• It is important to set up the ACL to databases with the proper access.

    设置acl使之具有适当的权限访问数据库非常重要。

    youdao

  • Each user or group that is added to the ACL can have a different set of active permissions, enabling very granular control over exactly what type of access is available to any user.

    添加ACL每个用户可以具有不同活动权限从而可任何用户可用访问权限类型进行适当的粒度控制

    youdao

  • It contains the names of principals and the access permissions followed by an optional principal that the ACL applies.

    包含主体名称访问权限然后一个可选的用于ACL主体

    youdao

  • Thus, the system can examine the subject's identities and the ACL of the resource, and if a match is found, permit the access specified.

    这样系统就能检查主体身份以及资源ACL了。如果找到匹配信息就允许指定访问

    youdao

  • First, change the ACL to allow Anonymous reader access.

    首先更改acl允许匿名用户访问

    youdao

  • The ACL determines whether or not users have access to the database and which level of permission they are granted.

    ACL确定用户是否具有访问数据库权限授予用户权限级别

    youdao

  • Of the major importance is implementation of POSIX ACL, an add-on to usual UNIX permissions that allows for more fine-grained user access control.

    重要POSIXACL实现,这是普通unix权限扩展可以支持细化用户访问控制。

    youdao

  • One method to satisfy the access authority on file access is to implement an access control list (ACL).

    文件访问进行访问授权方法实现访问控制列表 (ACL)。

    youdao

  • Notice that the public areas in each building need no ACL; you only need to create an ACL when the access rules for a resource deviate from that of the parent resource.

    注意每个大楼中的公共区域需要任何ACL资源访问规则偏离上一级资源访问规则时,只需创建 ACL

    youdao

  • Using ACL gives more control on who can and cannot access or execute a file or directory; that is determined by the extended permissions that can be given to a file on a user or group basis.

    通过使用ACL可以更好地控制可以、谁可以访问执行文件目录按用户或组分配给文件扩展权限决定。

    youdao

  • Public access is a way to enable CM to bypass ACL checking for each user or user group.

    公共访问使CM绕过ACL检查的方法。

    youdao

  • Though this file is ACL (Access Control List)-protected by root only access, it may not be enough for highly secure systems.

    尽管这个文件 ACL (AccessControlList) 保护,允许根用户访问但是这对于安全性要求的系统可能不够

    youdao

  • Acl: An access control list specification.

    acl一个访问控制列表规范

    youdao

  • An application service wanting to access a resource obtains the resource's ACL from the ACLManager using the resource identifier as a key.

    希望访问资源应用程序服务资源标识符用作密钥,ACLManager获取资源ACL

    youdao

  • If public access is enabled, ICMPUBLIC takes priority on any other ACL.

    如果启用公共访问ICMPUBLIC将拥有比任何其他ACL更高的优先权。

    youdao

  • Update the access control list (ACL) of the database DomForInt.nsf to prevent Anonymous access and to grant appropriate roles to the users.

    更新数据库domforint . nsf访问控制列表(acl),防止匿名访问以及用户授权相应角色

    youdao

  • If acl is not specified, then documents marked for public access will be returned.

    如果指定acl那么返回被标记公共访问文档

    youdao

  • For this example, use the access Manager access control list (ACL) to manage the ObjectGrid authorization policies.

    对于示例,请使用AccessManager访问控制列表(Access Control List,ACL)管理ObjectGrid授权策略

    youdao

  • If an ACL has a rule for a user and a rule for ICMPUBLIC, then both will be considered, and the user will have access if either of the rules is satisfied.

    如果ACL中的规则用于用户,另一个规则用于ICMPUBLIC那么个规则都有效,只要满足任何一个规则,用户能够进行访问。

    youdao

  • The Portal Administration can also manage the Access Control List (ACL) that determines role andpermission mappings for your portal.

    门户管理可以管理访问控制列表 (ACL),以便门户确定角色权限映射

    youdao

  • Access Control list (ACL) : An ACL is a data structure that associates to a set of principals a list of permissions for a service.

    访问控制列表(acl): ACL数据结构将一个服务权限列表与一主体相关联。

    youdao

  • If the group list corresponding to the user's version of PAC is found in the in-memory cache of PLAM, the user is granted access to the requested object based on permissions on the ACL.

    如果PLAM内存缓存找到了列表对应用户PAC版本,那么这个用户根据ACL限制对请求的对象进行授权

    youdao

  • Modify access control of all actions on the ACL record type with user groups, as shown in Figure 14.

    使用用户修改ACL记录类型所有action控制权限如图14所示。

    youdao

  • The kadm5.acl (access control list) file resides on the KDC host and controls access to the Kerberos database.

    acl访问控制列表文件位于 KDC主机,它控制Kerberos数据库的访问。

    youdao

  • The security administrator can dictate the level of security by applying rules known as protected object policies (POP) and access control lists (ACL).

    安全管理员可以通过应用protectedobjectpolicies (POP)accesscontrollists (acl)规则指定安全等级

    youdao

  • Figure 7 shows the critical portion of our example Data Access Object (DAO) code, demonstrating how to retrieve and reconstitute ACL information from strings stored in a properties file.

    7显示示例数据访问对象(Data Access Object,DAO)代码关键部分并演示了如何从属性文件存储字符串检索重新构建ACL信息

    youdao

  • As noted previously, the mail file owner must have at least Author access in the ACL of Admin4.nsf.

    正如前面提到邮件文件所有者必须至少拥有admin4 . nsf的ACL中的Author权限。

    youdao

  • Ensure that the ACL is set to Anonymous reader access.

    确保ACLAnonymousreaderaccess

    youdao

  • This paper introduces functions and rules of access control list, gives an instance to study how to use ACL in a real network environment, and ends with some advice on network security.

    在对控制访问列表作用规则作了概括性介绍后,给出应用实例,具体分析了访问控制列表的使用方法,对于网络安全中的应用给了一些建议

    youdao

  • The main allocation access of core router controls the stack out of ACL.

    核心路由器主要配置访问控制列表ACL应用。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定