By setting up fine-grained privileges and role-based access control HP protected systems reduces configuration time and required customer skill level.
设置细颗粒度的授权和角色访问控制,惠普保护系统减少了配置时间和客户所需的技能水平要求。
The security administrator can dictate the level of security by applying rules known as protected object policies (POP) and access control lists (ACL).
安全管理员可以通过应用protectedobjectpolicies (POP)和accesscontrollists (acl)规则来指定安全等级。
When the runtime establishes that code has a certain level of trust, it allows the code to access protected resources appropriate to that level of trust.
在运行时证实该代码有某一级别的信任时,它就允许该代码访问对于该信任级别合适的受保护资源。
When the runtime establishes that code has a certain level of trust, it allows the code to access protected resources appropriate to that level of trust.
在运行时证实该代码有某一级别的信任时,它就允许该代码访问对于该信任级别合适的受保护资源。
应用推荐