Step 5: Create an instance of the XKMSRegister object by providing the XKMS key data and authorization information.
步骤5:通过提供XKMS密钥数据和授权信息,创建XKMSRegister对象的一个实例。
Start the test again over from Step 3 and provide a valid username wmbuser2 and password user2pw to examine the authorization.
再次从第3步开始进行测试,提供有效的用户名wmbuser2和口令user2pw,检查授权。
As Step 5d in Figure 3 illustrates, BOB's identity is now asserted all the way to the DB2 data source, and his identity is used for accurate authorization, auditing, and so on.
从图3中的步骤5d可以看到,BOB的身份现在一直断言到db 2数据源,他的身份将用于准确地授权、审计等。
应用推荐