“门户管理”还可以管理访问控制列表 (ACL),以便为门户确定角色和权限映射。
The Portal Administration can also manage the Access Control List (ACL) that determines role andpermission mappings for your portal.
它涵盖任何安全管理解决方案都具有的要素,比如用户认证、访问权限控制、审计、单点登录、高可用性和日志记录。
This includes authentication of users, control of access privileges, auditing, single sign-on, high availability, and logging that are elements of any security management solution.
WebSphereCloudBurst提供了权限和精细的访问控制,它们可以一起帮助管理哪些用户能够处理哪些资源。
WebSphere CloudBurst provides both permission and fine-grained access controls that together help to govern which users can take which actions on which resources.
这允许您给WebSphereCloudBurst模式部署过程在权限和精细访问控制之外再增加一层组织管理。
This allows you to add a layer of organizational governance to your WebSphere CloudBurst pattern deployment process that goes beyond permission and fine-grained access controls.
管理员还可以通过给用户组分配文档类型和需求类型权限来控制项目文档和需求的访问。
Administrators also control access to project documents and requirements by assigning document type and requirement type permissions to user groups.
为有效使用管理控制台,用户需要对整个系统有广泛的访问权限。
For effective use of the admin console, a user needs broad access to the entire system.
这些角色没有提供管理组织资产本身的访问权限,因此,也就没有访问组织管理控制台的权限。
These roles give no access to managing the organization's assets themselves, and therefore, no access to the organization Administration console.
两个操作系统都允许将用户分组管理以简化访问控制,以避免为众多用户分别设置权限。
Both systems allow collecting users into groups so that access control can be done more easily without having to touch many users for each change.
关于对Accelerator与组织管理控制台的访问权限,还有最后一个要点。
There is one final point about access to the Accelerator versus the Organization Administration console.
当您安装CommunityEdition时,将会设置缺省的管理用户名和密码以授予访问管理控制台的权限。
When you install Community Edition, a default administrative user name and password are set to authorize access to the administrative console.
具体对身份认证、访问控制、权限管理、日志审计、数据加密、数字签名等方面进行了研究和一定程度的实现。
The facets of customer verification, access control, authority management, log audit, data encryption, digital signature are researched and implemented to some extent.
使用下列链接可管理用户并控制门户访问权限。
Use these links to manage users and control access to the portal.
在建筑管理信息系统中,对基础数据的访问权限控制是一个重要的内容。
It is very important to control the access to base data of the corporation in construct management information system.
描述如何使用存储过程来管理权限和控制数据访问。
Describes how to use stored procedures to manage permissions and control data access.
所有的功能和命令都在眼前,这是一个相当简单的工作来管理控制访问权限的远程客户端。
All the functions and commands are at hand, it is quite a simple job to manage the remote clients that control the access permissions.
分析ISO10181访问控制框架与权限管理基础设施PMI,提出了跨信任域的授权模型CTRA。
The ISO10181 access control framework and the Privilege Management Infrastructure PMI are analyzed, and a Cross Trust Regions Authorization Framework(CTRA) is designed.
系统实现了基于ACL的访问控制,支持部门、用户、群组及用户访问权限的动态配置与管理。
The system realizes the access control based on ACL, support dynamic configuration and manage about department, user, group and access authority.
最后,论文将基于UO BAC模型设计的权限管理方案应用于录井信息服务平台中,实现了录井公司中心数据库的访问控制。
Finally, the paper will apply design program of rights management based on UOBAC model to logging information service platform to achieve access control of a logging company central database.
使依托于PKI系统的资源的管理者可以根据自身的安全策略实现对资源的访问控制、权限管理、信任管理等。
So that the owner of the resources could implement access control, authority management, trust management using his security policies under the support of PKI.
借鉴基于角色的访问控制基本思想,结合开发实践,提出了一种用VJ实现用户权限管理的方法。
Based on the idea of Role-Based Access Control, this paper presents a user-privilege management method using VJ, which is advantageous for its simplicity, flexibility and security.
用户界面设计是应用软件系统开发的一个重要方面,而权限访问控制(或安全管理)在现代软件系统中同样有着重要的地位。
UI design is one important aspect in the development of the application software systems, and access control (security management) plays a comparably important role in modern software systems.
在基于角色访问控制的基础上,利用DBMS的审计功能,将用户审计信息与实际的权限管理信息相比较,从而侦测出内部合法用户的滥用行为。
On RBAC, using the audit function of DBMS, by comparing user's audit to the authorization administration information, this System can detect user's misuse behavior to DBMS.
论文在对自主访问控制、强制访问控制和基于角色的访问控制的访问控制策略及机制分析、研究基础上,选择并实现了基于角色的权限管理系统。
This paper chooses and realizes the privilege system role-based based on the further research between discretionary access control, mandatory access control and role-based access control.
它的访问,权限控制功能,您可以指定特定用户访问权限,除了管理员。
Its access-rights control feature lets you assign access rights to specific users in addition to the administrator.
该模型采用基于角色的访问控制策略,实现了各业务系统间的一次登录、统一认证、统一权限管理和业务漫游功能。
And, it implements single sign-on, uniform authentication, uniform authorization management and business systems roam between different application systems.
对您的解决方案中的文档或工作簿具有“完全控制”访问权限的任何用户都能够使用“信息权限管理”限制权限。
Anyone who has Full Control access to the document or workbook in your solution can use IRM to restrict permissions.
该模型解决了传统的基于角色访问控制中的动态适应性差和最小权限约束假象的问题,用于分布式工作流管理系统,提高了安全性、实用性。
This model overcomes the weaknesses of the bad dynamic adaption and the fake constraint of the least privilege. It can enhance the security and practicability of the distributed workflow system.
本文就该模型在OA系统中的应用,提出了具体的实现方案,利用用户、角色、动态权限列表和动态菜单列表,实现了系统访问权限的灵活管理和动态控制。
The paper brings out a concrete realization program with the model for the application of this model in the OA system. By using lists of users, roles, dynamic privilege and dynamic men…
本文就该模型在OA系统中的应用,提出了具体的实现方案,利用用户、角色、动态权限列表和动态菜单列表,实现了系统访问权限的灵活管理和动态控制。
The paper brings out a concrete realization program with the model for the application of this model in the OA system. By using lists of users, roles, dynamic privilege and dynamic men…
应用推荐