Memorex LOCK - VERSION 2-24 Informacje Techniczne Strona 127

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 568
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 126
Establishing Online Security
User Reference
Connectivity Systems, Inc.—Copyright © 2006
Use Pursuant to Company Instructions
2-63
$EPIC Unsecured profile. $EPIC, which cannot be modified, is
provided by the Online Manager to use as a model. After
$DEFSEC is secured, you can grant total system access to
selected users by modeling their user profiles after $EPIC.
Profiles modeled on $EPIC can be modified to create
custom security profiles. To prevent unauthorized access to
the Online Manager, you cannot use $EPIC as a user ID.
Use caution when modeling user profiles after $EPIC and
leaving the user profiles unmodified. If the user profiles are
left unmodified, a user can obtain the profile name and use
it to obtain total system access.
SJA SJA is an example of an unsecured profile that was modeled
after $EPIC.
User ID Definition
Przeglądanie stron 126
1 2 ... 122 123 124 125 126 127 128 129 130 131 132 ... 567 568

Komentarze do niniejszej Instrukcji

Brak uwag