Примеры использования Access control lists на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
Access Control Lists.
The site provides a patch for extended attributes and access control lists for Linux kernel.
And Access Control Lists will help to us.
The site provides a patch for extended attributes and access control lists for Linux kernel.
Internal Access Control Lists(ACLs) ensure fine-grained access to every system resource or resource group.
Depending on your environment,you can edit the access control lists(ACLs) or permissions on a distribution share.
The authentication system was based on Kerberos, andthe authorization system based on Access Control Lists ACLs.
Access Control Lists(ACL) allow an application to control access to its areas and the underlying objects from requests.
AFS uses Kerberos for authentication,and implements access control lists on directories for users and groups.
Active Directory access control lists(ACLs) are supported for the DNS Server service only when it is running on a domain controller.
If you installed a new Configuration Manager 2007 site server, a site reset sets the access control lists back to the original settings.
Inf defines the system access control lists(SACLs) that help detect the tampering or attempted tampering of the operating system.
In addition, you can secure data through encryption and secure network communication via firewall enforcement(ports,protocols, and access control lists).
To facilitate adding security groups and setting access control lists(ACLs), DHCP uses an application programming interface(API) called DhcpAddSecurityGroups.
For a sample of onsite personnel withphysical access to sensitive areas, interview responsible personnel and observe access control lists to verify that.
They can scale from 2 to 120 ports,include firewalls and access control lists and are easy to manage using a unique HTML/CLI/SNMP management system.
In Windows, Access Control Lists(ACLs) are used to grant access rights(read, write, and execute permissions) and privileges to users or groups.
The Web resource on the resource side is protected with access control lists(ACLs) of user accounts or groups on the resource partner forest.
NTFS access control lists can express any access policy possible using simple POSIX file permissions(and far more), but use of a POSIX-like interface is not supported without an add-on such as Services for UNIX or Cygwin.
Select a sample of recently terminated employees and review access control lists to verify the personnel do not have physical access to sensitive areas.
Some Installable File System drivers andoperating systems may not support extended attributes, access control lists or security labels on these filesystems.
HP-UX was the first Unix to offer access control lists for file access permissions as an alternative to the standard Unix permissions system.
And fair enough, personal accounts inherit permissions from role-based accounts,allowing to setup complicated access control lists and apply them to a group of system operators.
In addition, the functional ACL( access control lists) enhances network security and helps to protect your network by blocking traffic from unauthorized MAC- address or IP- addresses.
Switch DES-3810 series supports advanced security features such as Multi-level access control lists(ACL), Storm Control and IP-MAC-Port Binding to the DHCP Snooping.
Safety, performance and availability Switches DGS-3620 series provides a complete set of security features,including multi-level L2/ L3/ L4 Access Control Lists and 802.1x user authentication via TACACS+ and RADIUS.
Security features such as Multi-layer andPacket Content Access Control Lists(ACL), Storm Control, and IP-MAC-Port Binding with DHCP Snooping.
The DGS-3630 Series provides a complete set of security features including multi-layer Access Control Lists(ACLs) and 802.1X user authentication via TACACS+ and RADIUS.
ReFS supports many existing Windows and NTFS features such as BitLocker encryption, Access Control Lists, USN Journal, change notifications, symbolic links, junction points, mount points, reparse points, volume snapshots, file IDs, and oplock.
Unneeded schema classes and attributes can be deactivated.As with all objects in the directory, access control lists(ACLs) protect schema objects, so that only authorized users can alter the schema.