-
1 authorization
"The process of granting a person, computer process, or device access to certain information, services or functionality. Authorization is derived from the identity of the person, computer process, or device requesting access, which is verified through authentication." -
2 authorization store
A file containing user and group information used by the Authorization Manager. -
3 access token
"A data structure that contains authentication and authorization information for a user. Windows creates the access token when the user logs on and the user's identity is confirmed. The access token contains the user's security ID (SID), the list of groups that the user is a member of, the list of privileges held by that user. Each process or thread started for the user inherits a copy of the access token. In some cases a user may have more than one access token, with different levels of authority." -
4 RADIUS
A proposed Internet protocol in which an authentication server provides authorization and authentication information to a network server to which a user is attempting to link. -
5 Remote Authentication Dial-In User Service
A proposed Internet protocol in which an authentication server provides authorization and authentication information to a network server to which a user is attempting to link.خادم خدمة مصادقة عن بُعد لمستخدم طلب هاتفيEnglish-Arabic terms dictionary > Remote Authentication Dial-In User Service
См. также в других словарях:
Information security — Components: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to identify and apply information security… … Wikipedia
authorization code — UK US noun [C] ► BANKING, COMMERCE a set of numbers, or letters and numbers, usually sent as an electronic message from a bank, which shows that a customer s payment by credit card was officially approved: »If an approval is given with an… … Financial and business terms
Information privacy — Information privacy, or data privacy is the relationship between collection and dissemination of data, technology, the public expectation of privacy, and the legal and political issues surrounding them. Privacy concerns exist wherever personally… … Wikipedia
Information assurance — (IA) is the practice of managing information related risks. More specifically, IA practitioners seek to protect and defend information and information systems by ensuring confidentiality, integrity, authentication, availability, and non… … Wikipedia
Information technology audit process — Information technology audit process:Generally Accepted Auditing Standards (GAAS)In 1947, the American Institute of Certified Public Accountants (AICPA) adopted GAAS to establish standards for audits. The standards cover the following three… … Wikipedia
Information technology controls — In business and accounting, Information technology controls (or IT controls) are specific activities performed by persons or systems designed to ensure that business objectives are met. They are a subset of an enterprise s internal control. IT… … Wikipedia
Authorization Code — A generic term that refers to a code or password that identifies the user as authorized to purchase, sell or transfer items, or to enter information into a security protected space. For example, an authorization code would be required for a… … Investment dictionary
Authorization to Transport — An Authorization to Transport is a permit issued by the Canadian Firearms Program allowing holders of Restricted and Prohibited class firearms to transport them in Canada. Such a permit is only issued to holders of a Possession and Acquisition… … Wikipedia
Authorization to Carry — An Authorization to Carry is a permit issued by the government of Canada allowing holders of Restricted and Prohibited class firearms to carry them in Canada. Under this permit, the approved firearms may be carried on the permit holder s person,… … Wikipedia
authorization — The giving of approval or permission. Authorization is central to many of the *internal controls found in modern organizations, from the making of *disbursements to the hiring of employees. Authorization can be effected through written signatures … Auditor's dictionary
Information Sharing and Customer Outreach — The United States government s Information Sharing and Customer Outreach office or ISCO was one of five directorates within the office of the Chief Information Officer (CIO) under the Office of the Director of National Intelligence (ODNI). ISCO… … Wikipedia