• The security identity of a SCA component is similar to the EJB run-as delegation policy.

    SCA组件安全标识EJB run-as委托策略相似。

    youdao

  • So the security Identity authentication system based on PKI is becoming wide attention.

    因此PKI系统为基础安全身份认证体系在逐步得到广泛的关注。

    youdao

  • Select the Security identity qualifier, and in the Privilege field enter delegate (Figure 12).

    选择Security identity限定符Privilege字段中输入delegate(12)。

    youdao

  • Users can only be mapped to the security identity at deployment time, using the Administration console.

    用户只能部署使用管理控制台映射安全标识

    youdao

  • Notice that you can choose, for the security identity, a role not authorized to access the SCA component.

    注意可以安全标识选择授权访问SCA组件角色

    youdao

  • Authorization and security identity for implementation.spring components is handled by the SCA container.

    spring组件授权安全身份sca容器处理

    youdao

  • The security-identity element specifies the security identity to be used to invoke methods in SimpleSessionBean.

    security-identity元素指定用于调用 SimpleSessionBean 中的方法安全标识

    youdao

  • The Security identity property causes the broker to locate the username and password pair from its own security store.

    Security identity属性导致代理自己的安全存储区中查找用户密码

    youdao

  • As shown in Figure 11, we have defined "Security identity" on the CreateEmployee component by defining a role called "Payroll access".

    如图11所示,我们已经在CreateEmployee组件通过一个名为Payroll access”角色身份定义了“安全身份”。

    youdao

  • The security identity qualifier specifies the identity under which the implementation executes at runtime by providing a logical role name.

    安全身份限定符指定,以实现身份在运行时通过提供一个逻辑角色执行

    youdao

  • SCA policy sets, defined in the definitions.xml file, can be attached to the implementation to enforce authorization and security identity policies.

    xml文件定义SCA策略可以附加这个实现实施授权安全身份策略

    youdao

  • With EJB components, I need to define method permissions on a bean-per-bean basis. The same goes for security identity and transaction demarcations.

    对于EJB组件需要bean-per-bean基础上定义方法许可安全性验证事务区分同样需要这样的办法。

    youdao

  • The use-caller-identity element specifies that the caller's security identity be used as the security identity for the execution of the enterprise bean's methods.

    use - caller - identity元素指定将调用安全标识用作执行企业Bean的方法安全标识。

    youdao

  • To configure the security identity to invoke the methods in an ejb, we use the security-identity element in the bean definitions under enterprise-beans element in ejb-jar.xml.

    为了配置安全标识调用ejb中的方法我们ejb - jar . xml的enterprise - beansbean定义使用security - identity元素

    youdao

  • In addition to configuring method permissions for a bean's methods, you can configure a Run-as role for the bean to specify the security identity with which the bean invokes other beans.

    除了配置Bean方法方法权限外,Bean配置Run - as角色指定Bean用于调用其他Bean安全标识

    youdao

  • You can specify whether a caller's security identity should be used for the execution of specified methods of an enterprise bean, or whether a specific run-as identity should be used.

    可以规定应该使用调用者安全标识还是应该使用一个特定run -as标识来执行企业bean特定方法

    youdao

  • The application assembler can specify in the Deployment Descriptor whether the caller's Security Identity or a Run-As Security Identity should be used for the execution of the beans methods.

    应用程序组装人员可以部署描述符中指明调用者Security Identity或者Run-As Security Identity是否应该用于bean 方法的执行

    youdao

  • These moves do not provide total assurance that what your browser is told about an Internet site's identity and security is true.

    这些措施并不提供全面保证浏览器所告知关于一个互联网网站身份安全真的

    youdao

  • If that link is compromised, an intruder could then assert any identity and completely undermine the security of the infrastructure.

    如果链接受到威胁,入侵者就可以断言任何身份彻底破坏基础设施安全性

    youdao

  • If that link can be compromised, an intruder could then assert any identity and completely undermine the security of the infrastructure.

    如果可以攻破链路入侵者可以断言任何身份彻底破坏基础设施安全性

    youdao

  • As previously mentioned, identity mapping adds an additional layer of security to the scenario.

    前所述,身份映射场景添加了一个额外安全

    youdao

  • Once the security server confirms the identity of the user via secret key, the login process of the user into the DCE is completed.

    一旦安全服务器通过秘密密钥确认了用户身份,用户登录DCE过程完成了

    youdao

  • You are going to test two scenarios: one for testing message flow security functions using the identity extracted from the HTTP header.

    测试两个场景使用HTTP报头中提取身份测试消息安全性功能

    youdao

  • Authentication is a process to verify a person's identity for security purposes and authentication factor is the piece of information used to achieve it.

    身份验证出于安全目的检查人员身份过程身份验证因素用来实现身份验证的信息

    youdao

  • If you look ahead, the doves are right: the sole guarantee of both Israel's security and its Jewish identity is the creation of a proper Palestinian homeland in a largely settler-free West Bank.

    如果展望未来鸽派正确得以色列安全以及犹太国身份唯一保障就是大范围无人居住的西岸建立适当巴勒斯坦国

    youdao

  • Transport-layer security, message-layer security, threat protection, identity and access controlsecurity is truly a first class citizen, and the gateways have the certifications to prove it.

    传输层安全消息级安全、入侵保护身份认证访问控制——安全的确一等公民而且网关证书证实这一点

    youdao

  • He asked to remain anonymous for this article, saying he feared revealing his identity would put his security at risk.

    要求匿名发表篇文章害怕暴露身份而危及他的安全。

    youdao

  • Rest assured, this didn’t involve me snatching the purse of the weakest old woman I could find, taking her credit cards & social security number, & assuming her identity for a few weeks.

    放心不是说要去年老体弱妇人钱包拿走信用卡社会安全号码,然后用她的的身份逍遥

    youdao

  • The services are managed for identity and compliance through proper service-level security design and implementation.

    通过适当服务水平安全性设计实现对服务进行标识遵从性管理

    youdao

  • The services are managed for identity and compliance through proper service-level security design and implementation.

    通过适当服务水平安全性设计实现对服务进行标识遵从性管理

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定