An access rule represents a combination of a user's identity, an access mask, and an access control type (allow or deny).
访问规则表示用户的标识、访问掩码和访问控制类型(允许或拒绝)的组合。
An access rule object also contains information about the how the rule is inherited by child objects and how that inheritance is propagated.
访问规则对象还包含有关子对象如何继承规则以及如何传播继承的信息。
In the above output, tcpdmatch correctly states that access is denied, as there is no access rule for FTPD with clients that have an IP ending with 192.168.4.
在以上输出结果中,tcpdmatch正确说明拒绝访问,因为对IP以192.168.4结尾的客户端使用ftpd没有访问规则。
This is required because we do not want wrappers to think this is a separator, which could be part of the access rule. In fact, it is part of the message sent with logger.
一定要这么做,因为我们不想让wrappers认为这是一个分隔符,是访问规则的一部分。
If the user holds an exemption for the rule that is being used to compare two values, then that comparison is not done (in other words, access rule is not applied for that component).
如果用户持有用于比较两个值的规则的豁免权,则不进行比较(换句话说,访问规则没有被应用到那个组件)。
A second Council comment letter on proxy access, filed on January 14, 2010, reiterates the Council's support for a uniform federal access rule that would apply to all U.S. public companies..
CII在2010年1月14日,发布了第二封关于代理参与的评议书,重申支持一份适用于所有美国上市公司的统一的联邦参与法案。
For each rule, you specify a protocol, a range of ports, and a range of IP addresses allowed to access those ports via that protocol.
对于每个规则,您要指定一个协议、一个端口范围以及允许通过那个协议访问那些端口的一个IP地址范围。
This policy defines the rule to migrate files from one pool to another depending on various file attributes like access time, modified time, file name, path, owner, and so on.
该策略定义了文件在池间迁移的规则,可根据访问时间、修改时间、文件名、路径、所有者等文件属性将文件从某个池迁移另一个池。
You set access control on content spots and rule mappings to manage which users can change these start and end dates.
您可以在内容点和规则映射上通过设置访问控制来管理哪些用户可以改变开始和结束日期。
If a user holds an exemption on a particular rule of a particular security policy, that rule is not enforced when the user tries to access data protected by that security policy.
如果用户拥有一个特定安全策略的特定规则的豁免权,那么当该用户试图访问受该安全策略保护的数据时,该规则将不起作用。
This policy defines the rule to delete the files from the system depending on various file attributes like access time, modified time, file name, path, owner, and so on.
该策略定义了从系统中删除文件的规则,可根据访问时间、修改时间、文件名、路径、所有者等文件属性对系统中的文件进行删除。
Also grants read, edit, or delete access to each search rule that a user has read, edit, or delete access to.
这还授予对您已具有读取、编辑或删除访问权的每个搜索规则的读取、编辑或删除访问权。
Together, the default role and default policy make up the default authorization: the implicit rule of access on the cube for users with no explicit rule of access.
默认角色和默认策略共同构成默认授权:多维数据集上针对没有显式访问规则的用户的隐式访问规则。
Another reason to rule out automation is the inability to programmatically access the necessary elements of the models themselves.
另一个去掉自动化的原因是缺少计划性地访问模型本身必要的单元的能力。
When the first rule match is found, the calling client is either denied or allowed access.
当找到第一条规则匹配后,会拒绝或允许调用客户端的访问。
This workflow process implements various activities, decision points, sequencing, loops, business rule enforcement points, and access to services.
该工作流程实现了多种活动,决策点、排序、循环、业务规则实施点以及对服务的访问。
The XU handles low-level details of rule set execution and provides access to manage its resources.
XU 处理规则集执行的低层细节,提供对资源的访问。
Rule Execution Server provides administrators the access they need to monitor deployed rulesets, manage decision services, and perform auditing.
RuleExecutionServer 能够让管理员访问他们需要监控的已部署规则集,管理决策服务和执行审计。
Rule Management USES a custom properties file to access the server connection information and the JNDI names for the EJBs that make up the BRBeans application on the server.
RuleManagement使用自定义属性文件来访问服务器连接信息和组成服务器中的BRBeans应用程序的EJB的JNDI名称。
However, for entity beans this rule has to be relaxed; due to the nature of the model, most pessimistic locking access intents require at least Repeatable Read.
但是,对于实体Bean则可不遵循此规则,由于该模型本身的特性,多数悲观锁定访问都需要至少RepeatableRead。
This service facade approach provides a loosely coupled rule access mechanism that fits well with the web services programming model and process modeling.
该服务facade解决方案提供松耦合的规则访问机构,它可以非常好地适合于Web服务编程模型及流程模型。
If a match is found, then TCPD stops, depending on the rule, and access is either granted or denied.
如果找到匹配,那么tcpd会根据规则停下来,批准或拒绝访问。
If there is a deny or specify rule in place for a user that denies access, even if the base permission gives access by user or group, the user is denied.
如果对于一个用户有拒绝访问的deny或specify规则,那么即使基本权限通过用户或组给他授予了访问权,此用户也会被拒绝。
Since certain objects are being accessed via certain access methods and I/O operations, at least for the majority of all operations—the old rule is an 80-20 split.
由于某些对象是通过某些访问方法和I/O操作予以访问的,至少对大部分操作而言是这样 —原来的规则是 “二八开”。
Policy - a rule for accessing a resource, such as allowing read access to a cube or denying read access to the ascendants and descendants of the U.S. members of the Retailers dimension.
Policy——访问资源的规则,比如允许对多维数据集进行读访问,或者拒绝对Retailers维度的美国成员的祖先或后代成员进行读访问。
First, you must create an association rule model which is stored as PMML from which you can extract the rules into a database table for later Cognos access.
首先,必须创建一个关联规则模型,该模型被存储为PMML,从中可以提取这些规则并将其放入一个数据库表以供日后的Cognos访问。
ILOG JRules USES the transparent decision service to provide Web service access for the rule set. Two types of transparent decision services are provided by JRules.
ILOGJRules使用透明决策服务为规则集提供Web服务访问。
The above line will cause the JSP to have access to content populated in the LayoutChoiceContentSpot bean by personalization once we have defined a business rule.
上面一行将导致一旦已经定义了业务规则,JSP就拥有对由个性化填充到LayoutChoiceContentSpotbean的内容的访问权。
It drives rule execution and enables users to access the rule execution Server through a web service, rather than accessing it directly.
它驱动规则执行,并允许用户通过一个web服务、而不是直接访问RuleExecutionServer。
In this output, the rule states that the IP 192.168.4.12 (with telnetd) is matched against the IP range 192.168.4., thus access is granted.
在以上输出中,规则说明IP192.168.4.12(针对telnetd)与IP范围192.168.4 .匹配,因此批准访问。
应用推荐