Примеры использования Role-based на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
Implement role-based administration.
For more information about administering a PKI, see Implement Role-Based Administration.
Granular permissions and role-based access control are inseparably woven into all aspects of the system.
Secure your labeling process with role-based access control.
Secure data handling, role-based access controls, auditability and data integrity.
For more information, see Implement Role-Based Administration.
Granular permissions and role-based access control are inseparably woven into all aspects of the system.
For more information, see Implement Role-Based Administration.
Our Role-based access system ensures that only authorized employees can change or edit tags.
Under Installation Type,select Role-based or feature-based installation and click Next.
Regulate access to disaster recovery resources with delegated, role-based access control.
AggreGate core inherits role-based access control model enabling multi-user and multi-tenant installations.
Use of smart cards,biometric identification, electronic signatures, role-based technologies, etc.
SOAP Security indicates whether COM+ role-based security is implemented for activations through Simple Object Access Protocol(SOAP).
To understand the roles andactivities associated with managing AD CS, see Implement Role-Based Administration.
New Web-based portals provide role-based and secure single-point interfaces for many Fund-wide Web applications.
Physical person accounts can either have own permission tables orinherit permissions from role-based accounts.
Automation gives workers instant, up-to-date, role-based access to vital network resources.
Role-based access control(RBAC) regulates access to documents and resources based on the roles of individual users.
For more information about administering a public key infrastructure(PKI),see Implement Role-Based Administration.
It also provides role-based tools that allow you to create, manage and deploy your emulated environments for development and test activities.
(COM+ applications, on the other hand,can be designed to take advantage of role-based security.).
New web-based portals were added to provide role-based and secure single-point interfaces for many Fund-wide web applications.
No Crowdin employees ever access private projects unless required to for support purposes according to system role-based model.
Security is role-based and can be assigned on an individual item, such as a report or data source, a folder of items, or site wide.
The revealed social psychological conditions were implemented through role-based forms of group activities, methods and means of self-regulation development.
The ability to create instances of the new group types, called application basic groups andLightweight Directory Access Protocol(LDAP) query groups, to support role-based authorization.
The Role-ID project built an organization-oriented identity extension of role-based access control, delivering a role-centered vision.
And with role-based permissions and a strong documentation system, your organization will meet all applicable privacy and data protection laws- so patient care can remain the number goal.
The CA administrator for a CA assigns users to the separate roles of role-based administration by applying the security settings required by a role to the user's account.