It is important to set up the ACL to databases with the proper access.
设置acl,使之具有适当的权限访问数据库,这非常重要。
Each user or group that is added to the ACL can have a different set of active permissions, enabling very granular control over exactly what type of access is available to any user.
添加到ACL的每个用户或组可以具有不同的活动权限,从而可对任何用户可用的访问权限类型进行适当的细粒度控制。
It contains the names of principals and the access permissions followed by an optional principal that the ACL applies.
它包含主体的名称和访问权限,然后是一个可选的用于ACL的主体。
Thus, the system can examine the subject's identities and the ACL of the resource, and if a match is found, permit the access specified.
这样,系统就能检查主体的身份以及资源的ACL了。如果找到匹配信息,就允许指定的访问。
First, change the ACL to allow Anonymous reader access.
首先,更改acl以允许匿名用户访问。
The ACL determines whether or not users have access to the database and which level of permission they are granted.
ACL确定用户是否具有访问数据库的权限,并授予用户权限级别。
Of the major importance is implementation of POSIX ACL, an add-on to usual UNIX permissions that allows for more fine-grained user access control.
最重要的是POSIXACL的实现,这是对普通unix权限的扩展,可以支持更细化的用户访问控制。
One method to satisfy the access authority on file access is to implement an access control list (ACL).
对文件访问进行访问授权的一种方法是实现访问控制列表 (ACL)。
Notice that the public areas in each building need no ACL; you only need to create an ACL when the access rules for a resource deviate from that of the parent resource.
注意,每个大楼中的公共区域不需要任何ACL;当资源的访问规则偏离上一级资源的访问规则时,您只需创建 ACL。
Using ACL gives more control on who can and cannot access or execute a file or directory; that is determined by the extended permissions that can be given to a file on a user or group basis.
通过使用ACL,可以更好地控制谁可以、谁不可以访问或执行文件或目录;这由按用户或组分配给文件的扩展权限决定。
Public access is a way to enable CM to bypass ACL checking for each user or user group.
公共访问是一种使CM能绕过ACL检查的方法。
Though this file is ACL (Access Control List)-protected by root only access, it may not be enough for highly secure systems.
尽管这个文件由 ACL (AccessControlList) 保护,只允许根用户访问,但是这对于安全性要求高的系统可能不够。
Acl: An access control list specification.
acl:一个访问控制列表规范。
An application service wanting to access a resource obtains the resource's ACL from the ACLManager using the resource identifier as a key.
希望访问资源的应用程序服务将资源标识符用作密钥,从ACLManager获取资源的ACL。
If public access is enabled, ICMPUBLIC takes priority on any other ACL.
如果启用了公共访问,ICMPUBLIC将拥有比任何其他ACL更高的优先权。
Update the access control list (ACL) of the database DomForInt.nsf to prevent Anonymous access and to grant appropriate roles to the users.
更新数据库domforint . nsf的访问控制列表(acl),以防止匿名访问以及向用户授权相应的角色。
If acl is not specified, then documents marked for public access will be returned.
如果未指定acl,那么将返回被标记为公共访问的文档。
For this example, use the access Manager access control list (ACL) to manage the ObjectGrid authorization policies.
对于此示例,请使用AccessManager访问控制列表(Access Control List,ACL)来管理ObjectGrid授权策略。
If an ACL has a rule for a user and a rule for ICMPUBLIC, then both will be considered, and the user will have access if either of the rules is satisfied.
如果一个ACL中的一个规则用于用户,另一个规则用于ICMPUBLIC,那么两个规则都有效,只要满足任何一个规则,用户就能够进行访问。
The Portal Administration can also manage the Access Control List (ACL) that determines role andpermission mappings for your portal.
“门户管理”还可以管理访问控制列表 (ACL),以便为门户确定角色和权限映射。
Access Control list (ACL) : An ACL is a data structure that associates to a set of principals a list of permissions for a service.
访问控制列表(acl): ACL是一种数据结构,它将一个服务的权限列表与一组主体相关联。
If the group list corresponding to the user's version of PAC is found in the in-memory cache of PLAM, the user is granted access to the requested object based on permissions on the ACL.
如果在PLAM的内存缓存中找到了组列表对应用户的PAC的版本,那么这个用户就会根据ACL的限制对所请求的对象进行授权。
Modify access control of all actions on the ACL record type with user groups, as shown in Figure 14.
使用用户组修改ACL记录类型上的所有action的控制权限,如图14所示。
The kadm5.acl (access control list) file resides on the KDC host and controls access to the Kerberos database.
acl(访问控制列表)文件位于 KDC主机,它控制对Kerberos数据库的访问。
The security administrator can dictate the level of security by applying rules known as protected object policies (POP) and access control lists (ACL).
安全管理员可以通过应用protectedobjectpolicies (POP)和accesscontrollists (acl)规则来指定安全等级。
Figure 7 shows the critical portion of our example Data Access Object (DAO) code, demonstrating how to retrieve and reconstitute ACL information from strings stored in a properties file.
图7显示了示例数据访问对象(Data Access Object,DAO)代码的关键部分,并演示了如何从属性文件中存储的字符串检索和重新构建ACL信息。
As noted previously, the mail file owner must have at least Author access in the ACL of Admin4.nsf.
正如前面提到的,邮件文件所有者必须至少拥有admin4 . nsf的ACL中的Author权限。
Ensure that the ACL is set to Anonymous reader access.
确保ACL被设为Anonymousreaderaccess。
This paper introduces functions and rules of access control list, gives an instance to study how to use ACL in a real network environment, and ends with some advice on network security.
在对控制访问列表的作用和规则作了概括性介绍后,给出了一个应用的实例,具体分析了访问控制列表的使用方法,并对于它在网络安全中的应用给了一些建议。
The main allocation access of core router controls the stack out of ACL.
核心路由器上主要配置访问控制列表ACL的出栈应用。
应用推荐