• Looking at the users overrides of system defaults, one can then determine if the attributes for the users set are valid according to the implemented security policy.

    通过查看用户账户覆盖系统默认设置情况,可以判断用户属性对于实现安全策略是否合法有效。

    youdao

  • Figure 5 shows summarizes the attributes needed to set up user security between CICS TS and TXSeries.

    5总结了在CICSTSTXSeries之间建立用户安全性所需属性

    youdao

  • Figure 5 shows summarizes the attributes needed to set up user security between CICS TS and TXSeries.

    5总结了在CICSTSTXSeries之间建立用户安全性所需属性

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定