The security identity of a SCA component is similar to the EJB run-as delegation policy.
SCA组件的安全标识与EJB run-as委托策略相似。
So the security Identity authentication system based on PKI is becoming wide attention.
因此,以PKI系统为基础的安全身份认证体系也在逐步得到广泛的关注。
Select the Security identity qualifier, and in the Privilege field enter delegate (Figure 12).
选择Security identity限定符,并在Privilege字段中输入delegate(图12)。
Users can only be mapped to the security identity at deployment time, using the Administration console.
用户只能在部署时使用管理控制台映射到安全标识。
Notice that you can choose, for the security identity, a role not authorized to access the SCA component.
请注意,可以为安全标识选择未授权访问SCA组件的角色。
Authorization and security identity for implementation.spring components is handled by the SCA container.
spring组件的授权和安全身份由sca容器处理。
The security-identity element specifies the security identity to be used to invoke methods in SimpleSessionBean.
security-identity元素指定用于调用 SimpleSessionBean 中的方法的安全标识。
The Security identity property causes the broker to locate the username and password pair from its own security store.
Security identity属性导致代理在自己的安全存储区中查找用户名和密码对。
As shown in Figure 11, we have defined "Security identity" on the CreateEmployee component by defining a role called "Payroll access".
如图11所示,我们已经在CreateEmployee组件上通过一个名为“Payroll access”角色的身份定义了“安全身份”。
The security identity qualifier specifies the identity under which the implementation executes at runtime by providing a logical role name.
安全身份限定符指定,以实现的身份在运行时通过提供一个逻辑角色名执行。
SCA policy sets, defined in the definitions.xml file, can be attached to the implementation to enforce authorization and security identity policies.
xml文件中定义的SCA策略集可以被附加到这个实现以实施授权和安全身份策略。
With EJB components, I need to define method permissions on a bean-per-bean basis. The same goes for security identity and transaction demarcations.
对于EJB组件,需要在bean-per-bean 的基础上定义方法许可,安全性验证和事务区分同样需要这样的办法。
The use-caller-identity element specifies that the caller's security identity be used as the security identity for the execution of the enterprise bean's methods.
use - caller - identity元素指定将调用方的安全标识用作执行企业Bean的方法的安全标识。
To configure the security identity to invoke the methods in an ejb, we use the security-identity element in the bean definitions under enterprise-beans element in ejb-jar.xml.
为了配置安全标识来调用ejb中的方法,我们在ejb - jar . xml的enterprise - beans下的bean定义中使用了security - identity元素。
In addition to configuring method permissions for a bean's methods, you can configure a Run-as role for the bean to specify the security identity with which the bean invokes other beans.
除了配置Bean的方法的方法权限外,还为Bean配置Run - as角色,以指定Bean用于调用其他Bean的安全标识。
You can specify whether a caller's security identity should be used for the execution of specified methods of an enterprise bean, or whether a specific run-as identity should be used.
你可以规定是应该使用调用者的安全标识,还是应该使用一个特定的run -as标识来执行企业bean的特定方法。
The application assembler can specify in the Deployment Descriptor whether the caller's Security Identity or a Run-As Security Identity should be used for the execution of the beans methods.
应用程序的组装人员可以在部署描述符中指明调用者的Security Identity或者Run-As Security Identity是否应该用于bean 方法的执行。
These moves do not provide total assurance that what your browser is told about an Internet site's identity and security is true.
这些措施并不提供全面保证你的浏览器所告知的关于一个互联网网站的身份和安全是真的。
If that link is compromised, an intruder could then assert any identity and completely undermine the security of the infrastructure.
如果该链接受到威胁,则入侵者就可以断言任何身份并彻底破坏基础设施的安全性。
If that link can be compromised, an intruder could then assert any identity and completely undermine the security of the infrastructure.
如果可以攻破该链路,入侵者就可以断言任何身份并彻底破坏基础设施的安全性。
As previously mentioned, identity mapping adds an additional layer of security to the scenario.
如前所述,身份映射给该场景添加了一个额外的安全层。
Once the security server confirms the identity of the user via secret key, the login process of the user into the DCE is completed.
一旦安全服务器通过秘密密钥确认了用户的身份,用户登录到DCE的过程就完成了。
You are going to test two scenarios: one for testing message flow security functions using the identity extracted from the HTTP header.
您将测试两个场景:一个使用从HTTP报头中提取的身份测试消息流安全性功能。
Authentication is a process to verify a person's identity for security purposes and authentication factor is the piece of information used to achieve it.
身份验证是出于安全目的检查人员身份的过程,而身份验证因素是用来实现身份验证的信息。
If you look ahead, the doves are right: the sole guarantee of both Israel's security and its Jewish identity is the creation of a proper Palestinian homeland in a largely settler-free West Bank.
如果展望未来,鸽派是正确得:以色列的安全以及犹太国身份的唯一保障,就是在大范围无人居住的西岸建立起适当的巴勒斯坦国。
Transport-layer security, message-layer security, threat protection, identity and access control – security is truly a first class citizen, and the gateways have the certifications to prove it.
传输层安全、消息级安全、入侵保护、身份认证和访问控制——安全的确是一等公民,而且网关中有证书来证实这一点。
He asked to remain anonymous for this article, saying he feared revealing his identity would put his security at risk.
他要求匿名发表这篇文章,说他害怕暴露他的身份而危及他的安全。
Rest assured, this didn’t involve me snatching the purse of the weakest old woman I could find, taking her credit cards & social security number, & assuming her identity for a few weeks.
请放心,这并不是说我要去抢年老体弱妇人的钱包,拿走她的信用卡和社会安全号码,然后用她的的身份逍遥几周。
The services are managed for identity and compliance through proper service-level security design and implementation.
通过适当的服务水平安全性设计和实现对服务进行标识和遵从性管理。
The services are managed for identity and compliance through proper service-level security design and implementation.
通过适当的服务水平安全性设计和实现对服务进行标识和遵从性管理。
应用推荐