1·It should not be used as an insecure form of access authorization.
不要将其用作一种不安全的访问授权形式。
2·Log in to enter credentials for authentication and account access authorization.
登录以输入认证和帐户访问授权的凭证。
3·Any further access authorization is performed by NTFS file access permission's URL authorization.
任何进一步的存取授权将由NTFS档案存取使用权限的URL授权来执行。
4·The system achieves identity authentication, access authorization, and accounting management to the remote access users.
该系统实现了远程访问用户的安全认证、访问授权和记费管理。
5·An individual seeking access authorization to a facility may be identified with a biometric parameter such as an iris scan.
可利用诸如虹膜扫描的生物特征参数识别寻求对设施的访问授权的个体。
6·Access authorization is assigned per client. You must create a user master record for each user in the client where he or she wishes to work.
访问授权在各客户中被指派。无论在哪工作,都必须在客户中为每一个用户建立用户主记录。
7·This activity is usually performed for network access authorization and authentication, content filtering, or to better utilize network bandwidth through caching.
通常为了进行网络访问授权和身份验证、内容筛选或通过缓存更好地利用网络带宽而进行此活动。
8·The access permissions associated with the client's access token have a scope, which defines the degree of access authorization the client has for the resource owner's (the end user's) resources.
在与客户的访问令牌访问权限有关联范围,它定义了访问授权的客户拥有资源所有者的程度(用户的)资源。
9·By evaluating the value of user attributes in the user credential, a qualified user is assigned to a specific role. This allows access authorization based on user characteristics and qualifications.
通过对用户证书中的属性取值进行评估,把符合条件的用户分配给特定角色,从而达到了根据用户的特征及资历实施访问授权的目的。
10·This includes identification and authentication, authorization, access control, data masking, auditing, and encryption.
这包括识别、认证、授权、访问控制、数据屏蔽、审计和加密。