httpd 2.4.25 中文文档authorization will likely need changes. You should review the Authentication, Authorization and Access Control Howto, especially the section Beyond just authorization which explains the new mechanisms port your configuration to use Require dbm-group ... in place of Require group .... Access control In 2.2, access control based on client hostname, IP address, and other characteristics of client requests Allow, Deny, and Satisfy. In 2.4, such access control is done in the same way as other authorization checks, using the new module mod_authz_host. The old access control idioms should be replaced by the0 码力 | 2573 页 | 2.12 MB | 1 年前3
httpd 2.4.23 中文文档authorization will likely need changes. You should review the Authentication, Authorization and Access Control Howto, especially the section Beyond just authorization which explains the new mechanisms port your configuration to use Require dbm-group ... in place of Require group .... Access control In 2.2, access control based on client hostname, IP address, and other characteristics of client requests Allow, Deny, and Satisfy. In 2.4, such access control is done in the same way as other authorization checks, using the new module mod_authz_host. The old access control idioms should be replaced by the0 码力 | 2559 页 | 2.11 MB | 1 年前3
Cilium v1.5 DocumentationReference Guide BPF Architecture Toolchain Program Types Further Reading API Reference Introduc�on How to access the API Compa�bility Guarantees API Reference Reference Command Cheatsheet Command u�li�es: Command these approaches to struggle to scale side by side with the applica�on as load balancing tables and access control lists carrying hundreds of thousands of rules that need to be updated with a con�nuously using a key-value store. Secure access to and from external services Label based security is the tool of choice for cluster internal access control. In order to secure access to and from external services0 码力 | 740 页 | 12.52 MB | 1 年前3
httpd 2.4.20 中文文档authorization will likely need changes. You should review the Authentication, Authorization and Access Control Howto, especially the section Beyond just authorization which explains the new mechanisms port your configuration to use Require dbm-group ... in place of Require group .... Access control In 2.2, access control based on client hostname, IP address, and other characteristics of client requests Allow, Deny, and Satisfy. In 2.4, such access control is done in the same way as other authorization checks, using the new module mod_authz_host. The old access control idioms should be replaced by the0 码力 | 2533 页 | 2.09 MB | 1 年前3
Cilium v1.6 DocumentationGuide BPF Architecture Toolchain Program Types Further Reading API Reference Introduction How to access the API Compatibility Guarantees API Reference Reference Command Cheatsheet Command utilities: these approaches to struggle to scale side by side with the application as load balancing tables and access control lists carrying hundreds of thousands of rules that need to be updated with a continuously using a key-value store. Secure access to and from external services Label based security is the tool of choice for cluster internal access control. In order to secure access to and from external services0 码力 | 734 页 | 11.45 MB | 1 年前3
httpd 2.2.29 中文文档has been split up into mod_auth_basic, mod_authn_file, mod_authz_user, and mod_authz_groupfile mod_access has been renamed to mod_authz_host mod_auth_ldap has been renamed to mod_authnz_ldap Upgraded to is now split into mod_auth_basic and mod_authn_file; mod_auth_dbm is now called mod_authn_dbm; mod_access has been renamed mod_authz_host. There is also a new mod_authn_alias module for simplifying certain complicated search filters in the Require directive. mod_authz_owner A new module that authorizes access to files based on the owner of the file on the file system mod_version A new module that allows0 码力 | 1854 页 | 1.48 MB | 1 年前3
httpd 2.2.27 中文文档has been split up into mod_auth_basic, mod_authn_file, mod_authz_user, and mod_authz_groupfile mod_access has been renamed to mod_authz_host mod_auth_ldap has been renamed to mod_authnz_ldap Upgraded to is now split into mod_auth_basic and mod_authn_file; mod_auth_dbm is now called mod_authn_dbm; mod_access has been renamed mod_authz_host. There is also a new mod_authn_alias module for simplifying certain complicated search filters in the Require directive. mod_authz_owner A new module that authorizes access to files based on the owner of the file on the file system mod_version A new module that allows0 码力 | 1849 页 | 1.47 MB | 1 年前3
httpd 2.2.31 中文文档has been split up into mod_auth_basic, mod_authn_file, mod_authz_user, and mod_authz_groupfile mod_access has been renamed to mod_authz_host mod_auth_ldap has been renamed to mod_authnz_ldap Upgraded to is now split into mod_auth_basic and mod_authn_file; mod_auth_dbm is now called mod_authn_dbm; mod_access has been renamed mod_authz_host. There is also a new mod_authn_alias module for simplifying certain complicated search filters in the Require directive. mod_authz_owner A new module that authorizes access to files based on the owner of the file on the file system mod_version A new module that allows0 码力 | 1860 页 | 1.48 MB | 1 年前3
httpd 2.2.27.dev 中文文档has been split up into mod_auth_basic, mod_authn_file, mod_authz_user, and mod_authz_groupfile mod_access has been renamed to mod_authz_host mod_auth_ldap has been renamed to mod_authnz_ldap Upgraded to is now split into mod_auth_basic and mod_authn_file; mod_auth_dbm is now called mod_authn_dbm; mod_access has been renamed mod_authz_host. There is also a new mod_authn_alias module for simplifying certain complicated search filters in the Require directive. mod_authz_owner A new module that authorizes access to files based on the owner of the file on the file system mod_version A new module that allows0 码力 | 1849 页 | 1.47 MB | 1 年前3
httpd 2.4.16 中文文档authorization will likely need changes. You should review the Authentication, Authorization and Access Control Howto, especially the section Beyond just authorization which explains the new mechanisms port your configuration to use Require dbm-group ... in place of Require group .... Access control In 2.2, access control based on client hostname, IP address, and other characteristics of client requests Allow, Deny, and Satisfy. In 2.4, such access control is done in the same way as other authorization checks, using the new module mod_authz_host. The old access control idioms should be replaced by the0 码力 | 2438 页 | 1.87 MB | 1 年前3
共 644 条
- 1
- 2
- 3
- 4
- 5
- 6
- 65













