• Simple infrastructure to build custom access policy.

    支持创建定制存储策略简单基础构架

    youdao

  • NIH public access policy has an important role of enhancing public access to information resource.

    美国NIH公共获取政策提高信息资源公共获取具有重要作用

    youdao

  • A remote access policy can either grant or deny access to users who match the specified conditions.

    远程访问策略授予拒绝符合指定条件用户的访问权。

    youdao

  • You still need a way to enforce a low-privileged access policy on inbound messages, and that is usually through MCAUSER.

    需要一种方式入站消息执行低权限的访问策略通常可以通过MCAUSER来实现。

    youdao

  • It deals with user's attribute certificate and implements the access control based on access policy and user's attributes.

    访问决策子系统负责解析用户属性证书提取用户属性,并根据访问策略信息和用户属性实现对资源的访问控制

    youdao

  • How do you deal with the development of inventory of records? What are your storage facility, digital media, and access policy for electronic records?

    电子档案库存做法如何?电子档案之储存设备数位媒体存取政策为何?

    youdao

  • The cache engine also provides network administrators with a simple method to enforce a site-wide access policy through URL filtering. See also Cache.

    高速缓存引擎网络管理员提供了简单方法通过URL滤波增强工作站范围内的访问手段。

    youdao

  • The policy element is used to define an access policy for a specific URL pattern, as shown in Figure 41. It includes the following sub-elements, as shown in Figure 42.

    这些政策元素用于特定URL模式定义访问政策,如图41所示

    youdao

  • All of these issues are solved in the thesis, including how to generate secure access policy rules centralized and how to enforce secure policy distribution efficiently.

    由此本文需要解决如何集中定制安全访问策略规则,以及有效实施安全策略交互

    youdao

  • For example, there is an access control policy that allows all users that fulfill the customer Service Representative role to perform customer management operations.

    例如存在这样一个访问控制策略其允许担当客户服务代表角色所有用户执行客户管理操作

    youdao

  • These actions can be security configuration changes, key and certificate management, access control policy changes, bus and other system resources management, and so on.

    这些操作可以安全配置更改密钥证书管理访问控制策略更改、总线其他系统资源管理等等

    youdao

  • Do I need to configure something more apart from applying access intent policy?

    是否需要应用访问目的策略配置某些更多部分

    youdao

  • Writing the access control policy.

    编写访问控制策略

    youdao

  • The isolation level is set on the database connection and, as we will see later, the access intent policy in use will determine how the application server will set this parameter.

    接下来部分,我们不仅置于数据库连接上的隔离有所了解,还使用访问意图策略来确定应用服务器怎样设置这些隔离级的。

    youdao

  • XACML builds on SAML by providing the actual semantics used to define access control policy and authorization request and response messages.

    XACML构建SAML之上,提供用于定义访问控制授权请求响应消息实际语义

    youdao

  • Technology capabilities, like store and access capability, policy enforcement capability, or monitoring capability, may be satisfied by manual or software.

    存储访问功能策略执行功能监视功能一样,技术功能可以通过手工或者软件来实现

    youdao

  • Any application that is allowed access by the policy can access the files that are under guard points as long as the application USES system libraries to access the files.

    策略允许访问任何应用程序都可以访问保护文件前提是应用程序使用系统访问文件。

    youdao

  • Later in the article, you'll see the simple access control policy used in building a sample application.

    本文后面的部分,看到使用简单访问控制策略构建一个样应用程序

    youdao

  • Interceptors use your application's access control policy to make authorization decisions.

    拦截器使用应用程序访问控制策略做出授权决定。

    youdao

  • Each access intent policy defined is an aggregate of a set of properties used to control different aspects of the persistence and concurrency handling involved in dealing with EJB entities.

    每个已定义访问意图策略属性集合用来控制e JB实体持久性并发性处理不同方面

    youdao

  • Most LOB’s have their own "policy" for access to the resources they own.

    大多数LOB 对于自己资源有自己的访问策略”。

    youdao

  • The PMS needs a mechanism for the report execution service to access that policy setting.

    PMS需要报告执行服务访问那个策略设置机制

    youdao

  • On the client side, access the policy sets and binding panel by following the same path as the service side, but choose the client BLA, composite, and service instead.

    客户上,按照服务相同步骤访问策略选择客户端BLA组合服务。

    youdao

  • July 1, 2011 marked the one-year anniversary of the Bank's landmark Access to Information policy.

    2011年71是世行标志性信息获取政策生效一周年。

    youdao

  • To get to the policies, the PDP uses the Policy Access Point (PAP), which writes policies and policy sets, and makes them available to the PDP.

    为了获得策略PDP 要用到策略访问PAP),PAP编写策略策略 PDP使用

    youdao

  • I also show you how to configure Acegi to interact with the directory server to implement your access control policy.

    展示配置acegi的方法,使它能够目录服务器交互并实现访问控制策略。

    youdao

  • You will also learn how to configure Acegi to interact with the directory service to implement your access control policy.

    了解到如何配置Acegi,使它目录服务交互,从而实现访问控制策略。

    youdao

  • You can divide configuring a simple access control policy into two steps.

    配置简单访问控制策略分为两个步骤

    youdao

  • Tivoli Access Manager contains a security policy which defines access to a domain.

    TivoliAccessManager包含一个安全策略定义了访问

    youdao

  • For the moment, however, I'll stick to showing you how to configure a simple access control policy using Acegi.

    但是目前继续展示如何使用Acegi配置一个简单访问控制策略

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定