1. Can I see your authorization?
我能看你的授权书吗?

《牛津词典》

2. Who gave the authorization to release the data?
谁授权发表这些资料的?

《牛津词典》

3. You may not enter the security area without authorization.
未经批准不得进入警戒地区。

《牛津词典》

4. He had authorization from the military command to retaliate.
他得到了军事指挥部进行还击的授权。

《柯林斯英汉双解大词典》

5. The United Nations will approve his request for authorization to use military force to deliver aid.
联合国将同意他的请求,批准他动用军队来运送救援物资。

《柯林斯英汉双解大词典》

6. What if there is a long time gap between the authorization and the capture?
如果在授权和捕获之间有一个长的时间间隙,那会怎么样呢?

精选例句

7. To bring a hand gun into Hong Kong without proper authorization is a serious offense.
未经适当授权将手枪带入香港是严重罪行。

精选例句

8. AAA information file can be used not only for identity mapping but also for authentication and authorization.
AAA信息文件不仅可用于身份映射,还可以用于身份验证和授权。

精选例句

9. This is called an authorization.
这就是授权。

www.ibm.com

10. Authentication and authorization.
身份验证和授权。

www.ibm.com

11. An authorization window will appear.
这时会显示一个授权窗口。

www.ibm.com

12. What is authorization?
什么是授权?

www.ibm.com

13. Authentication and Authorization security.
认证和授权安全。

www.infoq.com

14. There are no more authorization errors.
不会再有授权错误。

www.ibm.com

15. Any authorization code can be injected here.
任何授权代码都可以在此注入。

archive.cnblogs.com

16. Others offer authorization solutions as well.
其他插件还提供了授权解决方案。

www.ibm.com

17. If found, grant authorization, otherwise deny.
如果发现,授予授权,否则拒绝。

www.ibm.com

18. There is also a sample authorization job given.
这里也给出了一个示例授权任务。

www.ibm.com

19. By default, transaction authorization is disabled.
默认情况下,事务授权是禁用的。

www.ibm.com

20. Should "Get Credit Authorization" activity execute?
“获得贷记授权”活动应该执行吗?

www.infoq.com

21. Only inheritance applies to this authorization role.
只有继承用户适用于此授权角色。

www.ibm.com

22. Authorization defined by the enterprise security model.
由企业安全模型定义的授权。

www.ibm.com

23. His action without authorization has stymied the whole plan.
他擅自采取的行动已经妨碍了整个计划的实施。

chazidian.com

24. Permission checks are another way to perform authorization.
权限检查是执行授权的另一种方法。

www.infoq.com

25. It provides separate authorization privileges for each.
它为每一个人提供了单独的权限。

www.ibm.com

26. This inconsistency affects only the authorization check.
这种不一致只会影响验证检查。

www.ibm.com

27. This approach embodies both authentication and authorization.
这种方法包含了身份验证和授权。

www.ibm.com

28. Do the services support both authentication and authorization?
服务同时支持身份验证和授权码?

www.ibm.com

29. Another difference is when authorization actually takes place.
另一个差异是实际进行授权的时间。

www.ibm.com

30. Multiple campuses, whose gates require authorization for entry.
多个校园,进入校园大门要求经过授权。

www.ibm.com