The FilterRequestHelper provides easy access to control the filter flow.
FilterRequestHelper提供了用于控制筛选器流的简单访问。
Secret passwords are often used to control access to computers.
密码常被用来控制对计算机的访问。
The game server can check authorization and control access to the media.
游戏服务器可以检查授权并控制对媒体的访问。
The system must provide security and control access to those functions based on permissions.
系统必须提供安全性,并根据相应的权限控制对这些功能的访问。
A better solution might be to control database object access through the use of schemas.
更好的解决方案可能是通过使用模式控制数据库对象访问。
Second, an authorization mechanism is used to control access to application functionality.
其次,使用授权机制来控制对应用程序功能的访问。
Administration: How do I control access to the service?
管理:如何控制对服务的访问?
Provide access control to the folders.
提供文件夹的访问控制。
They are responsible for the control of user access to the network.
他们的责任是控制用户对网络的访问。
Interceptors use your application's access control policy to make authorization decisions.
拦截器使用应用程序的访问控制策略来做出授权决定。
The first is to achieve complete and fine-grained access control.
第一个目标是实现完整的细粒度访问控制。
XACML is an initiative to develop a standard for access control and authorization systems.
XACML的初衷是开发一项访问控制和授权系统的标准。
It may be necessary to secure event payloads from unauthorized access using access control.
可能需要使用访问控制来保护事件负载免受未经授权的访问。
A common way to control access to table data is using views.
控制表数据访问的一种常见方法是使用视图。
Another key to scaling access control is grouping access.
另一个升级访问控制的关键是对访问分组。
Another approach to controlling access is role-based access control (RBAC).
另一种控制访问的方法是基于角色的访问控制(RBAC)。
The control logic makes use of COM objects (3) to access the database.
控制逻辑利用COM对象(3)来访问数据库。
Work item access and links to source control actions
工作项访问与对源控制操作的连接
Use stored procedures to control data access.
使用存储过程来控制数据访问。
Use views to control data access.
使用视图来控制数据访问。
Give Full control access to MQM and then click OK.
向mqm提供完全控制访问权,然后单击ok。
Use LBAC to control data access.
使用LBAC来控制数据访问。
To collect data for a WebSphere Commerce access control issue.
要为WebSphereCommerce访问控制问题收集数据。
Give control to the data access API.
通过数据访问API进行控制。
This allows Action to access the information to control flow.
这样就使Action可访问用于控制流程的信息。
This section shows you how to configure IF to implement an access control policy.
本节将向您展示如何配置IF来实现访问控制策略。
The primary value of this approach is to control file system access by applications.
这种方法的主要价值在于控制应用程序对文件系统的访问。
Natural resource Management: Who has access to and control over land and natural resources?
自然资源管理:哪些人对自然资源具有使用权和管理权?
XACML is a flexible standard and allows policy authors to build complex access control policies.
XACML是一个灵活的标准,并且允许策略创建者构建复杂的访问控制策略。
They are intended to add additional IP level access control.
它们旨在增加额外的IP级访问控制。
应用推荐