Add user and group entities in an external security provider.
在外部安全提供者中添加用户和组实体。
You need to at least make sure that MDM Server talks to the right security provider.
您至少需要确保MDMServer与正确的安全提供者交流。
To perform the authentication, mapping, and authorization, an external security provider is required.
为了执行验证、映射和授权,就需要使用外部安全提供者。
As mentioned above, the message flow security implementation depends on an external security provider.
如上文所述,消息流安全性实现依赖于外部安全性提供者。
EnSTratus works by separating the roles of infrastructure provider from the role of security provider.
EnSTratus通过将基础设施提供者角色与安全提供者角色分离的方法来运作。
The above code will add the Sun JCE provider as the last-approved security provider in the security registry.
上面的代码将添加sunJCE提供者作为安全性注册表内最后一个被批准的安全性提供者。
Thus, in order to configure any kind of security for the IBM Cognos environment, a security provider must be configured.
因此,要想为IBMCognos环境配置任何类型的安全性,就必须配置安全性提供者。
Based on 2007 annual revenues, USA is the country's fourth largest security firm, and the second largest U. S. -owned security provider.
根据2007年的年度收入,美国安全协会已经是美国第四大安全公司以及第二大的安全产品提供商。
I apologize to each and every one of you-i realize that security is fundamentally about trust and you have to trust your security provider.
我向每一个您,我认识到,安全是根本就是信任,你必须信任你的安全提供。
JACC specifies how an application server and a security provider can talk to each other to determine whether a particular request should be fulfilled.
JACC指定了应用服务器和安全提供程序如何相互交流以决定是否实现某个特定请求。
To configure the message flow security, an external security provider is required, such as Tivoli Directory Server, to be used as the security enforcement.
要配置消息流安全性,需要使用外部安全性提供者来强制实施安全性,例如TivoliDirectoryServer。
The security framework is made up of four layers: security service interface, security service, security service provider interface and security provider.
该安全框架采用了分层的结构:安全服务接口层、安全服务层、安全提供者接口层和安全提供者层。
"Police departments across the U. S. are starting to drown in smart phone thefts, "says Tom Kemp, CEO of Centrify, a software and cloud security provider.
软件与云安全服务提供商Centrify公司的CEO汤姆•坎姆指出:“全美各地的警察局几乎都被智能手机被盗的案子给淹没了。”
Both of the publish applications in this article use IBM's SSL support, but other implementations can be used by changing the protocol handler and the security provider.
本文中的两个发布应用程序都使用IBM的SSL支持,但是可以通过更改协议处理程序和安全性供应商来使用其它实现。
This allows you to control access to a message flow on a per message basis, using the identity of the message. The broker can, with the use of an external security provider.
这允许您使用消息的标识按每个消息控制对消息流的访问。
It is important to get the "Namespace id" from the properties of the security provider and not the name of the leaf under the Authentication leaf in the explorer pane on the left.
重要的是从安全提供者的属性获取“NamespaceID ”,而不是左侧的浏览器面板中的Authentication叶下的叶的名称。
The ordering of the security.provider lines in the file doesn't matter, but it's a good idea to add this after the other lines for predefined security provider implementations.
provider行在文件中的顺序并不重要,但是最好将其添加到实现预定义安全提供程序的代码行的后面。
The usernames have been added to the security registry in use by the service provider.
已通过服务提供者将用户名添加到正在使用的安全注册中心。
Zhou Hongyi, founder of Qihoo 360 Technology, China’s largest internet security software provider, is not afraid to battle with his competitors.
奇虎360技术公司是中国最大的互联网安全软件提供商,该公司创始人周鸿祎无惧对手的竞争。
JACC provides the ability to delegate the permissions checking of security authorization to an external provider.
JACC提供了将安全授权的权限检查委托给外部提供程序的功能。
The other properties specify the provider URL and the security principal and credentials.
其他属性指定提供者url以及安全主体和凭证。
For example, a small healthcare provider can employ a profile composed of standards that govern security.
比如,小型保健机构可以采用由控制安全的标准组成的配置文件。
The bean Provider is responsible for declaring all the security role names used in the enterprise bean code.
bean提供者负责声明所有在企业bean代码中所用到的安全性角色的名称。
The sample Web service provider application is configured to use WS-Security with a lightweight Third Party Authentication (LTPA) token.
实例Web服务提供者应用程序配置为通过轻量级第三方认证(Lightweight Third Party Authentication,LTPA)令牌使用WS-Security。
Security problems with the DB2 Web Service provider.
DB 2Web服务提供者的安全性问题。
If this is the case, you can be confident that the client user identity is being successfully propagated to the Web service provider application using WS-Security.
如果是这样,则可以确信客户机用户标识使用WS - Security成功传播到了Web服务提供者应用程序。
In the next section, we discuss the problems that arise with DB2 Web Service provider security and show how to address this in WebSphere.
在下一节中,我们讨论DB 2Web服务提供者安全性所引起的问题,并展示如何在WebSphere中解决这些问题。
The problems of an administrator who sets up security for the DB2 Web Service provider are the problem of identification and authentication, which we have already mentioned.
为DB 2Web服务提供者设置安全性的管理员的问题是识别和认证的问题,这个我们已经提到过。
The problems of an administrator who sets up security for the DB2 Web Service provider are the problem of identification and authentication, which we have already mentioned.
为DB 2Web服务提供者设置安全性的管理员的问题是识别和认证的问题,这个我们已经提到过。
应用推荐