• Access Control Lists (ACLs).

    访问控制列表(acl)。

    youdao

  • Access control lists and permission sets.

    访问控制列表权限

    youdao

  • Permissions are set using access control lists.

    权限使用访问控制列表设置的。

    youdao

  • The repositories are called Access Control Lists (ACLs).

    这种资料库称为访问控制链表ACL)。

    youdao

  • Access control lists let you define fine-grained permissions for files.

    访问控制定义细粒度文件许可权

    youdao

  • Authorization is handled in CM V8 with Access Control Lists (ACLs).

    CMV 8中授权通过访问控制列表(Access Control List,ACL)来处理的。

    youdao

  • Use Access Control Lists to define component level operation privileges.

    使用访问控制列表(Access Control List)定义组件级别操作权限

    youdao

  • Provide functional and data entitlement by maintaining access control lists of users.

    通过维护用户访问控制列表来提供功能数据权限

    youdao

  • Some file systems support advanced security features, such as access control lists (ACLs).

    某些文件系统支持高级安全特性比如访问控制列表(acl)。

    youdao

  • Access Control Lists (ACLs) determining who can access each database and to what extent.

    访问控制列表(Access Control List,ACL)确定多大范围内访问每个数据库

    youdao

  • OmniFind can be configured to associate documents with security tokens or access control lists.

    OmniFind可以配置文档安全令牌访问控制列表关联

    youdao

  • This case will illustrate how different access control lists interact with a given set of queues.

    这个用例展示不同访问控制列表特定队列之间交互

    youdao

  • Access Control Lists define the level of access on a particular CM entity for users and user groups.

    访问控制列表用户用户定义特定CM实体访问级别

    youdao

  • Visibility of reports and views can be limited to certain team members based on access control lists.

    可以通过存取控制表来限制报告视图某些团队成员可见性。

    youdao

  • Similarly, the user must have the correct access control lists for creating or writing to settings.

    同样用户必须创建写入设置正确访问控制列表

    youdao

  • Access control lists (ACLs) are objects with an owner and an indexed list, or hash, as illustrated in Figure 2.

    访问控制列表(acl)具有所有者索引列表散列对象如图2所示。

    youdao

  • The earliest forms of access control on the mainframe were based on manually maintained access control lists (ACLs).

    大型机上最早访问控制方式基于手动维护的访问控制列表ACLs)。

    youdao

  • They provide programmatic access to virtually all Domino elements including designs, access control lists, and documents.

    它们提供所有Domino元素编程访问能力,包括设计、访问控制列表文档

    youdao

  • Google Storage is worth the trouble, mainly because it supports powerful access controls through access control lists (ACLs).

    GoogleStorage值得花精力的,这主要是因为支持通过访问控制列表(acl)实现的强大访问控制

    youdao

  • Control over access to topics will normally be managed by the publication engine based on access control lists on a topic hierarchy.

    主题访问控制通常发布引擎基于主题层次结构中的访问控制列表进行管理

    youdao

  • One of these goodies is some special functionality called "access control lists" or ACLs, and is now enabled on XFS filesystems by default.

    其中之一一些名为访问控制ACL特殊功能现在XFS文件系统缺省启用这些功能

    youdao

  • In this step, please load the data from the First step to create the necessary users, groups, and access control lists (for example: ACL's).

    一步中,加载一步中的数据创建必要用户访问控制列表(acl)。

    youdao

  • The Lotus Domino server setup recommends that you configure access control lists of all databases and templates to prohibit anonymous access.

    LotusDomino服务器设置程序建议所有数据库模板访问控制列表配置禁止匿名访问。

    youdao

  • This process configures Tivoli access Manager to update access control lists to allow the service subscriber to invoke the subscribed service.

    流程可配置TivoliAccessManager更新访问控制列表允许服务订阅者调用订阅的服务。

    youdao

  • It is not necessary to define user groups in CM V8, but it simplifies administration, especially when you define Access Control Lists (ACLs).

    CMv8并不要求必须定义用户但是通过定义用户组可以简化管理尤其是定义访问控制列表(Access Control List, ACL)的时候。

    youdao

  • Although this design is simple, it's can be inadequate, leading some UNIX-type systems to extend it through access control lists and other mechanisms.

    尽管设计非常简单,但它可能不够从而导致某些unix系统通过访问控制列表其他机制对其进行扩展

    youdao

  • This article describes the programming model for Human Task Manager staff resolution, which provides access control lists for instance-based authorization.

    本文描述HumanTaskManager人员解析编程模型,前者基于实例授权提供访问控制列表

    youdao

  • The security administrator can dictate the level of security by applying rules known as protected object policies (POP) and access control lists (ACL).

    安全管理员可以通过应用protectedobjectpolicies (POP)access control lists (acl)规则指定安全等级

    youdao

  • File systems on Linux, AIX, Windows, and other operating systems support access Control Lists (ACLs) to limit access to directories that contain repositories.

    Windows文件系统以及其它操作系统的文件系统均支持Access Control Lists (ACLs),限制包含资料库目录访问

    youdao

  • File systems on Linux, AIX, Windows, and other operating systems support access Control Lists (ACLs) to limit access to directories that contain repositories.

    Windows文件系统以及其它操作系统的文件系统均支持Access Control Lists (ACLs),限制包含资料库目录访问

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定