﻿

{"id":15898,"date":"2023-10-12T15:40:04","date_gmt":"2023-10-12T06:40:04","guid":{"rendered":"https:\/\/www.bitstrong.com\/jp\/?p=15898"},"modified":"2024-01-29T14:45:16","modified_gmt":"2024-01-29T05:45:16","slug":"person-based-access-control","status":"publish","type":"post","link":"https:\/\/www.bitstrong.com\/jp\/person-based-access-control\/","title":{"rendered":"Person-Based Access Control"},"content":{"rendered":"<p>\u30fb \u76ee\u6b21<br \/>\n\u25bc<a href=\"#fa1\">Person-Based Access Control \u306e\u6982\u8981<\/a><br \/>\n\u25bc<a href=\"#fa2\">\u30b5\u30f3\u30d7\u30eb\u30d7\u30ed\u30b0\u30e9\u30e0\u4e00\u89a7<\/a><\/p>\n<p><strong><span style=\"font-size: 18pt;\"><a id=\"fa1\"><\/a><br \/>\nParson-Based Access Control \u306e\u6982\u8981<\/span><\/strong><\/p>\n<p>\u500b\u4eba\u3001\u30ab\u30fc\u30c9\u3001\u6307\u7d0b\u60c5\u5831\u306e\u7ba1\u7406\u3001\u30a2\u30e9\u30fc\u30e0\u3001\u30a4\u30d9\u30f3\u30c8\u306e\u8a2d\u5b9a\u3001\u30c9\u30a2\u3001\u30a8\u30ec\u30d9\u30fc\u30bf\u3001\u30d6\u30b6\u30fc\u306e\u5236\u5fa1\u3001\u9006\u623b\u308a\u9632\u6b62\u306a\u3069\u3092\u5b9f\u65bd\u3057\u307e\u3059\u3002<\/p>\n<p><strong><span style=\"font-size: 18pt;\"><a id=\"fa2\"><\/a><br \/>\n\u30b5\u30f3\u30d7\u30eb\u30d7\u30ed\u30b0\u30e9\u30e0\u4e00\u89a7<\/span><\/strong><\/p>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 8.06297%; text-align: center;\">\u9805\u756a<\/td>\n<td style=\"width: 34.6848%; text-align: center;\">\u30b5\u30f3\u30d7\u30eb\u30d7\u30ed\u30b0\u30e9\u30e0\u540d<\/td>\n<td style=\"width: 57.2522%; text-align: center;\">\u6a5f\u80fd\u6982\u8981<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 8.06297%; text-align: center; vertical-align: middle;\">(1)<\/td>\n<td style=\"width: 34.6848%;\"><a href=\"https:\/\/www.bitstrong.com\/jp\/person-based-access-control-configuring-access-permission-control-schedule\/\">Configuring Access Permission Control Schedule<\/a><\/td>\n<td style=\"width: 57.2522%;\">\u30a2\u30af\u30bb\u30b9\u8a31\u53ef\u306e\u5236\u5fa1\u30b9\u30b1\u30b8\u30e5\u30fc\u30eb\u3092\u8a2d\u5b9a\u3057\u307e\u3059\u3002<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 8.06297%; text-align: center; vertical-align: middle;\">(2)<\/td>\n<td style=\"width: 34.6848%;\"><a href=\"https:\/\/www.bitstrong.com\/jp\/person-based-access-control-configuring-authentication-mode-control-schedule\/\">Configuring Authentication Mode Control Schedule<\/a><\/td>\n<td style=\"width: 57.2522%;\">\u8a8d\u8a3c\u30e2\u30fc\u30c9\u306e\u5236\u5fa1\u30b9\u30b1\u30b8\u30e5\u30fc\u30eb\u3092\u8a2d\u5b9a\u3057\u307e\u3059\u3002<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 8.06297%; text-align: center; vertical-align: middle;\">(3)<\/td>\n<td style=\"width: 34.6848%;\"><a href=\"https:\/\/www.bitstrong.com\/jp\/person-based-access-control-configuring-door-control-schedule\/\">Configuring Door Control Schedule<\/a><\/td>\n<td style=\"width: 57.2522%;\">\u30c9\u30a2\u306e\u5236\u5fa1\u30b9\u30b1\u30b8\u30e5\u30fc\u30eb\u3092\u8a2d\u5b9a\u3057\u307e\u3059\u3002<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 8.06297%; text-align: center; vertical-align: middle;\">(4)<\/td>\n<td style=\"width: 34.6848%;\"><a href=\"https:\/\/www.bitstrong.com\/jp\/person-based-access-control-receiving-alarm-or-event-in-arming-mode\/\">Receiving Alarm Or Event In Arming Mode<\/a><\/td>\n<td style=\"width: 57.2522%;\">\u30a2\u30fc\u30df\u30f3\u30b0\u30e2\u30fc\u30c9\u3067\u30a2\u30e9\u30fc\u30e0 \u307e\u305f\u306f\u3001\u30a4\u30d9\u30f3\u30c8\u3092\u53d7\u4fe1\u3057\u307e\u3059\u3002<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 8.06297%; text-align: center; vertical-align: middle;\">(5)<\/td>\n<td style=\"width: 34.6848%;\"><a href=\"https:\/\/www.bitstrong.com\/jp\/person-based-access-control-receiving-alarm-event-in-listening-mode\/\">Receiving Alarm Event In Listening Mode<\/a><\/td>\n<td style=\"width: 57.2522%;\">\u30ea\u30b9\u30cb\u30f3\u30b0\u30e2\u30fc\u30c9\u3067\u30a2\u30e9\u30fc\u30e0 \u307e\u305f\u306f\u3001\u30a4\u30d9\u30f3\u30c8\u3092\u53d7\u4fe1\u3057\u307e\u3059\u3002<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 8.06297%; text-align: center; vertical-align: middle;\">(6)<\/td>\n<td style=\"width: 34.6848%;\"><a href=\"https:\/\/www.bitstrong.com\/jp\/person-based-access-control-searching-for-access-control-event\/\">Searching For Access Control Event<\/a><\/td>\n<td style=\"width: 57.2522%;\">\u30a2\u30af\u30bb\u30b9\u5236\u5fa1\u306e\u30a4\u30d9\u30f3\u30c8\u3092\u691c\u7d22\u3057\u307e\u3059\u3002<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 8.06297%; text-align: center; vertical-align: middle;\">(7)<\/td>\n<td style=\"width: 34.6848%;\"><a href=\"https:\/\/www.bitstrong.com\/jp\/person-based-access-control-setting-multiple-callback-functions-to-receive-different-alarms-events-in-arming-mode\/\">Setting Multiple Callback Functions To Receive Different Alarms Events In Arming Mode<\/a><\/td>\n<td style=\"width: 57.2522%;\">\u30a2\u30fc\u30df\u30f3\u30b0\u30e2\u30fc\u30c9\u3067\u7570\u306a\u308b\u30a2\u30e9\u30fc\u30e0\u3084\u30a4\u30d9\u30f3\u30c8\u3092\u53d7\u4fe1\u3059\u308b\u305f\u3081\u306e\u30b3\u30fc\u30eb\u30d0\u30c3\u30af\u95a2\u6570\u3092\u8907\u6570\u8a2d\u5b9a\u3057\u307e\u3059\u3002<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"\u30fb \u76ee\u6b21 \u25bcPerson-Based Access Control \u306e\u6982\u8981 \u25bc\u30b5\u30f3\u30d7\u30eb\u30d7\u30ed\u30b0\u30e9\u30e0\u4e00\u89a7 Parson-Based Access Control \u306e\u6982\u8981 \u500b\u4eba\u3001\u30ab\u30fc\u30c9\u3001\u6307\u7d0b\u60c5\u5831\u306e\u7ba1\u7406\u3001\u30a2\u30e9\u30fc\u30e0\u3001\u30a4\u30d9\u30f3\u30c8\u306e\u8a2d\u5b9a\u3001\u30c9\u30a2\u3001\u30a8\u30ec\u30d9\u30fc\u30bf\u3001\u30d6\u30b6\u30fc\u306e\u5236\u5fa1\u3001\u9006\u623b\u308a\u9632\u6b62\u306a\u3069\u3092\u5b9f\u65bd\u3057\u307e\u3059\u3002 \u30b5\u30f3\u30d7\u30eb\u30d7\u30ed\u30b0\u30e9\u30e0\u4e00\u89a7 ...","protected":false},"author":2,"featured_media":15950,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","footnotes":""},"categories":[136,107],"tags":[],"class_list":["post-15898","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sample-program","category-camera-connection"],"_links":{"self":[{"href":"https:\/\/www.bitstrong.com\/jp\/wp-json\/wp\/v2\/posts\/15898","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bitstrong.com\/jp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bitstrong.com\/jp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bitstrong.com\/jp\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bitstrong.com\/jp\/wp-json\/wp\/v2\/comments?post=15898"}],"version-history":[{"count":8,"href":"https:\/\/www.bitstrong.com\/jp\/wp-json\/wp\/v2\/posts\/15898\/revisions"}],"predecessor-version":[{"id":16978,"href":"https:\/\/www.bitstrong.com\/jp\/wp-json\/wp\/v2\/posts\/15898\/revisions\/16978"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bitstrong.com\/jp\/wp-json\/wp\/v2\/media\/15950"}],"wp:attachment":[{"href":"https:\/\/www.bitstrong.com\/jp\/wp-json\/wp\/v2\/media?parent=15898"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bitstrong.com\/jp\/wp-json\/wp\/v2\/categories?post=15898"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bitstrong.com\/jp\/wp-json\/wp\/v2\/tags?post=15898"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}