用identity mapping造句子,“identity mapping”造句

來源:國語幫 2.98W

If this capability is not available on the target server side, you should consider an outbound identity mapping scenario instead.

The preferred way to handle identity mapping is in the application server, performed by the infrastructure.

The article example USES AAA info file to define the identity mapping rules.

AAA info file can be used not only for identity mapping, but also for authentication and authorization.

identity mapping造句

Note the location and name of the exported XSLT file containing the identity mapping rule.

Handle identity mapping from the application code is the preferred method.

熱門標籤