-
1 access token
"A data structure that contains authentication and authorization information for a user. Windows creates the access token when the user logs on and the user's identity is confirmed. The access token contains the user's security ID (SID), the list of groups that the user is a member of, the list of privileges held by that user. Each process or thread started for the user inherits a copy of the access token. In some cases a user may have more than one access token, with different levels of authority." -
2 impersonation token
"An access token that captures the security information of a client process, allowing a service to ""impersonate"" the client process in security operations." -
3 primary token
An access token assigned to a process to represent the default information for that process. It is used in security operations by a thread working on behalf of the process itself rather than on behalf of a client. -
4 token
"Any nonreducible textual element in data that is being parsed. For example, the use in a program of a variable name, a reserved word, or an operator. Storing tokens as short codes shortens program files and speeds execution." -
5 token
"For networking, a unique structure or message that circulates continuously among the nodes of a token ring and describes the current state of the network. Before any node can send a message on the network, it must first wait to control the token."
Перевод: с английского на арабский
с арабского на английский- С арабского на:
- Английский
- С английского на:
- Арабский