This issue was addressed through improved access control list checks.
We do not use any access control list(ACL) internally.
Policy and ACL(access control list).
Create and apply an Access Control List(ACL).
Flexibility in choice of inheritance of access control lists.Combinations with other parts of speech
目前不支持基于ActiveDirectory的身份验证和访问控制列表(ACL),但将来的某个时候会提供此方面的支持。
At this time, Active Directory-based authentication and access control lists(ACLs) are not supported, but they will be at some time in the future.MySQL根据访问控制列表(ACL)为所有连接,查询和用户可能尝试执行的其他操作实现安全性。
MySQL uses security based on Access Control Lists(ACLs) for all connections, queries, and other operations that users can attempt to perform.Firewall6-运行大量访问控制列表(ACL),尝试绕过防火墙的检查和限制。
Firewall6- Runs a lot of access control list(ACL) bypass attempts to check different implementations of firewalling& restrictions.排除的策略类型包括基于资源的策略、访问控制列表、AWSOrganizationsSCP、IAM权限边界以及会话策略。
The excluded policy types include resource-based policies, access control lists, AWS Organizations policies, IAM permissions boundaries, and session policies.访问控制列表它可以对IP数据包进行控制,比如限制它的流量、出入以及提供QoS等等;.
Access control list it can control IP packets, such as limiting its traffic, access and provide QoS, and so on.POSIX已经发布了一个工作草案,增加了事件审计,访问控制列表,精细特权控制,信息标签和强制访问控制。
POSIX® has released aworking draft that adds event auditing, access control lists, fine grained privileges, information labeling, and mandatory access control..服务器可以模拟客户端以进行访问控制列表(ACL)检查,但它不能作为客户端访问系统对象。
The server applicationcan impersonate the client to do discretionary access control list(DACL) checks, but cannot access system objects as the client.访问控制列表(ACL)-用于进一步过滤访问和流量转发。
Access control lists(ACL)- These are used to further filter access and traffic forwarding.AmazonS3支持存储桶策略和访问控制列表(ACL)选项,供您用于授予和管理存储桶级权限。
Amazon S3 supports both bucket policy and access control list(ACL) options for you to grant and manage bucket-level permissions.Windows全权访问控制列表(DACL)以及系统访问控制列表(SACL)就是….
The Microsoft Windows discretionary access control list(DACL) and system access control list(SACL) are examples of access control lists..访问控制列表(ACL)-进一步过滤访问和流量转发.
Access control lists(ACL)- to further filter access and traffic forwarding.MySQL根据访问控制列表(ACL)为所有连接,查询和用户可能尝试执行的其他操作实现安全性。
Security MySQL implements security based on Access Control Lists(ACLs) for all connections, queries, and other operations that a user may attempt to perform.例如,我们的文件Api包括支持为Windows访问控制列表(ACL),不能在所有环境中支持。
For example, our file APIs include support for Windows Access Control Lists(ACL) which can't be supported in all environments.通过RBAC,您不需要修改和管理访问控制列表(ACL),而在ExchangeServer2007中则需要执行这些操作。
With RBAC, you don't need to modify and manage access control lists(ACLs), which was done in Exchange Server 2007.排除的策略类型包括基于资源的策略、访问控制列表、AWSOrganizationsSCP、IAM权限边界以及会话策略。
These other policy types include resource-based policies, access control lists, AWS Organizations policies, IAM permissions boundaries, and AWS STS assume role policies.
For example, access control lists(ACLs) are a superset of firewall rules.其中包含基于资源的策略、访问控制列表、AWSOrganizations策略、IAM权限边界或会话策略。
These include resource-based policies, access control lists, AWS Organizations policies, IAM permissions boundaries, or session policies.NetworkConfigurationManager将帮助你更新和审核其访问控制列表,并为你提供父/子关系的虚拟防御上下文支持。
The Network Configuration Manager will help you update andaudit its access control lists and give you virtual defense context support for parent/child relationships.例如,访问控制列表(ACL)就是防火墙规则的一个超集。
For example, access control lists(ACLs) are a superset of firewall rules.与本地和远程服务器COM对象交互的权限由访问控制列表(ACL)在注册表中决定。
Permissions to interact with local andremote server COM objects are specified by access control lists(ACL) in the Registry.Windows全权访问控制列表(DACL)以及系统访问控制列表(SACL)就是访问控制列表的示例。
The Microsoft Windows discretionary access control list(DACL) and system access control list(SACL) are examples of access control lists.对于MySQL数据库用户,远程访问由MySQL的本地安全机制来控制-访问控制列表(ACL)。
For MySQL database users, the remote access iscontrolled by MySQL native security mechanism- access control lists(ACL).这会让您能够更轻松地维护访问控制列表,而无须修改您服务器上的文件或设置。
This makes it easier for you to maintain the access control list without having to modify files or settings on your servers.网络安全组包含一系列访问控制列表(ACL)规则,这些规则可以允许或拒绝虚拟网络中流向VM实例的网络流量。
NSGs contain a list of Access Control List(ACL) rules that allow or deny network traffic to your VM instances in a Virtual Network.