Schemas have privileges associated with them, allowing the schema owner to control which users have the privilege to create, alter, and drop objects in the schema.
模式具有相关联的特权,使模式所有者能够控制哪些用户有权在这个模式中创建、修改和删除对象。
Just like tables, nicknames have an equivalent set of privileges that can control user access to the nickname objects on the federated system.
与表一样,昵称也有对等的一组权限,用于控制用户在联邦系统上对昵称对象的访问。
Once all required database objects and packages are created, use group membership and group privileges to control access to the created database objects and packages.
创建好所有必需的数据库对象和包之后,使用组成员关系和组特权来控制对所创建的数据库对象和包的访问。
This includes authentication of users, control of access privileges, auditing, single sign-on, high availability, and logging that are elements of any security management solution.
它涵盖任何安全管理解决方案都具有的要素,比如用户认证、访问权限控制、审计、单点登录、高可用性和日志记录。
Using trusted contexts provides greater control while using restricted, sensitive privileges, and allows middle-tier servers or applications to assert the identity of the user to the database server.
通过使用可信上下文,可以在使用受限制的、敏感的特权时提供更强的控制,并且使中间层服务器或应用程序可以向数据库服务器确定用户的身份。
In Listing 3, you see that the user EMMA has CONTROL privilege on the table TABLE1 as well as all the other available table privileges, including the ability to grant those privileges to other users.
在清单3中,可以看出用户EMMA具有表table1上的CONTROL特权,以及所有其他可用的表特权,包括将这些特权授予其他人的能力。
In this article, we have reviewed the different authority levels and privileges defined in DB2 UDB and how they can be assigned to users using command line syntax and the Control Center.
在本文中,我们回顾了DB 2UDB中定义的各种权限级别和特权,以及如何使用命令行语法和Control Center将它们分配给用户。
Use Access Control Lists to define component level operation privileges.
使用访问控制列表(Access Control List)定义组件级别的操作权限。
Finally, you might want to control and grant the privileges to specific users to provide specific access to the packages.
最后,您可能想要控制并授予特定用户访问数据包的特定权限。
But an attacker needs only to find a single hole in your defenses, or in any of the frameworks and libraries that you link against, to gain control of your app along with all of its privileges.
但攻击者只需找到你应用防御措施或是应用链接的框架和库中的一个漏洞,就可以控制你的应用及其所拥有的权限。
By setting up fine-grained privileges and role-based access control HP protected systems reduces configuration time and required customer skill level.
设置细颗粒度的授权和角色访问控制,惠普保护系统减少了配置时间和客户所需的技能水平要求。
By setting up fine-grained privileges and role-based access control HP protected systems reduces configuration time and required customer skill level.
设置细颗粒度的授权和角色访问控制,惠普保护系统减少了配置时间和客户所需的技能水平要求。
应用推荐