You set access control on content spots and rule mappings to manage which users can change these start and end dates.
您可以在内容点和规则映射上通过设置访问控制来管理哪些用户可以改变开始和结束日期。
Thus, management retains control over who can access each specific set of models, which prevents potential security violations.
因此,管理保留了对访问模型特定集合的控制权,这就阻止了潜在的安全性入侵。
This case will illustrate how different access control lists interact with a given set of queues.
这个用例将展示不同访问控制列表与特定队列集之间的交互。
Now that you have set access control for the e-form, you can test your changes.
既然为电子表单设置了访问控制,就可以开始测试更改了。
Just like tables, nicknames have an equivalent set of privileges that can control user access to the nickname objects on the federated system.
与表一样,昵称也有对等的一组权限,用于控制用户在联邦系统上对昵称对象的访问。
You can also set policies that control access to our SQS queue based on date, time, and source IP Address, as in Listing 2.
您还可以设置一个策略,它根据日期、时间和源ip地址控制SQS队列的访问,如清单2所示。
How can we create a set of tabs and pages to provide the navigation, or access control, which different groups of users require?
我们如何创建一组标签和页面,以提供不同组的用户需要的导航或者访问控制?
To optimize the management of access control, an IT organization might have a policy enforcement point or set of enforcement points.
为了优化对访问控制的管理,IT组织可能需要一个或一组策略实施点。
There are some system properties that you can set to control the level of access and the way in which VM data is transmitted from the JMX agent to the management client.
可以设置一些系统属性,来控制访问级别和虚拟机数据从JMX代理向管理客户机传递虚拟机数据的方式。
Each access intent policy defined is an aggregate of a set of properties used to control different aspects of the persistence and concurrency handling involved in dealing with EJB entities.
每个已定义的访问意图策略都是一组属性的集合,用来控制e JB实体的持久性和并发性处理的不同方面。
Includes a rich set of functions to test access control requirements, such as the user's IP address, time and date, or whether the user's name appears in a given list.
包括用于测试访问控制要求的丰富功能集,例如用户的IP地址、时间和日期,或用户的名称是否出现在给定的列表中。
If ignore access control in caches is set to false for a portal page, a completely rendered page will not be cacheable at all.
如果将某个门户页面的忽略缓存中的访问控制设置为False,将不能对完全呈现的页面进行缓存。
If CONTROL access is granted to a group, such as AP2USRS, it would allow users in that group to set both origin and identity context.
如果CONTROL访问权授予一个组,比如ap2usrs,那么它将允许该组中的用户设置原始和身份上下文。
After you submit your e-form, the user who has authority to set access control adds the second user to the Editor role in the e-form's access control.
在您提交电子表单后,具有设置访问控制权限的用户将第二个用户添加到电子表单的访问控制中的Editor角色。
Add a permission hook onto the reference field to set access control when changing a defect record.
在关联字段上增加一个permissionhook,在改变一个缺陷记录时设置控制权限。
We can use the little window of the program to quickly access our control panel, shut down our computer, or set up a custom shortcut for any program, file, or folder.
我们可以利用这个小型的视窗讯速进入控制面板、关闭电脑或建立任何一个程序、文件、文件夹的快捷方式。
Each of these application roles aggregates a set of very specific portal access control roles.
其中的每个应用程序角色都聚合一组非常特定的门户访问控制角色。
Each user or group that is added to the ACL can have a different set of active permissions, enabling very granular control over exactly what type of access is available to any user.
添加到ACL的每个用户或组可以具有不同的活动权限,从而可对任何用户可用的访问权限类型进行适当的细粒度控制。
Access Control list (ACL) : An ACL is a data structure that associates to a set of principals a list of permissions for a service.
访问控制列表(acl): ACL是一种数据结构,它将一个服务的权限列表与一组主体相关联。
Multiple security realms can be defined in Gluecode Standard Edition to authenticate and authorize users by providing a set of principals for access control.
在Gluecode标准版中可以定义多个安全域,然后通过提供一套访问控制主体,对用户进行身份验证和授权。
They may even filter requests by incoming IP addresses or set up a cookie to control access to the form.
他们甚至会按照传入IP地址对请求进行筛选,或设置Cookie来控制对表单的访问。
When you get the set of all audit rules for an event, the set contains the minimum number of rules currently required to express all the access control entries.
在获取某个事件的所有审核规则的集合时,该集合包含当前表示所有访问控制项所需要的最低数量的规则。
When you get the set of all audit rules for a registry key, the set contains the minimum number of rules currently required to express all the access control entries.
在获取某个注册表项的所有审核规则的集合时,该集合包含当前表示所有访问控制项所需要的最低数量的规则。
In a nutshell - CardSpace is a set of Windows features and user-interface that lets users navigate access decisions and control how personal information is used.
简单地说,CardSpace是一组Windows功能和用户界面,它们允许用户导航访问权限和控制使用个人信息。
As each packet is represented with an sk_buff, the packet headers are conveniently located through a set of Pointers (th, iph, and MAC for the Media Access Control, or MAC, header).
由于每个报文都是使用一个sk_buff表示的,因此报文头都可以通过一组指针(th、iph和mac[用于MediaAccess Control或者mac头])方便地进行定位。
It does no access control, so anyone who can login to the machine can set any message. We assume this is the desired behavior in our case.
它不进行访问控制,所以任何可以登录到这台机器上的人都可以设置任意的消息。我们假设这就是在我们的例子中所期待的行为。
It offer a rich set of access control mechanism for you to secure document and programs.
它提供了一套丰富的对文件及程序的存取控制机制。
Permissions are set using access control lists.
权限是使用访问控制列表设置的。
Gets a Boolean value that specifies whether this Access Control Entry (ACE) is inherited or is set explicitly.
获取一个布尔值,该值指定此访问控制项(ace)是继承的还是显式设置的。
Entity set access control and validation is enabled through query operations by using query composition.
实体集访问控制和验证是使用查询撰写通过查询操作实现的。
应用推荐