Method for implementing functions of system administratordoi:CN102404157 A宦奕奕
System administrator assigns user permissions, and manage enterprise resource functions, and the user is responsible for the corresponding obligations are based on their responsibilities and powers. 翻译结果4复制译文编辑译文朗读译文返回顶部 System Administrator assigns the user permissions and ownership of th...
a1 Description: system main page: the page display the three functions of the administrator can operate, enter the relevant management page can link to a sub menu, and highlighted, have corresponding sub menu below each management module. 1个描述: 系统主页: 管理员的三个作用可能经营的页显示,...
including monitoring, alarming, and starting or stopping services. When importing and exporting data using Loader, extracting metadata using Metadata, creating roles, backing up and restoring data, or developing applications, the system administrator needs to select specific service instances based on the...
Only the system administrator has the permission to execute this function. select col1 from wdr_xdb_query('dbname=test','select col1 from t1') as dd(col1 int); Return type: record pg_wlm_jump_queue(pid int) Description: Moves a task to the top of the queue of CN. Return type: ...
The type and meaning of the input parameter num_node_display are the same as those of the pg_stat_get_status function. Return type: record pgxc_os_run_info() Description: Obtains the running status of the operating system on each node in a cluster. For details about the returned results...
Note that you'll need administrator privileges to allow the exemption. Once allowed, you shouldn't be prompted for an exemption when you sideload Office Add-ins in the future (unless you remove the exemption from your machine). To learn more, see "We can't open this add-in from ...
If not, install solution in IsSystemAdminFunction_1_0_0_0_managed.zip containing the custom API. Retrieve 10 systemuser records. Loop through the records using the sample_IsSystemAdmin function to detect which ones have the System Administrator security role.Section...
Attributes of the VTY user interface must be configured. Table 12-19 Configuring the VTY user interface for SSH users to log in to the device Operation Command Description Enter the system view. system-view - Enter the VTY user interface view. user-interface vty firs...
This access is required whether you're using the Console or the REST API with an SDK, CLI, or other tool. If you get a message that you don't have permission or are unauthorized, verify with your administrator what type of access you have and which compartment to work in. If you're...