delegated authentication

delegated authentication
A method of authentication by which a trusted server (or service) is enabled to act as the client when it connects to third-tier application resources.
مصادقة مفوَّضة

English-Arabic terms dictionary. 2015.

Игры ⚽ Поможем решить контрольную работу

Look at other dictionaries:

  • Windows Live ID — An example of a Windows Live ID sign in page Type Single sign on …   Wikipedia

  • Quechup — www.quechup.com Kommerziell Ja Beschreibung Gemeinschaftsportal bzw. Online Kontaktnetzwerk (siehe Soziale Softwar …   Deutsch Wikipedia

  • Live Services — Saltar a navegación, búsqueda Live Services (anteriormente Windows Live Dev) es un centro de desarrollo y proveedor de kits de desarrollo de software de Windows Live y Azure Services Platform. Proporciona información sobre Introducción a Windows… …   Wikipedia Español

  • Live Connect — Live Services (anteriormente Windows Live Dev) es un centro de desarrollo y proveedor de kits de desarrollo de software de Windows Live y Azure Services Platform. Proporciona información sobre Introducción a Windows Live servicios, más reciente… …   Wikipedia Español

  • Global Trust Center — The Global Trust Center is a non profit independent international organisation that develops policy, best practice and guidance to enable trust in digital interactions, such as on the Internet. It provides a forum for governments; businesses and… …   Wikipedia

  • OpenID — The OpenID logo OpenID is an open standard that describes how users can be authenticated in a decentralized manner, eliminating the need for services to provide their own ad hoc systems and allowing users to consolidate their digital… …   Wikipedia

  • Context aware delegation — Use of contextual information (location, time) of a delegatee to mitigate this violation, which helps to achieve a higher level of practical security in nomadic environments used by nomadic user . Delegation in access control domain is not… …   Wikipedia

  • Delegation in IT — If a computer user temporarily hand over his authorizations to another user then this process is called delegation.[1][2] Contents 1 Types of Delegation in IT network 1.1 Delegation at Authentication Level …   Wikipedia

  • Domain Name System Security Extensions — Internet protocol suite Application layer BGP DHCP DNS FTP HTTP …   Wikipedia

  • Grid Security Infrastructure — The Grid Security Infrastructure (GSI), formerly called the Globus Security Infrastructure, is a specification for secret, tamper proof, delegatable communication between software in a grid computing environment. Secure, authenticatable… …   Wikipedia

  • Proxy voting — Part of the Politics series Electoral methods Single winner …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”