security access token 中文意思是什麼

security access token 解釋
安全性訪問令牌
  • security : n 1 安全(感);安穩;穩妥;平安。2 確實;確信;把握;可靠性;安心。3 【軍事】防禦物。4 保護;防...
  • access : n. 1. 接近;會面。2. 捷徑,門路〈指方法、手段〉;檢查孔;進路,入口;【自動化】(存貯器的)存取。3. (病的)發作;(怒氣等的)爆發。4. 增加。
  • token : n 象徵,記號,標記;表示物,證物;紀念品;代幣,代價券;【語言學】語言符號;【英史】私鑄貨幣;【...
  1. If the web site is configured to support only anonymous access in iis, then the security token passed from iis will be that of the windows user account for anonymous access as configured in iis

    如果網站配置為僅支持iis中的匿名訪問,則從iis傳遞的安全標記將是iis中配置的匿名訪問的windows用戶帳戶的安全標記。
  2. The authentication is done using standard token sharing protocol of gss ( generic security service ) while authorization is done by simply looking for the client ' s dn in the database, then return a limited proxy certificate, which embeds the security policies relating with the requesting user in the virtual organization. ldap stores contents about certificate authority, object policy and locality information and so on. aces enhances the resource severs and enables them to recognize the access control policies embedded in the proxy certificates, and implements the fine - grained access control through combining its own policies with

    訪問控制決策子系統接受它所管轄的虛擬域內用戶的請求,利用gss ( genericsecurityservice )標準令牌交換協議相互驗證身份后,通過查詢數據庫得到用戶相關的授權策略,並把授權策略寫入到代理證書中,返回給請求用戶; ldap目錄服務器儲存了ca證書、資源策略和位置信息等;訪問控制實施子系統通過對應用程序授權部分進行擴展,使其支持嵌入在代理證書中的授權策略,並結合本地的安全策略做出最終決策。
  3. The use of integrated security to access external data sources poses a special concern for report users who may not know that their security token is being passed to an external data source users are not warned in advance of running a report that the report is configured to use integrated security

    對于那些可能不知道其安全令牌將傳遞到外部數據源的用戶,使用集成安全性訪問外部數據源會為其帶來一個特殊問題(在運行報表之前不會事先通知用戶報表配置為使用集成安全性) 。
分享友人