角色决定用户的访问控制。
通过维护用户的访问控制列表来提供功能和数据权限。
Provide functional and data entitlement by maintaining access control lists of users.
很多这样的访问控制都会带来一个问题,因为所利用的程序能够继承用户的访问控制。
Lumping access controls like this creates a problem because an exploited program inherits the access controls of the user.
同时,随着在JVM中引入了多进程能力(请参阅参考资料),出现了对基于用户的访问控制的要求。
Also, with the work done on introducing multiprocessing capabilities to the JVM (see Resources) came the requirement for user-based access control.
获得会话对象之后,可以使用由LTPAToken定义的授权给用户的访问控制级别在它与LotusDomino服务器之间实现交互。
Once a session object is obtained, it can be used to interact with the Lotus Domino server using the access control level granted to the user defined by the LTPAToken.
管理用户和组并控制它们的访问一直都是操作系统中一项关键任务。
Managing users and groups and controlling their access is always a critical task in operating systems.
中央工具在单一位置存储整个网络的用户标识和访问控制信息,并提供用于进行全面管理的界面。
Central tools store user identity and access control information for the entire network in a single location and provide screens to manage it all.
仪表板还提供了对于访问控制警报、操作和用户角色的支持。
Also available from the dashboard are support for alerts, operations, and user roles for access control.
借助这个特性,数据管理员可以在表的列和行级别控制用户和组的读写访问。
Using this feature, data stewards can control read and write access for users and groups at the table column and row level.
您现在可以围绕着这个骨架,构建一个能够基于您在LDAP目录中定义的用户角色控制对功能的访问的应用程序。
You can now build an application around this that can control access to functionality based on the user roles you have defined in your LDAP directory.
在这一步中,请加载第一步中的数据,以创建必要的用户、组和访问控制列表(如acl)。
In this step, please load the data from the First step to create the necessary users, groups, and access control lists (for example: ACL's).
对于所负责的资源和操作系统无法识别的用户帐户,程序有时必须强制实施它们自己的访问控制要求。
Programs must sometimes enforce their own access control requirements on resources they are responsible for and on user accounts not recognized by the operating system.
我们如何创建一组标签和页面,以提供不同组的用户需要的导航或者访问控制?
How can we create a set of tabs and pages to provide the navigation, or access control, which different groups of users require?
在本文的例子中,访问控制主体就是调用MDM服务的用户,这毫不奇怪。
Not surprisingly, in this article's example, the subject of access control is the user calling an MDM service.
JAAS提供了对用户进行认证和控制访问资源的模块化机制。
JAAS provides a modular mechanism for authenticating users and controlling access to resources.
因此,可以实施用户管理的访问控制部分。
As a result, you can enforce the access control portion of user management.
还可以对能够部署到不同云组的用户应用访问控制。
You can also apply access controls to who can deploy to different cloud groups.
区分上述两类用户的安全和访问控制模型。
A security and access control model that distinguishes between these two classes of users.
DL不支持细粒度的用户访问控制。
The DL does not support fine-grained, per user access control.
可以控制每个用户对Webmin模块的访问。
控制用户访问Web站点的不同领域的安全设置。
Security Settings to control user access to different areas of the Web site.
根据列表或组的结构、位置或从属关系,LBAC可用于增强对用户可见记录的Siebel访问控制。
LBAC can be used to enforce Siebel access control, based on records visibility for a user that is based on organization, position, and a membership to a list or group.
另外,可以对每个映像和每个模式应用不同的细粒度访问控制,控制能够读取资产的用户和能够编辑资产的用户。
In addition, you can apply fine-grained access control distinctly to each image and each pattern, controlling who can read the asset and who can edit it.
用户身份的丢失:有些企业想知道访问数据库的所有用户的身份,以便进行访问控制。
Loss of user identity: Some enterprises prefer to know the identity of all users accessing the database for access control purposes.
相比之下,授权是系统用来决定已通过认证的某个特定用户访问系统控制的安全资源的访问级别的一种机制。
Authorization, by contrast, is the mechanism by which a system determines what level of access a particular authenticated user should have to secured resources controlled by the system.
换句话说,这种简单的方法不能区分不同的用户类型,因此不能用于需要细粒度访问控制的应用程序。
In other words, this simple approach fails to distinguish between different types of users, making it unsuitable for applications that require granular access control.
访问控制列表为用户和用户组定义了对特定CM实体的访问级别。
Access Control Lists define the level of access on a particular CM entity for users and user groups.
最终用户身份丢失:为了进行访问控制,企业需要了解实际访问数据库的用户的身份。
Loss of end-user identity: Enterprises need to know the identity of the actual user accessing the database for access control purposes.
访问控制确保只有拥有正确权限的用户才能访问数据和内容。
Access control ensures that only people with correct rights can access data and content.
他们的责任是控制用户对网络的访问。
They are responsible for the control of user access to the network.
应用推荐