Creating communities with roles and access controls.
创建包含角色和访问控制的社区。
There are also network access controls for sockets, network interfaces, hosts, and ports.
还有用于套接字、网络接口、主机和端口的网络访问控制。
To me, the addition of access controls is the primary reason to consider moving to PHP V5.
对于我来说,增加了访问控制是考虑移至PHP V5的主要原因。
Figure 1: Sample communities, roles, and access controls for a new service creation project.
图1:一个新的服务创建项目的社区、角色和访问控制。
Likewise, changes to access controls require changes to built-in access mechanism in the core layer.
类似地,对访问控制的更改要求更改核心层中的内置访问机制。
You can use fine-grained access controls to define exactly which patterns they have access to deploy.
您可以使用精细的访问控制来明确定义他们所能够部署的模式是哪些。
There will be several different security domains, each of which have different access controls and restrictions.
存在几种不同的安全领域,每个领域都有不同的访问控制和限制。
That means that we prevent such access via access controls on our backend as well as strict policy prohibitions.
这意味着我们通过访问控制在后台阻止这样的访问,以及严格的政策禁令。
The following example demonstrates how you can use TAMOS access controls to protect against fraudulent behavior.
下面的例子演示如何使用TAMOS访问控制来防范欺骗行为?
Part 2 will show you how to create governance policies and translatable messages, and how to configure access controls.
第2部分将向您展示如何创建治理策略和可翻译的消息,以及如何配置访问控件。
Most operating systems use access controls to determine whether an entity (user or program) can access a given resource.
大多数操作系统使用访问控制来判断一个实体(用户或程序)是否能够访问给定资源。
Lumping access controls like this creates a problem because an exploited program inherits the access controls of the user.
很多这样的访问控制都会带来一个问题,因为所利用的程序能够继承用户的访问控制。
Google Storage is worth the trouble, mainly because it supports powerful access controls through access control lists (ACLs).
GoogleStorage是值得花大精力的,这主要是因为它支持通过访问控制列表(acl)实现的强大访问控制。
Access controls must include the positive identification of all employees, visitors, and vendors at all points of entry.
访问控制必须包括所有员工,访港旅客身份,在所有入境点和供应商。
Automate the installation to minimize human error; include database updates, access controls, skins, themes, and page updates.
请自动化安装,以尽可能减少人为错误;请包含数据库更新、访问控制、皮肤、主题和页面更新。
The Solaris 10 operating system provides mandatory access controls through its security-enhanced Trusted Extensions component.
Solaris10操作系统通过其增强了安全性的 TrustedExtensions 组件提供了强制访问控制。
Access controls prevent unauthorized entry to facilities, maintain control of employees and visitors, and protect company assets.
访问控制,防止未经授权进入的设施,保持员工和旅客的控制,保护公司资产。
Therefore, it's wise to avoid using access controls based on the client's hostname and to scope them as described when they're necessary.
因此,避免使用基于客户主机名的访问控制,在必须使用时限定其作用域,这些都是明智的做法。
Often, the target is created when the consolidation pattern is first applied so that no access controls preexist and possibly need to be defined.
通常在首次应用整合模式时创建目标,这样不存在任何访问控制,所以可能需要对其进行定义。
In Part 2 of this article series, you will learn how to create governance policies and translatable messages, and how to configure access controls.
在本系列文章的第2部分,您将了解如何创建治理策略和可翻译的消息,以及如何配置访问控件。
The user must use the host systems file access controls on the directory configured for user Exits Path to ensure that the library is not vulnerable.
用户必须在为用户出口路径配置的目录上使用主机系统文件访问控制,以确保库不容易受到攻击。
Access controls to all your content, determine what's public, what's private, what's viewable by friends, family, co-workers or members of another group.
控制所有内容,可以选择哪些公开,哪些保密,好友、家人和同事分别可以看到哪些内容。
Configure the synchronization process, create the replication store, and define subscriptions and access controls using Mobile Device Administrator Center.
通过使用移动设备管理中心(Mobile Device Administration Center, MDAC)配置同步进程、创建复制存储以及定义订阅和访问控制。
This is compounded by the fact that the certificate may be "in the wild" on somebody's workstation or mobile computer with minimal physical access controls.
而事实上,证书可能会散放在某人的工作站或移动电脑上,并且提供的物理访问控制非常小,这进一步复杂化了该问题。
WebSphere CloudBurst provides both permission and fine-grained access controls that together help to govern which users can take which actions on which resources.
WebSphereCloudBurst提供了权限和精细的访问控制,它们可以一起帮助管理哪些用户能够处理哪些资源。
And in this case, I can only access it programmatically, because the default access controls associated with everything are set to deny any noncredentialed access to it.
(在本例中,我只能通过编程方式访问它,因为与所有内容关联的默认访问控制被设置为拒绝任何未授权访问)。
This allows you to add a layer of organizational governance to your WebSphere CloudBurst pattern deployment process that goes beyond permission and fine-grained access controls.
这允许您给WebSphereCloudBurst模式部署过程在权限和精细访问控制之外再增加一层组织管理。
Recent years, authentication based on the digital certificate and role-based access controls have features of safe and flexibility that enhance system security very prospect.
近几年产生的基于数字证书的认证和基于角色的访问控制具有安全性高、管理灵活的特征,对于加强系统的安全性很有应用前景。
Recent years, authentication based on the digital certificate and role-based access controls have features of safe and flexibility that enhance system security very prospect.
近几年产生的基于数字证书的认证和基于角色的访问控制具有安全性高、管理灵活的特征,对于加强系统的安全性很有应用前景。
应用推荐