| 1. | Access authorization information like user names and passwords 访问授权信息(比如用户名和密码) 。 |
| 2. | Log in to enter credentials for authentication and account access authorization 登录以输入认证和帐户访问授权的凭证。 |
| 3. | Any further access authorization is performed by ntfs file access permission s url authorization 任何进一步的访问授权均由ntfs文件访问权限的url授权来执行。 |
| 4. | Any attempt to perform these tasks without the proper access authorization will result in an exception error 在没有适当访问授权的情况下,任何执行上述任务的尝试都将导致异常错误。 |
| 5. | That is , the messaging engine authorizes access to the queue based on the connection identity as we discussed earlier 即,消息传递引擎将根据我们前面讨论的连接标识对此队列进行访问授权。 |
| 6. | Thanks to jaas we are able to identify users who access our system and restrict their access to the parts of the system they re authorized to use 有了jaas ,我们就可以识别访问系统的用户并限制他们只能访问授权使用的那部分系统。 |
| 7. | Thirdly , the paper analyzes how to carry out cwiss security , such as single - sign on , the rules and implementing in accessing resources and authorizing 再次,对校园网安全性实现问题,如单点登录、资源访问授权的规则与实施等问题进行了详细的阐述和分析。 |
| 8. | A cas credential includes authorization assertions that describe the user s role in a community and can be used by end resources to grant access accordingly Cas证书包括了授权声明,其中描述了用户在社区中的角色,终端资源也可以使用它来进行相应的访问授权。 |
| 9. | The thesis emphasize further research on both identity identification and authorization access based on role access control . a new identity identification protocol and a new method of access authorization are presented 论文着重对身份认证和基于角色的存取控制授权访问进行了深入研究,并提出新的身份认证协议和访问授权方法。 |