Writing the access control policy.
编写访问控制策略。
Implementing an access control policy usually consists of two steps.
实现访问控制策略通常包含两个步骤。
You can divide configuring a simple access control policy into two steps.
配置简单的访问控制策略可分为两个步骤。
This section shows you how to configure IF to implement an access control policy.
本节将向您展示如何配置IF来实现访问控制策略。
Interceptors use your application's access control policy to make authorization decisions.
拦截器使用应用程序的访问控制策略来做出授权决定。
Should the access control policy for the Wiki need to be changed, you only need to change a rule.
如果需要更改Wiki的访问控制策略,您只需更改某个规则。
This method employs service domain as a unit in which the access control policy is organized.
这种方法以服务域作为访问控制策略的组织单元,简化访问控制的管理和使用。
Later in the article, you'll see the simple access control policy used in building a sample application.
在本文后面的部分,您将看到使用简单的访问控制策略构建一个样例应用程序。
For the moment, however, I'll stick to showing you how to configure a simple access control policy using Acegi.
但是,目前我将继续向您展示如何使用Acegi配置一个简单的访问控制策略。
I also show you how to configure Acegi to interact with the directory server to implement your access control policy.
我还将展示配置acegi的方法,使它能够与目录服务器交互并实现您的访问控制策略。
You will also learn how to configure Acegi to interact with the directory service to implement your access control policy.
您还将了解到如何配置Acegi,使它与目录服务交互,从而实现您的访问控制策略。
Lastly, the preserving security property of the fine-grained access control policy with respect to state transition is proven.
最后,证明了该细粒度协作访问控制策略关于协作系统的状态转换是保持安全的。
You have also learned in detail how to configure Acegi to interact with an LDAP directory and implement an access control policy.
您还详细了解了配置Acegi 的方法,从而与LDAP目录交互实现访问控制策略。
Main access control technology considers the system as a whole and provides the technical platform to implement access control policy.
主流的访问控制技术是从系统整体考虑,提供实施访问控制策略的技术平台。
XACML builds on SAML by providing the actual semantics used to define access control policy and authorization request and response messages.
XACML构建于SAML之上,提供了用于定义访问控制和授权请求及响应消息的实际语义。
Step 3: the DataPower appliance checks if the user is allowed to call the requested service by evaluating the access control policy written in XACML.
步骤3:DataPower设备通过计算用XACML编写的访问控制策略,检查是否允许用户调用所请求的服务。
For the moment, just note that an interceptor can intercept a user's request and implement an access control policy before allowing the user to access the bean.
现在,只需了解拦截器可以拦截用户并在用户访问bean之前实现访问控制策略。
On the other hand, time is a critical factor in the access control policy of some enterprise. User's authorization is restricted at predefined time periods.
另一方面,在某些企业的访问控制策略中,时间是一个关键性因素,用户的授权被限制在预先定义的时间范围内。
For example, there is an access control policy that allows all users that fulfill the customer Service Representative role to perform customer management operations.
例如,存在这样一个访问控制策略,其允许担当客户服务代表角色的所有用户执行客户管理操作。
These actions can be security configuration changes, key and certificate management, access control policy changes, bus and other system resources management, and so on.
这些操作可以是安全配置更改、密钥和证书管理、访问控制策略更改、总线和其他系统资源管理等等。
When the policy changes, the subsystems change its own access control policy by Administrative Commands, then make the RBAC Administration in Distributed systems consistent.
当策略发生改变后,模型中各子系统根据管理指令进行自身的策略改变,使整个分布式系统中的RBAC访问控制策略达到一致。
The next article in this series will get you started with some more advanced uses of Acegi, beginning with writing an access control policy and storing it in a directory service.
本系列的下一文章将开始介绍 Acegi 的一些较为高级的应用,首先是编写访问控制协议并将其存储到目录服务中。
The results showed the model with single-log-in could access to resources in PULL mode, protect the private privacy and the access control policy and could be implemented easily.
分析表明,模型具有单点登录、PULL模式访问资源、用户隐私保护、访问控制策略保护、易于实现的特点。
The next article in this series shows you how to design access control policies, how to host them on a directory service, and how to configure Acegi to read your access control policy.
本系列的下一篇文章将展示如何设计访问控制策略,如何将它们托管在目录服务中,以及如何配置Acegi以读取您的访问控制策略。
Before 1970, in order to protect the information security in computer systems, mandatory and discretionary access control policy had been widely applied in secure computer systems.
在上世纪七十年代以前,为保证计算机系统中的信息安全性,自主存取控制和强制存取控制策略在计算机多安全级系统中得到了广泛的应用。
In this second article, I begin to discuss the more advanced USES of Acegi, starting with writing an access control policy and storing it in ApacheDS, an open source LDAP directory server.
在第二篇文章中,我将讨论Acegi的更加高级的应用,首先我将编写一个访问控制策略并将其存储在ApacheDS中,ApacheDS是一个开源的LDAP目录服务器。
Acegi relieves you from writing code, so in this article, I show you how to first store user and role information in ApacheDS and then implement an access control policy for that information.
Acegi将减轻代码编写的工作,因此在这篇文章中,我将展示如何将用户和用户角色信息存储到ApacheDS中,然后实现这些信息的访问控制策略。
Access control policy is an important part of network security policy, and for the advantage of convenient and effective the role based access control policy attracts more extensive attention.
访问控制策略是网络安全策略的重要组成部分,基于角色访问控制策略以其方便有效的特点日益受到人们的关注。
Other mediation patterns provide direct or indirect access to the security and management policy definition points so that the mediation flow can perform the appropriate control.
其他中介模式提供了对安全和管理策略定义点的直接或间接访问,以便中介流能够执行适当的控制。
Other mediation patterns provide direct or indirect access to the security and management policy definition points so that the mediation flow can perform the appropriate control.
其他中介模式提供了对安全和管理策略定义点的直接或间接访问,以便中介流能够执行适当的控制。
应用推荐