Using access-control lists (ACLs), you could have created an action in the products controller and used it to grant create access to the user's access-request object (ARO) on each dealer ACO.
您可以使用访问控制列表(Access Control List,ACL)在products控制器中创建一个操作,并使用它为每个经销商aco上的用户访问请求对象(ARO)授权create访问权限。
Fear not, you'll still have access to the raw mongrel request if you want to do fancy stuff like streaming or deferred rendering outside the mutex.
不用害怕,如果您想在互斥以外做一些奇特的事情,比如流处理或延迟呈现,您仍然可以访问原始的mongrel请求。
Of course, we had to express this business request in appropriate data access code.
当然,我们必须以适当的数据访问代码来表达这种业务请求。
The JPA application holds no reference to the detached objects between the first access request and the subsequent change request.
JPA应用程序在第一个访问请求和后续修改请求之间并没有保持分离对象的引用。
JACC provides uniform access to request parameters so a JACC provider can use parameters (but not results) in the permission decision process.
JACC提供对请求参数的统一访问,因而JACC提供程序可在权限决定过程中使用参数(而不是结果)。
The access guideline (any access request) allows the optimizer to choose the access method.
ACCESS准则(任何访问请求)允许优化器选择方法。
Generation of the request to access the target resource and the subsequent response granting or denying access falls under the domain of SAML.
访问目标资源请求的生成,以及后续的允许或拒绝访问响应,都属于SAML的范围。
First, we cover creating an infrastructure or an object model that starts with a request, access definition, and column maps for data extraction.
首先,我们创建一个基础或者对象模型,从分析需求、访问定义,以及数据提取的列映射开始。
Sometimes, to test your controller, you need access to the raw request and response.
有时,要测试控制器,您需要访问原始的请求和响应。
The client computers first request access to the exported data by mounting the file system.
客户端计算机首先通过挂载文件系统请求访问导出的数据。
To illustrate the various XACML components, I'll show you how to take a specific access request and create all the XACML components required to process it.
为了说明XACML的不同组件,我们将以一个具体的访问请求为例,创建所需的全部 XACML 组件。
In short, locking is the means by which data integrity can be maintained when two or more application processes simultaneously request access to the same data.
简而言之,锁定是一种方法,通过该方法,当两个或多个应用程序进程同时请求访问同一数据时,可以保持数据完整性。
If a request for exclusive access to the resource is unlocked, this method locks it.
如果独占访问请求的资源没有被锁定,则这个方法锁定它。
For all tables listed in a FROM clause, there can be, at most, one access or join request with the 'FIRST' attribute.
对于from子句中列出的所有表,最多有一个访问或计划可以带有“FIRST”属性。
Request to access a protected resource: The user attempts to access a protected resource on the RP's Web site.
请求访问受保护资源:用户试图访问RP网站上的受保护资源。
Many other software entities can request access to the resources from time to time, using services that the resource managers provide.
许多其他软件实体使用资源管理器提供的服务,不时地请求访问资源。
Discover and request access to the HMC or IVM that is managing the POWER hosts.
找到并请求访问管理POWER主机的hmc或ivm。
Follow these steps to add an HTTP access service request.
使用以下步骤添加一个HTTP访问服务请求。
To configure CXF dynamically, you need to make use of this implied typing and cast the proxy to the BindingProvider class, then access the request context property map through that cast.
要想动态地配置CXF,需要使用这个隐含的类型并把代理转换为bindingprovider类,然后通过类型转换访问请求上下文属性映射。
Direct template access to the request object and attributes, the session object and attributes, and the servlet context and attributes.
对请求对象和属性、会话对象和属性以及servlet上下文和属性的直接模板访问。
The IXAND access request element directs the optimizer to use index anding to access a table.
IXAND访问请求元素要求优化器使用indexanding访问表。
Request provides access to HTTP request data, as well as providing a context for associating request-specific data.
Request提供对HTTP请求数据的访问,同时还提供用于加入特定于请求的数据的上下文。
Here's the code we used to connect to the Domino server and request access to the Lotus Notes database.
下面是我们用来连接到Domino服务器以及请求访问LotusNotes数据库的代码。
Lines 10-12 show how an application can request full access to a client's environment.
第10行到第12行显示了应用程序如何请求对客户机环境的完全访问权。
OAuth defines two different types of Tokens: Request and Access.
OAuth定义了两种类型的令牌:请求令牌和访问令牌。
According to the PDPO, the Company has the right to charge you a reasonable fee for the processing of any data access request.
根据《个人资料(私隐)条例》,本公司有权就处理任何查阅资料的要求收取合理费用。
Based on certainty and possibility reasoning, an algorithm to determine whether an access request is authorized is proposed.
结合确定性推理和可能性推理,描述了如何判定访问请求的算法。
If your application will be transmitting protected user data, the usage string in your access request should clearly inform the user that their data will be uploaded to your server if they consent.
如果您的应用程序将传输保护用户数据,使用字符串在你访问请求应该清楚地通知用户,他们的数据将被上传到您的服务器,如果他们同意。
If your application will be transmitting protected user data, the usage string in your access request should clearly inform the user that their data will be uploaded to your server if they consent.
如果您的应用程序将传输保护用户数据,使用字符串在你访问请求应该清楚地通知用户,他们的数据将被上传到您的服务器,如果他们同意。
应用推荐