计算机英语第九章.pptVIP

  • 66
  • 0
  • 约4.19万字
  • 约 87页
  • 2021-07-05 发布于湖北
  • 举报
Reading Material 4. Centralized User Profiles for Authentication Given the sensitivity of data, it becomes essential to have an appropriate authentication mechanism in place. Access to these data should be based on the user profiles defined in the key manager. Only the authenticated users will be assigned and issued credentials to get access to the encrypted resources which are associated with the user profile. These user profiles are managed with the help of a user which has administrative rights in the key manager. In general, the best practice is to follow an approach where no single

文档评论(0)

1亿VIP精品文档

相关文档