1
کامپیوتر و شبکه::
اصالتسنجی، تایید اعتبار
8.1.1 Authentication and authorisation
Some bindings of the EPCIS Capture Interface provide a means for the EPCIS Service to authenticate the client's identity, for the client to authenticate the EPCIS Service's identity, or both.
The specification of the means to authenticate is included in the specification of each binding.
If the EPCIS Service authenticates the identity of the client, an implementation MAY use the client identity to make authorisation decisions as described below.
Because of the simplicity of the EPCIS Capture Interface, the authorisation provisions are very simple to state: namely, an implementation MAY use the authenticated client identity to decide whether a capture operation is permitted or not.،We'll cover the nitty gritty details of data modeling, hypermedia relationships, security, authentication and authorization, and much more.
I'll also choose No Authentication.
We'll add authentication later.
Which covers things like authentication and making sure users are authorized to perform actions in your system.
Later we'll found out the security story by adding Application security in the form of authentication and authorization.
واژگان شبکه مترجمین ایران