thus, establishing robust identity management processes to achieve authentication and authorization is one of the key aspects to successfully compile a secure software solution.
因此,必须建立健壮的身份管理过程来实现身份验证和授权,这是成功实现安全的软件解决方案的关键因素之一。
the 「tiny little」 authentication and authorization system for this 「tiny little」 blog application is now in place.
这个 「微型」博客应用程序的 「微型」身份验证和授权系统现在已经初具雏形。
where appropriate authentication and authorization are not available, we resort to clever design and procedures to prevent potential problems.
如果没有合适的身份验证和授权,那么只能采取巧妙的设计和过程来防止潜在的问题。
in any distributed environment, in order to maintain universal access, consistent authentication and authorization services are a necessity.
在任何分布式环境中,为了提供普遍的访问,都需要一致的身份验证和授权服务。
security might also be an issue: putting data into s3 means you have to use s3's access control system, which might not fit your authentication and authorization requirements.
安全性也许会成为一个问题:将数据放入s3 中意味着您必须使用s3的访问控制系统,而这个系统可能不能满足您的身份验证和授权需求。
authentication and authorization introduce how to design the organizational structure and access control (privileges) data storage/access patterns.
身份验证和授权说明如何设计组织结构和访问控制(特权)数据存储/访问模式。
where appropriate authentication and authorization are not available, then you must resort, frankly, to clever design and procedures to prevent potential problems.
如果无法采用适当的身份验证和授权,那么只能采取巧妙的设计和过程来防止潜在的问题。
in the next section, you will see how to set up authentication and authorization rules using ldap.
在下一部分中,您可了解到如何利用ldap来建立认证与授权规则。
authentication and authorization are combined together in radius.
在radius 中,验证和授权是组合在一起的。
you can also set authentication and authorization configuration for xml management.
您还可以为xml管理设置身份验证和授权配置。
it provides the consistent authentication and authorization services necessary for universal access.
它为通用访问提供了所需的一致的身份验证和授权服务。
all the clients/servers trust the security server for authentication and authorization of the messages running over the wires in the network.
所有客户端/服务器都依赖安全服务器对在网络上传输的消息进行身份验证和授权。
at a high level, you apply authentication and authorization rigorously.
在高层上,严格应用身份验证和授权。
this section gives a short overview of authentication and authorization concepts of cm v8, as they will be needed to understand the replication process.
本节简要地概述一下cmv8 中验证和授权的概念,因为这些概念是理解复制过程所需要的。
you configure ejb authentication and authorization by defining security roles in the deployment descriptor under which each method executes.
ejb 的身份验证和授权配置方法为:在部署描述符中定义安全角色,每个方法将依据部署描述符执行。
at a high level, we apply authentication and authorization rigorously.
在高级别上,我们严格应用身份验证和授权。
as illustrated in figure 1, there are four main components in the architecture we proposed to implement the authentication and authorization mechanism in the multi-tenant application.
这个体系结构用于在多租户应用程序中实现身份验证和授权机制,如图1所示,它有四个主要组件。
this is the action where all the authentication and authorization steps for any particular request are performed.
这是在其中对任何特定请求执行所有身份验证和授权步骤的操作。
authentication and authorization concepts have to be carefully designed.
验证和授权这两个概念必须谨慎地加以设计。