control policy
[自] 控制策略
2026-01-09 19:48 浏览次数 12
[自] 控制策略
control of policy implementation政策执行控制
The Rent Control Policy租金管制
exchange control policy外汇管制政策
control strategy[自] 控制策略
Macro Control Policy宏观调控政策
Control Plane Policy保护技术
optimal control policy最佳控制方式
birth control policy控制生育的政策
Inventory control center policy库存控制中心化策略
project access control policy项目管理控制策略
for example, there is an access control policy that allows all users that fulfill the customer service representative role to perform customer management operations.
例如,存在这样一个访问控制策略,其允许担当客户服务代表角色的所有用户执行客户管理操作。
in this second article, i begin to discuss the more advanced uses of acegi, starting with writing an access control policy and storing it in apacheds, an open source ldap directory server.
在第二篇文章中,我将讨论acegi的更加高级的应用,首先我将编写一个访问控制策略并将其存储在apacheds 中,apacheds是一个开源的ldap目录服务器。
these actions can be security configuration changes, key and certificate management, access control policy changes, bus and other system resources management, and so on.
这些操作可以是安全配置更改、密钥和证书管理、访问控制策略更改、总线和其他系统资源管理等等。
should the access control policy for the wiki need to be changed, you only need to change a rule.
如果需要更改wiki的访问控制策略,您只需更改某个规则。
level 1 is a coarse-grained access control policy that governs users’ access to an application or resource.
第一个层次是粗粒度的访问控制策略,监管用户对应用或资源的访问。
acegi relieves you from writing code, so in this article, i show you how to first store user and role information in apacheds and then implement an access control policy for that information.
acegi 将减轻代码编写的工作,因此在这篇文章中,我将展示如何将用户和用户角色信息存储到apacheds 中,然后实现这些信息的访问控制策略。
step 3: the datapower appliance checks if the user is allowed to call the requested service by evaluating the access control policy written in xacml.
步骤3:datapower设备通过计算用xacml编写的访问控制策略,检查是否允许用户调用所请求的服务。
for the moment, however, i「ll stick to showing you how to configure a simple access control policy using acegi.
但是,目前我将继续向您展示如何使用acegi配置一个简单的访问控制策略。
later in the article, you」ll see the simple access control policy used in building a sample application.
在本文后面的部分,您将看到使用简单的访问控制策略构建一个样例应用程序。
interceptors use your application「s access control policy to make authorization decisions.
拦截器使用应用程序的访问控制策略来做出授权决定。
a firewall is a system or group of systems that enforces an access control policy between two networks.
防火墻是一个系统或一组系统,它在两个网络之间强制执行访问控制策略。
this report is the third in a series of who reports on the status of global tobacco control policy implementation.
本报告是世卫组织在全球烟草控制政策的成就方面系列报告中的第三份。
implementing an access control policy usually consists of two steps
实现访问控制策略通常包含两个步骤
you can divide configuring a simple access control policy into two steps
配置简单的访问控制策略可分为两个步骤
for the moment, just note that an interceptor can intercept a user」s request and implement an access control policy before allowing the user to access the bean.
现在,只需了解拦截器可以拦截用户并在用户访问bean之前实现访问控制策略。
the next article in this series will get you started with some more advanced uses of acegi, beginning with writing an access control policy and storing it in a directory service.
本系列的下一文章将开始介绍 acegi的一些较为高级的应用,首先是编写访问控制协议并将其存储到目录服务中。
xacml builds on saml by providing the actual semantics used to define access control policy and authorization request and response messages.
xacml构建于saml 之上,提供了用于定义访问控制和授权请求及响应消息的实际语义。
most of the site was already embanked with concrete as the result of the local ?ood control policy and before a landscape architect was asked to 「beautify」 it.
由于过去治洪的政策,以及景观设计师受命所做的「美化」,园址大部分区域砌上了混凝土。