1.
Users trying to encrypt or decrypt with the specified key must have the required permissions to access the key container.
尝试用指定密钥进行加密或解密的用户必须具有访问密钥容器的所需权限。
2.
SQLite has no concept of user accounts, and instead relies on the file system for all database permissions.
SQLite没有用户帐户概念,而是根据文件系统确定所有数据库的权限。
3.
If multiple users have identical files, they may be unable to restore a file, as their file permissions do not allow this.
如果多个使用者拥有完全相同的文件,他们可能因为「他们的文件权限的不允许」而无法回复一个文件。
4.
If the database being restored does not exist, the user must have CREATE DATABASE permissions to be able to execute RESTORE.
如果不存在要还原的数据库,则用户必须有CREATEDATABASE权限才能执行RESTORE。
5.
Now that you can add or remove permissions, you may wonder how to set just a specific set of permissions.
现在已经可以添加或者删除权限了,您可能会想,怎样才能只设置一些特殊权限。
6.
The right to read permissions on this object, write all the properties on this object, and perform all validated writes to this object.
读取此对象上的权限、写入此对象上的全部属性以及执行此对象所有已验证写入的权限。
7.
If this is possible, the infrastructure team can place in the app. policy file the default permissions for all applications on that node.
如果不可能这样做,基础设施团队可以在app.policy文件中设置该节点上所有应用程序的缺省权限集。
8.
Clearly, it must be possible to uniquely identify a piece of running code to ensure that there is no confusion as to its access permissions.
显然,一定要能惟一地标识一段运行代码以保证它的访问权限没有冲突。
9.
It is quite easy to grant a user all database permissions and authorities using the Control Center, as is shown in Figure 1.
通过使用ControlCenter,很容易为一个用户授予所有数据库许可和权限,如图1所示。
10.
Sharing permissions can be granted to an individual or to a group of users on the same network.
可以将共享权限授予同一网络中的单个用户或一组用户。