identity mapping造句

The preferred way to handle identity mapping is in the application server, performed by the infrastructure.

If this capability is not available on the target server side, you should consider an outbound identity mapping scenario instead.

Handle identity mapping from the application code is the preferred method.

identity mapping造句

Note the location and name of the exported XSLT file containing the identity mapping rule.

AAA info file can be used not only for identity mapping, but also for authentication and authorization.

The article example USES AAA info file to define the identity mapping rules.