英語 での To control access の使用例とその 日本語 への翻訳
{-}
- 
                        Colloquial
                    
- 
                        Ecclesiastic
                    
- 
                        Computer
                    
- 
                        Programming
                    
You can use your existing VPC security groups to control access.
We use a session cookie to control access to  our membership areas.
Some Adult sites use an Adult Verification Service to control access.
To control access to  certain protected objects by other requesting objects.
For this reason, it is important to control access to  this account.
Permissions on the internal dbspaces system andtemporary can also be managed to control access.
Customizable content filtering to control access to  Web sites.
The new security measures to control access to  the premises of the mayor include fingerprint biometric identification systems.
Some Adult sites use an Adult Verification Service to control access.
SJSDZG-2 provides a basic tripod to control access smoothly and effectively by basic operation.
Plaintiffs have demonstrated that Napster retains the right to control access to  its system.
Enable your organization to control access inside the network to  secure assets with full-state inspection.
For more information, see Using the whitelist and blacklist to control access to  Zendesk Support.
To control access to  portfolios and products, you assign IAM users, groups, or roles on the Portfolio details page.
Now, we are ready to  configure LPD to control access to  your printer.
By using Apigee Edge Developer Services, you can automate the registration process;or you can use a manual process to control access.
See Using the whitelist and blacklist to control access to  Zendesk Support.
IAM policies can be used to control access to  the Amazon Rekognition API as well as manage resource-level permissions for your account.
Define permissions for Users and Groups to control access to  your application….
A key priority of network security is to control access and prevent these threats from entering and propagating throughout a network.
Plaintiffs have demonstrated that Napster retains the right to control access to  its system.
If you are using Access Control  Lists to control access to  your objects, the user should have Reader access.
Most importantly,<Location> directives should not be used to control access to  filesystem locations.
Each rule uses the following basic format to control access to  network services:.
Evidian developed an XACML authorisation server to control access to  SODA service-oriented infrastructure and a global monitoring application.
Timers(displayed on each interface depending on settings)can be used to control access, integrate in pay per view systems.
Usher is a single application that can be deployed to control access to  facilities, hardware, and applications.
Create a custom TAI that implements your security mechanism to control access to  the MobileFirst Operations Console.
Create a custom TAI that implements your security mechanism to control access to  the MobileFirst Operations Console.