After you select the security file to import, map roles.
选择要导入的安全文件之后,映射角色。
After you select the database, select the security file to import, as shown in Figure 16.
选择数据库后,选择要导出的安全文件,如图16所示。
There are two issues that make a macro set preferable to data languages like the XML declarative security file.
有两个原因使得宏更适合xml声明式安全文件这样的数据语言。
After you map roles, specify how collisions should be resolved if any are detected during the import of the security file.
映射角色后,指定安全文件导入过程中出现的冲突的解决方式。
The password does not match the one on the existing security file. Do you want to overwrite the existing security file with the new password?
与当前安全性文件上的密码不符,是否需要将旧密码改写为新密码?
Replace - Any security metadata in the repository associated with the cubes in the security file will be removed, and all security metadata in the file will be added.
Replace—资源库中与安全文件中的多维数据集关联的所有安全元数据将被删除,文件中的所有安全元数据将添加进来。
When applied security settings have not been changed, this file should be empty.
当应用的安全设置没有被更改时,这个文件应该为空。
When I talk about further distinctions like static and journal file systems, I'm emphasizing the consistency and, to some extent, security of file system contents.
当我谈到进一步的区分,如静态和日志文件系统时,我要强调一致性以及某种程度上的文件系统内容的安全性。
However, this is not necessarily a security concern since the file system access control mechanism usually provides sufficient protection.
不过您也不必担心安全问题,因为文件系统访问控制机制通常都可以提供充分的保护。
When another user requires access to the file, their security credentials are verified before being granted access to the data even though the file data is already in memory and in clear format.
当另一个用户需要访问该文件时,在授予对数据的访问权限之前,将验证其安全凭据,既使这些文件数据已经以明文格式存在于内存中。
Some file systems support advanced security features, such as access control lists (ACLs).
某些文件系统支持高级的安全特性,比如访问控制列表(acl)。
Often the file system cannot fulfill the security guidelines for a project.
文件系统常常不能完成项目的安全性指导原则。
Save the security editor file.
保存安全性编辑器文件。
Do you have sensitive data that might benefit from file systems with extra security features?
是否有敏感数据,具有额外安全特性的文件系统可能能够进一步保护它们?
The same security, file permissions, and other data is replicated between the NFS client and the NFS server.
将会在NFS客户端和NFS服务器之间复制相同的安全设置、文件权限和其他数据。
Nor do I mean to imply that there aren't security concerns with this file.
我也无意暗示有无和此文件安全相关的安全问题。
Above the communication protocols are the optional file attachment and security layers that are implemented with MIME.
通信协议的上面是可选的文件附件和安全层,用MIME实现。
For the first example, let's consider a security configuration file to detail different security domains within a configuration file.
作为第一个例子,我们来考虑一个安全配置文件,它在一个配置文件中详细描述不同的安全领域。
File-realm-demo: Demonstrates how to setup security restrictions using a flat file of users and groups.
file - realm - demo:展示如何使用用户和组的平面文件设置安全约束。
Recall that you defined two security roles in the web.xml file.
回忆一下您刚才在web . xml文件中定义了两个安全角色。
These permissions are changeable by using the chmod command and are generally good enough for most of the file security on the system.
可以使用chmod命令修改这些权限,一般来说它们足以保证系统上大多数文件的安全性。
Client.props: ObjectGrid client security configuration file.
props:ObjectGrid客户机安全性配置文件。
Server.props: ObjectGrid server-specific security configuration file.
props:ObjectGrid服务器特定的安全性配置文件。
ObjectGridSecurity.xml: ObjectGrid cluster security configuration file.
xml:ObjectGrid集群安全性配置文件。
Before you import the file containing your security model, import the file containing your cube model into the InfoSphere Warehouse control database using the Administration Console.
在导入包含安全模型的文件之前,使用Administration Console将包含多维数据集模型的文件导入InfoSphereWarehouse控制数据库。
Next up is configuring security in the web.xml file.
接下来,在web . xml文件中配置安全。
Merge replace - If security metadata exists in the repository for a resource, the security metadata in the file will replace the security metadata in the repository for the resource.
MergeReplace——如果某个资源的库中有安全元数据,文件中的安全元数据将替换资源库中的安全元数据。
For audit to understand how to print each object as a record to the audit log, it needs a corresponding entry in the /etc/security/events file.
为了让审计系统了解如何将每个对象作为一条记录输出到审计日志中,需要使用 /etc/security/events文件中的相应条目。
You can also track more than one file using the same keyword by making individual entries for each file to be tracked in the /etc/security/audit/objects file, in the same format.
通过在 /etc/security/audit/objects文件中采用相同的格式为每个想要跟踪的文件建立单独的条目,您还可以使用相同的关键字跟踪多个文件。
You can also track more than one file using the same keyword by making individual entries for each file to be tracked in the /etc/security/audit/objects file, in the same format.
通过在 /etc/security/audit/objects文件中采用相同的格式为每个想要跟踪的文件建立单独的条目,您还可以使用相同的关键字跟踪多个文件。
应用推荐