• Let's assume the following access rules.

    我们假设以下访问规则。

    youdao

  • As in Part 1, assume the following access rules.

    第1部分一样假设以下访问规则。

    youdao

  • These access rules are defined on a project's class path.

    这些访问规则定义工程路径上。

    youdao

  • If any of the access rules are violated, the user is denied access to data.

    如果违反任意一访问规则则拒绝用户访问数据

    youdao

  • LBAC read access rules are enforced while reading from source table, however.

    然而,在读取数据期间LBAC读取访问规则执行

    youdao

  • Action is taken if this condition is not met, as denoted in the access rules.

    如果条件满足按照访问规则采取行动

    youdao

  • After you have established roles, you can create access rules in your application.

    建立角色可以应用程序创建访问规则

    youdao

  • Access rules can be divided into two categories: read access rules and write access rules.

    访问规则可以划分访问规则访问规则。

    youdao

  • Rules for access control are configured as Security Rules.

    访问控制规则配置安全规则。

    youdao

  • An online policy holds one or more encryption keys and rules for access control.

    在线策略包含一个多个加密密以及访问控制规则

    youdao

  • After categories are established, access control rules can be written and enforced.

    分类建立,就可以写入执行访问控制规则

    youdao

  • Search Rules Grants view access to the Search Rules view.

    搜索规则授予SearchRules视图查看访问权。

    youdao

  • Business users have access to the central business rules repository.

    业务用户拥有访问中央业务规则存储库的访问权。

    youdao

  • Section 7.2.5, "Access Control, Stage 2: Request Verification", describes the rules for this.

    第7 . 2.5节“访问控制阶段2请求验证描述了这一点的规则

    youdao

  • Section 7.2.5, "Access Control, Stage 2: Request Verification", describes the rules for this.

    第7 . 2.5节“访问控制阶段2请求验证描述了这一点的规则

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定