You now define these roles as well as the security constraints which use the roles.

 
  • 您现在定义了的这些角色像安全约束使用的一样。
今日热词
目录 附录 查词历史