If the user holds an exemption to every rule used by a security policy, then the user will have complete access to all data protected by that security policy.
如果用户拥有安全策略使用的每个规则的豁免权,那么该用户将拥有受那个安全策略保护的所有数据的完全访问权。
If a user holds an exemption on a particular rule of a particular security policy, that rule is not enforced when the user tries to access data protected by that security policy.
如果用户拥有一个特定安全策略的特定规则的豁免权,那么当该用户试图访问受该安全策略保护的数据时,该规则将不起作用。
For instance, a policy that receives a SOAP request validates security information in the SOAP header to validate that a user may receive previously cached response data.
例如,收到一个SOAP请求时的策略,这个策略会在SOAP消息头里验证安全信息来确认用户也许可以接受先前缓存的响应数据。
There are two types of rules that a user can create in a security policy to protect event data and master data from unwanted disclosure.
用户可以在安全策略中创建两种类型的规则,从而防止泄露事件数据和管理数据。
Please check your own domain as a standard domain user and see if something is not following the security policy in your organization.
我们将用普通域用户对你的域进行检查,看看有哪些方面不符合安全策略。
An end user should evaluate a service provider's security policy before entering into a relationship.
在使用服务之前,最终用户应该评估服务提供商的安全策略。
The user will then be prompted to change their password when logging in (that is, if the security password policy rules are enforced).
如果启用了安全密码策略规则,当用户登录时,会提示他们修改密码。
Tivoli Security Policy Manager - Provides a uniform point of administration of users, federation of user information, and privilege management.
TivoliSecurity PolicyManager——提供针对用户、用户信息联合和特权管理的统一管理点。
Next, the consumer wants to know what security focus for user, resource, and data request threshold policy is for SaaS, PaaS and IaaS.
接下来,使用者希望了解SaaS、PaaS和IaaS用户、资源和数据请求安全策略的安全关注重点是什么。
A valid security context can be constructed using one item from each row as long as the three are connected. In policy, the user definition.
只要连接了三行,就可以使用任意一行中的条目构造一个有效的安全上下文。
The domain is governed by two security structures: The user registry, such as LDAP, Lotus Domino, or Microsoft Active Directory, and a master authorization policy database.
这个域由两个安全结构主导:用户注册表(比如LDAP、LotusDomino或MicrosoftActiveDirectory)和一个授权策略数据库。
A user can be granted at most two security labels for a security policy - one for read and the other for write.
对于一个安全策略,每个用户最多只能被授予2个安全标签—一个用于读,另一个用于写。
You also need to add WSIT custom extensions to the policy information on both client and server sides with user-configuration details to indicate how the security handling will be implemented.
您需要同时在服务器端和客户端向策略信息中添加WSDL自定义扩展,通过用户配置细节表明如何实现安全处理。
The RFIDIC Security Policy Editor is a tool for specifying the rules under which data can be disclosed by the RFIDIC query interfaces. A user can.
RFIDICSecurity PolicyEditor是一个用来指定安全规则的工具,这些规则控制RFIDIC查询接口能够公开哪些数据。
Enable password policy to force computer users to set passwords that meet security requirements, including setting the password lock server console to prevent unauthorized user modifications.
启用密码策略,强制计算机用户设置符合安全要求的密码,包括设置口令锁定服务器控制台,以防止非法用户修改。
As mentioned before, events are characterized by the two contextual dimensions product and location. Therefore, a user can specify three types of disclosure rules in the Security Policy editor.
正如前面提到的,事件按照两个上下文维(产品和位置)来区分。
It allows a security manager to define security policy for computer devices or groups of computer devices for a user or a group of users.
该软件允许一个安全管理来定义用于为一个用户或者一组用户的计算机设备和计算机设备组的安全策略。
These authorized rules have considered the user attribute and the enterprise security policy.
这些授权规则考虑了用户属性和企业安全策略。
You need to configure the local security policy setting to request a user name and password when you make changes to the computer system.
你需要配置本地安全策略设置,当你更改计算机系统时要求用户名和密码。
Code access security policy configuration state consists of three administrative policy levels: enterprise, machine, and user policy.
代码访问安全性策略配置状态分为三个管理策略级别:企业、计算机和用户策略。
The effective permission set that the security policy grants to code is determined by the intersection of the permission sets granted by the machine and user policies.
安全策略向代码授予的有效权限集是由计算机策略和用户策略授予的权限集的交集确定的。
Describes how to administer security policy for a user other than the current user.
描述如何为不是当前用户的用户管理安全策略。
You can edit policy files by hand or you can use the Code Access Security Policy tool to administer security policy for the enterprise, machine, or user levels.
您可以手动编辑策略文件,也可以使用代码访问安全性策略工具管理企业级别、计算机级别或用户级别的安全策略。
If the assembly or document location is on a network share, the local (User level) security policy update is not enough to allow the solution to run.
如果组件或文件位置是在网路共用上,则本机(使用者层级)安全性原则更新不足以允许执行方案。
On client machine, deploy a security policy which grants client application only the permissions to call back the server and to potentially display user interface.
在客户端服务器,发布安全策略授权给客户端应用程序,使其有权回调服务器端程序并且能够潜在的显示用户界面。
Provides an enumerator to access the security policy hierarchy by levels, such as computer policy and user policy.
提供枚举器以按级别(如计算机策略和用户策略)访问安全策略层次结构。
Provides an enumerator to access the security policy hierarchy by levels, such as computer policy and user policy.
提供枚举器以按级别(如计算机策略和用户策略)访问安全策略层次结构。
应用推荐