For example, if you want to allow certain users to access guard points only if the users log in via SSH and Telnet, add | authenticator | in front of the login processes as shown in Listing 2.
例如,如果您希望仅允许通过ssh和telnet登录的特定用户访问保护点,那么需要在登录进程的前面添加| authenticator |,如清单2所示。
This object is then passed by JAAS to any authorization components that have been established to guard access to sensitive systems or resources.
然后JAAS将这个对象传递给任何为保护对敏感系统或资源的访问而建立的授权组件。
Any application that the policy allows access to can access the files that are under guard points as long as the application USES system libraries to access the files.
策略允许访问的任何应用程序都可以访问保护点下的文件,前提是该应用程序使用系统库来访问文件。
应用推荐