... Commands Denied(命令遭拒)/Commands Permitted(许可的命令) Set Security Attributes(设置安全属性) Authorizations(授权) ...
基于6个网页-相关网页
Looking at the users overrides of system defaults, one can then determine if the attributes for the users set are valid according to the implemented security policy.
通过查看用户账户覆盖系统默认设置的情况,就可以判断用户的属性集对于实现的安全策略是否合法有效。
Figure 5 shows summarizes the attributes needed to set up user security between CICS TS and TXSeries.
图5总结了在CICS TS与TXSeries之间建立用户安全性所需的属性。
应用推荐