• Steps to implement Role based security

    实现基于角色安全性步骤

    youdao

  • A JAAS-based security implementation.

    一个基于JAAS的安全实现

    youdao

  • IBM Cognos BI features for implementing Role based security.

    用于实现基于角色安全性IBMCognosbi特性

    youdao

  • We could potentially use standard J2EE role-based security to manage printer access.

    我们可以使用标准J2EE基于角色的安全性管理打印机访问

    youdao

  • The guide contains also the protocols to be used in a claims-based security architecture.

    指南包括使用基于声明安全架构协议

    youdao

  • At this point, it may be useful to ponder a bit on the concept of document-based security.

    此时,稍许认真考虑一下基于文档安全性概念可能有用。

    youdao

  • In conjunction with Role based Security, IBM Cognos bi also offers dynamic reporting capability.

    结合基于角色安全性IBMCognosBI提供动态报告功能

    youdao

  • Role-based security is the most straightforward way to organize commands for security purposes.

    基于角色安全性组织命令、实现安全性简单方法

    youdao

  • This script creates user and group tables that you'll use to set up a database-based security realm.

    这个脚本创建用户使用这些表设置基于数据库的安全域。

    youdao

  • Part 1 explains how to use Acegi's built-in filters to implement a simple URL-based security system.

    第1部分解释了如何使用Acegi内置过滤器实现一个简单基于URL安全系统

    youdao

  • Let's now discuss some frequently confusing issues for those new to Kerberos-based security systems.

    接下来我们讨论一些接触的基于Kerberos的安全系统的经常混淆问题

    youdao

  • Doing so gives your applications access to a strong and robust standards-based security infrastructure.

    这样做可以应用程序能够访问强大健壮且基于标准的安全性基础设施。

    youdao

  • To create dynamic reports that implement Role based security we use the following IBM Cognos BI functionality.

    创建实现基于角色安全性动态报告使用以下IBMCognosBI功能

    youdao

  • It provides user and role based security, which is one of the most important aspects of P2P for an organization.

    能够提供用户基于角色安全保证而这对于企业级应用P 2 P重要方面

    youdao

  • However, when it is first installed, Rational Asset Manager USES file-based security for user authentication.

    然而第一次安装时RationalAssetManager使用基于文件用户安全验证

    youdao

  • If all the validations are passed, a JAAS-based security context is created, including the identity of the user in a JAAS subject.

    如果通过了所有验证过程,那么将创建基于JAAS安全上下文包括JAAS主题用户标识

    youdao

  • The security Configuration Wizard allows you to create XML-based security policies, which can then be applied to your servers.

    安全配置向导允许创建基于XML的安全策略它们可以应用服务器上

    youdao

  • The following subsections provide instructions for configuring file-based security on WebSphere Application Server Version 6.1.

    以后小节提供了WebSphereApplicationServer版本 6.1配置基于文件安全指导

    youdao

  • The sample application uses a database-based security realm, and you must install the realm before you install the Web application.

    这个示例应用程序使用一个基于数据库安全,在安装Web 应用程序之前必须安装这个域。

    youdao

  • Due to limited processing power and memory, however, a domain-based security manager is not yet available in the MIDP 1.0 specification.

    但是由于处理能力内存有限MIDP 1.0规范可以使用基于域的安全性管理器。

    youdao

  • Tivoli Access Manager for e-business is a mature product that provides robust, policy-based security to a corporate web environment.

    TivoliAccessManagerfor e-business款成熟产品,能够企业web 环境提供强壮的基于策略安全性

    youdao

  • Security is another major area of change with the transition from the WebSphere security authorization model to role-based security.

    安全性更改另一个主要方面,它体现在WebSphere安全性授权模型基于角色安全性的转变中。

    youdao

  • In this series of articles, I introduced you to using Acegi security System to enforce both URL-based security and method-based security.

    这份共分三部分系列文章中介绍了如何使用Acegi安全系统增强基于URL安全性基于方法的安全性。

    youdao

  • Role based security is described as user-level security which focuses on the logical role of a user rather than the user's individual identity.

    基于角色安全性用户级安全性,主要关注用户逻辑角色不是个人身份。

    youdao

  • Role-based security is a great way to protect your organization's information assets, and it's probably easier to implement than you think.

    基于角色安全性保护企业信息资产一个不错的方法而且可能想象容易实现

    youdao

  • Part 1 of this series introduced Acegi and explained how to use its built-in security filters to implement a simple, URL-based security system.

    系列文章第1部分简单介绍了Acegi解释如何使用内置的安全过滤器实现一个简单的、基于url的安全系统

    youdao

  • Perhaps you need to access an existing inventory control system, a legacy customer database, or a mainframe-based security access control service.

    或许需要访问现有库存控制系统客户数据库基于大型机安全性访问控制服务

    youdao

  • In the first article in this series, I introduced Acegi and explained how to use security filters to implement a simple, URL-based security system.

    系列第一篇文章介绍了Acegi解释了如何使用安全过滤器实现一个简单基于URL的安全系统

    youdao

  • Authorization Support: Handled a variety of ways whether you use Windows authentication, thread principals, ASP.NET role-based security or your own.

    授权支持可以处理各种授权方式不管使用Windows验证线程安全主体、ASP.NET基于角色安全模式或者自己自定义的。

    youdao

  • Authorization Support: Handled a variety of ways whether you use Windows authentication, thread principals, ASP.NET role-based security or your own.

    授权支持可以处理各种授权方式不管使用Windows验证线程安全主体、ASP.NET基于角色安全模式或者自己自定义的。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定