Then explore other topics —from designing a user interface and setting up resources to storing data and using permissions —as needed.
然后探讨其它主题 -从用户界面设计到储存数据和使用许可资源建立(如所需要那样)。
Using declarative security, you can define security roles in the assembly descriptor of the EJB Module and assign method permissions to each role.
通过使用声明的安全,您可以定义EJB模块的集合描述符中的安全角色,并为每个角色分配方法许可。
You can also set permissions using octal Numbers instead of symbols.
您还可以使用八进制取代符号设置权限。
You can do this from either your desktop or the command line, but you need to be using the system administrator's account to be able to change the required permissions.
你可以在桌面或命令行来达到此目的,但你需要使用系统管理员账户以便能够改变所需要权限。
A licensee can agree to the terms and enjoy the prescribed permissions or forgo using the software.
被许可方可以同意条款并接受规定的权限,或者放弃使用软件。
Using ACL gives more control on who can and cannot access or execute a file or directory; that is determined by the extended permissions that can be given to a file on a user or group basis.
通过使用ACL,可以更好地控制谁可以、谁不可以访问或执行文件或目录;这由按用户或组分配给文件的扩展权限决定。
Using numeric permissions is very handy when you want to set all the permissions at once without giving the same permissions to each of the groups.
当您想要一次设置所有权限,而不给予每个组相同权限时,设置使用数字权限非常方便。
Using a defined configuration, Cfengine can ensure that you have the proper packages, configuration files, file permissions, and processes are running in your environment.
通过使用一个已定义配置,Cfengine能够确保您拥有恰当的包、配置文件、文件权限,且进程运行在您的环境中。
Using the stat module, get permissions for each file found and display them to the screen (lines 15-23).
使用stat模块,获得每个找到的文件的权限,并将它们显示在屏幕上(第 15行到第 23 行)。
Verify the directory, file ownership, and permissions for the core file by using.
使用以下命令来验证核心文件的目录、文件所有权和权限。
While the ls command does not display the octal permissions, you can display them using the find command as shown in Listing 12.
虽然ls命令不显示八进制权限,您可以使用find命令进行显示,如清单12清单12所示。
The first approach is to write custom wsadmin scripts and protect them using operating system permissions to ensure that each administrator can only run the scripts for his servers.
第一个方法是编写自定义wsadmin脚本,并使用操作系统权限对其进行保护,以确保每个管理员只能为其所属的服务器运行这些脚本。
You can specify permissions using one or more role-name elements, one for each role that is allowed to access the method.
您可以使用一个或多个role - name元素指定权限,允许访问此方法的每个角色有一个对应的此元素。
Compile the source code, and then install the tool using sudo permissions.
编译源代码,然后使用sudo权限安装该工具。
These permissions are changeable by using the chmod command and are generally good enough for most of the file security on the system.
可以使用chmod命令修改这些权限,一般来说它们足以保证系统上大多数文件的安全性。
The Permissions configuration class functions as a container for static enum types that configure the permissions in a particular application using EAz.
Permissions配置类可用作在特定的应用程序中使用Eaz配置权限的静态Enum类型的容器。
Remember, though, if you had to run Snort as supervisor (using sudo) or root, you'll have to open the file using the same permissions.
但务必牢记,如果必须作为超级用户(使用sudo)或root 用户运行Snort,也就必须使用相同的权限打开此文件。
After this introduction, you can create digital certificates manually and using Eclipse, request applications permissions, and allow or disallow applications to access files and content providers.
阅读完这篇介绍性文章之后,您将能够使用Eclipse手动创建数字证书,请求应用程序权限,以及允许或不允许应用程序访问文件和内容提供者。
Using administrative capabilities in WebSphere CloudBurst, users and user groups can be defined and associated with a set of permissions. The WebSphere CloudBurst console includes permissions to.
通过使用WebSphereCloudBurst中的管理功能,用户和用户组可以被定义并关联到一组权限。
It is quite easy to grant a user all database permissions and authorities using the Control Center, as is shown in Figure 1.
通过使用ControlCenter,很容易为一个用户授予所有数据库许可和权限,如图1所示。
If you don't have root access, you could change the write permissions of templates_c and cache instead of using chown.
如果您不是使用root用户登录,您是不能使用chown修改templates_c和cache的写权限的。
We configure the bean method permissions by using the method-permission element under assembly-descriptor in ejb-jar.xml.
我们通过在 ejb-jar.xml 中的 assembly-descriptor下使用method-permission元素定义Bean方法权限。
You can change this (with suitable permissions or root access) using the ulimit command.
可以使用ulimit命令修改限制(需要适当的权限或根访问)。
To carry out these actions using the REST API, you must be a user with at least Cloud Administration role permissions.
要使用RESTAPI执行这些操作,您必须是一个至少拥有CloudAdministration角色权限的用户。
Depending on which UNIX platform you are using, you might be able to check and set file permissions from the desktop. If you do not have this ability, follow these steps.
取决于您使用的UNIX平台,您也许能够从桌面检查和设置文件权限。
Try changing the file permissions for BLDRTN, embprep, and spcat using the chmod command. For example.
请使用chmod命令来更改bldrtn、embprep和spcat的权限。
You modify permissions (except for the directory bit) by using the chmod (change mode) command.
您可以使用chmod(更改模式change mode)命令修改相应的权限(除了目录位之外)。
What ACL permissions does a process using it require?
使用这个类的进程需要什么ACL权限?
We're certainly under no illusions that users look at all the permissions when installing apps, but when using a non-Market source, it is very important to do so.
我们当然不指望用户每次在安装应用程序时查看所有的授权选项,不过当你在使用非应用市场来源的应用程序时,这么做是很重要的。
When exposing data by using services, you must ensure that only clients with sufficient permissions may execute a service operation.
当通过使用服务公布数据时,必须确保只有那些拥有足够权限的客户机才能执行服务操作。
应用推荐