The DL does not support fine-grained, per user access control.
DL不支持细粒度的用户访问控制。
In the right details pane, locate the User Access Control policies.
在右边的详细资料窗格中,找到用户访问控制的政策。
If User Access Control (UAC) is enabled, you must use the "Run as Administrator" option when installing.
如果用户访问控制(uac)是启用的,您必须使用“以管理员身份运行”选项,当安装。
We characterized the security issues in ASP-based networked manufacturing system, especially the issue of the user access control.
本章描述了ASP和网络化制造系统的安全性问题,尤其是用户访问控制的问题;
Of the major importance is implementation of POSIX ACL, an add-on to usual UNIX permissions that allows for more fine-grained user access control.
最重要的是POSIXACL的实现,这是对普通unix权限的扩展,可以支持更细化的用户访问控制。
This paper analyzed critical technology: heterogeneous data fusion based on XML, remote sensing data storage, data persistence and user access control;
对基于XML的多源异构数据融合、遥感数据存储、数据持久化以及用户访问控制技术进行了分析和设计;
The scheme is based on the user access control and it defines a fine access control mode. It is very suitable for the case that need to authenticate the user of the private network.
该方案对用户的认证是基于用户的权限进行的,定义了良好的资源访问控制模式,非常适合实际系统对内部网络用户有认证要求的场合。
With these options, the user can control the access of files and directories to copy to or from.
通过使用这些设置,用户可以控制对要复制的文件、源目录和目标目录的访问。
Each application assigns one or more administrators to control user access to its functions.
每个应用程序分配一个或多个管理员来控制用户对其功能的访问。
Central tools store user identity and access control information for the entire network in a single location and provide screens to manage it all.
中央工具在单一位置存储整个网络的用户标识和访问控制信息,并提供用于进行全面管理的界面。
You can now build an application around this that can control access to functionality based on the user roles you have defined in your LDAP directory.
您现在可以围绕着这个骨架,构建一个能够基于您在LDAP目录中定义的用户角色控制对功能的访问的应用程序。
The extracted metadata includes data model objects, such as item types and their attributes, and administration objects, such as user definitions and access control lists.
提取的元数据包括一些数据模型对象,例如项目类和它们的属性,还有一些管理对象,例如用户定义和访问控制列表。
Also available from the dashboard are support for alerts, operations, and user roles for access control.
仪表板还提供了对于访问控制警报、操作和用户角色的支持。
Just like tables, nicknames have an equivalent set of privileges that can control user access to the nickname objects on the federated system.
与表一样,昵称也有对等的一组权限,用于控制用户在联邦系统上对昵称对象的访问。
It makes for easier management of host and user control access from a system administrators point of view.
从系统管理员的角度来看,这样更容易管理主机和用户访问控制。
You can design access control policies to grant authority to a user based on their role in a particular organization.
您可以设计访问控制策略,以便根据用户在特定组织中的角色对其进行授权。
This can get particularly complex when you need to integrate access control customizations with other types, such as user preferences.
当需要将访问控制自定义与其他类型(如用户首选项)集成时,这种方法可能会变得尤为复杂。
Adaptive user interfaces also make it easier to comply with the changing rules and regulations around access control of information.
自适应用户界面还能使遵循与信息访问控制相关的不断变化的规则和规定变得更为简单。
Not surprisingly, in this article's example, the subject of access control is the user calling an MDM service.
在本文的例子中,访问控制主体就是调用MDM 服务的用户,这毫不奇怪。
What happens when the everyday user tries to access a control that is authorized only for administrators?
当用户每天都试着访问仅授权给管理员的控制权时,会发生什么?
Access Control Lists define the level of access on a particular CM entity for users and user groups.
访问控制列表为用户和用户组定义了对特定CM实体的访问级别。
Testing access will help you find out if an unauthorized user can successfully access a control that only the administrators are authorized to use.
测试访问将帮助您查明一名未授权用户是否能够成功访问一个只有管理员有权使用的控件。
Access Can an unauthorized user successfully access a control that only the administrators are authorized to use?
访问一个未经授权的用户能成功访问只有经过授权的管理员才能使用的控制权吗?
This allows actions to be restricted on a per-user basis, allowing fine-grained control over which user can access which action.
这允许基于用户限制操作,从而提供更细粒度的用户访问控制。
The framework also exposes a powerful user authentication and access control subsystem that you can customize it to meet the requirements of almost any Web application.
该框架还公开一个强大的用户身份验证和访问控制系统,通过定制它几乎可以满足任意web应用程序的需求。
The root user can control every process, access every file, and perform any function on the system.
root用户可以控制所有的程序,访问所有文件,使用系统上的所有功能。
However, there are some tools like sudo, which allows regular users to behave like a root or super user and provides access control through a configuration file.
然而,有些工具,比如sudo,允许普通用户充当root用户或超级用户的角色,并通过配置文件提供访问控制。
Examples of Lotus Notes Services include the Domino Security Model which is used for user authentication, access control and encryption.
LotusNotes的服务实例包括Domino安全模型(Security Model),可以用它进行用户身份验证、访问控制和加密。
The threats against web applications include user account hijacking, bypass of access control, reading or modifying sensitive data, or presenting fraudulent content.
在 受到威胁的web应用中,包括用户帐户劫持,绕开访问控制,阅读或修改敏感数据,或出示虚假的内容。
The authorization policies defined to the Object Authority Manager (OAM) control access based on user IDs and group membership.
ObjectAuthorityManager (oam)中定义的授权策略可以基于用户ID和组成员身份进行访问控制。
应用推荐