An individual seeking access authorization to a facility may be identified with a biometric parameter such as an iris scan.
可利用诸如虹膜扫描的生物特征参数识别寻求对设施的访问授权的个体。
Access authorization is assigned per client. You must create a user master record for each user in the client where he or she wishes to work.
访问授权在各客户中被指派。无论在哪工作,都必须在客户中为每一个用户建立用户主记录。
This activity is usually performed for network access authorization and authentication, content filtering, or to better utilize network bandwidth through caching.
通常为了进行网络访问授权和身份验证、内容筛选或通过缓存更好地利用网络带宽而进行此活动。
The access permissions associated with the client's access token have a scope, which defines the degree of access authorization the client has for the resource owner's (the end user's) resources.
在与客户的访问令牌访问权限有关联范围,它定义了访问授权的客户拥有资源所有者的程度(用户的)资源。
By evaluating the value of user attributes in the user credential, a qualified user is assigned to a specific role. This allows access authorization based on user characteristics and qualifications.
通过对用户证书中的属性取值进行评估,把符合条件的用户分配给特定角色,从而达到了根据用户的特征及资历实施访问授权的目的。
You have a proxy server that performs important authorization to limit who can access what applications at a coarse grained level.
有一个代理服务器,它执行重要的授权,以很粗的粒度限制谁可以访问什么应用程序。
This includes identification and authentication, authorization, access control, data masking, auditing, and encryption.
这包括识别、认证、授权、访问控制、数据屏蔽、审计和加密。
It allows a network access server (NAS) to perform authentication, authorization, and accounting for users.
它允许网络访问服务器(NAS)执行对用户的验证、授权和记帐。
If only the identity of the middle tier service is propagated to the downstream service, the downstream service does not have proper control over audit and authorization of access to the service.
如果只有中间层服务的标识传播到下游服务,则下游服务不能对服务访问审核和授权进行正确的控制。
They both share a lot of concepts and a domain — the domain of authentication, authorization, and access control.
它们有很多相同的概念,要处理的问题域也在很大程度上重叠:验证、授权和访问控制。
The security token (LTPA) created during the login is passed with data requests to back-end systems to enable them to perform authorization in providing controlled access to the data.
登录期间创建的安全标志(LTPA)随数据请求传递到后端系统,使后端系统可以执行授权,从而提供对数据的有控制的访问。
It provides the consistent authentication and authorization services necessary for universal access.
它为通用访问提供了所需的一致的身份验证和授权服务。
A typical access control and authorization scenario includes three main entities — a subject, a resource, and an action — and their attributes.
典型的访问控制和授权场景包括三个主要实体:主体、资源和动作以及它们的属性。
If you have Authorization, then the person requesting access needs to be authorized to access the system.
如果您具有授权,则需要对请求访问的人进行授权以访问系统。
Make sure that you have server administrator authorization before you access the administration services.
在访问管理服务之前,确保您得到服务器管理员的授权。
XACML builds on SAML by providing the actual semantics used to define access control policy and authorization request and response messages.
XACML构建于SAML之上,提供了用于定义访问控制和授权请求及响应消息的实际语义。
Role-based authorization provides access to resources based on the fact that the user is a member of some class of users.
基于角色的授权基于用户是某类用户的成员这一事实提供对资源的访问。
In a real-world scenario, most RPs would check a user's authorization before granting access.
在真实的场景中,大多数rp会在授予访问权之前检查用户的授权。
Service usage is cumbersome due to multiple Authentication and Authorization systems needed to give partners access.
由于合作伙伴需要访问多个身份验证和授权系统,因此服务的使用变得非常的繁琐。
Once the authentication process successfully establishes identity, authorization takes over to restrict or grant access.
一旦身份验证过程成功地建立起身份,授权就会接管以便进行访问的限制或允许。
Subject containing CORBA credential is used by the authorization service to further restrict access to JNDI resources.
授权服务使用包含CORBA凭证的对象进一步限制对JNDI资源的访问。
The purpose of authorization is to control access to resources on a per-ID, per-role, or per-profile basis.
授权的目的是对每个ID、每个角色、或者每个概要进行访问控制。
Now, let's go back and take a look at how we would solve our printer authorization problem using Tivoli Access Manager.
现在让我们回头看看如何使用TivoliAccessManager解决我们的打印机授权问题。
The Subscriber is also authorized to invoke the subscribed service in the Tivoli Access Manager-based authorization policy decision point.
还授权订阅者在基于TivoliAccessManager的授权策略决策点调用已订阅的服务。
This article describes the programming model for Human Task Manager staff resolution, which provides access control lists for instance-based authorization.
本文描述HumanTaskManager人员解析的编程模型,前者为基于实例的授权提供访问控制列表。
The objectDefinitionSource component contains access control definitions according to which authorization will take place.
objectDefinitionSource组件包含对应于将要发生的授权的访问控制定义。
If either userid does not have the required authorization to open the resource, then access fails.
如果任一userid都没有打开资源所需的授权,则访问失败。
This error indicates that the connectors are unable to access the SIBus due to authorization problems.
这个错误表明,连接器由于授权问题无法访问SIBus。
Using Acegi security provides your applications with comprehensive authentication, authorization, instance-based access control, channel security and human user detection capabilities.
使用Acegi安全性可以为应用程序提供全面的身份验证、授权、基于实例的访问控制、通道安全和人工用户检测功能。
Using Acegi security provides your applications with comprehensive authentication, authorization, instance-based access control, channel security and human user detection capabilities.
使用Acegi安全性可以为应用程序提供全面的身份验证、授权、基于实例的访问控制、通道安全和人工用户检测功能。
应用推荐