網站首頁 練習題 成語大全 造句 名詞解釋 經典語錄 名人語錄
當前位置:國文精選館 > 造句 > 

“security context”簡單造句,security context造句子

欄目: 造句 / 發佈於: / 人氣:1.61W

Managed threads are somewhat heavyweight and are associated with metadata, such as the transaction context and security context.

Determines if the workflow script will be run in an administrative security context.

You can authenticate and authorize callers at the Web server and then flow the caller's security context to the remote object by using impersonation.

The security context token optimizes performance similar to how traditional Web solutions use HTTP cookies for passing security context.

GNU ls USES a '. '(dot) character to signify a file with only an SELinux security context.

For example, the implementer could retrieve the requestor's user id from the security context on each request and use that to identify the target calculator total.

SIF creates a security context object, which is a placeholder for security-related information.

Security attribute propagation is a service provided by the application server to propagate various attributes, tokens, or objects related to the security context.

No security context is available to allow impersonation.

The black lines flowing between the stacks in the figures below represent flow of security context not information flow.

Security management manages the security context of the relationship and the transactions that pass through the adapter.

Do you want to change the default security context and weaken security for downlevel clients?

Impersonation allows the thread to interact with securable objects using the client's security context.

security context造句

Establishes a security context between the context initiator and the context acceptor.

Accepts a security context created by the context initiator.