Frequently, other account specific data that has to be available once the user has been authenticated must also be stored.
在通常情况下,一旦用户通过验证,其他特定于账号的数据都必须是可用的,它们也必须被存储起来。
As Listing 6 illustrates, a POST request must be transmitted to the API endpoint by an authenticated client with the screen name of the user to be followed.
正如清单6所述,必须由已通过验证的客户机使用被关注者的用户名将POST请求传递至API端点。
The auth-constraint element is used to specify constraints for an authenticated user account that must be met prior to accessing protected pages.
auth-constraint元素用于指定对通过认证的用户帐户的约束,这些约束必须在访问受保护页面之前得到满足。
The application security role user must be mapped to All authenticated as shown in figure 5.
应用程序用户安全角色必须映射到All authenticated,如图 5 所示。
The application security role user must be mapped to All authenticated as shown in figure 5.
应用程序用户安全角色必须映射到All authenticated,如图 5 所示。
应用推荐