• Schemas have privileges associated with them, allowing the schema owner to control which users have the privilege to create, alter, and drop objects in the schema.

    模式具有关联特权使模式所有者能够控制哪些用户有权这个模式中创建修改删除对象

    youdao

  • Just like tables, nicknames have an equivalent set of privileges that can control user access to the nickname objects on the federated system.

    与表一样昵称也有对等的一权限用于控制用户联邦系统昵称对象访问

    youdao

  • This includes authentication of users, control of access privileges, auditing, single sign-on, high availability, and logging that are elements of any security management solution.

    涵盖任何安全管理解决方案具有的要素,比如用户认证访问权限控制审计点登录可用性日志记录。

    youdao

  • Once all required database objects and packages are created, use group membership and group privileges to control access to the created database objects and packages.

    创建好所有必需数据库对象之后使用组成员关系和特权控制创建的数据库对象和包的访问

    youdao

  • Using trusted contexts provides greater control while using restricted, sensitive privileges, and allows middle-tier servers or applications to assert the identity of the user to the database server.

    通过使用可信上下文,可以使用受限制敏感特权时提供更强控制并且使中间层服务器应用程序可以数据库服务器确定用户身份

    youdao

  • In Listing 3, you see that the user EMMA has CONTROL privilege on the table TABLE1 as well as all the other available table privileges, including the ability to grant those privileges to other users.

    清单3中,可以看出用户EMMA具有table1CONTROL特权以及所有其他可用的表特权包括这些特权授予其他人能力

    youdao

  • In this article, we have reviewed the different authority levels and privileges defined in DB2 UDB and how they can be assigned to users using command line syntax and the Control Center.

    本文中,我们回顾DB 2UDB定义各种权限级别特权以及如何使用命令语法Control Center将它们分配用户

    youdao

  • Use Access Control Lists to define component level operation privileges.

    使用访问控制列表(Access Control List)定义组件级别操作权限

    youdao

  • Finally, you might want to control and grant the privileges to specific users to provide specific access to the packages.

    最后可能控制授予特定用户访问数据包的特定权限

    youdao

  • But an attacker needs only to find a single hole in your defenses, or in any of the frameworks and libraries that you link against, to gain control of your app along with all of its privileges.

    攻击只需找到应用防御措施或是应用链接框架中的漏洞,就可以控制你的应用及其所拥有的权限。

    youdao

  • By setting up fine-grained privileges and role-based access control HP protected systems reduces configuration time and required customer skill level.

    设置细颗粒度授权角色访问控制惠普保护系统减少了配置时间客户所需技能水平要求。

    youdao

  • By setting up fine-grained privileges and role-based access control HP protected systems reduces configuration time and required customer skill level.

    设置细颗粒度授权角色访问控制惠普保护系统减少了配置时间客户所需技能水平要求。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定