• The method might be an access control list for example.

    这个方法可能例子访问控制清单

    youdao

  • An administrator can also assign an access control list to each work node for additional security control at the work node level.

    管理员可以每个工作节点分配访问控制列表进一步工作节点级别上进行安全控制。

    youdao

  • Access control lists (ACLs) are objects with an owner and an indexed list, or hash, as illustrated in Figure 2.

    访问控制列表(acl)具有所有者索引列表散列对象如图2所示。

    youdao

  • Access control list processing.

    访问控制列表处理

    youdao

  • One method to satisfy the access authority on file access is to implement an access control list (ACL).

    文件访问进行访问授权方法实现访问控制列表 (ACL)。

    youdao

  • Access Control list (ACL) : An ACL is a data structure that associates to a set of principals a list of permissions for a service.

    访问控制列表(acl): ACL数据结构将一个服务权限列表与一主体相关联。

    youdao

  • The places list for the logged-in user's access control is displayed in figure 4.

    4显示了已登录用户具有访问控制权限位置列表

    youdao

  • Though this file is ACL (Access Control List)-protected by root only access, it may not be enough for highly secure systems.

    尽管这个文件 ACL (Access Control List) 保护,允许根用户访问但是这对于安全性要求的系统可能不够

    youdao

  • Acl: An access control list specification.

    acl一个访问控制列表规范

    youdao

  • Includes a rich set of functions to test access control requirements, such as the user's IP address, time and date, or whether the user's name appears in a given list.

    包括用于测试访问控制要求丰富功能例如用户IP地址时间日期用户的名称是否出现给定列表中

    youdao

  • The access control list file below allows all principals with admin instance for our realm VMKRB5 all accesses.

    下面所示的访问控制列表文件允许具有admin实例所有主体领域VMKRB5进行全面访问。

    youdao

  • The kadm5.acl (access control list) file resides on the KDC host and controls access to the Kerberos database.

    acl访问控制列表文件位于 KDC主机,它控制Kerberos数据库的访问。

    youdao

  • Update the access control list (ACL) of the database DomForInt.nsf to prevent Anonymous access and to grant appropriate roles to the users.

    更新数据库domforint . nsf访问控制列表(acl),防止匿名访问以及用户授权相应角色

    youdao

  • LBAC can be used to enforce Siebel access control, based on records visibility for a user that is based on organization, position, and a membership to a list or group.

    根据列表结构位置从属关系,LBAC用于增强用户可见记录的Siebel访问控制

    youdao

  • Name it PayClaimSubProcess, with description Pay claim process, and access control list XYZClaimFolderACL.

    对于名称,输入PayClaimSubProcess;对于描述,输入Payclaimprocess;对于访问控制列表,输入XYZClaimFolderACL

    youdao

  • For this example, use the access Manager access control list (ACL) to manage the ObjectGrid authorization policies.

    对于示例,请使用AccessManager访问控制列表(Access Control List,ACL)管理ObjectGrid授权策略

    youdao

  • The administrator configures an access control list that is assigned to each process, so that there is a business control to define who can do what in which process.

    管理员配置分配每个过程访问控制列表这样存在定义过程能够什么的业务控制。

    youdao

  • The Portal Administration can also manage the Access Control List (ACL) that determines role andpermission mappings for your portal.

    门户管理可以管理访问控制列表 (ACL),以便门户确定角色权限映射

    youdao

  • An access control list is a list of permissions or sets of permissions securing a resource.

    访问控制列表权限列表保护资源权限

    youdao

  • Notesaclentry represents a single entry in an access control list.

    描述访问控制列表中的条目

    youdao

  • A semi-colon separated list of registry key paths for change access control .

    可以更改访问控制带有路径和值的列表

    youdao

  • If you deselect the All Users option in the Page Access dialog box, it lists everyone who has a role defined in the composite application's Access Control list.

    如果PageAccess对话框中取消选择all User选项会列出复合应用程序Access Control List定义过角色的所有用户

    youdao

  • Create some test objects in Access Manager, such as users, groups, and protected resources, and then add an Access Control List policy.

    AccessManager创建一些测试对象用户受保护资源然后添加访问控制列表策略

    youdao

  • This paper introduces functions and rules of access control list, gives an instance to study how to use ACL in a real network environment, and ends with some advice on network security.

    在对控制访问列表作用规则作了概括性介绍后,给出应用实例,具体分析了访问控制列表的使用方法,对于网络安全中的应用给了一些建议

    youdao

  • See access control list for additional information.

    查看access control list了解更多信息

    youdao

  • On the Basics tab of the File Protection document, accept the default options and modify the access control list to make sure that the domino/html/web2.0 directory is specified as the Path.

    FileProtection文档Basics附签上,接受默认选项修改access control列表确保domino/html/web2.0目录指定Path

    youdao

  • For more information, see How to: Add or Remove Access Control List Entries and ACL Technology Overview.

    有关更多信息请参见如何添加移除访问控制列表ACL技术概述

    youdao

  • Access control list can be used to filter away dangerous packets and give some level of protection to the network.

    访问控制列表能够过滤网络中的有害报文网络提供相对安全保护

    youdao

  • Currently, only few domestic device manufacturers can produce switches for core network, so this method of utilizing access control list in core network switches is a leading technology domestically.

    目前国内设备生产厂商中,能够生产骨干网络交换机的厂商为数不多,所以,在骨干层网络交换机上的访问控制列表技术在国内处于领先地位的。

    youdao

  • The server can impersonate the client for access control list (ACL) checking, but it cannot access system objects as the client.

    服务器可以模拟客户以进行访问控制列表(acl)检查但是无法作为客户端访问系统对象

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定