Looking at the users overrides of system defaults, one can then determine if the attributes for the users set are valid according to the implemented security policy.
通过查看用户账户覆盖系统默认设置的情况,就可以判断用户的属性集对于实现的安全策略是否合法有效。
Figure 5 shows summarizes the attributes needed to set up user security between CICS TS and TXSeries.
图5总结了在CICSTS与TXSeries之间建立用户安全性所需的属性。
Figure 5 shows summarizes the attributes needed to set up user security between CICS TS and TXSeries.
图5总结了在CICSTS与TXSeries之间建立用户安全性所需的属性。
应用推荐