1·Any authorization code can be injected here.
任何授权代码都可以在此注入。
2·Note that the developer need write no authorization code.
请注意,部署人员无需编写任何授权代码。
3·Authorization code which includes two groups: group 1 is the month to 5-bit binary code, date of group 2 is 5-bit binary code.
其中授权码包含二组:第1组是当月的5位二进制码、第2组是当日的5位二进制码。
4·Authorization checking performed in this way will be somewhat slower than inline code, particularly when invoked through a separate process.
以这种方式执行的授权检查将比内联代码慢一点,尤其是在通过单独的进程来调用的时候。
5·Authorization is invoked frequently and across a wide footprint of code.
频繁地调用授权,并且可以跨大量的代码进行调用。
6·The first is a time-based authorization mechanism and the second is the ability to be further expanded by other macros and code.
第一个特性是基于时间的授权机制,第二个特性是能够由其他宏和代码进行进一步扩展。
7·But lots of programmers could know the application's DB2 authorization ID and password-because, as mentioned, these are embedded in program code.
但是许多程序员可能知道应用程序的DB 2授权ID和密码,因为前面已经提到,这些信息嵌入到程序代码中。
8·A developer can authorize or deny arbitrary functionality as needed, but the application's authorization policy is now partially or completely embedded in its code.
开发人员可以根据需要授权或拒绝任意功能,但是应用程序授权策略现在部分或全部嵌入在其代码中。
9·Instead of giving your ATM card and PIN code, the card can double as a credit card with a signature authorization.
不用交出你的ATM卡和PIN密码,只需获得信用卡签名的授权,你就可以使用信用卡。
10·Legacy portals had been deployed with custom authorization and authentication methods, each with custom code that needed to be updated and maintained.
遗留门户已经使用自定义授权和身份验证方法部署,每个门户都有需要更新和维护的自定义代码。