-
1 driver and access authorization system (ELCODE) [US]
نظام دخول السيارة إلكترونياً (ELCODE)English-Arabic automotive engineering dictionary > driver and access authorization system (ELCODE) [US]
-
2 access permissions
"Authorization to perform operations associated with a specific shared resource, such as a file, directory, or printer. Permissions must be granted by the system administrator to individual user accounts or administrative groups." -
3 authorization
"The process of granting a person, computer process, or device access to certain information, services or functionality. Authorization is derived from the identity of the person, computer process, or device requesting access, which is verified through authentication." -
4 access token
"A data structure that contains authentication and authorization information for a user. Windows creates the access token when the user logs on and the user's identity is confirmed. The access token contains the user's security ID (SID), the list of groups that the user is a member of, the list of privileges held by that user. Each process or thread started for the user inherits a copy of the access token. In some cases a user may have more than one access token, with different levels of authority." -
5 authorization code
"A code that grants rights to an individual, for example to use a system or access stored data." -
6 Host Credentials Authorization Protocol
A protocol used by Access Control Server (ACS) to send and receive statements of health to and from other NAP infrastructure components. HCAP is installed on NPS so that it can function with Access Control Server (ACS).English-Arabic terms dictionary > Host Credentials Authorization Protocol
-
7 permission class
A class that defines access to a resource or defines an indentity by supporting authorization checks.
См. также в других словарях:
Access control — is the ability to permit or deny the use of a particular resource by a particular entity. Access control mechanisms can be used in managing physical resources (such as a movie theater, to which only ticketholders should be admitted), logical… … Wikipedia
Authorization — In security engineering and computer security, authorization is the concept of allowing access to resources only to those permitted to use them. More formally, authorization is a process (often part of the operating system) that protects computer … Wikipedia
Authorization certificate — In computer security, an authorization certificate (also known as an attribute certificate) is a digital document that describes a written permission from the issuer to use a service or a resource that the issuer controls or has access to use.… … Wikipedia
Authorization for Use of Military Force Against Terrorists — The Authorization for Use of Military Force Against Terrorists (USStatute|107|40|115|224|2001|09|18), one of two resolutions commonly known as AUMF (the other being Authorization for Use of Military Force Against Iraq Resolution of 2002 ), was a… … Wikipedia
Authorization Code — A generic term that refers to a code or password that identifies the user as authorized to purchase, sell or transfer items, or to enter information into a security protected space. For example, an authorization code would be required for a… … Investment dictionary
authorization — The giving of approval or permission. Authorization is central to many of the *internal controls found in modern organizations, from the making of *disbursements to the hiring of employees. Authorization can be effected through written signatures … Auditor's dictionary
authorization — The provision of rights or permissions based on identity. Authorization and authentication go hand in hand in networking; your access to services is based on your identity, and the authentication processes confirm that you are who you say you… … Dictionary of networking
IBM Tivoli Access Manager — is an authentication and authorization solution for corporate web services, operating systems, and existing applications. [http://publib.boulder.ibm.com/infocenter/tivihelp/v2r1/topic/com.ibm.itame.doc/am61 admin18.htm#choverview] Tivoli Access… … Wikipedia
Comparison of privilege authorization features — A number of computer operating systems employ security features to help prevent malicious software from gaining sufficient privileges to compromise the computer system. Operating systems lacking such features, such as DOS, Windows implementations … Wikipedia
Multi Party Authorization — (MPA) is a process to protect a telecommunications network, data center or industrial control system from undesirable acts by a malicious insider or inexperienced technician acting alone. MPA requires that a second authorized user approve an… … Wikipedia
Distributed Access Control System — DACS The Distributed Access Control System Original author(s) Developers at Distributed Systems Software Developer(s) Distributed Systems Software Stable release 1.4.26 / September 30, 2011; 14 days ago (2011 09 30) … Wikipedia