通过维护用户的访问控制列表来提供功能和数据权限。
Provide functional and data entitlement by maintaining access control lists of users.
很多这样的访问控制都会带来一个问题,因为所利用的程序能够继承用户的访问控制。
Lumping access controls like this creates a problem because an exploited program inherits the access controls of the user.
同时,随着在JVM中引入了多进程能力(请参阅参考资料),出现了对基于用户的访问控制的要求。
Also, with the work done on introducing multiprocessing capabilities to the JVM (see Resources) came the requirement for user-based access control.
获得会话对象之后,可以使用由LTPAToken定义的授权给用户的访问控制级别在它与LotusDomino服务器之间实现交互。
Once a session object is obtained, it can be used to interact with the Lotus Domino server using the access control level granted to the user defined by the LTPAToken.
每个应用程序分配一个或多个管理员来控制用户对其功能的访问。
Each application assigns one or more administrators to control user access to its functions.
管理用户和组并控制它们的访问一直都是操作系统中一项关键任务。
Managing users and groups and controlling their access is always a critical task in operating systems.
中央工具在单一位置存储整个网络的用户标识和访问控制信息,并提供用于进行全面管理的界面。
Central tools store user identity and access control information for the entire network in a single location and provide screens to manage it all.
仪表板还提供了对于访问控制警报、操作和用户角色的支持。
Also available from the dashboard are support for alerts, operations, and user roles for access control.
借助这个特性,数据管理员可以在表的列和行级别控制用户和组的读写访问。
Using this feature, data stewards can control read and write access for users and groups at the table column and row level.
您现在可以围绕着这个骨架,构建一个能够基于您在LDAP目录中定义的用户角色控制对功能的访问的应用程序。
You can now build an application around this that can control access to functionality based on the user roles you have defined in your LDAP directory.
在这一步中,请加载第一步中的数据,以创建必要的用户、组和访问控制列表(如acl)。
In this step, please load the data from the First step to create the necessary users, groups, and access control lists (for example: ACL's).
对于所负责的资源和操作系统无法识别的用户帐户,程序有时必须强制实施它们自己的访问控制要求。
Programs must sometimes enforce their own access control requirements on resources they are responsible for and on user accounts not recognized by the operating system.
我们如何创建一组标签和页面,以提供不同组的用户需要的导航或者访问控制?
How can we create a set of tabs and pages to provide the navigation, or access control, which different groups of users require?
在本文的例子中,访问控制主体就是调用MDM服务的用户,这毫不奇怪。
Not surprisingly, in this article's example, the subject of access control is the user calling an MDM service.
JAAS提供了对用户进行认证和控制访问资源的模块化机制。
JAAS provides a modular mechanism for authenticating users and controlling access to resources.
当用户访问一个受保护的表时,IDS实施两个级别的访问控制。
When a protected table is accessed, IDS enforces two levels of access control.
DL不支持细粒度的用户访问控制。
The DL does not support fine-grained, per user access control.
可以控制每个用户对Webmin模块的访问。
BusinessGlossary针对的是需要访问、编写、控制和管理术语表的“高级用户”。
Business glossary targets "power users" that need to access, author, control, and administer a glossary.
步骤3:DataPower设备通过计算用XACML编写的访问控制策略,检查是否允许用户调用所请求的服务。
Step 3: the DataPower appliance checks if the user is allowed to call the requested service by evaluating the access control policy written in XACML.
控制用户访问Web站点的不同领域的安全设置。
Security Settings to control user access to different areas of the Web site.
根据列表或组的结构、位置或从属关系,LBAC可用于增强对用户可见记录的Siebel访问控制。
LBAC can be used to enforce Siebel access control, based on records visibility for a user that is based on organization, position, and a membership to a list or group.
另外,可以对每个映像和每个模式应用不同的细粒度访问控制,控制能够读取资产的用户和能够编辑资产的用户。
In addition, you can apply fine-grained access control distinctly to each image and each pattern, controlling who can read the asset and who can edit it.
用户身份的丢失:有些企业想知道访问数据库的所有用户的身份,以便进行访问控制。
Loss of user identity: Some enterprises prefer to know the identity of all users accessing the database for access control purposes.
相比之下,授权是系统用来决定已通过认证的某个特定用户访问系统控制的安全资源的访问级别的一种机制。
Authorization, by contrast, is the mechanism by which a system determines what level of access a particular authenticated user should have to secured resources controlled by the system.
审计功能现在根据指定的审计配置生成所有审计记录,可以控制访问DB2 的用户、访问时间和用户所在的位置等关键信息。
The audit facility now produces all audit records based on the audit configuration specified, controlling critical information about who is accessing DB2, when, and from where.
换句话说,这种简单的方法不能区分不同的用户类型,因此不能用于需要细粒度访问控制的应用程序。
In other words, this simple approach fails to distinguish between different types of users, making it unsuitable for applications that require granular access control.
访问控制列表为用户和用户组定义了对特定CM实体的访问级别。
Access Control Lists define the level of access on a particular CM entity for users and user groups.
与表一样,昵称也有对等的一组权限,用于控制用户在联邦系统上对昵称对象的访问。
Just like tables, nicknames have an equivalent set of privileges that can control user access to the nickname objects on the federated system.
最终用户身份丢失:为了进行访问控制,企业需要了解实际访问数据库的用户的身份。
Loss of end-user identity: Enterprises need to know the identity of the actual user accessing the database for access control purposes.
应用推荐