文语站

位置:首页 > 造句 > 

identity mapping造句

造句3.09W

The article example USES AAA info file to define the identity mapping rules.

identity mapping造句

Note the location and name of the exported XSLT file containing the identity mapping rule.

The preferred way to handle identity mapping is in the application server, performed by the infrastructure.

Handle identity mapping from the application code is the preferred method.

AAA info file can be used not only for identity mapping, but also for authentication and authorization.

If this capability is not available on the target server side, you should consider an outbound identity mapping scenario instead.