Every data source must have a defined custodian (a business role) responsible for the accuracy, integrity, and security of that data.
每个数据源必须有确定的管理人(业务角色)负责数据的精确性、完整性和安全性。
Now that you have a security role, you need to assign it to some resources.
现在您拥有了一个安全性角色,您需要给其分配一些资源。
They should clearly understand their role in the security chain and be provided with support, in tools and education.
他们应该清晰地理解自己在安全链中的角色,并在工具和培训方面获得支持。
The roles are mapped to real users and groups at application deployment time, during a process called security role mapping.
角色将在应用程序部署时映射到实际的用户和组(在称为安全角色映射 的过程期间进行)。
For each security role, a corresponding principal class and its name must be declared.
对于每个安全角色,必须声明相应的主体类及其名称。
The role separation divides the security duty among administrators.
角色分离分离了管理员的安全职责。
It provides user and role based security, which is one of the most important aspects of P2P for an organization.
它能够提供用户和基于角色的安全保证,而这对于企业级应用的P 2 P是最重要的一个方面。
Figure 22 shows the security role Reference being linked to the appropriate security role.
图22显示了正在链接到适当安全角色的安全性角色引用。
It might provoke Western boycotts of some ASEAN meetings, undermining ASEAN's central role in regional security.
这可能激起西方对某些东盟会议的联合抵制,破坏东盟在区域安全上的核心作用。
Security role definition changes: If a module level operation results in changes to application security role definitions, then the entire application may be recycled for any module level changes.
安全角色定义更改:如果模块级别操作导致应用程序安全角色定义更改,则会因为任何模块级别的更改而导致整个应用程序重新启动。
The EJB Visual Editor now enables the application assembler to visually create security roles and link the Security Role Reference to the security roles.
EJB可视化编辑器现在已经可以允许应用程序的组装人员直观地创建安全性角色,并能够将安全性角色引用链接到安全性角色。
What kinds of skills will you need in the role of security architect?
安全架构师的角色需要哪些技能?
A security role that groups all authenticated and unauthenticated system users must be created.
必须创建一个用于对所有通过验证和没有通过验证的系统用户进行分组的安全角色。
Security role mapping in the EJB deployment plan.
EJB部署计划中的安全角色映射。
To create dynamic reports that implement Role based security we use the following IBM Cognos BI functionality.
要创建实现基于角色的安全性的动态报告,可使用以下IBMCognosBI功能。
Steps to implement Role based security
实现基于角色的安全性的步骤
IBM Cognos BI features for implementing Role based security.
用于实现基于角色的安全性的IBMCognosbi特性。
EnSTratus works by separating the roles of infrastructure provider from the role of security provider.
EnSTratus通过将基础设施提供者角色与安全提供者角色分离的方法来运作。
Create a security role named BPEUser.
创建名为BPEUser的安全角色。
You'll see a J2EE security role called Agents.
您将看到名为agents的J2EE安全角色。
We use a role element for each security role to be mapped.
我们对每个要映射的安全角色使用一个role元素。
Add a security role called administrator.
添加安全角色administrator。
User role Provisioning: This is an application or a component that handles user role security mapping with a business process, resulting in a versioned process template with human task role mapping.
UserRoleProvisioning:这是一个应用程序或组件,处理用户角色安全与业务流程的映射,产生一个具有人工任务角色映射的版本化流程模板。
MapRolesToUsers Allows you to specify users or groups for a security role. Each row of task data represents a single security role.
MapRolesToUsers允许您指定安全性角色的拥护和组。
In the security Roles field, click add to add a new security role.
在Security Roles字段中,单击add添加一个新的安全性角色。
You can add users to this role by using the Security role to user/ group mapping in the application
通过在应用程序中使用Security roletouser/groupmapping ,可以向这个角色添加用户
The solution presented in this article is a loosely-coupled user role security integration solution.
本文提出的解决方案是一种松耦合的用户角色安全集成解决方案。
In America, there are voices that deride and deny the importance of Europe's role in our security and our future.
在美国,有一些声音嘲笑并否认欧洲在保障我们安全和未来方面的重要地位。
Role-based security is the most straightforward way to organize commands for security purposes.
基于角色的安全性是组织命令、实现安全性最简单的方法。
Role-based security is the most straightforward way to organize commands for security purposes.
基于角色的安全性是组织命令、实现安全性最简单的方法。
应用推荐