As part of the DB2 9.5 database roles enhancement to Label-based access control (LBAC), you might grant or revoke security labels or exemptions to or from a role or a group.
作为对基于标签的访问控制(LBAC)的DB 2 Viper 2数据库角色增强的一部分,可以对一个角色或组授予或收回安全标签或豁免权。
LBAC can be used to enforce Siebel access control, based on records visibility for a user that is based on organization, position, and a membership to a list or group.
根据列表或组的结构、位置或从属关系,LBAC可用于增强对用户可见记录的Siebel访问控制。
The authorization policies defined to the Object Authority Manager (OAM) control access based on user IDs and group membership.
ObjectAuthorityManager (oam)中定义的授权策略可以基于用户ID和组成员身份进行访问控制。
The system realizes the access control based on ACL, support dynamic configuration and manage about department, user, group and access authority.
系统实现了基于ACL的访问控制,支持部门、用户、群组及用户访问权限的动态配置与管理。
Fine-granularity discretionary access control based on Access Control List (ACL) may grant authority to one user or group, but it may grant unapt authority or remove authority not timely.
基于访问控制表(ACL)的细粒度自主访问控制机制可以实现针对单个用户或用户组的访问授权,但是在实际使用中可能造成不适当授权或权限撤销不及时的缺陷。
Fine-granularity discretionary access control based on Access Control List (ACL) may grant authority to one user or group, but it may grant unapt authority or remove authority not timely.
基于访问控制表(ACL)的细粒度自主访问控制机制可以实现针对单个用户或用户组的访问授权,但是在实际使用中可能造成不适当授权或权限撤销不及时的缺陷。
应用推荐