通过控制用户访问限制ssh访问。
不过,其他用户就要受到更多的访问限制。
only _ from行定义一个访问限制。
命名空间没有访问限制。
利用J2EE安全性模型向多个Web资源添加访问限制。
Add access restriction to multiple Web resources using the J2EE security model.
密码策略的组成部分之一是检查密码到期日期和访问限制。
One part of a password policy is to interrogate password expiry and restriction for review.
这意味着,如果需要访问限制更严格的资源,就需要额外的身份验证步骤。
This means that an additional authentication step is required in order to access resources that require more restrictive-access policies.
此外,通过服务器文档中的访问限制把对服务器的访问限制为ca和ra。
In addition, access to the server is restricted to CAs and RAs only via access restriction in the server document.
向user添加简单的角色允许将用户管理访问限制为只能由管理员执行。
Adding a simple role to the user allows you to limit user-management access to administrators.
然而,由于下面的查询访问限制在单个分区上,因此不需要额外的排序操作。
However, the following query does not need an extra sort since the query access is limited to a single partition.
第二个方法与第一个类似,只不过使用另外两个附加参数来指定记录存储的访问限制。
The second method operates in the same fashion but employs two additional parameters to specify the record store's access restrictions.
PD F文件包括多种安全选项——从访问限制到电子签名——帮助保护敏感的公司信息。
PDF files include a variety of security options - from access restrictions to electronic signatures - that help protect sensitive company information.
它可以是数据(图片、文档、通讯录)、事件(发表博文、转账)或者任何有访问限制的URL。
This can be data (photos, documents, contacts), activities (posting blog item, transferring funds) or any URL with a need for access restrictions.
AIXV7.1提供用户组扩展能力,以及新的密码策略和对OD m目录的访问限制等安全改进。
AIX V7.1 provides user group scalability and security enhancements such as new password policies and access restriction to ODM directories.
引入了一些有趣的安全对策,包括预防有限的一组文件系统竞争条件攻击的附加访问限制。
Includes several interesting security countermeasures, including additional access limits that prevent a limited set of filesystem race condition attacks.
可以在门户中对库中存储的内容设置各种访问限制,并且ContentAPI遵循这些访问权限。
Content stored in the repository can have various access limits set within the portal, and the Content API respects those access limits.
然而,现在的解决方案需要在生产环境中部署和访问限制到外部数据库通过建立一个虚拟的网络。
However, the solution now needs to be deployed in a production environment and access to the external database is to be restricted by setting up a Virtual Network.
创建查看器控制器,该控制器与编辑器平行,用于显示愿望列表,然后将编辑器访问限制为一个特定的用户。
Create a viewer controller, parallel to the editor that displays the wish list, and then restrict editor access to one specific user.
它还可以用于管理Cognos服务器,例如更改访问限制、导入内容或者更改将一份报告发送给哪些人的列表。
It is also used to administer the Cognos server, for example, to change access restrictions, import content, or change the list of people a report is sent to.
NWindReader帐户使用db_datareader角色(将其访问限制为读取数据库中的表)运行。
The NWindReader account runs under the db_datareader role, which limits its access to the reading of tables in the database.
您希望将访问限制为会话Bean,因为只有相应的LDAP用户ID才能访问整个会话Bean。
You want to restrict access to the session beans such that only appropriate LDAP user ids can access the entire session bean.
例如,可能仅在某段时间内允许上载操作,或者可能将对某个目录的访问限制到特定用户或来自某些IP地址的用户。
For example, uploads might be allowed only during certain hours, or access to a directory might be restricted to specific users or users connecting from certain IP addresses.
此Web应用程序包括一个无访问限制的主页和两个可由“bank”和“customer”角色访问的安全页。
The Web application consists of a home page with unrestricted access and two secure pages accessible by "bank" and "customer" roles.
这里所使用的示例应用程序由三个JSP组成:一个不受访问限制,一个可以通过admin角色访问,另一个可以通过user角色访问。
The sample application used here consists of three JSPs: one with unrestricted access, one accessible by the admin role, and another accessible by user role.
苹果公司在这些问题上的立场是在斯诺登事件出现后形成的,在那之后,公司开始采用了一系列的技术,这些技术在默认情况下将使用者的数据加密,限制他人访问。
Apple's stance on these issues emerged post-Snowden, when the company started putting in place a series of technologies that, by default, make use of encryption to limit access to people's data.
如果你的数据库包含敏感信息,您可能希望限制对编目视图的访问,因为编目描述了数据库中的每一个对象。
If your database contains sensitive data, you might want to limit access to the catalog views, because the catalog describes every object in the database.
存在几种不同的安全领域,每个领域都有不同的访问控制和限制。
There will be several different security domains, each of which have different access controls and restrictions.
可以通过使用并行访问卷克服这个限制。
You can overcome this restriction by using parallel access volumes (PAVs).
不过,您可以应用门户访问控制来限制某些虚拟门户使用这些共享资源。
However, you can apply portal access control and limit the usage of these Shared resources to certain virtual portals.
问:我想把对视图帐户信息的访问权限制到帐户的所有者。
Question: I want to restrict access to view account information to the owners of an account.
应用推荐