On the select Configuration Role page, select Configure this machine as control machine (see figure 1), and click Next.
在选择配置部件页面上,选择将此机器配置为控制机(参见图1),然后单击下一步。
A utilization service support tenants to maintain and configure their specific organization structure and access control data.
利用服务支持租户维护和配置自己的组织结构和访问控制数据。
You can request just the services you want, configure them just as you need, set up static IPs, and explicitly set your own security and networking up-in other words, you've got a lot of control.
您可以请求想要的服务,根据需要配置它们,设置静态IP,并显式地设置自己的安全性和网络—换句话说,您拥有很多的控制权。
We also need to configure that web content control will be started automatically when the system start.
我们也需要配置网络内控制开机时自动启动。
MySQL Administrator allows you to configure, backup/restore, and control your databases, as well as MySQL server environment.
MySQLAdministrator让您能够配置、备份/恢复、控制您的数据库以及 MySQL服务器环境。
To run the configuration advisor, use the autoconfigure command, or invoke it through the Control Center, by right clicking on the desired database to configure, and choosing configuration advisor.
为了运行configurationadvisor,要使用autoconfigure命令,或者通过ControlCenter调用它,右击想要配置的数据库,并选择configuration advisor。
This allows you to control the blog using the standard Domino database management interface to configure this information.
这样可以使用标准的Domino数据库管理界面配置这些信息以控制blog。
Your applications can invoke and configure both the embedded browser and portlet viewer to control the user experience when displaying the output from Web applications and portlets, respectively.
在显示来自Web应用程序和portlet的输出时,应用程序可以调用和配置嵌入式浏览器和portlet查看器,从而控制用户体验。
If you happen to use Windows, we have written a good guide on how to configure parental control in Windows 7.
如果你碰巧使用Windows,我们也写了一篇“如何在Windows7中配置父母控制”的文章。
For the moment, however, I'll stick to showing you how to configure a simple access control policy using Acegi.
但是,目前我将继续向您展示如何使用Acegi配置一个简单的访问控制策略。
You will also learn how to configure Acegi to interact with the directory service to implement your access control policy.
您还将了解到如何配置Acegi,使它与目录服务交互,从而实现您的访问控制策略。
You can configure a region using either the Web administration console or through the CICS control program (CICSCP) utility.
可以使用Web管理控制台或通过CICS控制程序(CICSCP)实用工具配置区域。
I also show you how to configure Acegi to interact with the directory server to implement your access control policy.
我还将展示配置acegi的方法,使它能够与目录服务器交互并实现您的访问控制策略。
The next article in this series shows you how to design access control policies, how to host them on a directory service, and how to configure Acegi to read your access control policy.
本系列的下一篇文章将展示如何设计访问控制策略,如何将它们托管在目录服务中,以及如何配置Acegi以读取您的访问控制策略。
The compute node, named Convert, consists of a single module whose purpose is to configure the LocalEnvironment tree in order to control the behavior of the following HTTPRequest node.
计算节点名为Convert,包含单个模块,该模块用于配置localenvironment树,以控制后面的HTTPRequest节点的行为。
You have also learned in detail how to configure Acegi to interact with an LDAP directory and implement an access control policy.
您还详细了解了配置Acegi 的方法,从而与LDAP目录交互实现访问控制策略。
Infrastructure: When you configure Q replication for non-DB2 targets, several Q Apply control tables are created on the target system and accessed through nicknames just as target tables are.
基础设施:在为非db 2目标配置q复制时,会在目标系统上创建多个QApply控制表,并通过别名就像访问目标表一样地访问控制表。
You need to consider the portal layout and access control issues; you can configure, version, and deploy using an xmlaccess command that is specific to Websphere portal.
您需要考虑门户布局和访问控制问题;可以使用特定于WebspherePortal的xmlaccess命令进行配置、版本控制和部署工作。
This is very handy since many of the files used to control and configure Linux are human readable (as opposed to the legacy operating systems).
这是一个很有用的工具,因为很多控制和配置Linux系统的文件都是文本可读文件(这一点,跟传统的操作系统有区别)。
Therefore, end users will have to configure the plug-in (through Windows control panel or by changing a symlink on Unix platforms) to use the latest and greatest.
因此,最终用户需要配置plug - in(在Windows控制面板或者在Unix平台改变一个symlink)来使用最新的,最酷的plug - in。
To make up a platform, you can select one machine as a control machine and others as component machines. To configure the machine as a component machine, do the following.
在搭建平台时,您可以选择一个机器作为控制机,其余的机器作为组件机。
As the developer responsible for providing this underlying functionality, however, you need to configure fine-grained security and have complete control over the user interface (UI).
然而,作为负责提供基础功能的开发人员,您需要配置细粒度的安全性,并拥有对用户界面(UI)的完全控制。
You want a specific user profile to be mandatory, but you cannot find an option in Control Panel where you can configure this. How should you do this?
你想要把一个特定的用户配置文件设为枪支,但你无法在“控制面板”的选项中找到可以配置的地方。你该怎么做?
You can configure the software to provide complete control to remote users, or limit it by disabling the keyboard and mouse.
您可以配置的软件来提供完全控制远程用户,或限制它的禁用键盘和鼠标。
If you are implementing Web services "internally" and have control over the client code, you can configure Application Server to generate LTPA tokens and have the client return them in cookies.
如果您正在“内部”实现Web服务并且拥有对客户机代码的控制权,您就可以把ApplicationServer配置为生成ltpa令牌并让客户机在cookie中返回它们。
The Lotus Domino server setup recommends that you configure access control lists of all databases and templates to prohibit anonymous access.
LotusDomino服务器设置程序建议,将所有数据库和模板的访问控制列表配置为禁止匿名访问。
It is preferred to use the approach shown in the above example because it allows you to configure the net.sf.cglib.proxy.Enhancer instance to fine control the generated proxies.
一般推荐使用上面例子的方法创建代理,因为它允许你通过配置net . sf . cglib . proxy . Enhancer实例很好的控制代理的创建。
It is preferred to use the approach shown in the above example because it allows you to configure the net.sf.cglib.proxy.Enhancer instance to fine control the generated proxies.
一般推荐使用上面例子的方法创建代理,因为它允许你通过配置net . sf . cglib . proxy . Enhancer实例很好的控制代理的创建。
应用推荐