Examples of using Role-based in English and their translations into Chinese
{-}
-
Political
-
Ecclesiastic
-
Programming
(c) Accountability is associated with role-based expectations.
Select the“Role-based or feature-based installation” option.
Game-based learning has greater impacts in imparting critical role-based information.
A role-based security information flow model in grid environment.
He is the founding researcher of Role-Based Collaboration and Adaptive Collaboration.
Applications use a role-based security model to determine access rights.
Second, role-based access control has the ability to manage itself.
You can set role-based access controls at the project level.
Authority implies role-based access controls over functionalities of an LoT product.
There's no way to express this in an ACL or role-based model.
OpenBravo Retail has role-based access and approval as well as POS terminal authentication.
At present, role-based access control has been implemented in many security systems.
Use of smart cards, biometric identification, electronic signatures, role-based technologies, etc.
MongoDB employs Role-Based Access Control(RBAC) to govern access to a MongoDB system.
The tool lets administrators assign references to particular users or groups, making redirection role-based.
Review the Authorization section of the documentation to learn more about role-based access control in MongoDB.
Today, managing proper authentication and role-based access control authorization on most popular NoSQL databases is possible.
Java 2 Platform, Enterprise Edition(J2EE) uses role-based authentication for enforcement of its policies.
Role-Based Authorization(RBAC): Security groups are used to perform RBAC in Azure AD Graph API.
For example, a system had role-based access control, but the internal system communication was unencrypted.