Simple infrastructure to build custom access policy.
可支持创建定制存储策略的简单基础构架。
NIH public access policy has an important role of enhancing public access to information resource.
美国NIH公共获取政策对提高信息资源公共获取具有很重要的作用。
A remote access policy can either grant or deny access to users who match the specified conditions.
远程访问策略可授予或拒绝符合指定条件的用户的访问权。
You still need a way to enforce a low-privileged access policy on inbound messages, and that is usually through MCAUSER.
您还需要一种方式对入站消息执行较低权限的访问策略,这通常可以通过MCAUSER来实现。
It deals with user's attribute certificate and implements the access control based on access policy and user's attributes.
访问决策子系统负责解析用户属性证书和提取用户属性,并根据访问策略信息和用户属性实现对资源的访问控制。
How do you deal with the development of inventory of records? What are your storage facility, digital media, and access policy for electronic records?
电子档案库存做法如何?电子档案之储存设备、数位媒体、与存取政策为何?
The cache engine also provides network administrators with a simple method to enforce a site-wide access policy through URL filtering. See also Cache.
高速缓存引擎还为网络管理员提供了一种简单方法,通过URL滤波增强了工作站范围内的访问手段。
The policy element is used to define an access policy for a specific URL pattern, as shown in Figure 41. It includes the following sub-elements, as shown in Figure 42.
这些政策元素用于为特定的URL模式定义访问政策,如图41所示。
All of these issues are solved in the thesis, including how to generate secure access policy rules centralized and how to enforce secure policy distribution efficiently.
由此,本文需要解决如何集中定制安全访问策略规则,以及有效实施安全策略交互。
For example, there is an access control policy that allows all users that fulfill the customer Service Representative role to perform customer management operations.
例如,存在这样一个访问控制策略,其允许担当客户服务代表角色的所有用户执行客户管理操作。
These actions can be security configuration changes, key and certificate management, access control policy changes, bus and other system resources management, and so on.
这些操作可以是安全配置更改、密钥和证书管理、访问控制策略更改、总线和其他系统资源管理等等。
Do I need to configure something more apart from applying access intent policy?
我是否需要在应用访问目的策略时配置某些更多的部分?
Writing the access control policy.
编写访问控制策略。
The isolation level is set on the database connection and, as we will see later, the access intent policy in use will determine how the application server will set this parameter.
在接下来的部分,我们不仅会对置于数据库连接上的隔离级有所了解,还将会使用访问意图策略来确定应用服务器是怎样设置这些隔离级的。
XACML builds on SAML by providing the actual semantics used to define access control policy and authorization request and response messages.
XACML构建于SAML之上,提供了用于定义访问控制和授权请求及响应消息的实际语义。
Technology capabilities, like store and access capability, policy enforcement capability, or monitoring capability, may be satisfied by manual or software.
像存储和访问功能、策略执行功能或监视功能一样,技术功能也可以通过手工或者软件来实现。
Any application that is allowed access by the policy can access the files that are under guard points as long as the application USES system libraries to access the files.
策略允许访问的任何应用程序都可以访问保护点下的文件,前提是该应用程序使用系统库来访问文件。
Later in the article, you'll see the simple access control policy used in building a sample application.
在本文后面的部分,您将看到使用简单的访问控制策略构建一个样例应用程序。
Interceptors use your application's access control policy to make authorization decisions.
拦截器使用应用程序的访问控制策略来做出授权决定。
Each access intent policy defined is an aggregate of a set of properties used to control different aspects of the persistence and concurrency handling involved in dealing with EJB entities.
每个已定义的访问意图策略都是一组属性的集合,用来控制e JB实体的持久性和并发性处理的不同方面。
Most LOB’s have their own "policy" for access to the resources they own.
大多数LOB 对于自己的资源有自己的访问 “策略”。
The PMS needs a mechanism for the report execution service to access that policy setting.
PMS需要报告执行服务访问那个策略设置的机制。
On the client side, access the policy sets and binding panel by following the same path as the service side, but choose the client BLA, composite, and service instead.
在客户端上,按照与服务端相同的步骤访问策略集,但选择客户端BLA、组合和服务。
July 1, 2011 marked the one-year anniversary of the Bank's landmark Access to Information policy.
2011年7月1日是世行标志性的信息获取政策生效一周年。
To get to the policies, the PDP uses the Policy Access Point (PAP), which writes policies and policy sets, and makes them available to the PDP.
为了获得策略,PDP 要用到策略访问点(PAP),PAP编写策略和策略集,供 PDP使用。
I also show you how to configure Acegi to interact with the directory server to implement your access control policy.
我还将展示配置acegi的方法,使它能够与目录服务器交互并实现您的访问控制策略。
You will also learn how to configure Acegi to interact with the directory service to implement your access control policy.
您还将了解到如何配置Acegi,使它与目录服务交互,从而实现您的访问控制策略。
You can divide configuring a simple access control policy into two steps.
配置简单的访问控制策略可分为两个步骤。
Tivoli Access Manager contains a security policy which defines access to a domain.
TivoliAccessManager包含一个安全策略,它定义了对域的访问。
For the moment, however, I'll stick to showing you how to configure a simple access control policy using Acegi.
但是,目前我将继续向您展示如何使用Acegi配置一个简单的访问控制策略。
应用推荐