If you have Authentication, then the user accessing a resource needs to be authenticated with rights and permissions to have access.
如果您具有认证,则需要对访问资源的用户进行认证以验证他们是否有访问的权利和权限。
Your automated tests will all have to access the database through some form of login or user authentication.
你的自动化测试将需要通过一些注册或者使用者身份验证的形式访问数据库。
It provides a unified mechanism to manage the authentication of users and implement business rules determining user access to applications and data.
它提供一个统一的机制来管理用户的身份验证,并实现业务规则来决定用户对应用程序和数据的访问。
Regardless of whether your application's access control will be based on passwords or roles, you'll still need a login and logout system to handle user authentication.
不管应用程序的访问控制基于密码还是基于角色,您都需要一个登录和注销系统来处理用户身份验证。
The user at home can access his company's Intranet by dial-up authentication.
用户在家里可以通过拨号验证访问他公司的内部网。
A login is used for user authentication and a database user account is used for database access and permissions validation.
登录用于用户身份验证,而数据库用户帐户用于数据库访问和权限验证。
Enabling security for user authentication and group permissions for access to requirements and documents
要访问需求和文档,就要为用户的鉴定和组权限激活其安全性
In a complete authentication system, you still need to write a policy decision point to decide if a user may access a Web page.
在完整的认证系统中,您仍需要编写策略决策点,以确定用户是否可以访问web页面。
The framework also exposes a powerful user authentication and access control subsystem that you can customize it to meet the requirements of almost any Web application.
该框架还公开一个强大的用户身份验证和访问控制系统,通过定制它几乎可以满足任意web应用程序的需求。
As you can see, this lets you specify which table in our database is used for authentication and the access level of the logged in user (the AccessLevel field).
正如您可以看到的,允许您指定使用数据库中的哪个表来进行身份验证,并允许您指定登录用户的访问级别(accesslevel字段)。
The user ID plato cannot access the noplatos database if the server side plug-in is invoked for authentication.
如果调用服务器端插件进行身份验证,则用户IDplato不能访问noplatos数据库。
Examples of Lotus Notes Services include the Domino Security Model which is used for user authentication, access control and encryption.
LotusNotes的服务实例包括Domino安全模型(Security Model),可以用它进行用户身份验证、访问控制和加密。
The Domino Directory typically keeps information recent and up-to-date, because authentication process USES this information and many user and server initiated tasks access this central file.
DominoDirectory通常要保持信息是最新的,因为身份验证过程要使用这些信息,用户和服务器发起的许多任务也要访问这个中心文件。
Using Acegi security provides your applications with comprehensive authentication, authorization, instance-based access control, channel security and human user detection capabilities.
使用Acegi安全性可以为应用程序提供全面的身份验证、授权、基于实例的访问控制、通道安全和人工用户检测功能。
DB2 UDB relies on this external security facility to authenticate a user and will only grant access to DB2 UDB resources if authentication is successful.
DB 2udb依赖于这个外部安全设施对用户进行身份验证,只有在身份验证成功时,才授予对DB 2 UDB资源的访问权。
If the user loses the certificate or the certificate is stolen, hackers can access this information without being challenged for authentication.
如果用户的证书丢失或被盗,黑客就能够访问信息而不用经过身份验证。
This forms the second factor of the two-factor authentication, where it is assumed that only the user will have access to his ATM card.
这是两因素身份验证的第二个因素,系统假设只有用户能够看到自己的atm卡。
An authentication profile is a container defining how the HTTP access service challenges for and validates user credentials.
认证profile是一个容器,其中定义HTTP访问服务如何询问和验证用户凭证。
The focus of this article is authentication, so if the user is authenticated by the OpenID Provider (OP), the sample application will grant access to the protected resource.
本文的重点是身份验证,所以如果OpenID提供者 (OP)验证了用户的身份,示例应用程序就会授予对受保护资源的访问权。
User id Plato can access databases other than noplatos when the server side plug-in is invoked for authentication.
当调用服务器端插件进行身份验证时,用户IDplato可以访问noplatos之外的数据库。
When using Windows authentication, the FileAuthorizationModule checks to make sure that the authenticated user has the appropriate access rights to access the specific ASP.NET page.
使用Windows身份验证时,FileAuthorizationModule将检查以确保通过身份验证的用户具有访问特定asp.net页面的相应权限。
Use the New button to create an authentication entry that contains the user name and password of a database user which has access to the Sample database.
使用New按钮创建身份验证条目,该条目包含有权访问Sample数据库的数据库用户的用户名和口令。
If the response to the authentication request is successfully verified, the user is granted access to whatever resource was being protected by the RP through OpenID.
如果对身份验证的响应得到成功检验,用户就有权通过OpenID访问由RP保护的任何资源。
It's quite possible for the authentication step to be passed, but to find the user isn't authorised to access something.
很可能认证步骤会被跳过,但是用户没有被授权访问。
If the response provided by the user matches the response computed by the authentication server, the user is granted access to the application or system.
如果用户提供的应答口令与认证服务器算出的应答口令相一致,用户就被授予访问应用程序或系统的权利。
Finally, combining RADIUS authentication server efficiently, the port control of user access in wireless security gateway is analyzed.
最后,本文分析了在有效结合RADIUS认证服务器时,无线安全网关上的用户访问的端口控制。
At last, it achieved user authentication access control system on the foundation of scheme design, and constructing experiment platform combining RADIUS authentication server.
最后,在方案设计基础上实现本认证与访问控制系统,结合RADIUS认证服务器构建实验系统平台。
In security module, the security technology of user authentication, message encryption, audit tracing and access control is used.
在安全模块中,使用了用户认证、通讯加密、审计追踪、访问控制等安全技术,并且引入了模糊控制与专家系统。
The essential security technologies of the distributed database are user authentication and access control.
分布式数据库安全的核心技术是用户身份验证和访问控制。
The network Auditing System usually used to implement the user authentication, access control, log recording and other functions such as flow charge in a large network.
网络审计系统广泛应用于园区网络,实现园区网络内的身份认证、访问控制、日志记录以及流量计费等功能。
应用推荐