Access control list processing.
访问控制列表处理。
Acl: An access control list specification.
acl:一个访问控制列表规范。
The method might be an access control list for example.
这个方法可能是例子的访问控制清单。
See access control list for additional information.
查看access control list以了解更多信息。
How to: Add or Remove Access Control List Entries.
如何:添加或移除访问控制列表项。
The access control list (ACL) structure is invalid.
访问控制列表(acl)结构无效。
View the access control list (ACL) for a key container.
查看密钥容器的访问控制列表(acl)。
Change the access control list (ACL) for a key container.
更改密钥容器的访问控制列表(acl)。
Notesaclentry represents a single entry in an access control list.
描述了一个访问控制列表中的一个条目。
This is the interface used for representing one entry in an Access Control List (ACL).
该接口用来表示访问控制列表中(acl)的一个入口。
An access control list is a list of permissions or sets of permissions securing a resource.
访问控制列表是权限列表或保护资源的权限集。
C. Modification road by implement access control list, prohibit be being visited illegally.
修改路由器的存取控制列表,禁止非法访问。
One method to satisfy the access authority on file access is to implement an access control list (ACL).
对文件访问进行访问授权的一种方法是实现访问控制列表 (ACL)。
Name it PayClaimSubProcess, with description Pay claim process, and access control list XYZClaimFolderACL.
对于名称,输入PayClaimSubProcess;对于描述,输入Payclaimprocess;对于访问控制列表,输入XYZClaimFolderACL。
For more information, see How to: Add or Remove Access Control List Entries and ACL Technology Overview.
有关更多信息,请参见如何:添加或移除访问控制列表项和ACL技术概述。
The kadm5.acl (access control list) file resides on the KDC host and controls access to the Kerberos database.
acl(访问控制列表)文件位于 KDC主机,它控制对Kerberos数据库的访问。
Access control lists (ACLs) are objects with an owner and an indexed list, or hash, as illustrated in Figure 2.
访问控制列表(acl)是具有所有者和索引列表或散列的对象,如图2所示。
The access control list file below allows all principals with admin instance for our realm VMKRB5 all accesses.
下面所示的访问控制列表文件允许具有admin实例的所有主体对领域VMKRB5进行全面访问。
Provides the ability to iterate through the access control entries (ACEs) in an access control list (ACL).
提供遍历访问控制列表 (ACL)中的访问控制项 (ACE)的能力。
For this example, use the access Manager access control list (ACL) to manage the ObjectGrid authorization policies.
对于此示例,请使用AccessManager访问控制列表(Access Control List,ACL)来管理ObjectGrid授权策略。
Access control list can be used to filter away dangerous packets and give some level of protection to the network.
访问控制列表能够过滤掉网络中的有害报文,给网络提供一层相对安全的保护。
Though this file is ACL (Access Control List)-protected by root only access, it may not be enough for highly secure systems.
尽管这个文件由 ACL (Access Control List) 保护,只允许根用户访问,但是这对于安全性要求高的系统可能不够。
An administrator can also assign an access control list to each work node for additional security control at the work node level.
管理员也可以为每个工作节点分配访问控制列表,进一步在工作节点级别上进行安全控制。
A sophisticated ACL (Access Control List) is used to ensure that the appropriate user is mapped to the desired information.
复杂而精密的ACL(访问控制列表)用于确保将适合的用户映射到所需要的信息。
Access Control list (ACL) : An ACL is a data structure that associates to a set of principals a list of permissions for a service.
访问控制列表(acl): ACL是一种数据结构,它将一个服务的权限列表与一组主体相关联。
The server can impersonate the client for access control list (ACL) checking, but it cannot access system objects as the client.
服务器可以模拟客户端以进行访问控制列表(acl)检查,但是无法作为客户端访问系统对象。
Adds the specified access control list (ACL) permission to the current file or directory and removes all matching ACL permissions.
重置对当前文件或目录的指定访问控制列表(acl)权限。
The Portal Administration can also manage the Access Control List (ACL) that determines role andpermission mappings for your portal.
“门户管理”还可以管理访问控制列表 (ACL),以便为门户确定角色和权限映射。
Update the access control list (ACL) of the database DomForInt.nsf to prevent Anonymous access and to grant appropriate roles to the users.
更新数据库domforint . nsf的访问控制列表(acl),以防止匿名访问以及向用户授权相应的角色。
Create some test objects in Access Manager, such as users, groups, and protected resources, and then add an Access Control List policy.
在AccessManager中创建一些测试对象,如用户、组和受保护资源,然后添加访问控制列表策略。
应用推荐