• 通过维护用户访问控制列表来提供功能数据权限

    Provide functional and data entitlement by maintaining access control lists of users.

    youdao

  • 很多这样访问控制都会带来一个问题因为利用程序能够继承用户的访问控制

    Lumping access controls like this creates a problem because an exploited program inherits the access controls of the user.

    youdao

  • 同时随着JVM中引入了多进程能力(请参阅参考资料),出现基于用户访问控制要求

    Also, with the work done on introducing multiprocessing capabilities to the JVM (see Resources) came the requirement for user-based access control.

    youdao

  • 获得会话对象之后,可以使用LTPAToken定义授权用户访问控制级别LotusDomino服务器之间实现交互

    Once a session object is obtained, it can be used to interact with the Lotus Domino server using the access control level granted to the user defined by the LTPAToken.

    youdao

  • 每个应用程序分配一个多个管理员控制用户功能访问

    Each application assigns one or more administrators to control user access to its functions.

    youdao

  • 管理用户控制它们访问一直都操作系统中一关键任务

    Managing users and groups and controlling their access is always a critical task in operating systems.

    youdao

  • 中央工具单一位置存储整个网络用户标识访问控制信息提供用于进行全面管理的界面

    Central tools store user identity and access control information for the entire network in a single location and provide screens to manage it all.

    youdao

  • 仪表板提供对于访问控制警报操作用户角色支持

    Also available from the dashboard are support for alerts, operations, and user roles for access control.

    youdao

  • 借助这个特性数据管理员可以级别控制用户读写访问

    Using this feature, data stewards can control read and write access for users and groups at the table column and row level.

    youdao

  • 现在可以围绕着这个骨架,构建一个能够基于您在LDAP目录定义用户角色控制功能访问应用程序

    You can now build an application around this that can control access to functionality based on the user roles you have defined in your LDAP directory.

    youdao

  • 一步中,加载一步中的数据创建必要用户访问控制列表(acl)。

    In this step, please load the data from the First step to create the necessary users, groups, and access control lists (for example: ACL's).

    youdao

  • 对于负责的资源操作系统无法识别用户帐户程序有时必须强制实施它们自己的访问控制要求

    Programs must sometimes enforce their own access control requirements on resources they are responsible for and on user accounts not recognized by the operating system.

    youdao

  • 我们如何创建标签页面提供不同用户需要导航或者访问控制

    How can we create a set of tabs and pages to provide the navigation, or access control, which different groups of users require?

    youdao

  • 本文例子中,访问控制主体就是调用MDM服务用户,这毫不奇怪。

    Not surprisingly, in this article's example, the subject of access control is the user calling an MDM service.

    youdao

  • JAAS提供用户进行认证控制访问资源模块化机制

    JAAS provides a modular mechanism for authenticating users and controlling access to resources.

    youdao

  • 用户访问一个受保护时,IDS实施两个级别访问控制

    When a protected table is accessed, IDS enforces two levels of access control.

    youdao

  • DL支持细粒度用户访问控制

    The DL does not support fine-grained, per user access control.

    youdao

  • 可以控制每个用户Webmin模块访问

    Access to Webmin modules can be controlled for each user.

    youdao

  • BusinessGlossary针对的需要访问编写控制管理术语表的“高级用户”。

    Business glossary targets "power users" that need to access, author, control, and administer a glossary.

    youdao

  • 步骤3DataPower设备通过计算用XACML编写访问控制策略检查是否允许用户调用请求的服务

    Step 3: the DataPower appliance checks if the user is allowed to call the requested service by evaluating the access control policy written in XACML.

    youdao

  • 控制用户访问Web站点不同领域安全设置

    Security Settings to control user access to different areas of the Web site.

    youdao

  • 根据列表结构位置从属关系,LBAC用于增强用户可见记录的Siebel访问控制

    LBAC can be used to enforce Siebel access control, based on records visibility for a user that is based on organization, position, and a membership to a list or group.

    youdao

  • 另外可以每个映像每个模式应用不同的细粒度访问控制控制能够读取资产用户和能够编辑资产的用户

    In addition, you can apply fine-grained access control distinctly to each image and each pattern, controlling who can read the asset and who can edit it.

    youdao

  • 用户身份丢失有些企业知道访问数据库所有用户身份,以便进行访问控制

    Loss of user identity: Some enterprises prefer to know the identity of all users accessing the database for access control purposes.

    youdao

  • 相比之下授权系统用来决定已通过认证某个特定用户访问系统控制安全资源访问级别一种机制

    Authorization, by contrast, is the mechanism by which a system determines what level of access a particular authenticated user should have to secured resources controlled by the system.

    youdao

  • 审计功能现在根据指定审计配置生成所有审计记录可以控制访问DB2用户访问时间用户所在的位置等关键信息

    The audit facility now produces all audit records based on the audit configuration specified, controlling critical information about who is accessing DB2, when, and from where.

    youdao

  • 话说,这种简单方法不能区分不同用户类型,因此不能用于需要细粒度访问控制应用程序。

    In other words, this simple approach fails to distinguish between different types of users, making it unsuitable for applications that require granular access control.

    youdao

  • 访问控制列表用户用户定义特定CM实体访问级别

    Access Control Lists define the level of access on a particular CM entity for users and user groups.

    youdao

  • 与表一样昵称也有对等的一权限用于控制用户联邦系统昵称对象访问

    Just like tables, nicknames have an equivalent set of privileges that can control user access to the nickname objects on the federated system.

    youdao

  • 最终用户身份丢失为了进行访问控制企业需要了解实际访问数据库用户身份。

    Loss of end-user identity: Enterprises need to know the identity of the actual user accessing the database for access control purposes.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定