终端用户只能访问授权给他们的数据集市,而非所有的数据仓库数据。
End users can only access the data mart granted to them, not all data warehouse data.
即,消息传递引擎将根据我们前面讨论的连接标识对此队列进行访问授权。
That is, the messaging engine authorizes access to the queue based on the connection identity as we discussed earlier.
这两种技术在单点访问系统中实现身份认证和访问授权控制功能。
The PKI and PMI can provide functions of authentication and authority in the SAS.
对文件访问进行访问授权的一种方法是实现访问控制列表 (ACL)。
One method to satisfy the access authority on file access is to implement an access control list (ACL).
在做校准时,技术人员需要登入系统中,他们只能访问授权使用的那些规程。
To perform a calibration, a technician logs into the system. Technicians have access only to those procedures that they are authorized to perform.
通常为了进行网络访问授权和身份验证、内容筛选或通过缓存更好地利用网络带宽而进行此活动。
This activity is usually performed for network access authorization and authentication, content filtering, or to better utilize network bandwidth through caching.
因为我们现在只使用自签名证书,所有这些根证书代表对我们的队列管理器的不恰当的访问授权。
Since we are using only self-signed certificates, all of these root certificates represent inappropriate access grants to our queue managers.
访问授权在各客户中被指派。无论在哪工作,都必须在客户中为每一个用户建立用户主记录。
Access authorization is assigned per client. You must create a user master record for each user in the client where he or she wishes to work.
拥有正确访问授权的涉众可能要求该服务在99%的时间内可用,并且每个文档页的下载时间不超过四秒。
The stakeholders who have the proper access authorizations can require that the service be available 99% of the time and that the download time per page of the document be no more than four seconds.
当被选中时,角色自动拥有对实体中所有组织的访问授权。这亦会在组织数量较多时提高系统性能。
When selected, the role has access to all organizations of the client automatically. This also increases performance where you have many organizations.
Linux的文件所有权和访问授权是与用户id 和组密切相关的,所以我们要复习一下基本的用户和组信息。
Ownership of files in Linux and access authority are closely related to user ids and groups, so let's review some basic user and group information.
在与客户的访问令牌访问权限有关联范围,它定义了访问授权的客户拥有资源所有者的程度(用户的)资源。
The access permissions associated with the client's access token have a scope, which defines the degree of access authorization the client has for the resource owner's (the end user's) resources.
更安全:可进行网络对象识别,身份认证和访问授权,具有数据加密和完整性,能够实现一个可信任的网络。
Safer: can undertake network object identifies, identity attestation and visit accredit, have number to be mixed closely according to adding integrality, can realize a dependable network.
认为数字图书馆有必要通过用户认证和访问授权的机制对虚拟用户进行管理,并研究他们访问和利用数字资源的规律。
It is indispensable for the digital library to manage the virtual patrons with authentication and authorization and to probe the laws of their access to and use of digital resources.
通过对用户证书中的属性取值进行评估,把符合条件的用户分配给特定角色,从而达到了根据用户的特征及资历实施访问授权的目的。
By evaluating the value of user attributes in the user credential, a qualified user is assigned to a specific role. This allows access authorization based on user characteristics and qualifications.
因此,您能够将有效的门户会话和对安全资源的访问授权给WebSphereApplicationServer无法使用其缺省的身份验证机制进行身份验证的请求。
Hence, you have the ability to grant valid portal sessions and access to secured resources to requests that WebSphere Application Server can't authenticate with its default authentication mechanism.
这就是所谓的“大交易”,即机构订阅者通过网站授权协议为访问一系列在线期刊而付费。
There is the so-called big deal, where institutional subscribers pay for access to a collection of online journal titles through site-licensing agreements.
这包括识别、认证、授权、访问控制、数据屏蔽、审计和加密。
This includes identification and authentication, authorization, access control, data masking, auditing, and encryption.
当用户每天都试着访问仅授权给管理员的控制权时,会发生什么?
What happens when the everyday user tries to access a control that is authorized only for administrators?
防止对数据进行未授权的访问和更改。
Data must be protected from unauthorized access and modification.
对于此用户,未授权访问SCA组件,因此将显示一条错误消息。
For this user, access to the SCA component is not authorized and so an error message displays.
把移动设备借给家庭成员或朋友似乎没什么危险,但却有可能造成借到的人访问未授权的数据或应用程序。
Lending a mobile device to a family member or friend may seem harmless but does raise the possibility of enabling that person to access data or applications to which that person is not authorized.
如果您具有授权,则需要对请求访问的人进行授权以访问系统。
If you have Authorization, then the person requesting access needs to be authorized to access the system.
检查替代标识或原始标识是否已被授权访问消息流。
Check that the alternate identity, or the original identity, is authorized to access the message flow.
在这些系统中,密码是不断变化的,这会大大降低未授权访问的风险。
In these systems, the passwords are constantly altered, which greatly reduces the risk from an unauthorized intruder.
让SAML处理匿名或访客访问是可能的,但是这要求参与的企业就其自己的匿名访问或访客授权访问的约定达成一致。
It is possible to get SAML to handle anonymous or guest access, but this requires that the participating enterprises agree to their own convention for anonymous or guest authorized access.
对服务器和数据库的物理访问可能受到危害,使未授权用户得以访问它们。
Physical access to your servers and your databases may be compromised allowing an unauthorized user to access them.
它使用清单9中第三个参数提供的访问控制定义来指定授权(或访问控制)决策。
It USES the access control definitions provided by the third parameter shown in Listing 9 to make authorization (or access control) decisions.
请注意,可以为安全标识选择未授权访问SCA组件的角色。
Notice that you can choose, for the security identity, a role not authorized to access the SCA component.
请注意,可以为安全标识选择未授权访问SCA组件的角色。
Notice that you can choose, for the security identity, a role not authorized to access the SCA component.
应用推荐