选中标记指示授予应用程序的权限。
The check mark indicates permissions granted to your application.
必须使所有的应用程序的权限要求。
我可以找到时,应用程序的权限的改变?
默认信任关系管理器实现提示用户需要安装应用程序的权限并提升授予应用程序的权限。
The default trust manager implementation prompts the user for permission to install the application and elevate the permissions granted to the application.
Login模块接收登录信息,并作出相应的决策,即该用户是否具有访问这个应用程序的权限。
The login module receives the login information and makes a decision as to whether or not the user has access to the application.
如果决定编辑策略,则必须确保不要将给予应用程序的权限减少到使这些应用程序无法正常工作的程度。
If you decide to edit policy, you must make sure that you do not decrease permission to applications to the point that they will not function properly.
为用户提供从应用程序访问报表的权限的最简单方法就是使用超级链接。
The simplest way to provide users with access to reports from your application is to use a hyperlink.
在几分钟之内,ARE 就能发现并修复(没错,ARE能够为您修复问题)导致应用程序失败的权限问题。
So in a matter of minutes, ARE can find and fix (yes, it can correct issues for you!) the authority issue that is causing your application to fail.
默认情况下,应用程序对用户的公共数据具有访问权限。
By default, applications have access to the user's public data.
EAz实现permissions类的方式使其成为EAz应用程序声明其权限和操作的单一标准位置。
EAz implements a permissions class as a single standard location for an EAz application to declare its permissions and actions.
这会向用户和管理员显示应用程序的Eaz权限授予情况,并允许您构建管理控制台接口。
This will show users and managers an application's EAz permission grants, and enable you to construct a management console interface.
如果不可能这样做,基础设施团队可以在app. policy文件中设置该节点上所有应用程序的缺省权限集。
If this is possible, the infrastructure team can place in the app.policy file the default permissions for all applications on that node.
用户登录之后,会被提示按照应用程序的请求输入权限(email或电话信息和密码)。
After the user logs in, she is prompted for permissions (email or phone information and a password) as requested by the application.
AllPermissions包含在使用EAz的应用程序中可用的每个权限。
AllPermissions contains each permission available in the application using EAz.
表格是卡的集合,为应用程序和组件开发提供具有访问权限控制的已命名容器。
A sheet is a collection of CARDS and provides a named, access-controlled container for application and component development.
角色本身通常表示J2EE应用程序中的权限集合。
Roles themselves generally represent collections of permissions in the J2EE application.
这样可允许用户获得对其需要使用的各种IBM应用程序的访问权限。
This allows users to acquire access rights to a number of IBM applications that they need to use.
这个特性允许客户应用程序重新设置运行该应用程序的用户权限(对默认角色),不需要dba手工改变权限设置。
This feature allows client applications to reset permissions (to the default role) of the user running the application, instead of requiring the DBA to reset permissions manually.
您还可以扩展配置以容纳其他应用程序形式,例如品牌联合或基于用户权限的应用程序限制。
You could also extend the configuration to accommodate other application modalities, such as co-branding or application restrictions based on user privileges.
例如,一位用户在您的应用程序中有适当的权限(比如管理员权限),他想将50个PDF文件从一个服务器发送到另一个服务器。
For example, a user with the appropriate privileges in your application, such as admin, might need to transfer 50 PDFs from one server to another.
要给应用程序定义不同的访问权限,成员应该以不同的社区角色来组织。
To define different access rights to the application, the members are organized in various community roles.
应用程序使用的规则可由具备适当权限的任何用户更改,而不必更改甚至重新编译应用程序。
The rules used by an application can be changed by anyone with permission, without changing or even recompiling the application.
许多有趣的UNIX应用程序都需要特殊权限来完成它们的作业。
A number of interesting UNIX applications need special privileges to accomplish their jobs.
要访问私有数据,应用程序必须首先请求用户的权限(被称之为扩展权限)。
To access private data, applications must first request the user's permissions, which are called extended permissions.
远程应用程序通过SVRCONN通道建立连接与本地应用程序采用绑定模式建立连接所需的权限是相同的。
The authorizations that are granted are the same for a remote application connecting over a SVRCONN channel as they are for a local application connecting in bindings mode.
应用程序可以定义它们自己的定制权限,以保护应用程序资源。
Applications can define their own custom permissions to protect application resources.
只有这个社区的成员被允许使用复合应用程序(除了有特殊权限的门户管理员之外)。
Only members of this community are permitted to use the composite application (an exception are the portal administrators who have special rights on applications).
WebIdentify具有加载流程,可供应用程序用于描述与Web Identify工具中的应用程序关联的角色和权限。
Web Identify has an on-boarding process that applications use to describe roles and rights associated with the application in the Web Identify tool.
应用程序签署之后,下一步由您在manifest中定义应用程序需要的权限。
After applications are signed, the next step is for you to define in the manifest the permissions needed by the application.
Permissions配置类可用作在特定的应用程序中使用Eaz配置权限的静态Enum类型的容器。
The Permissions configuration class functions as a container for static enum types that configure the permissions in a particular application using EAz.
应用推荐