May they set access privileges for other users?
设定存取权限给其它用户?
It is assumed that your DB2 database access privileges allow you to change data in the database.
这里假定您的DB 2数据库访问权限允许您更改数据库中的数据。
Different grades of access privileges were issued to the roles such as manages and doctors.
授权用户以不同的权限以使他们可浏览、查询和使用相关信息。
Sometimes it provides personalized Settings, sometimes it allows a hierarchy of access privileges.
有时它提供个性化的设置,有时它允许访问权力层次划分。
Create a new directory on the server (user access privileges permitting) with the specified name.
在服务器上建立指定名称的目录(当然要以用户访问权限来决定)。
However, you can read counter values from any computer in the enterprise for which you have access privileges.
不过,您可以从公司内您有存取权限的任何电脑读取计数器值。
The user access privileges provided by the Web services are consistent with those enforced by the Lotus Notes client.
Web服务提供的用户访问权限与LotusNotes客户机施加的权限一致。
Revoking access privileges and revoking a certificate are functionally equivalent; removing the certificate from the trust store accomplishes both tasks.
撤销访问权限和撤销证书在功能上相当;从信任存储区中删除证书可同时完成这两项任务。
More elaborate initialization scripts can do a lot more, declaring global variables to be maintained by the server, setting up access privileges, and so on.
更复杂的初始化脚本能做更多的事,包括声明由服务器维护的全局变量以及设置访问权限等等。
A security check is performed upon entry into the federation, after which the party has whatever access privileges are available to the party's access group.
安全检查在进入联合时执行,之后,合作伙伴拥有对其所在的访问组可用的任何访问权限。
Provides the necessary id management and access privileges across enterprises. This component USES the following additional components to fulfill its services.
提供了必要的ID管理和跨企业的访问权限。
Software shall authenticate these credentials and upon authentication shall permit the users to access sections of the software that they have access privileges for.
软件鉴别这些证书,在鉴定通过的基础上允许用户访问那些他们有权限访问软件的功能部件。
With the Shared Model architecture, changes made in one process element are (depending on access privileges) immediately visible and accessible to other process elements.
借助SharedModel架构,在一个流程元素内所作的更改会(根据访问权限)立即可见并可由其他流程元素访问。
Security is difficult to handle in multi-privileged group communications, because group users have multiple access privileges when subscribing different data streams.
多权限组播通信存在多个数据流且组播组中用户权限因获得数据流的不同而不同,其安全问题较难处理。
This includes authentication of users, control of access privileges, auditing, single sign-on, high availability, and logging that are elements of any security management solution.
它涵盖任何安全管理解决方案都具有的要素,比如用户认证、访问权限控制、审计、单点登录、高可用性和日志记录。
The CyberLock system allows each user's electronic key to be programmed with access privileges to allow or restrict access to specific locks at certain times of the day or week.
配备星际钥匙系统允许每个用户把电子钥匙被编入访问特权的程序,从而在某天或某周的特定的时间允许或是限制访问特殊锁具。
The permissions used to access external tables is governed by the user access privileges on the external table by IDS as well as the data file permissions managed by the operating system.
用于访问外部表的权限由IDS通过外部表上的用户访问特权治理,还受到由操作系统管理的数据文件权限的治理。
Group administrator-has the full set of rights for viewing and managing group information, group level properties, and group access privileges. There are three types of group administrators.
组管理员——具有全部权限,能够查看和管理组信息、组级别属性和组访问特权。
There are a lot of tables and views in MIS. It is very complex to administrate the access privileges of these database resources and it is very difficult for a user to administrate them directly.
在大型MIS系统中建有许多表和视图,对这些数据库资源的存取授权管理十分复杂,而由用户直接管理数据库中的资源的存取授权十分困难。
Now you'll want to give the task a name, and make sure to check the box for "Run with highest privileges", since the shutdown utility requires admin access.
您可以给新建的任务起一个名字,并且确保选择了“使用最高权限运行”复选框,因为运行关机程序需要管理员权限。
Just like tables, nicknames have an equivalent set of privileges that can control user access to the nickname objects on the federated system.
与表一样,昵称也有对等的一组权限,用于控制用户在联邦系统上对昵称对象的访问。
Once all required database objects and packages are created, use group membership and group privileges to control access to the created database objects and packages.
创建好所有必需的数据库对象和包之后,使用组成员关系和组特权来控制对所创建的数据库对象和包的访问。
In other words, the database server USES the database privileges associated with APP_USER for all authorization checking and auditing for all database access.
换句话说,数据库服务器使用与APP_USER关联的数据库权限进行所有数据库访问的身份验证和审核。
Revoking privileges is easiest when access is granted to individual identities.
在将访问权授予个别标识时,撤销权限最容易。
That is, IDS verifies whether the user attempting to access the table has been granted the required privileges to perform the requested operation on that table.
也就是说,IDS验证试图访问表的用户是否已经被授予在该表上执行操作所需的权限。
Always, always create (and use!) a regular user account for yourself on any system where you have root access when you need to do something that requires root privileges.
在任何具有管理员权限的系统中,您应该始终为自己创建(并使用!)一个常规的用户帐户。
Users also are able to view existing reservations, as well as access their Choice Privileges account information.
用户能够看到现有的预订情况,并能访问他们在Choice的账户信息。
Use Access Control Lists to define component level operation privileges.
使用访问控制列表(Access Control List)定义组件级别的操作权限。
To create a new project area, you need to have both JazzAdmins role privileges and the necessary client access licenses (CALs).
为了创建新的项目区域,您需要同时拥有JazzAdmins角色权限以及必要的客户访问许可证(Client Access License, CAL)。
However, when they are installed locally in a browser in its chrome system as an extension, they receive special privileges to access local systems and bookmarks.
但是,当它们作为扩展而本地安装在其chrome系统的浏览器中时,条目将收到访问系统和书签的特殊权限。
应用推荐