Applicability of controls introduction application access control.
控制介绍应用访问控制的适用性。
Each application assigns one or more administrators to control user access to its functions.
每个应用程序分配一个或多个管理员来控制用户对其功能的访问。
You can now build an application around this that can control access to functionality based on the user roles you have defined in your LDAP directory.
您现在可以围绕着这个骨架,构建一个能够基于您在LDAP目录中定义的用户角色控制对功能的访问的应用程序。
Access control is the component of the e-commerce application that determines whether a given user can perform a given action on a given resource.
访问控制是电子商务应用程序的组件,它可以决定给定的用户是否可以对给定资源执行给定操作。
Each of these application roles aggregates a set of very specific portal access control roles.
其中的每个应用程序角色都聚合一组非常特定的门户访问控制角色。
You can hide the complexity of many access control roles to individual components and expose them as few simplified application level roles with well-understood and easy to use names.
您可以对各个组件隐藏许多访问控制角色的复杂性,并使用易于理解和方便使用的名称将它们公开为少数几个简单的应用程序级别角色。
Later in the article, you'll see the simple access control policy used in building a sample application.
在本文后面的部分,您将看到使用简单的访问控制策略构建一个样例应用程序。
A lock associates the resource with an application, called the lock owner, to control how other applications can access the same resource.
锁将资源与应用程序(叫做锁拥有者)相关联,以控制其他应用程序对同一资源的访问。
Access control: Fine-grained access control might be necessary via a database lookup primitive, or a service invoke to an application specific authorization service.
访问控制:细粒度的访问控制可能是必须的,通过一个数据库查找原语或对特定于应用程序的授权服务的调用实现。
The annotated interface that defines the data access object provides a central control point to manage the SQL statements for the entire application.
带注释的接口为管理整个应用程序的sql语句提供一个集中控制点。
The framework also exposes a powerful user authentication and access control subsystem that you can customize it to meet the requirements of almost any Web application.
该框架还公开一个强大的用户身份验证和访问控制系统,通过定制它几乎可以满足任意web应用程序的需求。
When being audited, you will have to prove to the auditor access control between normal and application, system accounts, and how the sugroup policy is being monitored.
在接受审计时,您必须向审计人员证明对普通、应用程序和系统账户的访问控制是有效的,还要展示监视sugroup策略的方法。
So, application flow control logic belongs in a controller and data access logic belongs in a repository. In that case, where do you put your validation logic?
现在我们的应用程序流控制逻辑从控制器开始,数据库访问逻辑由repository负责,现在我们要把验证逻辑放在哪里呢?
Security infrastructure of WebSphere Application Server, such as role-based access control and encryption.
WebSphereApplicationServer的安全基础结构,比如基于角色的访问控制和加密。
SaaS end user: the only control an end user has is to access the provider's application from a desktop, laptop, or mobile.
SaaS最终用户:最终用户拥有的唯一控制能力是从桌面、笔记本电脑或移动设备访问提供商的应用程序。
Thus, when it is deployed, the mashup server is easily able to control access through the integration of the WebSphere Application Server VMM capability.
因此,部署mashup应用程序后,mashup服务器可以通过集成的WebSphere Application Server VMM 功能轻松地控制访问。
Authorization is essentially access control - controlling what your users can access in your application, such as resources, web pages, etc.
授权实质上就是访问控制-控制用户能够访问应用中的哪些内容,比如资源、Web页面等等。
Depending on the Web application being developed, a requirement might exist to control access to Web documents or the types of servers to which the Web application is allowed to connect.
根据所开发的Web应用程序,有可能会需要控制对Web文档的访问或者Web应用程序允许连接到的服务器的类型。
Hlq.IMS is checked for access from IMS control and application processing regions.
控制来自IMS控件和应用程序处理区域的访问。
It is design intent to control the ability to publish modelled packages by access to a FM install or an SDK application.
它的设计目标是控制通过访问fm或sdk应用程序发布包的能力。
This article addresses the problem of application-level security by breaking access into two manageable units: Workbench - and Control-level access.
本文通过将访问权集成到两个可管理单元(工作台级访问和控件级访问)的方式,解决了应用程序级的安全性问题。
This encryption method can control the user's access to the data of the application system, and the real data for all database users are not visible, is the safest way to encrypt.
这种加密方式可以控制应用系统的用户对数据的访问权限,并且真实数据对所有数据库用户都是不可见的,是最安全的一种加密方式。
Network security is an important research area in the application of information system now, How to implement effective access control based on user's identity is very important.
网络安全是目前信息系统应用的一个重要研究方向,如何确定用户身份以控制用户对信息资源的访问,是其中的一个重要问题。
It would be nice if the audio panel could provide access to some of the more advanced PulseAudio Settings, such as per-application volume control.
如果音频面板能提供更先进的PulseAudio设置就好了,比如说根据不同程序分别控制音量。
Products softswitch involves mainly include: softswitch equipment for core control, application server, media server, access gateway, relay gateway, signaling gateway, and IAD equipment.
软交换涉及的产品主要有负责核心控制的软交换设备、应用服务器、媒体服务器、接入网关、中继网关、信令网关、IAD设备。
But the access and control software of the USB equipment were only used in application level, and the consumer can't do the second development.
但是目前已有的usb设备所配备的访问与控制软件和设备驱动都是应用级的,用户无法做二次开发使用。
In the application of secure information systems, the traditional role-based access control model can not filter business data for users, which easily results in secret data leakage.
在安全信息系统应用中,传统的基于角色的访问控制模型不能为用户过滤业务数据,容易导致数据失密。
Based on the features of the laboratory education information system, this paper discussed the advantages of the application of role-based access control (RBAC) in the system.
从实验室教学管理系统的特点出发,讨论了基于角色的访问控制模型RBAC在实验室教学管理系统中应用的优势。
Based on the features of the laboratory education information system, this paper discussed the advantages of the application of role-based access control (RBAC) in the system.
从实验室教学管理系统的特点出发,讨论了基于角色的访问控制模型RBAC在实验室教学管理系统中应用的优势。
应用推荐