英語 での To control access の使用例とその 日本語 への翻訳
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
-
Programming
Essentially every system which wants to control access to its resources needs some way to authenticate users.
MFA can be also be used to control access to AWS service APIs.
The business vision of Gluu is quite simple: offer an open source utility platform that enables organizations to control access to valuable online resources.
Impersonation is another mechanism that you can use to control access to resources.
User Authentication Essentially every system which wants to control access to its resources needs some way to authenticate users.
The train control system is intended to control access to the controls of the train.
Build powerful, scalable DataFusions and use PDP to control access.
LABEL ARCHIVE allows administrators to easily create and maintain user groups and establish permissions to control access.
The following examples show how to control access by policy.
Administrators can also use group policy to control access to the Store, at an individual, role or group level.
Some Adult sites use an Adult Verification Service to control access.
You can use AWS Identity and Access Management(IAM) to control access to the Customer Master Key(CMK).
Using Cisco DNA Center, we're starting to control access based on the specific application or time of day.
Configure these features to prevent intrusions: User Interface Security- Set display and password protection to control access to the VirusScan Enterprise user interface.
Security- LABEL ARCHIVE allows administrators to have the ability to easily create and maintain user groups and establish permissions to control access.
Located along an original Inca Trail, 15 minutes from the main Urban and Agricultural Sectors of Machu Picchu, the Inca Bridge is an original wooden drawbridge that was be raised or lowed to control access to the citadel.
The reason is that it takes tons of times(i.e., it's expensive) to develop the security protocols and encryption to control access to the file.
The Linux kernel has two primary functions: to control access to physical devices on the computer and to schedule when and how processes interact with these devices.
We also use Cookies and Other Tracking Technologies to control access to certain content on our Sites, protect the Sites, and to process any requests that you make of us.
For the consumer of all of these services, the technology offers the potential, according to the circumstances, for individual consumers to control access to personal records and to know who has accessed them.