• 实现访问控制策略通常包含两个步骤

    Implementing an access control policy usually consists of two steps.

    youdao

  • 配置简单访问控制策略分为两个步骤

    You can divide configuring a simple access control policy into two steps.

    youdao

  • 编写访问控制策略

    Writing the access control policy.

    youdao

  • 节将展示如何配置IF实现访问控制策略

    This section shows you how to configure IF to implement an access control policy.

    youdao

  • 拦截器使用应用程序访问控制策略做出授权决定

    Interceptors use your application's access control policy to make authorization decisions.

    youdao

  • 发明公开了一种访问控制策略生成方法装置

    The invention discloses method and device for generating an access controlling policy.

    youdao

  • 如果需要更改Wiki访问控制策略只需更改某个规则。

    Should the access control policy for the Wiki need to be changed, you only need to change a rule.

    youdao

  • 访问控制策略保证数据库访问身份合法性。

    Access control security strategy is to preserve the legality of the database users.

    youdao

  • 提出利用权能资源访问控制策略进行描述动态维护

    This paper describes the policy of resource access control with capability, so the policy has dynamic maintenance characteristic.

    youdao

  • 包括诸如加载删除分类系统以及设置访问控制策略功能

    This includes functions such as loading and removing classification systems, and setting up access control policies.

    youdao

  • 可以设计访问控制策略以便根据用户特定组织中的角色进行授权。

    You can design access control policies to grant authority to a user based on their role in a particular organization.

    youdao

  • 包含针对所有Cognos对象安全名称空间信息以及访问控制策略

    It also contains security namespace information and access control policies on all the Cognos objects.

    youdao

  • 本文后面的部分,看到使用简单访问控制策略构建一个样应用程序

    Later in the article, you'll see the simple access control policy used in building a sample application.

    youdao

  • XACML一个灵活标准并且允许策略创建者构建复杂访问控制策略

    XACML is a flexible standard and allows policy authors to build complex access control policies.

    youdao

  • 但是目前继续展示如何使用Acegi配置一个简单访问控制策略

    For the moment, however, I'll stick to showing you how to configure a simple access control policy using Acegi.

    youdao

  • 数据库系统安全性主要包括两个方面访问控制策略传输通道安全

    There are two aspects included in database system security, which is access control security strategy and communication channel security.

    youdao

  • 了解到如何配置Acegi,使它目录服务交互,从而实现访问控制策略

    You will also learn how to configure Acegi to interact with the directory service to implement your access control policy.

    youdao

  • 文章着重讨论保护网络数据两种策略访问控制策略信息加密策略

    The article emphasizes on discussing the two measures to protect the datum in the network: accessing control measure and information encryption measure.

    youdao

  • 展示配置acegi的方法,使它能够目录服务器交互并实现访问控制策略

    I also show you how to configure Acegi to interact with the directory server to implement your access control policy.

    youdao

  • 这种方法服务作为访问控制策略组织单元,简化访问控制管理和使用。

    This method employs service domain as a unit in which the access control policy is organized.

    youdao

  • 最后证明细粒度协作访问控制策略关于协作系统状态转换保持安全的。

    Lastly, the preserving security property of the fine-grained access control policy with respect to state transition is proven.

    youdao

  • 现在只需了解拦截可以拦截用户在用户访问bean之前实现访问控制策略

    For the moment, just note that an interceptor can intercept a user's request and implement an access control policy before allowing the user to access the bean.

    youdao

  • RBAC模型具有灵活性方便性安全性特点,因此成为访问控制策略的首选。

    RBAC model is the most popular access control strategy because of its flexibleness, convenience and security.

    youdao

  • 详细了解配置Acegi 的方法,从而LDAP目录交互实现访问控制策略

    You have also learned in detail how to configure Acegi to interact with an LDAP directory and implement an access control policy.

    youdao

  • 例如存在这样一个访问控制策略其允许担当客户服务代表角色所有用户执行客户管理操作

    For example, there is an access control policy that allows all users that fulfill the customer Service Representative role to perform customer management operations.

    youdao

  • 这些操作可以安全配置更改密钥证书管理访问控制策略更改、总线其他系统资源管理等等

    These actions can be security configuration changes, key and certificate management, access control policy changes, bus and other system resources management, and so on.

    youdao

  • 访问控制拦截能够保证调用请求在对目标对象调用操作之前进行拦截并执行访问控制策略

    The interceptor can ensure that access control will occur before any request gets to the server operation.

    youdao

  • 自动信任协商(atn)指通过暴露信任凭证访问控制策略进行匹配以达到建立信任关系的目的。

    Automated trust Negotiation (ATN) provides a means to establish the trust membership by disclosing and matching credentials and access control policies.

    youdao

  • 步骤3DataPower设备通过计算用XACML编写访问控制策略检查是否允许用户调用请求的服务

    Step 3: the DataPower appliance checks if the user is allowed to call the requested service by evaluating the access control policy written in XACML.

    youdao

  • 步骤3DataPower设备通过计算用XACML编写访问控制策略检查是否允许用户调用请求的服务

    Step 3: the DataPower appliance checks if the user is allowed to call the requested service by evaluating the access control policy written in XACML.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定