造句

當前位置 /首頁/造句 > /列表

用“security context”造句大全,security context造句

GNU ls USES a '. '(dot) character to signify a file with only an SELinux security context.

Security attribute propagation is a service provided by the application server to propagate various attributes, tokens, or objects related to the security context.

You can authenticate and authorize callers at the Web server and then flow the caller's security context to the remote object by using impersonation.

No security context is available to allow impersonation.

Do you want to change the default security context and weaken security for downlevel clients?

Impersonation allows the thread to interact with securable objects using the client's security context.

For example, the implementer could retrieve the requestor's user id from the security context on each request and use that to identify the target calculator total.

The security context token optimizes performance similar to how traditional Web solutions use HTTP cookies for passing security context.

Security management manages the security context of the relationship and the transactions that pass through the adapter.

Accepts a security context created by the context initiator.

Managed threads are somewhat heavyweight and are associated with metadata, such as the transaction context and security context.

security context造句

Establishes a security context between the context initiator and the context acceptor.

The black lines flowing between the stacks in the figures below represent flow of security context not information flow.

SIF creates a security context object, which is a placeholder for security-related information.

Determines if the workflow script will be run in an administrative security context.

TAG標籤:Context 造句 security #