在对控制访问列表的作用和规则作了概括性介绍后,给出了一个应用的实例,具体分析了访问控制列表的使用方法,并对于它在网络安全中的应用给了一些建议。
This paper introduces functions and rules of access control list, gives an instance to study how to use ACL in a real network environment, and ends with some advice on network security.
在这一步中,请加载第一步中的数据,以创建必要的用户、组和访问控制列表(如acl)。
In this step, please load the data from the First step to create the necessary users, groups, and access control lists (for example: ACL's).
提取的元数据包括一些数据模型对象,例如项目类和它们的属性,还有一些管理对象,例如用户定义和访问控制列表。
The extracted metadata includes data model objects, such as item types and their attributes, and administration objects, such as user definitions and access control lists.
尽管此设计非常简单,但它可能不够,从而导致某些类unix系统通过访问控制列表和其他机制对其进行扩展。
Although this design is simple, it's can be inadequate, leading some UNIX-type systems to extend it through access control lists and other mechanisms.
“门户管理”还可以管理访问控制列表 (ACL),以便为门户确定角色和权限映射。
The Portal Administration can also manage the Access Control List (ACL) that determines role andpermission mappings for your portal.
某些文件系统支持高级的安全特性,比如访问控制列表(acl)。
Some file systems support advanced security features, such as access control lists (ACLs).
访问控制列表(acl)是具有所有者和索引列表或散列的对象,如图2所示。
Access control lists (ACLs) are objects with an owner and an indexed list, or hash, as illustrated in Figure 2.
这个用例将展示不同访问控制列表与特定队列集之间的交互。
This case will illustrate how different access control lists interact with a given set of queues.
本文借助示例演示了权限集合和访问控制列表,并授权给 CM实体,如用户、用户组、项目类型、项目、工作流等。
With the help of examples, this article highlights privilege sets and Access Control Lists (ACLs) to be granted to CM entities like users, usergroups, itemtype, item, workflow, and so on.
图4显示了已登录用户具有访问控制权限的位置列表。
The places list for the logged-in user's access control is displayed in figure 4.
上一小节建议控制对公共任务列表拥有访问权的用户数量。
The previous section suggests keeping the number of users who have access to a common task list small.
对文件访问进行访问授权的一种方法是实现访问控制列表 (ACL)。
One method to satisfy the access authority on file access is to implement an access control list (ACL).
这些属性包括文件所有者及组权限,访问控制列表(acl),以及扩展文件属性。
These attributes include file owner and group permissions, access-control lists (ACLs), and extended file attributes.
在AccessManager中创建一些测试对象,如用户、组和受保护资源,然后添加访问控制列表策略。
Create some test objects in Access Manager, such as users, groups, and protected resources, and then add an Access Control List policy.
OmniFind可以配置来将文档与安全令牌或访问控制列表相关联。
OmniFind can be configured to associate documents with security tokens or access control lists.
该流程可配置TivoliAccessManager来更新访问控制列表,以允许服务订阅者调用所订阅的服务。
This process configures Tivoli access Manager to update access control lists to allow the service subscriber to invoke the subscribed service.
本文描述HumanTaskManager人员解析的编程模型,前者为基于实例的授权提供访问控制列表。
This article describes the programming model for Human Task Manager staff resolution, which provides access control lists for instance-based authorization.
对于此示例,请使用AccessManager访问控制列表(Access Control List,ACL)来管理ObjectGrid授权策略。
For this example, use the access Manager access control list (ACL) to manage the ObjectGrid authorization policies.
在CMv8中并不要求必须定义用户组,但是通过定义用户组可以简化管理,尤其是在定义访问控制列表(Access Control List,ACL)的时候。
It is not necessary to define user groups in CM V8, but it simplifies administration, especially when you define Access Control Lists (ACLs).
在CMV 8中,授权是通过访问控制列表(Access Control List,ACL)来处理的。
Authorization is handled in CM V8 with Access Control Lists (ACLs).
根据列表或组的结构、位置或从属关系,LBAC可用于增强对用户可见记录的Siebel访问控制。
LBAC can be used to enforce Siebel access control, based on records visibility for a user that is based on organization, position, and a membership to a list or group.
管理员也可以为每个工作节点分配访问控制列表,进一步在工作节点级别上进行安全控制。
An administrator can also assign an access control list to each work node for additional security control at the work node level.
通过维护用户的访问控制列表来提供功能和数据权限。
Provide functional and data entitlement by maintaining access control lists of users.
管理员配置分配给每个过程的访问控制列表,这样就存在定义该过程中谁能够做什么的业务控制。
The administrator configures an access control list that is assigned to each process, so that there is a business control to define who can do what in which process.
访问控制列表为用户和用户组定义了对特定CM实体的访问级别。
Access Control Lists define the level of access on a particular CM entity for users and user groups.
对主题访问的控制将通常由发布引擎基于主题层次结构中的访问控制列表进行管理。
Control over access to topics will normally be managed by the publication engine based on access control lists on a topic hierarchy.
访问控制列表(acl): ACL是一种数据结构,它将一个服务的权限列表与一组主体相关联。
Access Control list (ACL) : An ACL is a data structure that associates to a set of principals a list of permissions for a service.
访问控制列表是权限列表或保护资源的权限集。
An access control list is a list of permissions or sets of permissions securing a resource.
有关更多信息,请参见如何:添加或移除访问控制列表项和ACL技术概述。
For more information, see How to: Add or Remove Access Control List Entries and ACL Technology Overview.
访问控制列表(Access Control List,ACL)确定谁能在多大范围内访问每个数据库。
Access Control Lists (ACLs) determining who can access each database and to what extent.
应用推荐