions, which I have configured in Listing 7.
拦截过滤器使用三个组件来做出授权决策,我在清单7中对其进行了配置。
Use EDTAUTL QPMCCDATA to edit the authorization list to add users.
使用EDTAUTLQPMCCDATA编辑授权列表以添加用户。
Authorization Support: Handled a variety of ways whether you use Windows authentication, thread principals, ASP.NET role-based security or your own.
授权支持:可以处理各种授权方式,不管你是使用Windows验证、线程安全主体、ASP.NET基于角色的安全模式或者你自己自定义的。
So, if you rely on Windows authentication and file authorization, you will want to use the HTTP module approach for URL rewriting.
因此,如果您依赖于Windows身份验证和文件授权,您可能希望为url重写使用HTTP模块方法。
Therefore, in your provider class, you need to use these two arguments to determine whether authorization is allowed or not.
因此,在您的provider类中,需要使用这2 个参数来确定是否允许使用授权。
That means that if you use elements in your Web.config file to specify authorization for specific URLs, you will have to refer to the rewritten URL.
也就是说,如果您在Web . config文件中使用元素来为特定的URL指定授权,则必须引用重写后的URL。
How to use authorization policies to protect DB2 resources?
如何使用授权策略保护DB 2资源?
Our goal is to demonstrate how to enable the integration of the message-level security tokens for use with the JEE authorization framework on WebSphere Application Server.
我们的目标是演示如何支持消息级安全令牌的集成,以在WebSphereApplication Server上结合使用JEE授权框架。
In doing so, it would only need to use the Android device's web browser for purposes of authorization, but the rest of the application may be completely native.
这时,在需要授权时只需调用Android设备中的浏览器即可,应用中的其余部分完全可以是基于本地化开发的。
This way you declare that DataPower Appliance must use the name of the MDM service as a resource for the authorization.
这样就声明了DataPower Appliances必须使用MDM服务的名称作为资源授权。
Generally, you may choose to use an LDAP transaction authorization provider for the following reasons.
通常,可以选择使用LDAP事务授权provider,因为。
To use transaction authorization, you configure InfoSphere MDM Server to use a transaction authorization provider class.
为了使用事务授权,可以将InfoSphereMDMServer配置为使用一个事务授权provider类。
For this example, use the access Manager access control list (ACL) to manage the ObjectGrid authorization policies.
对于此示例,请使用AccessManager访问控制列表(Access Control List,ACL)来管理ObjectGrid授权策略。
Ideally, what should happen next is that another component will look at the identity in the certificate and then use that identity to make an authorization decision.
接下来理想的情况应该是另一个组件查看证书中的身份,然后使用该身份做出授权决策。
应用推荐