• 部署计划配置安全凭据以构成Run - as角色安全性主体

    You configure the security credentials that constitute the subject for run-as role security in the deployment plan.

    youdao

  • 安全性更改另一个主要方面,它体现在WebSphere安全性授权模型基于角色安全性转变中。

    Security is another major area of change with the transition from the WebSphere security authorization model to role-based security.

    youdao

  • 每个数据源必须确定管理人业务角色负责数据精确性完整性安全性

    Every data source must have a defined custodian (a business role) responsible for the accuracy, integrity, and security of that data.

    youdao

  • 方案集成过程中,需要一直记住的一个安全性规则就是不同用户角色拥有相应特权设置

    During the solution integration, one security rule you need keep in mind is to be certain that different user roles have their corresponding privilege sets.

    youdao

  • 第二问题数据安全性没有任何角色用户访问检查确保适当数据访问。

    The second issue is data security because there is no check of roles or users to ensure proper access to the data.

    youdao

  • 此外如果需要的话可以指定访问角色BE4 WS设定某一安全性级别

    Furthermore, you can assign access roles and set a certain security level for BE4WS if required.

    youdao

  • 典型IT组织包括多个其他角色,包括基础设施支持数据库支持、安全性等等

    There are several more roles in a typical it organization, including infrastructure support, database support, security, and so on.

    youdao

  • 管理应用程序安全性需要启用实施安全角色

    Administrative and application security needs to be enabled in order for security roles to be enforced.

    youdao

  • 软件如何配置实现其他步骤那样扮演者关键安全性角色

    How software is configured and implemented can play just as pivotal a security role as any other steps that lead to that point.

    youdao

  • 虽然两个术语代表的是不同的含义,但出于它们应用程序安全性方面各自角色考虑,它们有时会被交换使用

    Though the two terms mean different things, they are sometimes used interchangeably because of their respective roles in application security.

    youdao

  • V 4符合J2EE 1.2基于安全性角色不是方法授权模型

    V4 conforms to the J2EE 1.2 authorization model, which is based on security roles rather than method groups.

    youdao

  • 提示:要获取精确安全控制可以通过使用下面COM +角色用户进一步缩小安全性

    TIP: For more precise security controls, you can narrow the security further by using the following COM + role and user instead.

    youdao

  • 如果第一打开编辑器,那么您看到问题,“您创建一个安全性角色吗?”

    If this is the first time you've opened this editor, you will be presented with a question, "Would you like to create a security role?"

    youdao

  • bean提供者负责声明所有企业bean代码所用到安全性角色名称

    The bean Provider is responsible for declaring all the security role names used in the enterprise bean code.

    youdao

  • 结合基于角色安全性IBMCognosBI提供动态报告功能

    In conjunction with Role based Security, IBM Cognos bi also offers dynamic reporting capability.

    youdao

  • DSS电子商务其他Web应用程序安全性方面扮演重要角色,它可以确保交换存储中检索应用程序Web数据可靠性

    DSS plays an important role in the security of electronic commerce and other Web applications by assuring the authenticity of Web data when applications are exchanged and retrieved from storage.

    youdao

  • 下面我们使用我们一个样例Great Out doorsWarehouse”展示如何根据基于角色安全性创建动态报告(见图2)。

    Now we will explain the method of how to create dynamic reporting based on Role based security by using one of our sample packages, "Great Outdoors Warehouse". (Figure 2).

    youdao

  • 创建实现基于角色安全性动态报告使用以下IBMCognosBI功能

    To create dynamic reports that implement Role based security we use the following IBM Cognos BI functionality.

    youdao

  • EAR部署描述符创建安全性角色使用RoleMapping按钮

    To create the security roles in the EAR deployment descriptor, use the role Mapping button.

    youdao

  • HomeComponent接口选择方法每个安全性角色调用这些方法24),然后选择Finish

    Select methods from the Home and Component interfaces that each selected security role is allowed to invoke (Figure 24), then Finish.

    youdao

  • 实现基于角色安全性步骤

    Steps to implement Role based security

    youdao

  • 启用安全性时,根据人工任务设置StaffPlugin (4)分配适当角色

    When the security is enabled, the proper role will be assigned from the Staff Plugin (4) depending on the Human Task settings.

    youdao

  • 通过Rolename输入名称admin创建名为admin的安全性角色

    Create a security role named Admin by typing in the name Admin into the role name field.

    youdao

  • 首先确定网站上需要访问WebSphereMQ命令然后实现基于角色安全性,从而对命令进行分组

    Determining the roles at your site that require access to WebSphere MQ commands, and then implementing role-based security can provide a way to group the commands.

    youdao

  • 接下来三个展示如何添加安全性约束8),如何设置正确URLHTTP方法(图9以及如何针对该约束允许DADXUser角色(图10)。

    The next 3 figures show how to add the security constraint (Figure 8), how to set the right URL and HTTP methods (Figure 9) and how to allow the role "DADXUser" for that constraint (Figure 10).

    youdao

  • servletweb.xml文件包含一个 <security-constraint>元素元素定义安全性约束应用的 HTTP方法以及使用该约束的角色

    The web.xml file for the servlet contains a <security-constraint> element that defines the security constraint, the HTTP methods that it applies to, and the roles that use the constraint.

    youdao

  • 用于实现基于角色安全性IBMCognosbi特性

    IBM Cognos BI features for implementing Role based security.

    youdao

  • 部署计划中,安全性配置为ejb3user角色指定Run - as主体dwuser1 -subject

    In the deployment plan, the security configuration specifies a run-as-subject dwuser1-subject for the ejb3user role. Listing 16 shows the OrderRecvMDB bean class.

    youdao

  • 基于角色安全性组织命令、实现安全性简单方法

    Role-based security is the most straightforward way to organize commands for security purposes.

    youdao

  • J2EE 1.2使用安全性角色凭借这个应用程序开发人员就能指定哪些角色访问特定方法权限并且部署人员这些角色映射特定的用户用户上。

    J2EE 1.2 USES security roles, whereby the application developer specifies which roles have the authority to access specific methods, and the deployer maps these roles to specific users or user groups.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定