在对控制访问列表的作用和规则作了概括性介绍后,给出了一个应用的实例,具体分析了访问控制列表的使用方法,并对于它在网络安全中的应用给了一些建议。
This paper introduces functions and rules of access control list, gives an instance to study how to use ACL in a real network environment, and ends with some advice on network security.
在这一步中,请加载第一步中的数据,以创建必要的用户、组和访问控制列表(如acl)。
In this step, please load the data from the First step to create the necessary users, groups, and access control lists (for example: ACL's).
提取的元数据包括一些数据模型对象,例如项目类和它们的属性,还有一些管理对象,例如用户定义和访问控制列表。
The extracted metadata includes data model objects, such as item types and their attributes, and administration objects, such as user definitions and access control lists.
尽管此设计非常简单,但它可能不够,从而导致某些类unix系统通过访问控制列表和其他机制对其进行扩展。
Although this design is simple, it's can be inadequate, leading some UNIX-type systems to extend it through access control lists and other mechanisms.
“门户管理”还可以管理访问控制列表 (ACL),以便为门户确定角色和权限映射。
The Portal Administration can also manage the Access Control List (ACL) that determines role andpermission mappings for your portal.
某些文件系统支持高级的安全特性,比如访问控制列表(acl)。
Some file systems support advanced security features, such as access control lists (ACLs).
访问控制列表(acl)是具有所有者和索引列表或散列的对象,如图2所示。
Access control lists (ACLs) are objects with an owner and an indexed list, or hash, as illustrated in Figure 2.
这个用例将展示不同访问控制列表与特定队列集之间的交互。
This case will illustrate how different access control lists interact with a given set of queues.
访问控制列表处理。
本文借助示例演示了权限集合和访问控制列表,并授权给 CM实体,如用户、用户组、项目类型、项目、工作流等。
With the help of examples, this article highlights privilege sets and Access Control Lists (ACLs) to be granted to CM entities like users, usergroups, itemtype, item, workflow, and so on.
图4显示了已登录用户具有访问控制权限的位置列表。
The places list for the logged-in user's access control is displayed in figure 4.
我们知道,您还可以提供访问控制列表。
上一小节建议控制对公共任务列表拥有访问权的用户数量。
The previous section suggests keeping the number of users who have access to a common task list small.
对文件访问进行访问授权的一种方法是实现访问控制列表 (ACL)。
One method to satisfy the access authority on file access is to implement an access control list (ACL).
这些属性包括文件所有者及组权限,访问控制列表(acl),以及扩展文件属性。
These attributes include file owner and group permissions, access-control lists (ACLs), and extended file attributes.
访问控制列表和权限集。
在AccessManager中创建一些测试对象,如用户、组和受保护资源,然后添加访问控制列表策略。
Create some test objects in Access Manager, such as users, groups, and protected resources, and then add an Access Control List policy.
OmniFind可以配置来将文档与安全令牌或访问控制列表相关联。
OmniFind can be configured to associate documents with security tokens or access control lists.
该流程可配置TivoliAccessManager来更新访问控制列表,以允许服务订阅者调用所订阅的服务。
This process configures Tivoli access Manager to update access control lists to allow the service subscriber to invoke the subscribed service.
本文描述HumanTaskManager人员解析的编程模型,前者为基于实例的授权提供访问控制列表。
This article describes the programming model for Human Task Manager staff resolution, which provides access control lists for instance-based authorization.
acl:一个访问控制列表规范。
访问控制列表(acl)。
对于此示例,请使用AccessManager访问控制列表(Access Control List,ACL)来管理ObjectGrid授权策略。
For this example, use the access Manager access control list (ACL) to manage the ObjectGrid authorization policies.
使用访问控制列表(Access Control List)定义组件级别的操作权限。
Use Access Control Lists to define component level operation privileges.
在CMv8中并不要求必须定义用户组,但是通过定义用户组可以简化管理,尤其是在定义访问控制列表(Access Control List,ACL)的时候。
It is not necessary to define user groups in CM V8, but it simplifies administration, especially when you define Access Control Lists (ACLs).
在CMV 8中,授权是通过访问控制列表(Access Control List,ACL)来处理的。
Authorization is handled in CM V8 with Access Control Lists (ACLs).
对于名称,输入PayClaimSubProcess;对于描述,输入Payclaimprocess;对于访问控制列表,输入XYZClaimFolderACL。
Name it PayClaimSubProcess, with description Pay claim process, and access control list XYZClaimFolderACL.
管理员也可以为每个工作节点分配访问控制列表,进一步在工作节点级别上进行安全控制。
An administrator can also assign an access control list to each work node for additional security control at the work node level.
通过维护用户的访问控制列表来提供功能和数据权限。
Provide functional and data entitlement by maintaining access control lists of users.
管理员配置分配给每个过程的访问控制列表,这样就存在定义该过程中谁能够做什么的业务控制。
The administrator configures an access control list that is assigned to each process, so that there is a business control to define who can do what in which process.
应用推荐