单选题The configuration of a Web Services Security management (WSSM) Partner allows for the specification of XSL mapping rules. What is the input and output of these XSL mapping rules?()A The input to the XSL mapping rules of a WSSM Partner is the binary sec

题目
单选题
The configuration of a Web Services Security management (WSSM) Partner allows for the specification of XSL mapping rules. What is the input and output of these XSL mapping rules?()
A

The input to the XSL mapping rules of a WSSM Partner is the binary security token as received on the Web Service request. The output of the mapping rules is a new security token ready for use by the Web Service application. 

B

The input to the XSL mapping rules of a WSSM Partner is an STSUniveralUser XML document created from the security token received on the Web Service request. The output of the mapping rules is an arbitrary collection of attributes that will be made available to the Web Services application. 

C

The input to the XSL mapping rules of a WSSM Partner is an STSUniveralUser XML document created from the security token received on the Web Service request. The output of the mapping rules is a new STSUniversalUser XML document that represents the security token required by the application. 

D

The input to the XSL mapping rules of a WSSM Partner is an STSUniveralUser XML document created from the security token received on the Web Service request. The output of the mapping rules is an IBM Tivoli Access Manager for e-business credential that will be used to authorize the partner's access to the Web Service application.

参考答案和解析
正确答案: C
解析: 暂无解析
更多“单选题The configuration of a Web Services Security management (WSSM) Partner allows for the specification of XSL mapping rules. What is the input and output of these XSL mapping rules?()A The input to the XSL mapping rules of a WSSM Partner is the binary sec”相关问题