You can customize the security mechanisms to meet your individual needs, instead of relying on a standard facility like the operating system.
不必依赖于操作系统之类的标准设施,相反,可以定制安全性机制以满足自己的需求。
The important point to remember is that these accounts are defined in a security facility outside of DB2 UDB — typically the operating system.
要记住的重点是,这些帐号是在DB 2UD b外的安全设施中定义的——通常是操作系统。
User and group authentication is managed in a facility external to DB2, such as the operating system, a domain controller, or a Kerberos security system.
用户和组的身份验证是在DB 2外部的一个设施中,例如操作系统、域控制器或Kerberos安全系统中进行管理的。
Prior to Version 8.2, these operations were managed by a facility external to DB2, such as the operating system, a domain controller, or a Kerberos security system.
在8.2版之前,这些操作是由DB 2udb之外的设施管理的,例如操作系统、域管理器或Kerberos安全性系统。
User and group authentication is managed in a facility external to DB2 UDB, such as the operating system, a domain controller, or a Kerberos security system.
用户和组身份验证由DB 2udb外部的设施管理,比如操作系统、域控制器或者Kerberos安全系统。
In DB2 UDB, user and group authentication is managed in a facility external to DB2 UDB, such as the operating system, a domain controller, or a Kerberos security system, in the form of a plug-in.
在DB 2UD b中,用户和组身份验证由DB 2UDB的外部设备以插件的形式来管理,如操作系统、域控制器或者Kerberos安全系统。
Start the Control Center by entering the db2cc command on a command prompt, or starting it from the graphical facility on your operating system. For example, on Windows.
在命令提示符下输入db2cc命令,启动ControlCenter,或用操作系统上的图形工具启动它。
Empirical estimation of cost functions requires statistical techniques which relate the cost of constructing or operating a facility to a few important characteristics or attributes of the system.
利用基于经验的成本函数估算成本需要一些统计技术,这些技术将建造或运营某设施与系统的一些重要特征或属性联系起来。
Empirical estimation of cost functions requires statistical techniques which relate the cost of constructing or operating a facility to a few important characteristics or attributes of the system.
利用基于经验的成本函数估算成本需要一些统计技术,这些技术将建造或运营某设施与系统的一些重要特征或属性联系起来。
应用推荐