要将该任务限制在一部分人员手中,您必须建立角色并给它授予权限,然后向每个用户分配一个或多个角色。
To restrict that task to a subset of your constituents, you must establish a role, grant it permissions, and assign one or more roles to each user.
也就是说,通过欺骗在您的组织中工作的人员,攻击者可以获得权限以访问他们本不应该访问的系统和信息。
That is, by tricking the human beings that work for your organization, attackers are able to gain access to systems and information to which they should not have access.
您将看到与开发人员帐户相关联的分组成员身份在更新时,访问权限将如何随时间不断变化。
You will see how the access rights change over time as the group memberships associated with the developer's account are updated.
这些人员有权安装和删除应用程序、更改操作系统权限以及对属性和系统配置文件进行更改。
This person (or persons) has access to install and remove applications, change OS permissions, and make changes to property and system configuration files.
部署人员使用资产管理器来确保使用必要的语义、权限和范围约束来填充该元数据。
Deployers work with asset managers to ensure the metadata is augmented with the necessary semantics, permissions and scoping constraints.
治理是一个决策权限和管理框架,可确保在正确时间由经过授权的正确人员进行正确处理。
Governance is a decision rights and management framework which ensures that the right steps are taken at the right time by the right people who are empowered to take them.
一旦你确认了所有者身份,你可以依次访问”网站配置“ > ”抓取工具的权限“ > ”删除网址“ > ”已经删除的网址(或者其他人的请求)“,然后在人员你想取消的请求对应处点击取消。
Once you've verified ownership, you can go to Site configuration > Crawler access > Remove URL > Removed URLs (or > Made by others) and click "Cancel" next to any requests you wish to cancel.
针对开发人员,“Geneva”通过使用声明的方式来控制用户对程序的访问权限,通过使用预先构建好的安全逻辑与集成的.NET工具来减少开发工作量。
“Geneva” helps simplify user access for developers by externalizing user access from applications via claims and reducing development effort with pre-built security logic and integrated .NET tools.
每个管理员对于整个计算单元都具有相同的管理权限(在其分配的管理角色内:管理员、配置人员、操作员或监视人员)。
Every administrator has equal administrative authority (within their assigned authority of administrator, configurator, operator, or monitor) to the entire cell.
也就是说,通过欺骗在组织中工作的人员,攻击者可以获得权限以访问他们本不应该访问的系统和信息。
That is, attackers are often able to gain access to systems and information to which they should not have access by tricking the human beings that work for an organization.
另一组人员——除了所有者和管理员之外——可以具有读取或编辑任务数据的权限。
Another set of people — in addition to the owner and administrator - can have the privilege of reading or editing task data.
因此,权限是通过将人员与业务对象上的角色相关联来授予的。
Thus, authorization is granted by associating a person with a role on a business object.
这些系统对文件进行加锁,这样在某个时间只有一个开发人员对中心仓库具有写入权限。
These systems lock files so that only one developer has write access to the central repository at a time.
按设计这个模块被放在IIS进程中,运行在带有管理员权限的系统帐户下,该账户不能有编程人员和系统管理员修改。
By design, the module lives in the IIS process and runs under the system account with administrative privileges. This account cannot be modified by developers and system administrators.
任何终端用户、开发人员和网络架构师,如果其行为违反了本策略或任何其他相关的IT策略或法规,供应商有权限制或者停止服务。
Any end users, developers and network architects whose actions violate this policy or any other related it policy or regulations shall be subject to limitations or loss of service with the provider.
从我的角度来看,这类系统应该给使用SCM系统的开发人员设置适当的控制权限混合以培养他们的创造力。
From my perspective, this kind of system would give developers working with SCM the right mix of control and chaos to foster creativity.
SAML 向软件开发人员展示了如何表示用户、标识所需传送的数据,并且定义了发送和接收权限数据的过程。
SAML shows software developers how to represent users, identifies what data needs to be transferred, and defines the process for sending and receiving authorization data.
同样,部署人员必须在整个应用程序生命周期中维护个别权限到组的或主体映射。
Likewise, the deployers must maintain the individual permission-to-group or principal mappings over the life of the application.
如果您不具备正在使用的存储库的提交权限,就需要制作一个修补程序,然后将其发送给维护人员。
If you don't have commit access to the repository you're working with, you need to make a patch and send it to the maintainers instead.
人员分配标准的目的是授予用户访问权限来执行基于用户权限的任务,同时处理底层存储库。
The purpose of this People Assignment Criteria is to grant access to users to work on tasks based on the user authority in conjunction with the underlying repository.
J2EE 1.2使用安全性角色,凭借这个应用程序开发人员就能指定哪些角色有访问特定方法的权限,并且部署人员将这些角色映射到特定的用户或用户组上。
J2EE 1.2 USES security roles, whereby the application developer specifies which roles have the authority to access specific methods, and the deployer maps these roles to specific users or user groups.
组工作项为整组人员授予角色权限。
Group work items grant role authorization to an entire group of people.
开发人员可以通过SSL隧道进行连接,通过oam概要对其访问权限进行控制。
Developers could connect through an SSL tunnel, with their access controlled by OAM profiles.
管理者必须具备一个重要的新技能,即是学习与公共部门管理人员和监督人员合作,因为他们在商务领域的权限已大幅扩展了。
A critical new skill is learning to work with regulators and other public-sector executives whose role in business has vastly expanded.
“无线手机上网应用协议并不是基于标准的英特网协议,因此对其浏览器没有太大的竞争要求,而且操作人员对入网许可有着较为严实的权限控制”,他讲道。
"WAP was not based on standard Internet protocols, there was no competition for browsers, and operators had a stranglehold on access," he says.
当然,除了开发人员获得一个需要在受限权限下运行应用程序的工具外,其他的并不重要。
Of course that does not matter much unless developers are given the tools they need to run applications under restricted privileges. Nicholas Allen writes.
我和委员会提到,我们取消了VisualStudio的授权限制,现在开发人员可以针对任何平台来构建插件。
I talked to the council about the removal of licensing restrictions for Visual Studio that now allows developers to build plug-ins that target any platform.
通过流程控制达到了不同的人员拥有不同的权限,其中管理员拥有最高的权限。
Through the process control to a different staff have different authority, which administrators have the highest competence.
通过流程控制达到了不同的人员拥有不同的权限,其中管理员拥有最高的权限。
Through the process control to a different staff have different authority, which administrators have the highest competence.
应用推荐