例如,存在这样一个访问控制策略,其允许担当客户服务代表角色的所有用户执行客户管理操作。
For example, there is an access control policy that allows all users that fulfill the customer Service Representative role to perform customer management operations.
访问控制是电子商务应用程序的组件,它可以决定给定的用户是否可以对给定资源执行给定操作。
Access control is the component of the e-commerce application that determines whether a given user can perform a given action on a given resource.
其他中介模式提供了对安全和管理策略定义点的直接或间接访问,以便中介流能够执行适当的控制。
Other mediation patterns provide direct or indirect access to the security and management policy definition points so that the mediation flow can perform the appropriate control.
一个保存测试执行信息的访问数据库的使用,意味着对于个体的测试案例或者测试计划没有单元级别的变更控制。
The use of an access database to store test execution information means there's no unit-level change control over individual test cases or test plans.
多数用户执行访问控制是通过使用诸如角色和权限这类概念完成的。
Most users perform access control by employing concepts such as roles and permissions.
细粒度访问控制不只是授予或拒绝执行程序或读取数据文件的权限。
Fine-grained access control goes beyond granting or denying the right to execute a program or read a data file.
访问控制可以外化给网络代理,不用再在本地应用里执行。
Access control can be externalized to a network proxy instead of being performed within the local app.
它还确保脚本可以安全执行,并提供一个沙箱来控制DOM的访问和修改。
It also ensures that scripts are safe to execute and provides a sandbox to control access and modification of the DOM.
没有集中的访问和控制,一致的政策和过程不能在所有涉众中执行。
Without centralized access and control, consistent policies and processes cannot be practiced among all stakeholders.
数据库可执行访问控制。
标准部署流程也会让自动化变得更简单,让运维人员从重复任务中解脱出来,同合适的访问控制相结合,可以让开发人员自己执行部署。
It is also simpler to automate, freeing up Operations for less repetitive tasks and, in combination with suitably access controls, enabling developers to carry out their own deployments.
与自定义不同,我们将立即讨论安全性。安全性是由系统管理员创建的,用于执行企业或部门定义的访问控制。
Unlike customization, which we will discuss in a minute, security is based on policies created by system administrators to enforce corporate and departmental defined access controls.
安全策略用于访问控制检查,这是由JVM在运行时执行的。
The security policy is used for access control checks, which are performed by the JVM at runtime.
屏幕上的每一块区域都可以让你快速访问到常用的命令,执行常用的操作以及对项目和解决方案的控制与修改。
No screen real estate is wasted to give you quick access to commonly used commands and activities and to control and modify your project and solutions.
分类建立后,就可以写入和执行访问控制规则。
After categories are established, access control rules can be written and enforced.
Realm写操作:目前所有Realm实现都支持“读”操作来获取验证和授权数据以执行登录和访问控制。
Realm Write operations: Currently all Realm implementations support 'read' operations for acquiring authentication and authorization data to perform logins and access control.
登录期间创建的安全标志(LTPA)随数据请求传递到后端系统,使后端系统可以执行授权,从而提供对数据的有控制的访问。
The security token (LTPA) created during the login is passed with data requests to back-end systems to enable them to perform authorization in providing controlled access to the data.
服务安全性的重点是管理联合标识和跨服务的访问控制、确保能安全访问服务和应用程序,以及使服务的安全策略得到一致执行。
Service security focuses on managing the federated identity and access control across services, securing access to services and applications, and consistently enforcing security policies for services.
通过使用ACL,可以更好地控制谁可以、谁不可以访问或执行文件或目录;这由按用户或组分配给文件的扩展权限决定。
Using ACL gives more control on who can and cannot access or execute a file or directory; that is determined by the extended permissions that can be given to a file on a user or group basis.
如果没有执行这种配置,默认情况下磁盘阵列只能通过每台计算机上的第一个适配器HBA0以及每个DS4500s上的控制器a进行访问。
If this configuration was not performed, by default the arrays would all be accessed by the first adapter on each computer, HBA0, and consequently the controller a on each DS4500.
sysinit:在登录和init访问控制台之前执行条目。
Sysinit: Execute the entry before init accesses the console before login.
您启动管理控制台,执行某项操作,并访问命令帮助面板,其中显示该操作的wsadmin命令。
You launch the administrative console, perform an action, and access the command assistance panel, which displays the wsadmin command for that action.
这些灵活性需要支持控制访问权限的转移,执行细粒度的访问控制和撤消之前许可的访问权限。
The policy flexibilities include controlling migrated access permissions, performing fine grain access control and revoking permitted access permission.
当处于准备状态的事务和处于提交状态的事务发生数据冲突访问时,A2SC允许处于执行状态的事务在一种控制的方式下乐观地访问锁住的数据。
When data conflicts between the prepared transaction and the execution transactions occur, A2SC allows the execution transactions to access the locked data optimistically in a controlled manner.
还有另外一种情况:你的驱动程序正在执行并且获得了一个锁来控制对其设备的访问操作。
Here's another scenario: your driver is executing and has just taken out a lock that controls access to its device.
向其它用户或用户组授以执行资源访问控制程序(RACF)操作许可权。
The act of giving other users or groups authorities to perform RACF operations.
而基于角色的访问控制模型以角色为中介,将用户与权限逻辑隔离,但该模型不能处理有执行顺序的任务;
Role is introduced to separate user and privilege in role-based access control model, but RBAC can't directly control the permission for a sequence of events.
您应该公开组件的属性而不是公共字段,因为属性的版本可以控制,它们允许数据隐藏,并且访问器方法可以执行附加逻辑。
You should expose properties instead of public fields from your components, because properties can be versioned, they allow data hiding, and the accessor methods can execute additional logic.
代码访问安全性还可让您应用程序可以执行的操作进行更好的控制,原因是您可以仅指定您需要应用程序具有的权限。
Code access security also gives you more control over what actions your application can perform, because you can specify only those permissions you need your application to have.
访问控制拦截器能够保证调用请求在对目标对象调用操作之前进行拦截并执行访问控制策略。
The interceptor can ensure that access control will occur before any request gets to the server operation.
应用推荐