• If the user holds an exemption to every rule used by a security policy, then the user will have complete access to all data protected by that security policy.

    如果用户拥有安全策略使用每个规则豁免权那么用户拥有受那个安全策略保护所有数据完全访问权。

    youdao

  • If a user holds an exemption on a particular rule of a particular security policy, that rule is not enforced when the user tries to access data protected by that security policy.

    如果用户拥有特定安全策略特定规则豁免权那么用户试图访问受该安全策略保护数据时,该规则将不起作用。

    youdao

  • For instance, a policy that receives a SOAP request validates security information in the SOAP header to validate that a user may receive previously cached response data.

    例如收到一个SOAP请求时的策略,这个策略会SOAP消息头里验证安全信息确认用户也许可以接受先前缓存响应数据

    youdao

  • There are two types of rules that a user can create in a security policy to protect event data and master data from unwanted disclosure.

    用户可以安全策略创建两种类型规则,从而防止泄露事件数据管理数据。

    youdao

  • Please check your own domain as a standard domain user and see if something is not following the security policy in your organization.

    我们将用普通用户你的域进行检查,看看哪些方面符合安全策略

    youdao

  • An end user should evaluate a service provider's security policy before entering into a relationship.

    使用服务之前,最终用户应该评估服务提供商安全策略

    youdao

  • The user will then be prompted to change their password when logging in (that is, if the security password policy rules are enforced).

    如果启用安全密码策略规则用户登录时,提示他们修改密码。

    youdao

  • Tivoli Security Policy Manager - Provides a uniform point of administration of users, federation of user information, and privilege management.

    TivoliSecurity PolicyManager——提供针对用户用户信息联合特权管理统一管理点。

    youdao

  • Next, the consumer wants to know what security focus for user, resource, and data request threshold policy is for SaaS, PaaS and IaaS.

    接下来使用者希望了解SaaSPaaSIaaS用户资源数据请求安全策略安全关注重点是什么

    youdao

  • A valid security context can be constructed using one item from each row as long as the three are connected. In policy, the user definition.

    只要连接,就可以使用任意行中的条目构造有效安全上下文

    youdao

  • The domain is governed by two security structures: The user registry, such as LDAP, Lotus Domino, or Microsoft Active Directory, and a master authorization policy database.

    这个两个安全结构主导用户注册表比如LDAPLotusDominoMicrosoftActiveDirectory一个授权策略数据库

    youdao

  • A user can be granted at most two security labels for a security policy - one for read and the other for write.

    对于一个安全策略,每个用户最多只能授予2个安全标签用于一个用于写。

    youdao

  • You also need to add WSIT custom extensions to the policy information on both client and server sides with user-configuration details to indicate how the security handling will be implemented.

    需要同时服务器客户端策略信息中添加WSDL自定义扩展通过用户配置细节表明如何实现安全处理

    youdao

  • The RFIDIC Security Policy Editor is a tool for specifying the rules under which data can be disclosed by the RFIDIC query interfaces. A user can.

    RFIDICSecurity PolicyEditor一个用来指定安全规则的工具这些规则控制RFIDIC查询接口能够公开哪些数据

    youdao

  • Enable password policy to force computer users to set passwords that meet security requirements, including setting the password lock server console to prevent unauthorized user modifications.

    启用密码策略强制计算机用户设置符合安全要求密码包括设置口令锁定服务器控制台防止非法用户修改

    youdao

  • As mentioned before, events are characterized by the two contextual dimensions product and location. Therefore, a user can specify three types of disclosure rules in the Security Policy editor.

    正如前面提到事件按照两个上下文维(产品位置)来区分

    youdao

  • It allows a security manager to define security policy for computer devices or groups of computer devices for a user or a group of users.

    软件允许安全管理定义用于为一个用户或者用户计算机设备计算机设备的安全策略

    youdao

  • These authorized rules have considered the user attribute and the enterprise security policy.

    这些授权规则考虑用户属性企业安全策略

    youdao

  • You need to configure the local security policy setting to request a user name and password when you make changes to the computer system.

    需要配置本地安全策略设置更改计算机系统要求用户密码

    youdao

  • Code access security policy configuration state consists of three administrative policy levels: enterprise, machine, and user policy.

    代码访问安全性策略配置状态分为三个管理策略级别企业计算机用户策略。

    youdao

  • The effective permission set that the security policy grants to code is determined by the intersection of the permission sets granted by the machine and user policies.

    安全策略代码授予有效权限计算机策略用户策略授予的权限交集确定的。

    youdao

  • Describes how to administer security policy for a user other than the current user.

    描述如何不是当前用户的用户管理安全策略

    youdao

  • You can edit policy files by hand or you can use the Code Access Security Policy tool to administer security policy for the enterprise, machine, or user levels.

    可以手动编辑策略文件可以使用代码访问安全性策略工具管理企业级别计算机级别用户级别安全策略。

    youdao

  • If the assembly or document location is on a network share, the local (User level) security policy update is not enough to allow the solution to run.

    如果组件文件位置网路共用上,则本机(使用者层级)安全性原则更新不足以允许执行方案

    youdao

  • On client machine, deploy a security policy which grants client application only the permissions to call back the server and to potentially display user interface.

    客户服务器发布安全策略授权给客户端应用程序,使有权服务器端程序并且能够潜在显示用户界面

    youdao

  • Provides an enumerator to access the security policy hierarchy by levels, such as computer policy and user policy.

    提供枚举级别(计算机策略用户策略)访问安全策略层次结构

    youdao

  • Provides an enumerator to access the security policy hierarchy by levels, such as computer policy and user policy.

    提供枚举级别(计算机策略用户策略)访问安全策略层次结构

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定