现有的访问控制机制不会被忽略。
DL不支持细粒度的用户访问控制。
The DL does not support fine-grained, per user access control.
创建包含角色和访问控制的社区。
依赖方使用属性来更好的访问控制决策。
Relying parties use attributes to make fine grain access control decisions.
基于策略的访问控制决策。
访问控制表让您定义细粒度的文件许可权。
Access control lists let you define fine-grained permissions for files.
这种资料库称为访问控制链表(ACL)。
需要对于大企业客户的需求定制访问控制。
Access control may also need to be customized to the needs of a large enterprise customer.
重用现有容器功能,如访问控制和事务管理。
Reuse of existing container features, such as access control and transaction management.
还提供了通过策略实现的服务安全访问控制。
Secure access control for services using policies is also provided.
也就是说你可以通过浏览器访问控制你的软件。
That means your "apps" will be accessed and controlled through your browser.
储存库可以分类并对提交资源提供了访问控制。
The repository can categorize and provide access control for any of your submitted assets.
访问控制列表是权限列表或保护资源的权限集。
An access control list is a list of permissions or sets of permissions securing a resource.
访问控制—使系统能够识别用户组的安全性策略。
Access control. Enables the system to recognize security policies for groups of users.
可以根据业务和访问控制要求将策略归入策略组中。
Policies are grouped into policy groups based on business and access control requirements.
通常pac包含制定访问控制决策所需的授权信息。
Usually PAC carries the authorization information that is used to make access-control decision.
通过维护用户的访问控制列表来提供功能和数据权限。
Provide functional and data entitlement by maintaining access control lists of users.
这种逻辑对于大量更新访问控制配置的情况特别有用。
This logic especially makes sense in scenarios with many updates of the access control configuration.
对于一些组织,对项目访问控制也许不是一个重要问题。
For some organizations, access control to projects may not be a significant issue.
这会对数据库本机访问控制和审核功能的价值带来影响。
This undermines the value of the database's native access control and auditing function.
还有用于套接字、网络接口、主机和端口的网络访问控制。
There are also network access controls for sockets, network interfaces, hosts, and ports.
此处根据门户访问控制或个性化规则进行筛选会更为有效。
Filtering based on portal access control or personalization rules would be more efficient here.
访问控制可以外化给网络代理,不用再在本地应用里执行。
Access control can be externalized to a network proxy instead of being performed within the local app.
为了防止误用,部署基础设施和注册中心也都需要访问控制。
Both the deployment infrastructure and the registry also need access control, to prevent misuse.
仪表板还提供了对于访问控制警报、操作和用户角色的支持。
Also available from the dashboard are support for alerts, operations, and user roles for access control.
这个用例将展示不同访问控制列表与特定队列集之间的交互。
This case will illustrate how different access control lists interact with a given set of queues.
属性可以在查询中使用,并且可用于建立细粒度的访问控制。
Properties can be used in queries, and can be used to establish fine-grained access control.
这包括识别、认证、授权、访问控制、数据屏蔽、审计和加密。
This includes identification and authentication, authorization, access control, data masking, auditing, and encryption.
这包括诸如加载和删除分类系统以及设置访问控制策略等功能。
This includes functions such as loading and removing classification systems, and setting up access control policies.
创建一种可移植的、标准的方式来描述访问控制实体及其属性。
Create a portable and standard way of describing access control entities and their attributes.
应用推荐