DL不支持细粒度的用户访问控制。
The DL does not support fine-grained, per user access control.
从系统管理员的角度来看,这样更容易管理主机和用户访问控制。
It makes for easier management of host and user control access from a system administrators point of view.
在右边的详细资料窗格中,找到用户访问控制的政策。
In the right details pane, locate the User Access Control policies.
这允许基于用户限制操作,从而提供更细粒度的用户访问控制。
This allows actions to be restricted on a per-user basis, allowing fine-grained control over which user can access which action.
它本身是一个企业级应用服务,因此我们无需担心它的扩展性、部署、用户访问控制等等。
It is an enterprise application server by itself, so we don't have to worry about scalability, deployment, user access management and a lot more.
本章描述了ASP和网络化制造系统的安全性问题,尤其是用户访问控制的问题;
We characterized the security issues in ASP-based networked manufacturing system, especially the issue of the user access control.
如果用户访问控制(uac)是启用的,您必须使用“以管理员身份运行”选项,当安装。
If User Access Control (UAC) is enabled, you must use the "Run as Administrator" option when installing.
最重要的是POSIXACL的实现,这是对普通unix权限的扩展,可以支持更细化的用户访问控制。
Of the major importance is implementation of POSIX ACL, an add-on to usual UNIX permissions that allows for more fine-grained user access control.
对基于XML的多源异构数据融合、遥感数据存储、数据持久化以及用户访问控制技术进行了分析和设计;
This paper analyzed critical technology: heterogeneous data fusion based on XML, remote sensing data storage, data persistence and user access control;
本文通过对SSL及其关键技术的研究,提出了在网络数据库系统的用户访问控制中使用基于SSL和证书的双向身份认证。
Through study on SSL and its key technology, it is recommended that the SSL-based certificate authentication can be used as client access control method in database systems.
中央工具在单一位置存储整个网络的用户标识和访问控制信息,并提供用于进行全面管理的界面。
Central tools store user identity and access control information for the entire network in a single location and provide screens to manage it all.
除了控制哪个应用程序能被访问之外,您还可以添加用户级别的控制。
In addition to controlling which applications can be accessed, you can add user level control.
用户身份的丢失:有些企业想知道访问数据库的所有用户的身份,以便进行访问控制。
Loss of user identity: Some enterprises prefer to know the identity of all users accessing the database for access control purposes.
通过维护用户的访问控制列表来提供功能和数据权限。
Provide functional and data entitlement by maintaining access control lists of users.
在这一步中,请加载第一步中的数据,以创建必要的用户、组和访问控制列表(如acl)。
In this step, please load the data from the First step to create the necessary users, groups, and access control lists (for example: ACL's).
提取的元数据包括一些数据模型对象,例如项目类和它们的属性,还有一些管理对象,例如用户定义和访问控制列表。
The extracted metadata includes data model objects, such as item types and their attributes, and administration objects, such as user definitions and access control lists.
仪表板还提供了对于访问控制警报、操作和用户角色的支持。
Also available from the dashboard are support for alerts, operations, and user roles for access control.
我们如何创建一组标签和页面,以提供不同组的用户需要的导航或者访问控制?
How can we create a set of tabs and pages to provide the navigation, or access control, which different groups of users require?
它涵盖任何安全管理解决方案都具有的要素,比如用户认证、访问权限控制、审计、单点登录、高可用性和日志记录。
This includes authentication of users, control of access privileges, auditing, single sign-on, high availability, and logging that are elements of any security management solution.
他们的责任是控制用户对网络的访问。
They are responsible for the control of user access to the network.
JAAS提供了对用户进行认证和控制访问资源的模块化机制。
JAAS provides a modular mechanism for authenticating users and controlling access to resources.
多数用户执行访问控制是通过使用诸如角色和权限这类概念完成的。
Most users perform access control by employing concepts such as roles and permissions.
角色决定用户的访问控制。
因此,可以实施用户管理的访问控制部分。
As a result, you can enforce the access control portion of user management.
图4显示了已登录用户具有访问控制权限的位置列表。
The places list for the logged-in user's access control is displayed in figure 4.
还可以对能够部署到不同云组的用户应用访问控制。
You can also apply access controls to who can deploy to different cloud groups.
区分上述两类用户的安全和访问控制模型。
A security and access control model that distinguishes between these two classes of users.
LotusNotes的服务实例包括Domino安全模型(Security Model),可以用它进行用户身份验证、访问控制和加密。
Examples of Lotus Notes Services include the Domino Security Model which is used for user authentication, access control and encryption.
获得会话对象之后,可以使用由LTPAToken定义的授权给用户的访问控制级别在它与LotusDomino服务器之间实现交互。
Once a session object is obtained, it can be used to interact with the Lotus Domino server using the access control level granted to the user defined by the LTPAToken.
控制用户访问Web站点的不同领域的安全设置。
Security Settings to control user access to different areas of the Web site.
应用推荐