The service provider USES the management UI to control access to the Web service.
服务提供者使用管理UI来控制对Web服务的访问。
You can also control access to stored procedures through GRANT and REVOKE statements.
还可以通过GRANT和revoke语句控制对存储过程的访问。
As a best practice, consider using LBAC as a way to control access to sensitive data.
作为一项最佳实践,应考虑使用LBAC作为控制对敏感数据的访问的一种方法。
For example, you need to control access to EJBs using a network-safe encrypted token.
例如,您需要使用网络安全加密令牌控制对ejb的访问。
Singletons often control access to resources such as database connections or sockets.
单例模式同样用于控制像数据库连接或者sockets这样的资源访问。
Enable host control access is the whole point of wrappers, so make sure it is uncommented.
启用主机控制访问是wrappers的最关键之处,所以确定它未被注释。
Now, let's go over some examples of how TCP Wrappers can control access via SSH to a host.
现在,我们通过一些示例了解TCPWrappers如何控制对主机的SSH访问。
As a best practice, consider using stored procedures as a way to control access to your data.
作为一项最佳实践,应考虑使用存储过程来控制对数据的访问。
Singletons are a useful way to control access to a class, making sure that only one instance can exist.
单例模式是一种有用的控制类访问的途径,他能保证只有一个类实例存在。
This requires RACF to use several different profiles in various classes to control access to a resource.
这要求RACF在不同的类中使用几个不同的概要文件来控制对资源的访问。
They may even filter requests by incoming IP addresses or set up a cookie to control access to the form.
他们甚至会按照传入IP地址对请求进行筛选,或设置Cookie来控制对表单的访问。
Profiles in the MQQUEUE class control access to queues. Four levels of access are meaningful for MQQUEUE.
mqqueue类中的配置文件控制队列访问。
In the standard JDK distribution, the mechanism to control access to code source is turned off by default.
在标准JD k分发版中,控制代码源访问的机制缺省情况下是关闭的。
It makes for easier management of host and user control access from a system administrators point of view.
从系统管理员的角度来看,这样更容易管理主机和用户访问控制。
The purpose of authorization is to control access to resources on a per-ID, per-role, or per-profile basis.
授权的目的是对每个ID、每个角色、或者每个概要进行访问控制。
The method implementation uses the JTA API to start local transactions that control access to EIS1 and EIS2.
该方法用JTAAPI启动控制EIS1和EIS2 的访问的本地事务。
Control access and visibility to business service models and policies within the business Services Repository.
控制对BusinessServicesRepository中的业务服务模型和策略的访问和可视性。
Using sugroups enables system administrators to control access to individual user accounts by group membership.
使用sugroup 让系统管理员能够通过组成员关系控制对各个用户账户的访问。
If access to projects is a concern, then you can create security policies that control access to certain groups.
如果对项目的访问是您所关注的,那么您应该创建一个安全策略来控制一定的组能够访问项目。
Wrappers allow system administrators to control access of TCP-based services or daemons that are wrappers aware.
Wrappers允许系统管理员控制 wrappers 支持的基于TCP 的服务或守护进程的访问。
As a best practice, use views to control access to tables when you want to hide a subset of table columns or rows.
作为一项最佳实践,在您想隐藏表中的部分列或行的时候,应该使用视图来控制对表的访问。
SQLJ provides the unique ability to develop using static SQL statements and control access at the DB2 package level.
SQLJ提供了独特的使用静态SQL语句进行开发以及在DB2包级别控制访问的能力。
Domain RBAC provides fine granular control access over resources for users and requires Enhanced RBAC to be enabled.
DomainRBAC为用户提供了很好的资源访问粒度控制,它要求启用Enhanced RBAC。
It also ensures that scripts are safe to execute and provides a sandbox to control access and modification of the DOM.
它还确保脚本可以安全执行,并提供一个沙箱来控制DOM的访问和修改。
Middleware technology is available to orchestrate services and control access to specific functionalities in the service.
可以使用中间件技术对服务进行组合,并对服务中的特定功能进行访问控制。
Information gathered by social network applications needs to be protected by policies which control access to information.
应该使用控制信息访问的策略来保护社交网络应用程序收集到的信息。
You can also set policies that control access to our SQS queue based on date, time, and source IP Address, as in Listing 2.
您还可以设置一个策略,它根据日期、时间和源ip地址控制SQS队列的访问,如清单2所示。
The enterprise beans control access to the back-end data and internally manage the current transactions and database locking.
企业bean控制对后端数据的访问,并且在内部管理当前事务和数据库锁定。
The authorization policies defined to the Object Authority Manager (OAM) control access based on user IDs and group membership.
ObjectAuthorityManager (oam)中定义的授权策略可以基于用户ID和组成员身份进行访问控制。
Security policy defines the composition of the security labels and specifies the rules used to control access to sensitive data.
安全策略定义安全标签的组成,并指定控制敏感数据的访问的规则。
应用推荐