因此,在大多数情况下,基础设施默认地为管理通信流提供合理的身份验证、授权和加密。
Thus, for the most part, the infrastructure provides for reasonable authentication, authorization, and encryption of administrative traffic by default.
基于角色的访问建立在适当授权的基础上,可以作为中央管理基础设施的一部分被实现。
Role-based access on a need-to-use basis can be implemented as part of the central management infrastructure.
这会限制得到授权的管理员对基础设施的访问。
This limits authorized administrator access to the infrastructure.
应用推荐