Support for MDM deployments beyond enterprise boundaries by providing first-level authorization and identity mapping in DataPower. 通过在DataPower中提供一流的身份验证和身份映射,支持在企业范围之外部署MDM。
The identity mapping and the identity switch is performed by an outbound custom login module. 由出站自定义登录模块来进行标识映射和标识切换。
This method is called Identity Mapping and is handled by the nfsrgyd NFS daemon. 这种方法称为身份映射,由nfsrgydNFS守护进程处理。
This scenario requires a custom login module for the target server to perform the identity mapping. 这个场景需要一个自定义登录模块,以便目标服务器能够执行标识映射。
Select the XSLT file you want to use for identity mapping. 选择用于身份映射的XSLT文件。
Handle identity mapping from the application code is the preferred method. 由应用程序代码来处理标识映射,这是首选的方法。
The identity mapping uses a properties file to determine the mapped user identity. 标识映射使用属性文件来确定映射的用户标识。
The preferred way to handle identity mapping is in the application server, performed by the infrastructure. 要处理标识映射,首选的方法是在应用服务器中由基础结构执行处理过程。
In this case, for successful identity mapping, the EIM administrator has to also store the Kerberos realm to NFS domain mapping information in the EIM server. 在这种情况下,为了成功地实现身份映射,EIM管理员还必须在EIM服务器上存储Kerberos领域到NFS域的映射信息。
If this capability is not available on the target server side, you should consider an outbound identity mapping scenario instead. 如果在目标服务器端这种功能不可用,那么您应该考虑使用出站标识映射场景来代替。
The second outbound identity mapping scenario uses a custom login module on the sending server side. 第二个出站标识映射场景使用了发送服务器端中的一个自定义登录模块。
Identity mapping is about changing one identity to a different identity from a different user registry. 标识映射就是将一个标识更改为来自另一个用户注册中心中不同的标识。
The user_mapping.properties file is used in all three identity mapping scenarios. 在所有的三个标识映射场景中都使用了usermapping.properties文件。
Identity mapping is not a required approach but is generally recommended in cases when user and service authorization happens outside of the service provider. 身份映射不是必要的,但如果用户和服务授权发生在服务提供商范围之外,通常建议使用它。
A security profile is used to specify whether authentication, authorization, and identity mapping and propagation are performed on the identity of messages in the message flow, and if so, which external security provider is used. 一个安全配置文件被用于指定身份验证、授权、身份映射和广播是否在这个消息流中的消息身份上执行,如果是这样,外部安全提供者将被使用。
As previously mentioned, identity mapping adds an additional layer of security to the scenario. 如前所述,身份映射给该场景添加了一个额外的安全层。
AIX provides foreign identity mapping using EIM, which is an LDAP-based technology to manage multiple user registries in an organization. AIX使用EIM提供外部身份映射。EIM是一种基于LDAP的技术,用来管理组织中的多个用户注册表。
Define an XSLT file containing an identity mapping rule 定义包含身份映射规则的XSLT文件
In cases when outbound mapping does not meet the requirements for identity mapping, inbound identity mapping can open up new options. 在出站映射不满足标识映射的需求的情况下,入站标识映射可以提供一些新的选择。
Setting up EIM server/ client and adding Identity Mapping information 设置EIM服务器/客户机并添加身份映射信息
Note the location and name of the exported XSLT file containing the identity mapping rule. 请注意已导出的包含身份映射规则的XSLT文件的位置和名称。
The article example uses AAA info file to define the identity mapping rules. 本文的例子使用AAA信息文件定义身份映射规则。
AAA info file can be used not only for identity mapping, but also for authentication and authorization. AAA信息文件不仅可用于身份映射,还可以用于身份验证和授权。
To resolve this request correctly, the EIM administrator has to store the following foreign identity mapping information on the EIM server. 为了正确地解析这个请求,EIM管理员必须在EIM服务器上存储下面的外部身份映射信息。
The advantage of this approach is that it does not require additional application code to perform the identity mapping. 这种方法的优点是,它不需要附加的应用程序代码来执行标识映射。
Now the NFS server detects that the request is from the foreign domain and consults the EIM server for the foreign identity mapping information. 现在,NFS服务器发现这个请求来自外部域,因此向EIM服务器查询外部身份映射信息。
STS applies any required identity mapping ( group retrieval, attribute retrieval). STS应用所需的身份映射(获取组,获取属性)。
Add the user and group identity mapping information in the EIM server. 在EIM服务器中添加用户和组身份映射信息。
This paper raises a set of security policy, builds homologous security architectural model, and analyses the model detailedly from a angle of grid computational process, solves some problems such as single-on, identity mapping, etc. 本文提出一组安全策略,构建了相应的安全体系结构模型,并从一次典型网格计算过程的角度来详细分析该模型,解决了诸如单点登录、身份映射等问题。
Third, Inter-domain identity mapping and attribute mapping are gave for passing authorization information to achieve cross-domain unified authorization in the cross-domain interoperability. 第三、对于跨域互操作中如何传递授权信息,实现跨域统一授权这一关键问题,给出了域间身份映射和域间属性映射的解决方案。