-
1 user-based policies
"Policies that are detailed enough to be applied to distribution groups, security groups, and individual users." -
2 security principal
"In Windows-based computers, an account (such as a user, security group, device, or computer) that can be granted or denied access to resources." -
3 security ID
"In Windows-based systems, a unique value that identifies a user, group, or computer account within an enterprise. Every account is issued a SID when it is created."معرّف الأمان -
4 security identifier
"In Windows-based systems, a unique value that identifies a user, group, or computer account within an enterprise. Every account is issued a SID when it is created."معرّف الأمان -
5 security trimming
The process of limiting search results based on the identity of the user who submitted the query. -
6 Role-Based Interface
"A feature that customizes the contents of the user interface depending on the security permissions of the user. For example, if the user does not have permission to edit an item, the edit button will not be displayed." -
7 account lockout
"A Windows security feature that locks a user account if a number of failed logon attempts occur within a specified amount of time, based on security policy lockout settings. Locked accounts cannot log on." -
8 principal
"In Windows-based computers, an account (such as a user, security group, device, or computer) that can be granted or denied access to resources."
См. также в других словарях:
Capability-based security — is a concept in the design of secure computing systems. A capability (known in some systems as a key) is a communicable, unforgeable token of authority. It refers to a value that references an object along with an associated set of access rights … Wikipedia
Security token — Several types of security tokens with a penny for scale … Wikipedia
Security Identifier — In the context of the Microsoft Windows NT line of operating systems, a Security Identifier (commonly abbreviated SID) is a unique name (an alphanumeric character string) which is assigned by a Windows Domain controller during the log on process… … Wikipedia
Security-focused operating system — This is an alphabetical list of operating systems with a sharp security focus. Their order does not imply rank.In our context, Security focused means that the project is devoted to increasing the security as a major goal. As such, something can… … Wikipedia
Security Assertion Markup Language — (SAML) is an XML based standard for exchanging authentication and authorization data between security domains, that is, between an identity provider (a producer of assertions) and a service provider (a consumer of assertions). SAML is a product… … Wikipedia
Security as a service — refers to the practice of delivering traditional security applications as an Internet based service, on demand, to consumers and businesses. It is an example of the everything as a service trend and shares many of the common characteristics,… … Wikipedia
User-mode Linux — (UML) allows multiple virtual Linux systems (known as guests) to run as an application within a normal Linux system (known as the host). As each guest is just a normal application running as a process in user space, this approach provides the… … Wikipedia
Security — is the condition of being protected against danger, loss, and criminals. In the general sense, security is a concept similar to safety. The nuance between the two is an added emphasis on being protected from dangers that originate from outside.… … Wikipedia
Security and safety features new to Windows Vista — There are a number of security and safety features new to Windows Vista, most of which are not available in any prior Microsoft Windows operating system release.Beginning in early 2002 with Microsoft s announcement of their Trustworthy Computing… … Wikipedia
Security-Enhanced Linux — The SELinux administrator in Fedora 8 Security Enhanced Linux (SELinux) is a Linux feature that provides a mechanism for supporting access control security policies, including United States Department of Defense style mandatory access controls,… … Wikipedia
User (computing) — Username redirects here. For the same term in Wikipedia, see Wikipedia:Username End user (computer science) redirects here. For other uses, see End user (disambiguation). A user is an agent, either a human agent (end user) or software agent, who… … Wikipedia