One method to satisfy the access authority on file access is to implement an access control list (ACL).
对文件访问进行访问授权的一种方法是实现访问控制列表 (ACL)。
The system realizes the access control based on ACL, support dynamic configuration and manage about department, user, group and access authority.
系统实现了基于ACL的访问控制,支持部门、用户、群组及用户访问权限的动态配置与管理。
Ownership of files in Linux and access authority are closely related to user ids and groups, so let's review some basic user and group information.
Linux的文件所有权和访问授权是与用户id 和组密切相关的,所以我们要复习一下基本的用户和组信息。
Some scholars argue that the concentration of water within the urban core of these sites provided a centralized source of political authority for Maya elites based largely on controlled water access.
一些学者认为,集中在这些地点的城市核心区的水资源为玛雅精英提供了一个集中的政治权力来源,而这些权力主要是基于对水资源的控制。
The purpose of this People Assignment Criteria is to grant access to users to work on tasks based on the user authority in conjunction with the underlying repository.
人员分配标准的目的是授予用户访问权限来执行基于用户权限的任务,同时处理底层存储库。
The authorization policies defined to the Object Authority Manager (OAM) control access based on user IDs and group membership.
ObjectAuthorityManager (oam)中定义的授权策略可以基于用户ID和组成员身份进行访问控制。
This message indicates that the bus security is enabled and WBEruntimeear is unable to access the SIBus because it does not have authority to access it.
这个消息表明,总线安全性已经启用,但是WBEruntimeear没有访问SIBus的权力,因此无法访问它。
Add the groups (s) that you use to give access to the Cognos Controller application (for example 'everyone' and 'nt AUTHORITY \ system').
选择您用于向CognosController应用程序提供访问权的组(例如“everyone”和“ntAUTHORITY \system”)。
After you submit your e-form, the user who has authority to set access control adds the second user to the Editor role in the e-form's access control.
在您提交电子表单后,具有设置访问控制权限的用户将第二个用户添加到电子表单的访问控制中的Editor角色。
Any operating system user can potentially access DB2; however, unless they have been granted a given DB2 authority or privilege, there is not much they can do.
任何操作系统用户都有可能访问DB2;但是,除非他们被授予给定的DB 2权限或特权,否则他们能做的事情不多。
ControllerUsers nt AUTHORITY \ NETWORK SERVICE (the account running the default application pool in which Controller's virtual directories have write access).
ControllerUsersntAUTHORITY \ NET WORKSERVICE(运行默认应用程序池的帐户,Controller的虚拟目录在该池中拥有写访问权)。
As you might know, all inbound channels run with full authority of the queue manager and thus have access to all queues.
您可能知道,所有入站通道都具有队列管理器的完整权限,因此可以访问所有队列。
As a best practice, change the default value of each instance-level authority parameter to an explicit group name in order prevent unintended super-user access.
作为一项最佳实践,应该将每个实例级权限参数的缺省值改为一个显式的组名,以防止意料之外的超级用户访问。
There are several new administration authority levels, two of which are: DATAACCESS and ACCESSCTRL, that you can use to give users the authority to access data or grant access to data, respectively.
有几个新的管理权限级别,其中两个是 DATAACCESS和ACCESSCTRL,分别用来给予用户访问数据的权限或授权别人访问数据的权限。
These users need to be able to access and view the models in ways that fit with their needs and authority.
这些用户需要以适合自己的需要和权限的方式访问和查看模型。
The queue manager's administrators might not even have the authority to display what profiles are defined, or the access lists for those profiles.
队列管理器的管理员甚至没有权限显示定义了什么概要文件或者这些概要文件的访问列表。
If that user ID is later retired (e.g. the user leaves the company) or if the user no longer needs database access or authority on database objects, a DBA must revoke privileges from the user.
如果那个用户ID后来不用了(例如这位用户离开了公司),或者如果该用户不再需要数据库对象上的数据库访问或权限,那么DBA必须撤销该用户的特权。
You can design access control policies to grant authority to a user based on their role in a particular organization.
您可以设计访问控制策略,以便根据用户在特定组织中的角色对其进行授权。
The DBADM authority allows a user to perform administrative tasks on a specific database in an instance and allows full access to the data and objects in that database.
DBADM权限允许用户在一个实例中的特定数据库上执行管理任务,还允许完全访问这个数据库中的数据和对象。
J2EE 1.2 USES security roles, whereby the application developer specifies which roles have the authority to access specific methods, and the deployer maps these roles to specific users or user groups.
J2EE 1.2使用安全性角色,凭借这个应用程序开发人员就能指定哪些角色有访问特定方法的权限,并且部署人员将这些角色映射到特定的用户或用户组上。
In fact, L.A. 's Metropolitan Transportation Authority is working on providing cellphone access on subway trains, not taking it away.
事实上,洛杉矶运输局正努力允许在地铁上使用手机,而不是剥夺这种机会。
This article assumes that you have the necessary administrative privileges on the system that will house the authority (most likely you will need root access for some of the steps).
本文假定您对容纳中心的系统有必要的管理特权(在某些步骤中很可能需要root访问权)。
Solution: : Grant the user authority to access the JMS (SIBus, in this case) by doing the following.
解决方案:按以下步骤授予用户访问JMS(在这里是SIBus)的权力。
Identity service scopes - The Identity service now allows for creating per-service access control management scopes with delegation of management authority between users.
身份识别服务作用域(IdentityService Scopes)——通过代理各用户间的授权管理,身份识别服务(Identity Service)现在允许为每个服务访问控制创建管理作用域。
Also, you do not need to have root authority to set up public key-based authentication (portions of the host-based authentication setup require root access).
而且,不需要root授权就可以设置基于公钥的认证(部分基于主机的认证需要root访问)。
Grant nt authority \ anonymous LOGON authority to access to the objects for which you want to enable location via anonymous lookups.
授予NTAUTHORITY \ANONYMOUSLOGON权限以便访问要通过匿名查找启用位置的对象。
Restrict remote administrative authority using SYSTEM.ADMIN.SVRCONN channels on production-level (restricted-access) boxes.
在生产级别(受限制的访问)的计算机上使用SYSTEM . ADMIN .SVRCONN通道来限制远程管理权限。
National focal points often have limited authority and very little access to a country's true power base.
国家归口单位的权限往往十分有限,极少可以接近国家的真正权力基础。
National focal points often have limited authority and very little access to a country's true power base.
国家归口单位的权限往往十分有限,极少可以接近国家的真正权力基础。
应用推荐