The strength of POS 2009 is the role-based experience, which changes based on whether you're a store manager, a cashier, or a sales rep, for example.
POS 2009的优势在于其基于角色的用户体验,根据使用者角色(店面经理,收银员,销售代表等)不同而不同。
Role-based access control (RBAC)
基于角色的访问控制 (RBAC)
A role-based permission lookup example.
基于角色权限查找的范例。
"Who", i.e. Subscribers or role-based users.
“人员”,例如订阅者或基于角色的用户。
We won't cover setting up role-based access.
我们将不介绍如何设置基于角色的访问。
Projects provide a role-based context for work.
项目如何为工作提供基于角色上下文环境?
Identifying and utilizing a role-based process model.
确定并利用基于角色的过程模型。
An intuitive, role-based UI for technical and business users.
直观的基于角色的UI,可供技术用户和业务用户使用。
Reporting Services security uses a familiar role-based model.
ReportingServices安全性使用熟悉的基于角色的模型。
Setting up role-based security is easier than most people think.
设置基于角色的安全性比大部分人所想的更轻松。
Common workflow is a role-based change management system design.
通用工作流是基于角色的变更管理系统设计。
Another approach to controlling access is role-based access control (RBAC).
另一种控制访问的方法是基于角色的访问控制(RBAC)。
Registry and repository services can be accessed by a role-based web portal.
注册表和仓库服务可以通过一个基于角色的Web门户访问。
Listing 1 shows an example of code defining some role-based method permissions.
清单1所示的是用于定义某些基于角色的方法权限的示例代码。
Access to enterprise data sources through automated role-based entitlement systems.
通过基于角色的自动化授权系统实现对企业数据的访问。
We could potentially use standard J2EE role-based security to manage printer access.
我们可以使用标准的J2EE基于角色的安全性来管理打印机访问。
Role-based permission system to define access to the viewing and editing of content.
基于角色的权限系统,可以控制对内容的查看和编辑权限。
J2EE provides both declarative and programmatic role-based authorization capabilities.
J2EE同时提供了声明和编程形式的基于角色的授权功能。
Mergers and acquisitions, user preferences, and role-based design drive this requirement.
并购、用户喜好和基于角色的设计促成了这种需求。
Our clients take advantage of both role-based permission and fine-grained access control.
我们的客户同时利用基于角色的权限和细粒度访问控制。
Business-driven development is a role-based business process for developing SOA solutions.
业务驱动的开发是用于开发soa解决方案的基于角色的业务流程。
Role-based security is the most straightforward way to organize commands for security purposes.
基于角色的安全性是组织命令、实现安全性最简单的方法。
Customizing the UI to remove links and menu options is very analogous to role-based authorization.
自定义ui以删除链接和菜单选项的做法与基于角色的授权非常相似。
You can combine standard and custom views to create role-based dashboards to meet any business need.
您可以合并标准视图和自定义视图,创建基于角色的仪表板,进而满足任何业务需求。
A business component can take part in this role-based approach by defining its own roles, domain roles.
一个业务组件可以通过定义自己的角色域角色,参与这个基于角色的方法。
Security infrastructure of WebSphere Application Server, such as role-based access control and encryption.
WebSphereApplicationServer的安全基础结构,比如基于角色的访问控制和加密。
The tool lets administrators assign references to particular users or groups, making redirection role-based.
该工具允许管理员将引用指定给特殊用户或组,使重定向基于角色。
Role-based access on a need-to-use basis can be implemented as part of the central management infrastructure.
基于角色的访问建立在适当授权的基础上,可以作为中央管理基础设施的一部分被实现。
A third factor is role-based access for a variety of user roles, including non-technical policy analysts.
第三个因素是各种用户角色需要基于规则的访问,包括非技术性策略分析师。
For more examples, see Figure 2: a role-based view of selected products with communications industry features.
要参考更多的案例,请看图2:一个带有通信行业特征的选定产品的基于角色的视图。
应用推荐