文语站

位置:首页 > 造句 > 

security context造句

造句1.74W

Accepts a security context created by the context initiator.

security context造句

Establishes a security context between the context initiator and the context acceptor.

No security context is available to allow impersonation.

The security context token optimizes performance similar to how traditional Web solutions use HTTP cookies for passing security context.

SIF creates a security context object, which is a placeholder for security-related information.

Do you want to change the default security context and weaken security for downlevel clients?

Managed threads are somewhat heavyweight and are associated with metadata, such as the transaction context and security context.

Security management manages the security context of the relationship and the transactions that pass through the adapter.

GNU ls USES a '. '(dot) character to signify a file with only an SELinux security context.

Impersonation allows the thread to interact with securable objects using the client's security context.

Determines if the workflow script will be run in an administrative security context.

Security attribute propagation is a service provided by the application server to propagate various attributes, tokens, or objects related to the security context.

The black lines flowing between the stacks in the figures below represent flow of security context not information flow.

For example, the implementer could retrieve the requestor's user id from the security context on each request and use that to identify the target calculator total.

You can authenticate and authorize callers at the Web server and then flow the caller's security context to the remote object by using impersonation.