Installation requires modification of application permissions.
申请安装改造许可的规定。
All application permissions must be granted by the user at install time.
所有的应用许可都必须在应用安装的时候获得用户的准许。
All application permissions must be granted by the user at install time.
所有的应用程序权限必须在安装的时候被用户设定。
All application permissions must be granted by the user at install time.
所有应用的安装权限必需通过用户许可。
To access private data, the application must request and the user must grant to the application permissions to do so.
要访问私有数据,应用程序必须请求权限,并由用户对应用程序授予权限,才能进行访问。
A permissions class with a static initializer provides a single location for declaring and configuring available application permissions.
带有静态初始化器的permissions类为声明和配置可用的应用程序权限提供单一位置。
This article introduced security on the Android platform, including sandboxes, application signing, application permissions, and file and content provider permissions.
本文介绍了Android平台上的安全性,包括沙箱、应用程序签名、应用程序权限,以及文件和内容提供者权限。
Roles themselves generally represent collections of permissions in the J2EE application.
角色本身通常表示J2EE应用程序中的权限集合。
The requesting application or user can perform any query requests within the scope of their access permissions.
请求应用程序或用户可以在其访问权限内执行任何查询请求。
A role is therefore a collection of permissions; to be useful, you have to bind it to some set of users when you deploy the application.
因此,角色是权限集合;为了使用它,必须在部署应用程序时将其绑定到某一组用户。
The system sets permissions for all the files in an application so that only the user ID assigned to that application can access them.
应用中的所有文件访问许可都被系统设置了此ID,因此,只有被分配了该用户ID的应用可以访问这些文件。
In this case, the permissions are built into the very data structures of the application.
在这种情况下,权限内置到应用程序的数据结构中。
Permissions were based on masking a 32-bit integer — the example application and requirements would have needed at least 64 bits to handle the required atomic permissions.
各种权限都基于屏蔽一个32位整数——示例应用程序和要求至少需要64位才能处理所需的原子权限。
Applications can define their own custom permissions to protect application resources.
应用程序可以定义它们自己的定制权限,以保护应用程序资源。
This feature allows client applications to reset permissions (to the default role) of the user running the application, instead of requiring the DBA to reset permissions manually.
这个特性允许客户应用程序重新设置运行该应用程序的用户权限(对默认角色),不需要dba手工改变权限设置。
Permissions are requested by the application through the manifest file and granted or not granted by the user during installation.
权限在安装期间通过manifest文件由应用程序请求,由用户授予或不授予。
ACL requires some customization, but unlike Permissions, the customization is for a runtime environment rather than for a particular application.
ACL需要一些自定义,但与Permissions不同,该自定义是针对运行时环境,而不是特定应用程序。
You should limit file system access to WebSphere Application Server's files by leveraging operating system file permissions.
应该利用操作系统文件权限来限制对WebSphereApplicationServer文件的文件系统访问。
In Part 3, the conclusion to this series, you will explore how to visualize application actions, groups, and principals, and their relationship to EAz permissions, in a graphical interface.
在作为本系列结束的第3部分,您将探索如何将应用程序操作、组和主体,以及它们与EAz权限的关系在图形界面中可视化。
Listing 7 shows fragments of the EJB application deployment descriptor used to configure the method permissions for SimpleSessionBean.
清单7显示了用于配置SimpleSessionBean的方法权限的EJB应用程序部署描述符的片段。
The two static maps are the application structures that relate permissions to actions.
两个静态map是将权限与操作相关联的应用程序结构。
If anonymous access is allowed, the IBM Cognos 8 SDK application will be granted the same rights and permissions as the anonymous user from the Cognos namespace.
如果允许匿名访问,IBMCognos8SDK应用程序将被授予与Cognos名称空间的匿名用户相同的权利和权限。
The Permissions configuration class functions as a container for static enum types that configure the permissions in a particular application using EAz.
Permissions配置类可用作在特定的应用程序中使用Eaz配置权限的静态Enum类型的容器。
Permissions is never instantiated — it features a static initializer that builds up the enum types that configure permissions for the application.
Permissions从不实例化,它提供构建Enum类型的静态初始化器,该Enum类型可以为应用程序配置权限。
After applications are signed, the next step is for you to define in the manifest the permissions needed by the application.
应用程序签署之后,下一步由您在manifest中定义应用程序需要的权限。
This article illustrated a technique for visualizing application actions, groups, and actors, and their relationship to EAz permissions, in a graphical interface.
本文阐述了将应用程序操作、组和参与者,以及它们与 EAz权限的关系在图形界面中实现可视化的技术。
After the user logs in, she is prompted for permissions (email or phone information and a password) as requested by the application.
用户登录之后,会被提示按照应用程序的请求输入权限(email或电话信息和密码)。
That complicates deployment in same ways (editing a common file), but reduces the risk of an application obtaining inappropriate permissions.
采用同样的方式(编辑一个公共文件),这会使得部署变得复杂起来,但可以减少应用程序获得不恰当的权限的风险。
Employees in different roles see only the pages that matter to them, which you achieve in a WebSphere Portal-deployed application by setting permissions on the pages of your composite application.
不同角色的员工只能看到与之相关的页面,这可以通过在WebSpherePortal部署的应用程序中实现,方法为在复合应用程序的页面中设置权限。
Employees in different roles see only the pages that matter to them, which you achieve in a WebSphere Portal-deployed application by setting permissions on the pages of your composite application.
不同角色的员工只能看到与之相关的页面,这可以通过在WebSpherePortal部署的应用程序中实现,方法为在复合应用程序的页面中设置权限。
应用推荐