• The DL does not support fine-grained, per user access control.

    DL支持细粒度用户访问控制

    youdao

  • In the right details pane, locate the User Access Control policies.

    右边详细资料窗格中找到用户访问控制政策

    youdao

  • If User Access Control (UAC) is enabled, you must use the "Run as Administrator" option when installing.

    如果用户访问控制(uac)启用的,必须使用“以管理员身份运行选项安装。

    youdao

  • We characterized the security issues in ASP-based networked manufacturing system, especially the issue of the user access control.

    本章描述ASP和网络化制造系统安全性问题尤其是用户访问控制问题

    youdao

  • Of the major importance is implementation of POSIX ACL, an add-on to usual UNIX permissions that allows for more fine-grained user access control.

    重要POSIXACL实现,这是普通unix权限扩展可以支持细化用户访问控制。

    youdao

  • This paper analyzed critical technology: heterogeneous data fusion based on XML, remote sensing data storage, data persistence and user access control;

    基于XML多源异构数据融合遥感数据存储、数据持久化以及用户访问控制技术进行了分析和设计

    youdao

  • The scheme is based on the user access control and it defines a fine access control mode. It is very suitable for the case that need to authenticate the user of the private network.

    方案用户认证基于用户权限进行的,定义良好的资源访问控制模式非常适合实际系统对内部网络用户有认证要求的场合。

    youdao

  • With these options, the user can control the access of files and directories to copy to or from.

    通过使用这些设置用户可以控制对要复制文件、源目录目标目录访问

    youdao

  • Each application assigns one or more administrators to control user access to its functions.

    每个应用程序分配一个多个管理员控制用户功能访问

    youdao

  • Central tools store user identity and access control information for the entire network in a single location and provide screens to manage it all.

    中央工具单一位置存储整个网络用户标识访问控制信息提供用于进行全面管理的界面

    youdao

  • You can now build an application around this that can control access to functionality based on the user roles you have defined in your LDAP directory.

    现在可以围绕着这个骨架,构建一个能够基于您在LDAP目录中定义用户角色控制功能访问应用程序

    youdao

  • The extracted metadata includes data model objects, such as item types and their attributes, and administration objects, such as user definitions and access control lists.

    提取元数据包括一些数据模型对象例如项目它们的属性还有一些管理对象,例如用户定义访问控制列表

    youdao

  • Also available from the dashboard are support for alerts, operations, and user roles for access control.

    仪表板提供对于访问控制警报操作用户角色支持

    youdao

  • Just like tables, nicknames have an equivalent set of privileges that can control user access to the nickname objects on the federated system.

    与表一样昵称也有对等的一权限用于控制用户联邦系统昵称对象访问

    youdao

  • It makes for easier management of host and user control access from a system administrators point of view.

    系统管理员角度来看,这样容易管理主机用户访问控制

    youdao

  • You can design access control policies to grant authority to a user based on their role in a particular organization.

    可以设计访问控制策略以便根据用户特定组织中的角色进行授权。

    youdao

  • This can get particularly complex when you need to integrate access control customizations with other types, such as user preferences.

    需要访问控制定义其他类型(用户首选项)集成时,这种方法可能会变得尤为复杂

    youdao

  • Adaptive user interfaces also make it easier to comply with the changing rules and regulations around access control of information.

    自适应用户界面能使遵循信息访问控制相关不断变化规则规定变得更为简单。

    youdao

  • Not surprisingly, in this article's example, the subject of access control is the user calling an MDM service.

    本文例子中,访问控制主体就是调用MDM 服务用户,这毫不奇怪。

    youdao

  • What happens when the everyday user tries to access a control that is authorized only for administrators?

    用户每天都访问授权管理员的控制权时,会发生什么

    youdao

  • Access Control Lists define the level of access on a particular CM entity for users and user groups.

    访问控制列表用户用户定义特定CM实体访问级别

    youdao

  • Testing access will help you find out if an unauthorized user can successfully access a control that only the administrators are authorized to use.

    测试访问帮助查明未授权用户是否能够成功访问只有管理员有权使用控件

    youdao

  • Access Can an unauthorized user successfully access a control that only the administrators are authorized to use?

    访问一个未经授权用户能成功访问只有经过授权管理员才能使用的控制权吗?

    youdao

  • This allows actions to be restricted on a per-user basis, allowing fine-grained control over which user can access which action.

    允许基于用户限制操作从而提供更细粒度的用户访问控制

    youdao

  • The framework also exposes a powerful user authentication and access control subsystem that you can customize it to meet the requirements of almost any Web application.

    框架公开一个强大的用户身份验证访问控制系统通过定制几乎可以满足任意web应用程序需求

    youdao

  • The root user can control every process, access every file, and perform any function on the system.

    root用户可以控制所有程序访问所有文件使用系统所有功能

    youdao

  • However, there are some tools like sudo, which allows regular users to behave like a root or super user and provides access control through a configuration file.

    然而有些工具比如sudo允许普通用户充当root用户超级用户的角色,通过配置文件提供访问控制

    youdao

  • Examples of Lotus Notes Services include the Domino Security Model which is used for user authentication, access control and encryption.

    LotusNotes服务实例包括Domino安全模型(Security Model),可以进行用户身份验证访问控制加密

    youdao

  • The threats against web applications include user account hijacking, bypass of access control, reading or modifying sensitive data, or presenting fraudulent content.

    受到威胁web应用中包括用户帐户劫持绕开访问控制阅读修改敏感数据,或出示虚假内容

    youdao

  • The authorization policies defined to the Object Authority Manager (OAM) control access based on user IDs and group membership.

    ObjectAuthorityManager (oam)中定义授权策略可以基于用户ID组成员身份进行访问控制

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定