这就使存储过程可执行调用方无直接执行权限的操作。
This enables stored procedures to perform operations that the caller does not have permissions to perform directly.
诸如创建用户帐户、组和角色或与用户相关的角色组和权限这类“写”操作还不支持。
'Write' operations, like creating user accounts, groups and roles, or associating users with roles groups and permissions, are not supported.
当通过使用服务公布数据时,必须确保只有那些拥有足够权限的客户机才能执行服务操作。
When exposing data by using services, you must ensure that only clients with sufficient permissions may execute a service operation.
这是允许用户运行操作子集所需的最低级权限,不会导致任何安全风险。
This is the lowest level of rights that allows users to run a subset of operations that do not cause any security risks.
实际上,帐号、密码和权限只能在遵守固定规则的操作系统环境中保护您的数据。
The fact is accounts, passwords, and permissions can only protect your data in the context of an operating system that obeys stated rules.
表2对比了每个权限级别允许的常见管理操作。
Table 2 compares common administrative operations permitted for each authority level.
ACL策略是一组规则(权限),用于指定在资源上执行特定操作所需的条件。
An ACL policy is the set of rules (permissions) that specifies the conditions required to perform certain operations on that resource.
用特殊的系统调用(即对UNIX内核的请求)分配和释放内存并设置权限;通过一般的读写操作读写内存段中的数据。
Special system calls, or requests to the UNIX kernel, allocate and free the memory and set permissions; common read and write operations put and get data from the region.
具有SYSADM权限的用户可以执行所有可用的DB 2操作。
A user with SYSADM authority can perform all available DB2 operations.
不允许执行此操作;您不具有访问指定资源的权限。
EPERM — the operation isn't permitted; you don't have permission to access the specified resource.
权限是执行操作所需的资格。
Permissions are the qualifications needed to perform an action.
定义权限后,继续定义虚拟校园的操作。
After defining the permissions, go on to define the actions of the virtual campus.
两个静态map是将权限与操作相关联的应用程序结构。
The two static maps are the application structures that relate permissions to actions.
用户没有足够的权限执行DataAdvisor的操作。
The user does not have sufficient rights to perform the operation in Data Advisor.
这些操作通过限制人们只具有他们需要的权限,从而极大地限制了损害风险。
These actions greatly limit the risk of damage by trusting people with only the permissions they need.
您必须拥有一个服务器许可协议,并安装有至少七个开发员许可协议,还需要完全的管理员权限,去执行本文所描述的所有操作。
You must have a server license and at least seven developer licenses installed, and you also need full administrative rights to perform all of the steps described.
因此,运行这些命令的安全机制以文件的操作系统权限为基础。
Therefore, the security mechanism to run these commands is based on the operating system permissions of the files.
每次提交一个命令时,DB2 将执行授权检查以确保您具有正确的权限集来执行操作。
Each time you submit a command, DB2 performs authorization checking to ensure that you have the correct set of privileges to perform that action.
使用显式主题方法可以传入任何用户的主题,并确定他们是否具有执行某项操作的权限。
The explicit subject method enables you to pass in the subject of any user and determine if they are authorized to perform an action.
这种流程允许应用程序只执行登录用户权限范围内的操作。
This process allows the application to perform only operations allowable to the logged-in user.
每个客户有他自己的定制,例如运输和账单操作,以及影响定价或产品权限的合约安排。
Each customer may have its own customizations, such as shipping and billing options, and contractual arrangements that affect pricing or product entitlement.
用于访问外部表的权限由IDS通过外部表上的用户访问特权治理,还受到由操作系统管理的数据文件权限的治理。
The permissions used to access external tables is governed by the user access privileges on the external table by IDS as well as the data file permissions managed by the operating system.
当对文件的元信息进行操作时(比如修改它的所有者、对文件进行统计,或者修改它的权限位),首先要打开该文件,然后对打开的文件进行操作。
When performing operations on a file's meta-information, such as changing its owner, stat-ing the file, or changing its permission bits, first open the file and then use the operations on open files.
因此,除了没有权限的用户外,如果取消授予操作系统权限的要求,则LDAP和用户自定义注册表都是不错的选择。
As a result, both LDAP and custom user registries are good alternatives for negating the requirement to grant OS privileges over and above that of an unprivileged user.
不过,如果您对目标文件有合适的权限,可以对它进行写操作,如清单10所示。
However, attempts to write it will work if you have the appropriate permission on the target file, as shown in Listing 10.
如果遇到类似的消息,一定要确认连接到数据库所提供的用户ID是否具有执行目标操作的适当权限。
If you ever encounter similar types of messages, ensure that the user id provided to connect to the database has the appropriate privileges to perform the target operation.
你还可以设定目录的操作权限是只读还是可写。
The service allows you to set 'read' and 'write' permissions for folders.
身份验证成功之后,DB 2UDB必须判断用户是否具有执行操作所需的权限。
Once authentication is successful, DB2 UDB must determine whether the user has the required permissions to perform the intended operation.
根据登录到控制台的用户的权限,将显示不同的UI面板、操作按钮和链接。
Various UI panels, action buttons, and links are displayed, depending on the privileges owned by the user logged into the console.
如果主文件夹需要同样等级的权限——这几乎是有些没有用的——因为你又得提高权限来进行修改操作。
If the Home folder book did require the same level of permissions, it would be kinda unusable, because you'd have to elevate permissions to make any and every change.
应用推荐