• One method to satisfy the access authority on file access is to implement an access control list (ACL).

    文件访问进行访问授权方法实现访问控制列表 (ACL)。

    youdao

  • The authorization policies defined to the Object Authority Manager (OAM) control access based on user IDs and group membership.

    ObjectAuthorityManager (oam)中定义授权策略可以基于用户ID组成员身份进行访问控制

    youdao

  • After you submit your e-form, the user who has authority to set access control adds the second user to the Editor role in the e-form's access control.

    提交电子表单后,具有设置访问控制权限用户第二个用户添加电子表单访问控制中的Editor角色

    youdao

  • Identity service scopes - The Identity service now allows for creating per-service access control management scopes with delegation of management authority between users.

    身份识别服务作用(IdentityService Scopes)——通过代理用户授权管理,身份识别服务(Identity Service)现在允许每个服务访问控制创建管理作用域。

    youdao

  • You can design access control policies to grant authority to a user based on their role in a particular organization.

    可以设计访问控制策略以便根据用户特定组织中的角色进行授权。

    youdao

  • The system realizes the access control based on ACL, support dynamic configuration and manage about department, user, group and access authority.

    系统实现基于ACL访问控制支持部门用户群组用户访问权限的动态配置管理

    youdao

  • The facets of customer verification, access control, authority management, log audit, data encryption, digital signature are researched and implemented to some extent.

    具体身份认证访问控制权限管理日志审计数据加密数字签名等方面进行了研究一定程度的实现

    youdao

  • So that the owner of the resources could implement access control, authority management, trust management using his security policies under the support of PKI.

    使依托于PKI系统资源管理者可以根据自身的安全策略实现对资源的访问控制权限管理信任管理等。

    youdao

  • The basic authority and the HTTP authority provide access control strategy of the protected resources. The SSL provides mechanism for transmitting sensitive encrypted data.

    基本认证HTTP认证提供受保护资源访问控制策略SSL则提供敏感数据加密传输机制

    youdao

  • Services such as identification and authentication, authority and access control, non-deniability, confidentiality and integrity are the key elements for the security of the information system.

    实现信息系统安全目标,需要系统能够提供相关安全服务身份标识认证服务、授权访问控制服务、非否认服务、机密性服务、完整性服务。

    youdao

  • Fine-granularity discretionary access control based on Access Control List (ACL) may grant authority to one user or group, but it may grant unapt authority or remove authority not timely.

    基于访问控制ACL)的细粒度自主访问控制机制可以实现针对单个用户用户的访问授权但是在实际使用中可能造成适当授权或权限撤销不及时的缺陷。

    youdao

  • Fine-granularity discretionary access control based on Access Control List (ACL) may grant authority to one user or group, but it may grant unapt authority or remove authority not timely.

    基于访问控制ACL)的细粒度自主访问控制机制可以实现针对单个用户用户的访问授权但是在实际使用中可能造成适当授权或权限撤销不及时的缺陷。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定