authorization
n. 授权,认可;批準,委任
2025-09-06 13:44 浏览次数 6
n. 授权,认可;批準,委任
"authority for the program was renewed several times"
"he has the authority to issue warrants"
"deputies are given authorization to make arrests"
letter of authorization授权证书;委任证书
procurement authorization[贸易] 采购授权书
access authorization存取授权;访问权限
authorization norm授权规范
authorization code授权代码
written authorization授权书;核準书
program authorization程序授权
Code Authorization代码授权
authorization letter授权书;授权信
Student Authorization学生签证
authentication and authorization鑒别与授权;验证和授权
Without authorization私自
AUTHORIZATION PAGE授权页
finally, consider the authorization and authentication example from above.
最后,考虑上面的授权和身份验证的例子。
the notion of authorization solves the problem, but introduces a few interesting scenarios, which i'll discuss below.
认可的概念解决了这个问题,但也引入了几个有趣的方案,我将在下面讨论。
what if there is a long time gap between the authorization and the capture?
如果在授权和捕获之间有一个长的时间间隙,那是什么呢?
you can define roles in this record as well provide authorization for your application.
您可以在这个记录内定义角色以及为应用程序提供授权。
the ability to produce -- and manipulate -- tables of this sort is a key capability for any authorization framework.
能够生成此类表并对这些表进行操作对于任何授权框架来说都是一项关键功能。
the best practices for authorization of topics have yet to emerge.
用于主题授权的最佳实践还没有出现。
what do our efforts now have to do with the original authorization of the use of force?
我们现在所做的一切和当初授权使用武力的初衷有还有什么联系吗?
in fact, i would go so far as to say that the authorization scheme is not complete until there is nothing that you can remove or simplify without breaking it.
事实上,我写了这么多文字的目的就是希望大家能够认识到,授权模式永远都不是完善的,除非已经简化到不能再简化为止。
so the question is: how does this impact j2ee application server security, and in particular, how does it affect authorization in this space?
因此,所面临的问题是:这将如何影响j2ee应用服务器的安全性,特别是它如何影响在此领域内的授权?
this can be a devil to debug because the authorization script may work one day and fail the next, and nothing in the script itself has changed.
这可能会影响调试工作,因为授权脚本可能在某一天正常工作,而在第二天失败,但脚本本身却没有发生任何变化。
i do not know yet what they will look like, but i do know that if we treat them as nothing more than extensions of the queue authorization model, the 「best」 practice will be wrong.
我还不知道它们将是什么样子,但是我知道,如果我们将它们简单视为队列授权模型的扩展,则该「最佳」实践将是错误的。
at a high level, we apply authentication and authorization rigorously.
在高级别上,我们严格应用身份验证和授权。
from a security perspective, attribute-level granularity of authorization privileges across all functions such as workflow, relationship and hierarchy management must be available for implementation.
从安全性的角度来看,必须跨所有功能(比如工作流、关系和层次结构管理)实现属性级的特权授权粒度。
in the next section, you will see how to set up authentication and authorization rules using ldap.
在下一部分中,您可了解到如何利用ldap来建立认证与授权规则。
as you can see, this is not a very clean implementation of the authorization requirements.
正如您所看到的,这并不是授权需求的一个条理非常清楚的实现。
authentication and authorization security.
认证和授权安全。
using this plug-in provider, you can model your staff queries for any plug-in, and switch authorization during your tests on and off by simply changing the staff plug-in provider jndi name for a task.
使用此插件提供程序,您可以针对任何插件建模您的人员查询,并且在打开和关闭测试期间,仅通过更改任务的人员插件提供程序jndi名称就可切换授权。
security -- authorization of the request, encryption and decryption as required, validation, etc.
安全性——请求的授权、加密和解密(在需要时)、确认等等
it is also possible to have a certain level of authorization for users that have not been authenticated.
还有一种可能是用户虽然具有了某种程度的授权,却并未经过身份验证。
this usually requires some form of authorization and authentication against a user registry.
这通常需要某种形式的授权和对用户注册的身份验证。
if you choose to deploy them, do so carefully and ensure that they have proper authorization on their operations.
如果您选择部署它们,要十分谨慎,以确保它们的操作具有合适的授权。
upon completing the article (or tour) you should have a complete understanding of both the conceptual basis of each authorization framework and its underlying mechanisms.
完成本文(或者游览)后,应当可以对每一种授权框架的基础概念及它们的底层机制有全面的了解。
the solution should implement some type of authentication system to understand who is asking for a resource and an authorization system to decide whether the access should be granted.
此解决方案应该实现某种类型的身份验证系统来理解谁正在请求一个资源,并实现一个授权系统来决定是否向其授予访问权。
administrators can create, transfer, or delete work items of every authorization role to anybody.
管理员可以向任何人创建、传输或删除每个授权角色的工作项。
for example, if no authentication or authorization of service requests is required, the choice of technology can be very broad.
例如,如果服务请求不需要提供身份验证或授权,实现技术的选择就可以非常的广泛。
you can also set authentication and authorization configuration for xml management.
您还可以为xml管理设置身份验证和授权配置。
yes是(表示肯定)
signature署名;签名;信号
license许可;特许;发许可证给
delegation代表团;授权;委托
subscription捐献;订阅;订金;签署
passport护照,通行证;手段
institution制度;建立;(社会或宗教等)公共机构;习俗
authority权威;权力;当局
credential证书;凭据;国书
freedom(Freedom)人名;(英)弗里德姆
warrant保证;担保;批準;辩解
concession让步;特许(权);承认;退位
interdiction禁止,制止;封锁
prohibition禁止;禁令;禁酒;诉讼中止令
proscription禁止;放逐;剥夺人权