• Set user security in the CICS TS region

    CICSTS区域设置用户安全性

    youdao

  • Set user security in the TXSeries region.

    TXSeries区域设置用户安全性

    youdao

  • Local OS registry (other operating systems) : user security name.

    本地OS注册中心(其他操作系统):用户安全名称

    youdao

  • Custom registry with "use display name" false: user security name.

    Usedisplayname为false自定义注册中心:用户安全名称

    youdao

  • In the next section we set up user security over IP connectivity with SSL.

    我们使用经ssl加密的IP连接建立用户安全性

    youdao

  • The user security of application programs is one of important subjects in MIS.

    应用程序用户安全性MIS系统开发重要部分之一

    youdao

  • This requires controlling user security and permissions for testing members and artifacts.

    需要测试人员工件控制用户安全和进入许可

    youdao

  • Figure 5 shows summarizes the attributes needed to set up user security between CICS TS and TXSeries.

    5总结了在CICSTSTXSeries之间建立用户安全性所需属性

    youdao

  • For user security, you need to set the following resource definitions for IPIC connections in CICS ts.

    对于用户安全性需要CICSTSIPIC连接设置以下资源定义

    youdao

  • The transfer and assertion of the current task’s user security context between address spaces is among these.

    其中还包括在地址空间之间传输断言当前任务用户安全上下文

    youdao

  • Maxium user security through snap-lock functionality & red-colour indications for open and closed position.

    最大用户安全通过管理单元打开关闭位置锁定功能红色标志。

    youdao

  • Specify the level of user security for inbound requests only, on the USERAUTH attribute of the IPCONN resource definition.

    IPCONN资源定义USERAUT h属性请求指定用户安全级别

    youdao

  • In order to guarantee user security, offered to you on this site to download the file anti-virus, and updated anti-virus software.

    为了保证用户安全请主动网站下载文件杀毒及时更新杀毒软件

    youdao

  • These include changing the owner of a mail database, changing passwords, setting up user security, customizing replication Settings, and so on.

    这些包括更改邮件数据库拥有者、更改密码设置用户安全性定制复制设置

    youdao

  • IDSLBACREADSET: Each set component of the user security label must include the set component of the data security label to allow access to data.

    IDSLBACREADSET:要访问数据用户安全标签每个集合组件必须包括数据安全标签的集合组件。

    youdao

  • IDSLBACWRITESET: Each set component of the user security label must include the set component of the data security label to allow access to data.

    IDSLBACWRITESET访问数据用户安全标签每个集合组件必须包括数据安全标签的集合组件。

    youdao

  • They want to balance the desire to be on the front edge of access to the Indian market, with the collateral impact of compromising user security.

    他们希望平衡印度电信市场中保持强劲竞争力需求,及为了进入这个市场而必要的在用户通讯安全性方面的牺牲

    youdao

  • IDSLBACWRITEARRAY: Each array component of the user security label must be equal to the array component of the data security label to allow access to data.

    IDSLBACWRITEARRAY:要访问数据用户安全标签每个数组组件必须等于数据安全标签的数组组件。

    youdao

  • To allow for ease of use, wireless Hosted Network also supports the concept of a secondary or user security key that is more user-friendly, but could be less secure.

    为了便于使用无线承载网络支持第二密钥”,称作“用户安全密钥”,使用起来更加友好,但是安全性稍

    youdao

  • IDSLBACREADARRAY: Each array component of the user security label must be greater than or equal to the array component of the data security label to allow access to data.

    IDSLBACREADARRAY:要访问数据用户安全标签每个数组组件必须大于等于数据安全标签的数组组件。

    youdao

  • For example, for a queue, an MQQUEUE profile is used to control MQI access to the queue, but other profiles in the MQADMIN class are used to control context and alternate user security.

    例如对于队列使用一个MQQUEUE概要文件控制对该队列的访问但是mqadmin中的其他概要文件用于控制上下文用户安全性

    youdao

  • Similar to context security, if you do not plan to use alternate user security, define a backstop profile (CSQ1.ALTERNATE.USER.**) with a UACC of NONE and do not grant any users access to it.

    上下文安全性类似如果打算使用替代用户安全性,那么可以定义一个UACCNONEbackstop配置文件CSQ1.ALTERNATE.USER.**),不要向它授予任何用户访问权。

    youdao

  • Mappings are created for the user roles in the user security registry, then imported into Modeler, so that any design to deploy processes can properly assign work to users in the test environment.

    用户安全注册中心用户角色创建映射然后导入Modeler以便任何部署设计流程能够测试环境中为用户正确分配工作

    youdao

  • These policies are policies integrated of system security, data security and user security, and introduce the authentication of Database, exterior, enterprise and user and the permission res.

    进一步地介绍数据库验证外部验证、企业验证并发许可用户验证和许可限制。

    youdao

  • This brings up a few questions: What if a malicious user hacks the underlying security mechanism itself?

    这会带来几个问题如果恶意用户攻破底层安全机制本身,那么会怎么样?

    youdao

  • The solution presented in this article is a loosely-coupled user role security integration solution.

    本文提出解决方案一种松耦合用户角色安全集成解决方案。

    youdao

  • Some people suggest using random passwords for ordinary user accounts is good security policy.

    一些认为对于普通用户账户使用随机密码良好安全策略

    youdao

  • This secret key is known only to the user and the security server.

    秘密密钥只有用户安全服务器知道

    youdao

  • Manage user interface security.

    管理用户界面安全

    youdao

  • Then one can gradually lift the security of that user as your security policy demands.

    以后可以根据安全策略要求逐渐放松用户的安全限制。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定