We could potentially use standard J2EE role-based security to manage printer access.
我们可以使用标准的J2EE基于角色的安全性来管理打印机访问。
Role-based security is the most straightforward way to organize commands for security purposes.
基于角色的安全性是组织命令、实现安全性最简单的方法。
Role-based security checks have slightly different semantics than code access security checks.
基于角色的安全检查与代码访问安全检查在语义上稍有不同。
Role-based security can also be used when an application requires multiple approvals to complete an action.
当应用程式需要多重许可来完成动作时,也可以使用以角色为基础的安全性。
Security is another major area of change with the transition from the WebSphere security authorization model to role-based security.
安全性是更改的另一个主要方面,它体现在从WebSphere安全性授权模型到基于角色安全性的转变中。
For a given application domain, the host can change the default role-based security policy and set a default security principal.
对于给定应用程序域,宿主可更改默认的基于角色的安全性策略并设置默认安全主体。
Role-based security is a great way to protect your organization's information assets, and it's probably easier to implement than you think.
基于角色的安全性是保护企业信息资产的一个不错的方法,而且它可能比您想象的更容易实现。
Authorization Support: Handled a variety of ways whether you use Windows authentication, thread principals, ASP.NET role-based security or your own.
授权支持:可以处理各种授权方式,不管你是使用Windows验证、线程安全主体、ASP.NET基于角色的安全模式或者你自己自定义的。
Determining the roles at your site that require access to WebSphere MQ commands, and then implementing role-based security can provide a way to group the commands.
首先确定您的网站上需要访问WebSphereMQ的命令,然后实现基于角色的安全性,从而对命令进行分组。
As you can see, this is clearly a more flexible solution to the problem than is trying to bend a role-based security model to fit a situation that it was not designed to handle.
正如您所看到的,与尝试对基于角色的安全模型进行修改来适应其设计时并未考虑的情况相比,这显然是更为灵活的解决方案。
Role-Based Security Permissions provide a mechanism for discovering whether a user (or the agent acting on the user's behalf) has a particular identity or is a member of a specified role.
以角色为基础的安全性权限提供一种机制来探索,无论使用者 (或主机上代表使用者的代理程式)有特定的识别,或是为成员指定的角色。
This paper provides an overview of security in the. NET Framework and in particular, role-based security, code access security, verification, stack walking, isolated storage and cryptography.
文章提供了。NET框架安全性方面的概述,具体讲述基于角色的安全性、代码访问安全性、验证、堆栈审核、隔离存储、加密等方面的核心安全技术。
This enables the host to control the set of permissions granted to code in a particular domain and to set both the current thread's principal and the default principal for role-based security.
这样,宿主既能够控制向特定域中的代码授予的权限集,也能为基于角色的安全策略设置当前线程的主体和默认的主体。
Role-Based Security Permissions, which provide a mechanism for discovering whether a user (or the agent acting on the user's behalf) has a particular identity or is a member of a specified role.
基于角色的安全性权限,此类权限提供一种判别机制,用以确定用户(或代表用户进行操作的代理)是否具有特定的身份,或是否为指定角色的成员。
It provides user and role based security, which is one of the most important aspects of P2P for an organization.
它能够提供用户和基于角色的安全保证,而这对于企业级应用的P 2 P是最重要的一个方面。
This section briefly lists the basic steps that are necessary for role-based staffing to function properly, using the commonly used LDAP security enablement.
本部分使用最常用的LDAP安全支持简要列出了基于角色的人员分配功能正确发挥作用所必需的基本步骤。
In conjunction with Role based Security, IBM Cognos bi also offers dynamic reporting capability.
结合基于角色的安全性,IBMCognosBI还提供动态报告功能。
To create dynamic reports that implement Role based security we use the following IBM Cognos BI functionality.
要创建实现基于角色的安全性的动态报告,可使用以下IBMCognosBI功能。
Now we will explain the method of how to create dynamic reporting based on Role based security by using one of our sample packages, "Great Outdoors Warehouse". (Figure 2).
下面,我们将使用我们的一个样例包“Great Out doorsWarehouse”展示如何根据基于角色的安全性创建动态报告(见图2)。
Steps to implement Role based security
实现基于角色的安全性的步骤
IBM Cognos BI features for implementing Role based security.
用于实现基于角色的安全性的IBMCognosbi特性。
In AIX 6.1, IBM introduced Role Based Access Control (RBAC), which addresses many of the security and auditing concerns of sudo.
在AIX 6.1中,IBM引入了基于角色的访问控制(RBAC),这解决了sudo的许多安全和审计问题。
WebSphere Portal Server enables quick integration of applications and content in role-based applications with integrated search and security mechanism.
WebSpherePortalServer可以快速地把应用程序和内容集成在基于角色的应用程序中,提供集成的搜索和安全机制。
It's extremely simple to deploy to your Web application using DWR, and DWR's security features can be integrated with a J2EE role-based authentication system.
使用DWR部署到Web应用程序极为简单,而且DWR的安全性特性可以与J2EE基于角色的验证系统集成。
To activate the role-based human task actions, one of the security options (LDAP, Local OS, or Custom) needs to be enabled.
要激活基于角色的人工任务操作,需要启用安全选项(LDAP、LocalOS或Custom)之一。
Reporting Services security uses a familiar role-based model.
ReportingServices安全性使用熟悉的基于角色的模型。
Role based security is described as user-level security which focuses on the logical role of a user rather than the user's individual identity.
基于角色的安全性是一种用户级安全性,主要关注用户的逻辑角色而不是个人身份。
Security infrastructure of WebSphere Application Server, such as role-based access control and encryption.
WebSphereApplicationServer的安全基础结构,比如基于角色的访问控制和加密。
As a sort of security mechanism, Role Based Access Control (RBAC) technique has been one of the hotspots in current research.
基于角色的访问控制(RBAC)作为一种安全机制,是当前研究的热点之一。
As a sort of security mechanism, Role Based Access Control (RBAC) technique has been one of the hotspots in current research.
基于角色的访问控制(RBAC)作为一种安全机制,是当前研究的热点之一。
应用推荐