This is the interface used for representing one entry in an Access Control List (ACL).
该接口用来表示访问控制列表中(acl)的一个入口。
An access control list is a list of permissions or sets of permissions securing a resource.
访问控制列表是权限列表或保护资源的权限集。
C. Modification road by implement access control list, prohibit be being visited illegally.
修改路由器的存取控制列表,禁止非法访问。
One method to satisfy the access authority on file access is to implement an access control list (ACL).
对文件访问进行访问授权的一种方法是实现访问控制列表 (ACL)。
For more information, see How to: Add or Remove Access Control List Entries and ACL Technology Overview.
有关更多信息,请参见如何:添加或移除访问控制列表项和ACL技术概述。
The kadm5.acl (access control list) file resides on the KDC host and controls access to the Kerberos database.
acl(访问控制列表)文件位于 KDC主机,它控制对Kerberos数据库的访问。
Access control lists (ACLs) are objects with an owner and an indexed list, or hash, as illustrated in Figure 2.
访问控制列表(acl)是具有所有者和索引列表或散列的对象,如图2所示。
The access control list file below allows all principals with admin instance for our realm VMKRB5 all accesses.
下面所示的访问控制列表文件允许具有admin实例的所有主体对领域VMKRB5进行全面访问。
Provides the ability to iterate through the access control entries (ACEs) in an access control list (ACL).
提供遍历访问控制列表 (ACL)中的访问控制项 (ACE)的能力。
For this example, use the access Manager access control list (ACL) to manage the ObjectGrid authorization policies.
对于此示例,请使用AccessManager访问控制列表(Access Control List,ACL)来管理ObjectGrid授权策略。
Access control list can be used to filter away dangerous packets and give some level of protection to the network.
访问控制列表能够过滤掉网络中的有害报文,给网络提供一层相对安全的保护。
Though this file is ACL (Access Control List)-protected by root only access, it may not be enough for highly secure systems.
尽管这个文件由 ACL (Access Control List) 保护,只允许根用户访问,但是这对于安全性要求高的系统可能不够。
An administrator can also assign an access control list to each work node for additional security control at the work node level.
管理员也可以为每个工作节点分配访问控制列表,进一步在工作节点级别上进行安全控制。
A sophisticated ACL (Access Control List) is used to ensure that the appropriate user is mapped to the desired information.
复杂而精密的ACL(访问控制列表)用于确保将适合的用户映射到所需要的信息。
Access Control list (ACL) : An ACL is a data structure that associates to a set of principals a list of permissions for a service.
访问控制列表(acl): ACL是一种数据结构,它将一个服务的权限列表与一组主体相关联。
The server can impersonate the client for access control list (ACL) checking, but it cannot access system objects as the client.
服务器可以模拟客户端以进行访问控制列表(acl)检查,但是无法作为客户端访问系统对象。
Adds the specified access control list (ACL) permission to the current file or directory and removes all matching ACL permissions.
重置对当前文件或目录的指定访问控制列表(acl)权限。
The Portal Administration can also manage the Access Control List (ACL) that determines role andpermission mappings for your portal.
“门户管理”还可以管理访问控制列表 (ACL),以便为门户确定角色和权限映射。
Update the access control list (ACL) of the database DomForInt.nsf to prevent Anonymous access and to grant appropriate roles to the users.
更新数据库domforint . nsf的访问控制列表(acl),以防止匿名访问以及向用户授权相应的角色。
Create some test objects in Access Manager, such as users, groups, and protected resources, and then add an Access Control List policy.
在AccessManager中创建一些测试对象,如用户、组和受保护资源,然后添加访问控制列表策略。
If so, you must protect the directory containing these files, using code access security or an access Control List in the file system, as appropriate.
如果存在,则必须相应地使用文件系统中的代码访问安全机制或访问控制列表,来保护包含这些文件的目录。
If you deselect the All Users option in the Page Access dialog box, it lists everyone who has a role defined in the composite application's Access Control list.
如果在PageAccess对话框中取消选择all User选项,它会列出在复合应用程序的Access Control List中定义过角色的所有用户。
The administrator configures an access control list that is assigned to each process, so that there is a business control to define who can do what in which process.
管理员配置分配给每个过程的访问控制列表,这样就存在定义该过程中谁能够做什么的业务控制。
This paper introduces functions and rules of access control list, gives an instance to study how to use ACL in a real network environment, and ends with some advice on network security.
在对控制访问列表的作用和规则作了概括性介绍后,给出了一个应用的实例,具体分析了访问控制列表的使用方法,并对于它在网络安全中的应用给了一些建议。
Fine-granularity discretionary access control based on Access Control List (ACL) may grant authority to one user or group, but it may grant unapt authority or remove authority not timely.
基于访问控制表(ACL)的细粒度自主访问控制机制可以实现针对单个用户或用户组的访问授权,但是在实际使用中可能造成不适当授权或权限撤销不及时的缺陷。
On the Basics tab of the File Protection document, accept the default options and modify the access control list to make sure that the domino/html/web2.0 directory is specified as the Path.
在FileProtection文档的Basics附签上,接受默认的选项并修改access control列表以确保将domino/html/web2.0目录指定为Path。
In wireless network, intruders can change their MAC addresses to legitimate ones. Thus their wireless facilities can't be found by access control list, and they can steal network information.
在无线网络中,攻击者可以修改自己无线网卡的MAC地址为合法站点的地址,从而可以绕过访问控制列表,窃取网络信息,这给无线网络安全带来很大的危害。
Currently, only few domestic device manufacturers can produce switches for core network, so this method of utilizing access control list in core network switches is a leading technology domestically.
目前在国内的设备生产厂商中,能够生产骨干层网络交换机的厂商为数不多,所以,在骨干层网络交换机上的访问控制列表技术在国内是处于领先地位的。
The places list for the logged-in user's access control is displayed in figure 4.
图4显示了已登录用户具有访问控制权限的位置列表。
The places list for the logged-in user's access control is displayed in figure 4.
图4显示了已登录用户具有访问控制权限的位置列表。
应用推荐