security context造句

No security context is available to allow impersonation.

Do you want to change the default security context and weaken security for downlevel clients?

GNU ls USES a '. '(dot) character to signify a file with only an SELinux security context.

Security attribute propagation is a service provided by the application server to propagate various attributes, tokens, or objects related to the security context.

You can authenticate and authorize callers at the Web server and then flow the caller's security context to the remote object by using impersonation.

The security context token optimizes performance similar to how traditional Web solutions use HTTP cookies for passing security context.

Security management manages the security context of the relationship and the transactions that pass through the adapter.

The black lines flowing between the stacks in the figures below represent flow of security context not information flow.

security context造句

Establishes a security context between the context initiator and the context acceptor.

Impersonation allows the thread to interact with securable objects using the client's security context.

Accepts a security context created by the context initiator.

Determines if the workflow script will be run in an administrative security context.

Managed threads are somewhat heavyweight and are associated with metadata, such as the transaction context and security context.

For example, the implementer could retrieve the requestor's user id from the security context on each request and use that to identify the target calculator total.

SIF creates a security context object, which is a placeholder for security-related information.