亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? cim_privilege.mof

?? Pegasus is an open-source implementationof the DMTF CIM and WBEM standards. It is designed to be por
?? MOF
字號:
// Copyright (c) 2005 DMTF.  All rights reserved.// <change cr="ArchCR00066.004" type="add">Add UmlPackagePath// qualifier values to CIM Schema.</change>// ==================================================================//  CIM_Privilege// ==================================================================   [UMLPackagePath ( "CIM::User::Privilege" ), Version ( "2.8.0" ),     Description (       "Privilege is the base class for all types of activities which "       "are granted or denied by a Role or an Identity. Whether an "       "individual Privilege is granted or denied is defined using the "       "PrivilegeGranted boolean. Any Privileges not specifically "       "granted are assumed to be denied. An explicit deny (Privilege "       "Granted = FALSE) takes precedence over any granted Privileges. "       "\n\n"       "The association of subjects (Roles and Identities) to "       "Privileges is accomplished using policy or explicitly via the "       "associations on a subclass. The entities that are protected "       "(targets) can be similarly defined. \n"       "\n"       "Note that Privileges may be inherited through hierarchical "       "Roles, or may overlap. For example, a Privilege denying any "       "instance Writes in a particular CIM Server Namespace would "       "overlap with a Privilege defining specific access rights at an "       "instance level within that Namespace. In this example, the "       "AuthorizedSubjects are either Identities or Roles, and the "       "AuthorizedTargets are a Namespace in the former case, and a "       "particular instance in the latter.")]class CIM_Privilege : CIM_ManagedElement {      [Key, Description (          "Within the scope of the instantiating Namespace, InstanceID "          "opaquely and uniquely identifies an instance of this class. "          "In order to ensure uniqueness within the NameSpace, the "          "value of InstanceID SHOULD be constructed using the "          "following 'preferred' algorithm: \n"          "<OrgID>:<LocalID> \n"          "Where <OrgID> and <LocalID> are separated by a colon ':', "          "and where <OrgID> MUST include a copyrighted, trademarked "          "or otherwise unique name that is owned by the business "          "entity creating/defining the InstanceID, or is a registered "          "ID that is assigned to the business entity by a recognized "          "global authority. (This is similar to the <Schema "          "Name>_<Class Name> structure of Schema class names.) In "          "addition, to ensure uniqueness <OrgID> MUST NOT contain a "          "colon (':'). When using this algorithm, the first colon to "          "appear in InstanceID MUST appear between <OrgID> and "          "<LocalID>. \n"          "<LocalID> is chosen by the business entity and SHOULD not "          "be re-used to identify different underlying (real-world) "          "elements. If the above 'preferred' algorithm is not used, "          "the defining entity MUST assure that the resultant "          "InstanceID is not re-used across any InstanceIDs produced "          "by this or other providers for this instance's NameSpace. "          "For DMTF defined instances, the 'preferred' algorithm MUST "          "be used with the <OrgID> set to 'CIM'.")]   string InstanceID;      [Description (          "Boolean indicating whether the Privilege is granted (TRUE) "          "or denied (FALSE). The default is to grant permission.")]   boolean PrivilegeGranted = TRUE;      [Description (          "An enumeration indicating the activities that are granted "          "or denied. These activities apply to all entities specified "          "in the ActivityQualifiers array. The values in the "          "enumeration are straightforward except for one, "          "4=\"Detect\". This value indicates that the existence or "          "presence of an entity may be determined, but not "          "necessarily specific data (which requires the Read "          "privilege to be true). This activity is exemplified by "          "'hidden files'- if you list the contents of a directory, "          "you will not see hidden files. However, if you know a "          "specific file name, or know how to expose hidden files, "          "then they can be 'detected'. Another example is the ability "          "to define search privileges in directory implementations."),        ValueMap { "1", "2", "3", "4", "5", "6", "7", "..15999",          "16000.." },        Values { "Other", "Create", "Delete", "Detect", "Read", "Write",          "Execute", "DMTF Reserved", "Vendor Reserved" },          ArrayType ( "Indexed" ),        ModelCorrespondence { "CIM_Privilege.ActivityQualifiers" }]   uint16 Activities[];      [Description (          "The ActivityQualifiers property is an array of string "          "values used to further qualify and specify the privileges "          "granted or denied. For example, it is used to specify a set "          "of files for which 'Read'/'Write' access is permitted or "          "denied. Or, it defines a class' methods that may be "          "'Executed'. Details on the semantics of the individual "          "entries in ActivityQualifiers are provided by corresponding "          "entries in the QualifierFormats array."),        ArrayType ( "Indexed" ),        ModelCorrespondence { "CIM_Privilege.Activities",          "CIM_Privilege.QualifierFormats" }]   string ActivityQualifiers[];      [Description (          "Defines the semantics of corresponding entries in the "          "ActivityQualifiers array. An example of each of these "          "'formats' and their use follows: \n"          "- 2=Class Name. Example: If the authorization target is a "          "CIM Service or a Namespace, then the ActivityQualifiers "          "entries can define a list of classes that the authorized "          "subject is able to create or delete. \n"          "- 3=<Class.>Property. Example: If the authorization target "          "is a CIM Service, Namespace or Collection of instances, "          "then the ActivityQualifiers entries can define the class "          "properties that may or may not be accessed. In this case, "          "the class names are specified with the property names to "          "avoid ambiguity - since a CIM Service, Namespace or "          "Collection could manage multiple classes. On the other "          "hand, if the authorization target is an individual "          "instance, then there is no possible ambiguity and the class "          "name may be omitted. To specify ALL properties, the "          "wildcard string \"*\" should be used. \n"          "- 4=<Class.>Method. This example is very similar to the "          "Property one, above. And, as above, the string \"*\" may be "          "specified to select ALL methods. \n"          "- 5=Object Reference. Example: If the authorization target "          "is a CIM Service or Namespace, then the ActivityQualifiers "          "entries can define a list of object references (as strings) "          "that the authorized subject can access. \n"          "- 6=Namespace. Example: If the authorization target is a "          "CIM Service, then the ActivityQualifiers entries can define "          "a list of Namespaces that the authorized subject is able to "          "access. \n"          "- 7=URL. Example: An authorization target may not be "          "defined, but a Privilege could be used to deny access to "          "specific URLs by individual Identities or for specific "          "Roles, such as the 'under 17' Role. \n"          "- 8=Directory/File Name. Example: If the authorization "          "target is a FileSystem, then the ActivityQualifiers entries "          "can define a list of directories and files whose access is "          "protected. \n"          "- 9=Command Line Instruction. Example: If the authorization "          "target is a ComputerSystem or Service, then the "          "ActivityQualifiers entries can define a list of command "          "line instructions that may or may not be 'Executed' by the "          "authorized subjects."),        ValueMap { "2", "3", "4", "5", "6", "7", "8", "9", "..15999",          "16000.." },        Values { "Class Name", "<Class.>Property", "<Class.>Method",          "Object Reference", "Namespace", "URL",          "Directory/File Name", "Command Line Instruction",          "DMTF Reserved", "Vendor Reserved" }, ArrayType ( "Indexed" ),        ModelCorrespondence { "CIM_Privilege.ActivityQualifiers" }]   uint16 QualifierFormats[];};

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
婷婷一区二区三区| 欧美婷婷六月丁香综合色| 亚洲制服丝袜av| 亚洲成av人片一区二区梦乃| 国产免费成人在线视频| 久久久久国产精品免费免费搜索| 久久伊人中文字幕| 日本一区二区三级电影在线观看| 亚洲综合色自拍一区| 国产盗摄精品一区二区三区在线| 国产福利视频一区二区三区| 欧美视频精品在线| 综合色中文字幕| 亚洲青青青在线视频| 亚洲综合一区二区| 成人性生交大片免费看在线播放| 91在线免费播放| 欧美日韩1区2区| 精品国产免费人成在线观看| 国产精品色在线| 亚洲国产综合在线| 精品写真视频在线观看| 成人黄色片在线观看| 欧美日韩视频专区在线播放| 2021中文字幕一区亚洲| 日韩精品电影一区亚洲| 成人午夜在线播放| 久久久久久久久99精品| 免费av网站大全久久| 波多野结衣中文一区| 久久精品人人做人人爽人人| 亚洲国产精品一区二区久久 | 欧美成人r级一区二区三区| 久久久影院官网| 激情综合网激情| 日韩精品中文字幕在线不卡尤物 | 国产99久久精品| 97国产一区二区| 中文字幕一区二区三区四区不卡 | 色呦呦一区二区三区| 欧美一级二级三级蜜桃| 最新成人av在线| 成人av在线电影| 中文字幕亚洲欧美在线不卡| 成人av电影在线播放| 国产精品美女久久久久久久 | 91官网在线观看| 久久免费电影网| 国产成人日日夜夜| 自拍av一区二区三区| 在线一区二区三区四区五区| 亚洲超碰97人人做人人爱| 日韩一区二区三区四区| 国内精品久久久久影院一蜜桃| 在线观看一区二区视频| 国产精品私人自拍| 91论坛在线播放| 国产精品色哟哟网站| 色久优优欧美色久优优| 日韩avvvv在线播放| 欧美军同video69gay| 一区二区三区欧美久久| youjizz久久| 国产精品美女久久久久aⅴ| 色综合av在线| 六月丁香婷婷久久| 日韩限制级电影在线观看| 精品一区二区免费在线观看| 中文字幕一区二区三区四区| 5858s免费视频成人| 亚洲五月六月丁香激情| 亚洲三级理论片| 欧美日韩国产高清一区二区三区| 久99久精品视频免费观看| 国产精品国产三级国产aⅴ入口| 丁香另类激情小说| 亚洲成人黄色影院| 中文字幕av在线一区二区三区| 成人晚上爱看视频| 日韩一区精品视频| 亚洲视频小说图片| 精品国产伦理网| 在线亚洲免费视频| 高清国产午夜精品久久久久久| 亚洲一区二区在线视频| 日本一二三不卡| 欧美一区二区三区的| 蜜桃视频一区二区三区在线观看| 日韩精品专区在线| 欧美在线观看一区| 波多野结衣精品在线| 精品一区二区三区在线观看| 亚洲成人免费电影| 亚洲色图欧美激情| 国产精品免费网站在线观看| 日韩欧美一区二区久久婷婷| 91国在线观看| 97成人超碰视| 成人午夜短视频| 国产精品99久| 亚洲综合色区另类av| 亚洲国产精品av| 久久综合色综合88| 日韩精品在线网站| 欧美老女人第四色| 欧美日韩在线综合| 欧美伊人久久大香线蕉综合69| 波多野结衣在线一区| 风流少妇一区二区| 国产美女主播视频一区| 亚洲综合一二区| 亚洲精品美腿丝袜| 久久久久久9999| 久久综合五月天婷婷伊人| 欧美大胆一级视频| 精品国产91洋老外米糕| 欧美va亚洲va在线观看蝴蝶网| 欧美一区二区视频观看视频| 欧美丰满高潮xxxx喷水动漫| 91麻豆精品国产91| 日韩天堂在线观看| 亚洲精品一区二区三区在线观看| 欧美成人综合网站| 欧美精品一区二区不卡| 久久久久久黄色| 中文字幕av一区二区三区免费看 | 国产精品一区二区在线观看网站 | 欧美一区二区三区在线观看视频| 欧美美女黄视频| 制服丝袜亚洲精品中文字幕| 欧美一级电影网站| 2020国产精品自拍| 国产精品乱子久久久久| 亚洲欧美日韩一区二区| 亚洲国产欧美另类丝袜| 午夜一区二区三区视频| 麻豆精品新av中文字幕| 国产成人精品亚洲777人妖 | 欧美日韩一级视频| 欧美一区二区黄色| 国产亚洲自拍一区| 亚洲男人的天堂在线aⅴ视频| 亚洲香肠在线观看| 精品一区二区在线视频| 国产白丝精品91爽爽久久 | 在线成人小视频| 亚洲精品在线三区| 专区另类欧美日韩| 全部av―极品视觉盛宴亚洲| 国产麻豆9l精品三级站| 一本色道亚洲精品aⅴ| 日韩天堂在线观看| 中文在线资源观看网站视频免费不卡 | 中文字幕国产精品一区二区| 亚洲综合色网站| 国产在线看一区| 日本道精品一区二区三区| 日韩欧美激情在线| 樱花草国产18久久久久| 男人的天堂亚洲一区| 99国产精品一区| 精品少妇一区二区三区在线视频 | 精品福利在线导航| 另类小说欧美激情| 成人黄动漫网站免费app| 欧美久久婷婷综合色| 欧美高清在线精品一区| 日本三级韩国三级欧美三级| 97久久精品人人做人人爽| 欧美成人video| 亚洲一区二区影院| 99亚偷拍自图区亚洲| 欧美电影免费观看高清完整版在线 | 久久国内精品自在自线400部| 色悠久久久久综合欧美99| 久久综合九色综合久久久精品综合| 亚洲精品中文字幕乱码三区| 国产成人福利片| 日韩女优av电影| 性做久久久久久免费观看欧美| 成av人片一区二区| 国产亚洲一区字幕| 精品一二线国产| 欧美一区二区三区在线观看| 一区二区三区四区五区视频在线观看| 国产精品白丝jk白祙喷水网站| 欧美一区二区在线不卡| 亚洲妇女屁股眼交7| 91麻豆免费看| 中文字幕五月欧美| 国产传媒一区在线| 久久久777精品电影网影网| 麻豆freexxxx性91精品| 欧美tickling网站挠脚心| 国产精品一区二区三区乱码| 日韩午夜在线影院| 日本v片在线高清不卡在线观看| 欧美色精品在线视频| 亚洲在线成人精品| 欧美丝袜丝交足nylons图片|