當前位置:中文谷 >

造句

> security context造句怎麼寫

security context造句怎麼寫

Security management manages the security context of the relationship and the transactions that pass through the adapter.

Impersonation allows the thread to interact with securable objects using the client's security context.

Security attribute propagation is a service provided by the application server to propagate various attributes, tokens, or objects related to the security context.

For example, the implementer could retrieve the requestor's user id from the security context on each request and use that to identify the target calculator total.

Accepts a security context created by the context initiator.

No security context is available to allow impersonation.

SIF creates a security context object, which is a placeholder for security-related information.

Managed threads are somewhat heavyweight and are associated with metadata, such as the transaction context and security context.

Determines if the workflow script will be run in an administrative security context.

You can authenticate and authorize callers at the Web server and then flow the caller's security context to the remote object by using impersonation.

The security context token optimizes performance similar to how traditional Web solutions use HTTP cookies for passing security context.

GNU ls USES a '. '(dot) character to signify a file with only an SELinux security context.

security context造句

Establishes a security context between the context initiator and the context acceptor.

The black lines flowing between the stacks in the figures below represent flow of security context not information flow.

Do you want to change the default security context and weaken security for downlevel clients?

標籤: security 造句 Context
  • 文章版權屬於文章作者所有,轉載請註明 https://zhongwengu.com/zh-hant/sentence/w0ql2o.html