Once a session object is obtained, it can be used to interact with the Lotus Domino server using the access control level granted to the user defined by the LTPAToken.
获得会话对象之后,可以使用由LTPAToken定义的授权给用户的访问控制级别在它与LotusDomino服务器之间实现交互。
The architecture needs to cover a range of directives from security, access control, and service level agreements to business workflow, event processing, and information management and business rules.
架构师需要涉及许多问题,从安全性、访问控制和服务水平协议,直到业务工作流、事件处理、信息管理和业务规则。
An administrator can also assign an access control list to each work node for additional security control at the work node level.
管理员也可以为每个工作节点分配访问控制列表,进一步在工作节点级别上进行安全控制。
Using this feature, data stewards can control read and write access for users and groups at the table column and row level.
借助这个特性,数据管理员可以在表的列和行级别控制用户和组的读写访问。
The trusted device network approach provides an organization with a higher level of control over critical system access.
可信任硬件网络策略提供了一种可以更高效控制临界系统接入的组织结构。
This example shows that you can control, even down to a very fine-grained instance level, access to individual resources if you needed to.
该例表明,你可以对你需要的单个资源进行访问控制,甚至深入到非常细粒度的实例级别。
You can hide the complexity of many access control roles to individual components and expose them as few simplified application level roles with well-understood and easy to use names.
您可以对各个组件隐藏许多访问控制角色的复杂性,并使用易于理解和方便使用的名称将它们公开为少数几个简单的应用程序级别角色。
This level of access control provides additional administrative control, especially useful for supporting multiple organizations.
这种级别的访问控制提供了额外的管理控制、特别适合支持多个组织。
Security administrators can control access to their databases at a level of abstraction that is close to the structure of their organizations.
安全管理员可以在接近于组织结构的抽象层次上控制对数据库的访问。
SQLJ provides the unique ability to develop using static SQL statements and control access at the DB2 package level.
SQLJ提供了独特的使用静态SQL语句进行开发以及在DB2包级别控制访问的能力。
Access Control Lists define the level of access on a particular CM entity for users and user groups.
访问控制列表为用户和用户组定义了对特定CM实体的访问级别。
There are some system properties that you can set to control the level of access and the way in which VM data is transmitted from the JMX agent to the management client.
可以设置一些系统属性,来控制访问级别和虚拟机数据从JMX代理向管理客户机传递虚拟机数据的方式。
A myriad of tools are required to provide the proper IT governance and access control at a macro level.
提供适当的IT治理和全面的访问控制需要使用许多工具。
There are various permissions - read, write, full control - assigned to users, and access granularity established at bucket or object level.
这是各种权限:读、写、完全控制、指定给用户、bucket或对象级别的访问粒度。
The second level of access control is Label-Based access control (LBAC), which can be at the row level, column level, or both.
第二级的访问控制是基于标签的访问控制(Label - Based Access Control,LBAC),这种控制可以发生在行级、列级或者同时发生在这两级。
More database security: a new security feature called Label-Based access control (LBAC) allows you to control data access at the row and column level.
增强了数据库安全性:基于标签的访问控制(Label BasedAccess Control,LBAC)是一种新的安全特性,它使您可以在行和列的级别上控制数据访问。
Ben also talked about advanced web security requirements like method level authorization, JSR-250 for defining method security metadata, Spring security method metadata, and domain access control.
Ben还谈到了一些高级web安全需求,例如方法层的授权、定义方法安全元数据的JSR- 250规格、SpringSecurity方法元数据以及领域的访问控制等。
The Advanced Access Control Feature implements label-based access control (LBAC) to offer row-level and column-level protection.
AdvancedAccess ControlFeature实现了基于标签的访问控制(LBAC),以提供行级和列级保护。
The use of an access database to store test execution information means there's no unit-level change control over individual test cases or test plans.
一个保存测试执行信息的访问数据库的使用,意味着对于个体的测试案例或者测试计划没有单元级别的变更控制。
Enterprise encyclopedias are databases that have role-based access control and instance-level access control.
企业百科全书是拥有基于角色控制以及实例层次控制的数据库。
Obligations: Remember, one of the objectives of XACML is to provide much finer-level access control than mere permit and deny decisions. Well, obligations are the mechanism for achieving this.
义务:要知道,XACML的目标之一是提供更高层次的访问控制,而不仅仅是允许和拒绝决策,义务是实现这种控制的机制。
CRX offers level I and level II functionality, as well as advanced features such as versioning, locking, access control, and events.
CRX提供了i级和ii级功能,以及版本管理、锁定、访问控制和事件等高级特性。
Includes the Advanced access control Feature (ACCF) enabling cell -, column - and row-level label-based access control (LBAC).
内含启用资料格层次、栏层次与列层次标签型存取控制(LBAC)的“进阶存取控制功能”(ACCF)。
This article addresses the problem of application-level security by breaking access into two manageable units: Workbench - and Control-level access.
本文通过将访问权集成到两个可管理单元(工作台级访问和控件级访问)的方式,解决了应用程序级的安全性问题。
Additionally, the proxy can filter on HTTP headers, cookies, and mime-types to provide a level of control over the sites that a browser-based client can access.
另外,该代理可以对HTTP标头、cookie和MIME类型进行筛选,以便对基于浏览器的客户端访问的网站提供一定级别的控制。
TAMOS addresses these concerns by providing operating system-level access control for UNIX and Linux operating systems.
TAMOS通过为 UNIX和Linux提供操作系统级访问控制来解决这些问题。
Classes that require class instance-level access control must implement the Resource interface.
要求类实例级访问控制的类必须实现Resource接口。
By setting up fine-grained privileges and role-based access control HP protected systems reduces configuration time and required customer skill level.
设置细颗粒度的授权和角色访问控制,惠普保护系统减少了配置时间和客户所需的技能水平要求。
The security administrator can dictate the level of security by applying rules known as protected object policies (POP) and access control lists (ACL).
安全管理员可以通过应用protectedobjectpolicies (POP)和access controllists (acl)规则来指定安全等级。
LBAC is an implementation of Mandatory Access Control (MAC), which provides a reasonable level of security assurance for sensitive data stored in database.
LBAC是MandatoryAccess Control (MAC)的一个实现,它为存储在数据库中的敏感数据提供了较高级别的安全保障。
应用推荐