The method might be an access control list for example.
这个方法可能是例子的访问控制清单。
An administrator can also assign an access control list to each work node for additional security control at the work node level.
管理员也可以为每个工作节点分配访问控制列表,进一步在工作节点级别上进行安全控制。
Access control lists (ACLs) are objects with an owner and an indexed list, or hash, as illustrated in Figure 2.
访问控制列表(acl)是具有所有者和索引列表或散列的对象,如图2所示。
Access control list processing.
访问控制列表处理。
One method to satisfy the access authority on file access is to implement an access control list (ACL).
对文件访问进行访问授权的一种方法是实现访问控制列表 (ACL)。
Access Control list (ACL) : An ACL is a data structure that associates to a set of principals a list of permissions for a service.
访问控制列表(acl): ACL是一种数据结构,它将一个服务的权限列表与一组主体相关联。
The places list for the logged-in user's access control is displayed in figure 4.
图4显示了已登录用户具有访问控制权限的位置列表。
Though this file is ACL (Access Control List)-protected by root only access, it may not be enough for highly secure systems.
尽管这个文件由 ACL (Access Control List) 保护,只允许根用户访问,但是这对于安全性要求高的系统可能不够。
Acl: An access control list specification.
acl:一个访问控制列表规范。
Includes a rich set of functions to test access control requirements, such as the user's IP address, time and date, or whether the user's name appears in a given list.
包括用于测试访问控制要求的丰富功能集,例如用户的IP地址、时间和日期,或用户的名称是否出现在给定的列表中。
The access control list file below allows all principals with admin instance for our realm VMKRB5 all accesses.
下面所示的访问控制列表文件允许具有admin实例的所有主体对领域VMKRB5进行全面访问。
The kadm5.acl (access control list) file resides on the KDC host and controls access to the Kerberos database.
acl(访问控制列表)文件位于 KDC主机,它控制对Kerberos数据库的访问。
Update the access control list (ACL) of the database DomForInt.nsf to prevent Anonymous access and to grant appropriate roles to the users.
更新数据库domforint . nsf的访问控制列表(acl),以防止匿名访问以及向用户授权相应的角色。
LBAC can be used to enforce Siebel access control, based on records visibility for a user that is based on organization, position, and a membership to a list or group.
根据列表或组的结构、位置或从属关系,LBAC可用于增强对用户可见记录的Siebel访问控制。
Name it PayClaimSubProcess, with description Pay claim process, and access control list XYZClaimFolderACL.
对于名称,输入PayClaimSubProcess;对于描述,输入Payclaimprocess;对于访问控制列表,输入XYZClaimFolderACL。
For this example, use the access Manager access control list (ACL) to manage the ObjectGrid authorization policies.
对于此示例,请使用AccessManager访问控制列表(Access Control List,ACL)来管理ObjectGrid授权策略。
The administrator configures an access control list that is assigned to each process, so that there is a business control to define who can do what in which process.
管理员配置分配给每个过程的访问控制列表,这样就存在定义该过程中谁能够做什么的业务控制。
The Portal Administration can also manage the Access Control List (ACL) that determines role andpermission mappings for your portal.
“门户管理”还可以管理访问控制列表 (ACL),以便为门户确定角色和权限映射。
An access control list is a list of permissions or sets of permissions securing a resource.
访问控制列表是权限列表或保护资源的权限集。
Notesaclentry represents a single entry in an access control list.
描述了一个访问控制列表中的一个条目。
A semi-colon separated list of registry key paths for change access control .
可以更改访问控制的、带有路径的键和值的列表。
If you deselect the All Users option in the Page Access dialog box, it lists everyone who has a role defined in the composite application's Access Control list.
如果在PageAccess对话框中取消选择all User选项,它会列出在复合应用程序的Access Control List中定义过角色的所有用户。
Create some test objects in Access Manager, such as users, groups, and protected resources, and then add an Access Control List policy.
在AccessManager中创建一些测试对象,如用户、组和受保护资源,然后添加访问控制列表策略。
This paper introduces functions and rules of access control list, gives an instance to study how to use ACL in a real network environment, and ends with some advice on network security.
在对控制访问列表的作用和规则作了概括性介绍后,给出了一个应用的实例,具体分析了访问控制列表的使用方法,并对于它在网络安全中的应用给了一些建议。
See access control list for additional information.
查看access control list以了解更多信息。
On the Basics tab of the File Protection document, accept the default options and modify the access control list to make sure that the domino/html/web2.0 directory is specified as the Path.
在FileProtection文档的Basics附签上,接受默认的选项并修改access control列表以确保将domino/html/web2.0目录指定为Path。
For more information, see How to: Add or Remove Access Control List Entries and ACL Technology Overview.
有关更多信息,请参见如何:添加或移除访问控制列表项和ACL技术概述。
Access control list can be used to filter away dangerous packets and give some level of protection to the network.
访问控制列表能够过滤掉网络中的有害报文,给网络提供一层相对安全的保护。
Currently, only few domestic device manufacturers can produce switches for core network, so this method of utilizing access control list in core network switches is a leading technology domestically.
目前在国内的设备生产厂商中,能够生产骨干层网络交换机的厂商为数不多,所以,在骨干层网络交换机上的访问控制列表技术在国内是处于领先地位的。
The server can impersonate the client for access control list (ACL) checking, but it cannot access system objects as the client.
服务器可以模拟客户端以进行访问控制列表(acl)检查,但是无法作为客户端访问系统对象。
应用推荐