Within the J2EE application, you can define and name security roles and constrain resource access based on those roles.
在J2EE应用程序内,您可以基于这些角色定义和命名安全角色及约束资源访问。
Within the J2EE application, you can define and name security roles and constrain resource access based on those roles.
在J2EE应用程序内,您可以基于这些角色定义和命名安全角色及约束资源访问。
These decisions are made based on security roles.
要根据安全角色来作出此类决定。
V4 conforms to the J2EE 1.2 authorization model, which is based on security roles rather than method groups.
V 4符合J2EE 1.2基于安全性角色而不是方法组的授权模型。
Determining the roles at your site that require access to WebSphere MQ commands, and then implementing role-based security can provide a way to group the commands.
首先确定您的网站上需要访问WebSphereMQ的命令,然后实现基于角色的安全性,从而对命令进行分组。
As part of the DB2 9.5 database roles enhancement to Label-based access control (LBAC), you might grant or revoke security labels or exemptions to or from a role or a group.
作为对基于标签的访问控制(LBAC)的DB 2 Viper 2数据库角色增强的一部分,可以对一个角色或组授予或收回安全标签或豁免权。
The system used authority management based on resource roles to enhance the security.
在安全方面,系统采用基于资源角色的权限管理,增强了系统运行的安全性。
The system used authority management based on resource roles to enhance the security.
在安全方面,系统采用基于资源角色的权限管理,增强了系统运行的安全性。
应用推荐