• The repositories are called Access Control Lists (ACLs).

    这种资料库称为访问控制链表ACL)。

    youdao

  • Access control lists let you define fine-grained permissions for files.

    访问控制定义细粒度文件许可权

    youdao

  • Authorization is handled in CM V8 with Access Control Lists (ACLs).

    CMV 8中授权通过访问控制列表(Access Control List,ACL)来处理的。

    youdao

  • Provide functional and data entitlement by maintaining access control lists of users.

    通过维护用户访问控制列表来提供功能数据权限

    youdao

  • Some file systems support advanced security features, such as access control lists (ACLs).

    某些文件系统支持高级安全特性比如访问控制列表(acl)。

    youdao

  • Access Control Lists (ACLs) determining who can access each database and to what extent.

    访问控制列表(Access Control List,ACL)确定多大范围内访问每个数据库

    youdao

  • OmniFind can be configured to associate documents with security tokens or access control lists.

    OmniFind可以配置文档安全令牌访问控制列表关联

    youdao

  • This case will illustrate how different access control lists interact with a given set of queues.

    这个用例展示不同访问控制列表特定队列之间交互

    youdao

  • Access Control Lists define the level of access on a particular CM entity for users and user groups.

    访问控制列表用户用户定义特定CM实体访问级别

    youdao

  • Visibility of reports and views can be limited to certain team members based on access control lists.

    可以通过存取控制表来限制报告视图某些团队成员可见性。

    youdao

  • Similarly, the user must have the correct access control lists for creating or writing to settings.

    同样用户必须创建写入设置正确访问控制列表

    youdao

  • Access control lists (ACLs) are objects with an owner and an indexed list, or hash, as illustrated in Figure 2.

    访问控制列表(acl)具有所有者索引列表散列对象如图2所示。

    youdao

  • The earliest forms of access control on the mainframe were based on manually maintained access control lists (ACLs).

    大型机上最早访问控制方式基于手动维护的访问控制列表ACLs)。

    youdao

  • They provide programmatic access to virtually all Domino elements including designs, access control lists, and documents.

    它们提供所有Domino元素编程访问能力,包括设计、访问控制列表文档

    youdao

  • Google Storage is worth the trouble, mainly because it supports powerful access controls through access control lists (ACLs).

    GoogleStorage值得花精力的,这主要是因为支持通过访问控制列表(acl)实现的强大访问控制

    youdao

  • Control over access to topics will normally be managed by the publication engine based on access control lists on a topic hierarchy.

    主题访问控制通常发布引擎基于主题层次结构中的访问控制列表进行管理

    youdao

  • One of these goodies is some special functionality called "access control lists" or ACLs, and is now enabled on XFS filesystems by default.

    其中之一一些名为访问控制ACL特殊功能现在XFS文件系统缺省启用这些功能

    youdao

  • In this step, please load the data from the First step to create the necessary users, groups, and access control lists (for example: ACL's).

    一步中,加载一步中的数据创建必要用户访问控制列表(acl)。

    youdao

  • The Lotus Domino server setup recommends that you configure access control lists of all databases and templates to prohibit anonymous access.

    LotusDomino服务器设置程序建议所有数据库模板访问控制列表配置禁止匿名访问。

    youdao

  • This process configures Tivoli access Manager to update access control lists to allow the service subscriber to invoke the subscribed service.

    流程可配置TivoliAccessManager更新访问控制列表允许服务订阅者调用订阅的服务。

    youdao

  • It is not necessary to define user groups in CM V8, but it simplifies administration, especially when you define Access Control Lists (ACLs).

    CMv8并不要求必须定义用户但是通过定义用户组可以简化管理尤其是定义访问控制列表(Access Control List, ACL)的时候。

    youdao

  • Although this design is simple, it's can be inadequate, leading some UNIX-type systems to extend it through access control lists and other mechanisms.

    尽管设计非常简单,但它可能不够从而导致某些unix系统通过访问控制列表其他机制对其进行扩展

    youdao

  • This article describes the programming model for Human Task Manager staff resolution, which provides access control lists for instance-based authorization.

    本文描述HumanTaskManager人员解析编程模型,前者基于实例授权提供访问控制列表

    youdao

  • The security administrator can dictate the level of security by applying rules known as protected object policies (POP) and access control lists (ACL).

    安全管理员可以通过应用protectedobjectpolicies (POP)access control lists (acl)规则指定安全等级

    youdao

  • File systems on Linux, AIX, Windows, and other operating systems support access Control Lists (ACLs) to limit access to directories that contain repositories.

    Windows文件系统以及其它操作系统的文件系统均支持Access Control Lists (ACLs),限制包含资料库目录访问

    youdao

  • The extracted metadata includes data model objects, such as item types and their attributes, and administration objects, such as user definitions and access control lists.

    提取元数据包括一些数据模型对象例如项目它们的属性还有一些管理对象,例如用户定义访问控制列表

    youdao

  • Routers are playing an important role in the network flow of the computer -network increasingly, where the key technology is the configuration of access control lists.

    路由器计算机网络流量控制方面作用日益显著,其关键技术就是访问控制列表配置

    youdao

  • With the help of examples, this article highlights privilege sets and Access Control Lists (ACLs) to be granted to CM entities like users, usergroups, itemtype, item, workflow, and so on.

    本文借助示例演示权限集合访问控制列表,并授权给 CM实体用户、用户组、项目类型、项目、工作流

    youdao

  • These attributes include file owner and group permissions, access-control lists (ACLs), and extended file attributes.

    这些属性包括文件所有者权限访问控制列表(acl),以及扩展文件属性。

    youdao

  • These attributes include file owner and group permissions, access-control lists (ACLs), and extended file attributes.

    这些属性包括文件所有者权限访问控制列表(acl),以及扩展文件属性。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定