After you select the security file to import, map roles.
选择要导入的安全文件之后,映射角色。
After you select the database, select the security file to import, as shown in Figure 16.
选择数据库后,选择要导出的安全文件,如图16所示。
There are two issues that make a macro set preferable to data languages like the XML declarative security file.
有两个原因使得宏更适合xml声明式安全文件这样的数据语言。
After you map roles, specify how collisions should be resolved if any are detected during the import of the security file.
映射角色后,指定安全文件导入过程中出现的冲突的解决方式。
The password does not match the one on the existing security file. Do you want to overwrite the existing security file with the new password?
与当前安全性文件上的密码不符,是否需要将旧密码改写为新密码?
Replace - Any security metadata in the repository associated with the cubes in the security file will be removed, and all security metadata in the file will be added.
Replace—资源库中与安全文件中的多维数据集关联的所有安全元数据将被删除,文件中的所有安全元数据将添加进来。
This is a more robust security realm than the properties file realm, but for this you need to create tables and enter data in the database.
这是一种比属性文件域更加可靠的安全领域,但是为了实现该域,您需要创建相应的表,并在数据库中输入数据。
If you want to ensure the new file system retains the security details of the source, this is vital.
如果您希望确保新的文件系统保留源文件系统的安全细节,那么这是至关重要的。
The article is geared toward small - to medium-sized applications, because it implements simple security by using the properties file login module.
本文适用于小到中型的应用程序,因为它通过利用属性文件登录模块实现了简单的安全。
When I talk about further distinctions like static and journal file systems, I'm emphasizing the consistency and, to some extent, security of file system contents.
当我谈到进一步的区分,如静态和日志文件系统时,我要强调一致性以及某种程度上的文件系统内容的安全性。
However, this is not necessarily a security concern since the file system access control mechanism usually provides sufficient protection.
不过您也不必担心安全问题,因为文件系统访问控制机制通常都可以提供充分的保护。
When another user requires access to the file, their security credentials are verified before being granted access to the data even though the file data is already in memory and in clear format.
当另一个用户需要访问该文件时,在授予对数据的访问权限之前,将验证其安全凭据,既使这些文件数据已经以明文格式存在于内存中。
Some file systems support advanced security features, such as access control lists (ACLs).
某些文件系统支持高级的安全特性,比如访问控制列表(acl)。
Note that these properties will be stored in plain text and it is recommended that directory and/or file level security be applied to protect these values.
请注意这些属性将被存储为纯文本,且我们建议采用适用于保护这些值的目录和/或文件等级安全性。
The same security, file permissions, and other data is replicated between the NFS client and the NFS server.
将会在NFS客户端和NFS服务器之间复制相同的安全设置、文件权限和其他数据。
Nor do I mean to imply that there aren't security concerns with this file.
我也无意暗示有无和此文件安全相关的安全问题。
Above the communication protocols are the optional file attachment and security layers that are implemented with MIME.
通信协议的上面是可选的文件附件和安全层,用MIME实现。
For the first example, let's consider a security configuration file to detail different security domains within a configuration file.
作为第一个例子,我们来考虑一个安全配置文件,它在一个配置文件中详细描述不同的安全领域。
File-realm-demo: Demonstrates how to setup security restrictions using a flat file of users and groups.
file - realm - demo:展示如何使用用户和组的平面文件设置安全约束。
These permissions are changeable by using the chmod command and are generally good enough for most of the file security on the system.
可以使用chmod命令修改这些权限,一般来说它们足以保证系统上大多数文件的安全性。
Server.props: ObjectGrid server-specific security configuration file.
props:ObjectGrid服务器特定的安全性配置文件。
ObjectGridSecurity.xml: ObjectGrid cluster security configuration file.
xml:ObjectGrid集群安全性配置文件。
Before you import the file containing your security model, import the file containing your cube model into the InfoSphere Warehouse control database using the Administration Console.
在导入包含安全模型的文件之前,使用Administration Console将包含多维数据集模型的文件导入InfoSphereWarehouse控制数据库。
Merge replace - If security metadata exists in the repository for a resource, the security metadata in the file will replace the security metadata in the repository for the resource.
MergeReplace——如果某个资源的库中有安全元数据,文件中的安全元数据将替换资源库中的安全元数据。
Security is now enabled by default, using a file-based registry.
缺省情况下,现在使用基于文件的注册中心启用安全性。
For audit to understand how to print each object as a record to the audit log, it needs a corresponding entry in the /etc/security/events file.
为了让审计系统了解如何将每个对象作为一条记录输出到审计日志中,需要使用 /etc/security/events文件中的相应条目。
You can also track more than one file using the same keyword by making individual entries for each file to be tracked in the /etc/security/audit/objects file, in the same format.
通过在 /etc/security/audit/objects文件中采用相同的格式为每个想要跟踪的文件建立单独的条目,您还可以使用相同的关键字跟踪多个文件。
The user account attributes, such as system defaults or user specific, can be found in the file: /etc/security/user.
在 /etc/security/user文件中可以找到用户账户属性,比如系统默认的或用户特有的属性。
However, when it is first installed, Rational Asset Manager USES file-based security for user authentication.
然而,当第一次安装时,RationalAssetManager使用基于文件的用户安全验证。
However, when it is first installed, Rational Asset Manager USES file-based security for user authentication.
然而,当第一次安装时,RationalAssetManager使用基于文件的用户安全验证。
应用推荐