一个ESB网关,处理安全性策略。
有时候,那可能不满足应用的安全性策略。
Sometimes that may not satisfy the security policy for the application.
应用于所有对象的所有安全性策略的记录。
这项限制就是相同初始服务器安全性策略。
This limitation is known as the same origin server security policy.
安全性策略拒绝了对此邮件的访问。
访问控制—使系统能够识别用户组的安全性策略。
Access control. Enables the system to recognize security policies for groups of users.
组织安全性策略。
安全性策略返回未知错误。
安全性策略返回未知错误。请与系统管理员联系。
The security policy returned an unknown error. Please contact your system administrator.
代码签名是J2ME应用程序安全性策略中下一个重要元素。
Code signing is the next essential element in J2ME's application security policy.
为日志记录、跟踪消息交换以及安全性策略实施提供操作支持。
Operational support for logging, tracing message exchanges, and enforcement of security policy.
一个内容审计选项,用来决定安全性策略计算是否在FM内完成。
A Content Audit option that determines whether security policy calculation should be done in FM.
作为分配风险等级的一部分,必须考虑分配给数据的安全性策略。
As part of assigning a risk level, you have to consider the security policies assigned to the data.
本文介绍了一些可以帮您维持系统遵守安全性策略的工具和技术。
This article introduced some tools and techniques that can help you maintain your system's adherence to its security policy.
这种安全性策略需要解决存储、消息和传输等方面的安全性。
The security strategy needs to address storage, messaging, and transport security.
当验证Web服务事务中的一方时,通常需要强制执行公司的安全性策略。
Upon authentication of a party in a web services transaction, a company's security policy often needs to be enforced.
这个策略的范围包括了隐私策略和规则,安全性策略和规则、交易和实施规则。
The scope of the policy covers privacy policies and rules, security policies and rules, transactional and enforcement rules.
您只需仔细掂量一下您的安全性策略,尤其是在计划采用新的策略之前就更应如此。
Just think a little bit about your security policy, especially before you adopt a new one.
代码访问安全性策略配置状态分为三个管理策略级别:企业、计算机和用户策略。
Code access security policy configuration state consists of three administrative policy levels: enterprise, machine, and user policy.
如果用户是特定组的成员,则可以给组分配一个角色,该角色有权访问安全性策略允许的资源。
When a user is a member of a specific group, then that group can be assigned to a role that is entitled to access resources for which the security policies allow.
对于给定应用程序域,宿主可更改默认的基于角色的安全性策略并设置默认安全主体。
For a given application domain, the host can change the default role-based security policy and set a default security principal.
用户必需充分定义所有的安全性策略以确保正常运行时间的可用性保证,而没有或很少有中断阈值。
You must adequately define all security policies to ensure uptime availability guarantees with little or no interruption thresholds.
虽然这种方法在端对端通信链路中提供了适当的安全性,但违反了图书销售商的安全性策略。
Although this provides relevant security through the end-to-end communication link, the books-seller's security policy is violated.
胖客户机可以根据内容建立全面分级的安全性策略,而不是无论是否需要都以相同的密钥强度加密所有内容。
Instead of encrypting everything with the same key strength regardless of needs, rich clients can establish a comprehensive differentiating security policy based on the content.
要利用如此多的服务来在各种不同的业务背景下获得最大的商业效益,必须谨慎考虑的一个因素就是安全性策略管理。
Leveraging so many services for maximum business value across many different business contexts, one concept they must consider carefully is security policy management.
根据您的安装所使用的安全性策略,您可能想创建一个新用户名来使用MicrosoftSQLServer。
Depending on the security policies that your installation USES, you might want to create a new username for Microsoft SQL Server use.
这些组和角色可用于一些安全性策略,比如针对IBMCognos8门户中的每个对象的访问权限。
These groups and roles can be used in Security policies such as access permission for each object within the IBM Cognos 8 portal.
您可以手动编辑策略文件,也可以使用代码访问安全性策略工具管理企业级别、计算机级别或用户级别的安全策略。
You can edit policy files by hand or you can use the Code Access Security Policy tool to administer security policy for the enterprise, machine, or user levels.
您可以手动编辑策略文件,也可以使用代码访问安全性策略工具管理企业级别、计算机级别或用户级别的安全策略。
You can edit policy files by hand or you can use the Code Access Security Policy tool to administer security policy for the enterprise, machine, or user levels.
应用推荐