If there is no group with this name, it is created and given the multipurpose type, meaning it may be used for email or access control.
如果没有这个给定名称的组,就需要创建该组并为它提供通用类型,这意味着它可以用于电子邮件或访问控制。
You might group them for purposes of convenience — for instance, all the threads in a thread pool belong to group X, while those in another pool belong to group Y — or for access control.
您可能是为了方便而将线程组合,例如,一个线程池中的所有线程都属于组x,而另一个池的所有线程则属于组y,或者是为了访问控制而将线程进行组合。
You might group them for purposes of convenience -- for instance, all the threads in a thread pool belong to group X, while those in another pool belong to group Y -- or for access control.
您可能是为了方便而将线程组合,例如,一个线程池中的所有线程都属于组X,而另一个池的所有线程则属于组Y,或者是为了访问控制而将线程进行组合。
You can also start a public group with invitation-only access, allowing you to control membership by having users request to join.
也可以发起一个只有受邀请的用户才能加入的公共组,这样可以通过让用户请求加入来控制成员资格。
These attributes include file owner and group permissions, access-control lists (ACLs), and extended file attributes.
这些属性包括文件所有者及组权限,访问控制列表(acl),以及扩展文件属性。
Using ACL gives more control on who can and cannot access or execute a file or directory; that is determined by the extended permissions that can be given to a file on a user or group basis.
通过使用ACL,可以更好地控制谁可以、谁不可以访问或执行文件或目录;这由按用户或组分配给文件的扩展权限决定。
Since WebSphere Commerce 5.5, the access control infrastructure has been enhanced with the policy group subscription feature.
自websphereCommerce 5.5起,访问控制基础结构得到了增强,提供了策略组订阅功能。
As part of the DB2 9.5 database roles enhancement to Label-based access control (LBAC), you might grant or revoke security labels or exemptions to or from a role or a group.
作为对基于标签的访问控制(LBAC)的DB 2 Viper 2数据库角色增强的一部分,可以对一个角色或组授予或收回安全标签或豁免权。
LBAC can be used to enforce Siebel access control, based on records visibility for a user that is based on organization, position, and a membership to a list or group.
根据列表或组的结构、位置或从属关系,LBAC可用于增强对用户可见记录的Siebel访问控制。
If CONTROL access is granted to a group, such as AP2USRS, it would allow users in that group to set both origin and identity context.
如果CONTROL访问权授予一个组,比如ap2usrs,那么它将允许该组中的用户设置原始和身份上下文。
ACLs use access control entries (ACE) to control user and group access and denial. Though more commonly known as rules, they are.
ACL使用访问控制条目(ace)控制用户和组的访问权。
Once all required database objects and packages are created, use group membership and group privileges to control access to the created database objects and packages.
创建好所有必需的数据库对象和包之后,使用组成员关系和组特权来控制对所创建的数据库对象和包的访问。
Each user or group that is added to the ACL can have a different set of active permissions, enabling very granular control over exactly what type of access is available to any user.
添加到ACL的每个用户或组可以具有不同的活动权限,从而可对任何用户可用的访问权限类型进行适当的细粒度控制。
Parents can make use of programs that control access to the Internet, but adolescents in this age group are quite savvy about technology and the Internet.
父母可以利用程序控制孩子使用电脑,但是这个年龄阶段的青少年对技术和互联网非常精通。
Group access control scaled well but still required manually managing group memberships.
用户组访问控制可伸缩性很好,但还是需要手动地管理组成员。
The authorization policies defined to the Object Authority Manager (OAM) control access based on user IDs and group membership.
ObjectAuthorityManager (oam)中定义的授权策略可以基于用户ID和组成员身份进行访问控制。
Using sugroups enables system administrators to control access to individual user accounts by group membership.
使用sugroup 让系统管理员能够通过组成员关系控制对各个用户账户的访问。
However, the modes of centralized access control and key distribution limit the extension of their group sizes.
然而,由于其集中式访问控制和密钥分配方式,限制了组规模的进一步扩展。
The system realizes the access control based on ACL, support dynamic configuration and manage about department, user, group and access authority.
系统实现了基于ACL的访问控制,支持部门、用户、群组及用户访问权限的动态配置与管理。
Fine-granularity discretionary access control based on Access Control List (ACL) may grant authority to one user or group, but it may grant unapt authority or remove authority not timely.
基于访问控制表(ACL)的细粒度自主访问控制机制可以实现针对单个用户或用户组的访问授权,但是在实际使用中可能造成不适当授权或权限撤销不及时的缺陷。
This paper presents a multi-group access control scheme that achieves multi-privileged access by combining the centralized and distributed key management scheme.
该文提出了一种多重组的访问控制方案,该方案使用集中式与分布协同式相结合的密钥更新算法实现了多权限的控制。
This paper presents a multi-group access control scheme that achieves multi-privileged access by combining the centralized and distributed key management scheme.
该文提出了一种多重组的访问控制方案,该方案使用集中式与分布协同式相结合的密钥更新算法实现了多权限的控制。
应用推荐