Or you might be able to perform your access logging on the ADC itself.
此外,还可以在ADC 本身中执行访问日志记录。
Logging in provides access to the user account management form.
登陆提供了对用户账户管理表单的访问。
Other instances in which this pattern is useful include logging and printing, such as when you want only one instance of a class to access and control one particular printer at a time.
在其他实例中,此模式也是有用的,包括登录和打印,例如,当您想要一个能够每次访问并控制一个特别打印机的类实例。
We've looked at transaction demarcation and logging and you now have a deeper understanding of how each applies to data access objects.
我们讨论过了事务界定和日志,现在对于如何在数据访问对象上应用它们有了更深入的理解。
Data access services: These services are responsible for authorization, restrictions and logging access to data.
数据访问服务:这些服务负责数据访问授权、限制和日志记录。
By dumping the session, we force any continued access to first be revalidated by logging back in.
通过转储会话,我们强制任何再续访问首先都要通过重新登录重新验证。
The client provides an API through which the business application can access the logging client.
客户端提供了一组API,业务应用程序通过它能够访问日志客户端。
User space provides a number of access points for reading and managing kernel logging.
用户空间提供了许多读取和管理内核日志的访问方法。
Auditing and logging indicators like requests per amount of time, denials of access, profiling of service consumers, and so on.
对诸如单位时间的请求数、拒绝访问、服务使用者分析等指标进行审核并做日志记录。
The change summary is initially inactive, so the user code needs to access it and set it logging.
更改摘要最初处于非活动状态,因此用户代码需要访问并将其设置开始记录。
Rather than add the latency, complexity, and overhead of summarizing, logging, and processing information, it is often better to provide direct access to live system performance data.
由于不增加延迟、复杂性以及合计、日志及处理信息的开销,提供到即时系统数据的直接访问通常会更好。
This will help a handler obtain access to container-specific value-added features, including authentication mechanisms, transaction processing, a logging framework, etc.
这将帮助处理程序获得特定于容器的增值功能的访问权,包括认证机制,事务处理,日志记录的框架等。
Activity Logging records user activity by person, database, and access protocol.
ActivityLogging记录由个人、数据库和访问协议产生的用户活动。
Listing 3 shows an example of a USER Not Authenticated or FAKED USER error that occurs if you run a program to access a guard point after logging in via a non-authorized login method.
清单3显示了一个USERNotAuthenticated或FAKED USER错误的例子,当您通过不支持的登录方法登录并运行访问保护点的程序之后,就会出现此类错误。
The use of WebSphere logging and caching services and WebSphere Portal access control management also help to simplify administration.
使用WebSphere日志记录和缓存服务以及 WebSpherePortal访问控制管理还有助于简化管理。
Using this special manager allows our application to access the existing WebSphere logging system, adding messages to the main console window and trace logs.
使用这个特殊的管理器可以允许我们的应用程序访问已有的WebSphere日志记录系统,把消息添加到主控制台窗口和跟踪日志。
It is better to take the second option and have other plug-ins access logger.jar through a logging plug-in.
因此使用第二个选项使其他插件通过日志插件来访问logger . jar会更好些。
A user logging into portal can only see and work with those for which portlets the user has the necessary access rights.
登录到门户的用户仅能查看和处理该用户拥有必要访问权限的Portlet的内容。
If a user attempts to directly access a protected page without first logging in (for example, by using a bookmark or following a link), the WebSEAL server will return its default login page.
如果用户试图不是先登录而是直接访问受保护的页面(例如,采用书签或者利用链接),WebSEAL服务器将会返回其默认登录页面。
Overall, make sure that the disk space and access rights in your file system allow for proper WebSphere Process Server logging.
应该确保文件系统中的磁盘空间和访问权限支持WebSphereProcessServer日志记录。
Unless logging is being performed (for example, of exceptions or site access information), WebSphere Portal does not cause any disk access on its own.
除非在执行日志记录功能(例如,在记录异常或站点访问信息),否则WebSpherePortal自己不会引起任何磁盘访问。
Answer: Utility services would be separated into individual subpackages (logging; data synchronization and backup; access control; and login).
回答:公用服务被单独的放在一个子包中(日志服务;数据同步和备份服务;访问控制服务和登陆服务)。
Antipattern: People manually access machines by logging into each of the machines as different users; then they copy files, configure values, and so on.
反模式:由人以不同的用户身份手工登录并访问每台计算机,然后执行复制文件、配置值等操作。
This includes authentication of users, control of access privileges, auditing, single sign-on, high availability, and logging that are elements of any security management solution.
它涵盖任何安全管理解决方案都具有的要素,比如用户认证、访问权限控制、审计、单点登录、高可用性和日志记录。
A requirement of a recovery log is that only one server has access to it (either for recovery processing or standard logging) at any time.
对于恢复日志来说,要求任何时间都只能有一台服务器对其进行访问(恢复处理或是标准的日志记录)。
You are logging in with the correct name and password, but it says that you are not allowed access to the page.
您用正确的用户名和密码登录了,但不允许您访问该页面。
After successfully logging in, the user is sent back to the page they attempted to access in the first place.
成功登录后,用户将被返回到他们第一次尝试访问的页面。
Policy-related requirements, such as security requirements on the users' and external system's access, ID management policies, audit and logging.
政策相关的需求,例如用户访问及外部系统访问的安全性需求,ID管理政策,审计和登录。
If you don't want to log to a database, and would prefer logging only to files, or if you want to log to a MySQL database or an ODBC-accessible database like Microsoft access, choose the first option.
如果您不希望登录到数据库,而是希望仅登录到文件,或者希望登录到MySQL数据库以及MicrosoftAccess等odbc可访问的数据库,则应选择第一个选项。
If you don't want to log to a database, and would prefer logging only to files, or if you want to log to a MySQL database or an ODBC-accessible database like Microsoft access, choose the first option.
如果您不希望登录到数据库,而是希望仅登录到文件,或者希望登录到MySQL数据库以及MicrosoftAccess等odbc可访问的数据库,则应选择第一个选项。
应用推荐