impersonation token

"An access token that captures the security information of a client process, allowing a service to ""impersonate"" the client process in security operations."
رمز مميز للانتحال

English-Arabic terms dictionary. 2015.

Look at other dictionaries:

  • Access token — In Microsoft Windows operating systems, an access token contains the security information for a login session and identifies the user, the user s groups, and the user s privileges. OverviewAn access token is as an object encapsulating the… …   Wikipedia

  • false token — A devise for the effecting of a cheat or the obtaining of money by false pretenses; a device having the semblance of authenticity to the public but spurious a false weight or measure; impersonation of another person. 22 Am J2d False Pret § 20.… …   Ballentine's law dictionary

  • arts, East Asian — Introduction       music and visual and performing arts of China, Korea, and Japan. The literatures of these countries are covered in the articles Chinese literature, Korean literature, and Japanese literature.       Some studies of East Asia… …   Universalium

  • SecurID — RSA SecurID is a mechanism developed by RSA Security for performing two factor authentication for a user to a network resource. Overview The RSA SecurID authentication mechanism consists of a token mdash;a piece of hardware (e.g. a token or USB)… …   Wikipedia

  • Security Support Provider Interface — SSPI is an API used by Microsoft Windows systems to perform a variety of security related operations such as authentication.SSPI functions as a common interface to several Security Support Providers (SSP) such as: * NTLM * Kerberos * Secure… …   Wikipedia

  • Traffic shaping — (also known as packet shaping ) is the control of computer network traffic in order to optimize or guarantee performance, lower latency, and/or increase usable bandwidth by delaying packets that meet certain criteria. [… …   Wikipedia

  • Session hijacking — The term session hijacking refers to the exploitation of a valid computer session sometimes also called a session key to gain unauthorized access to information or services in a computer system. In particular, it is used to refer to the theft of… …   Wikipedia

  • South Asian arts — Literary, performing, and visual arts of India, Pakistan, Bangladesh, and Sri Lanka. Myths of the popular gods, Vishnu and Shiva, in the Puranas (ancient tales) and the Mahabharata and Ramayana epics, supply material for representational and… …   Universalium

  • Marge Schott — Born August 18, 1928(1928 08 18) Cincinnati, Ohio, U.S.A. Died March 2, 2004(2004 03 02) (aged 75) Cincinnati, Ohio, U.S.A. Margaret Unnewehr Schott (August 18, 1928 – March 2, 2004) was the managing general partner, president and CEO of the …   Wikipedia

  • Crazy Taxi (series) — Crazy Taxi The Crazy Taxi logo Genres Score attack, racing Developers Hitmaker …   Wikipedia

  • List of characters in Daria — The following is an extensive list of the fictional characters featured in MTV s animated series Daria (1997 2002).Note: In reference to episode numbers, the system used is as such: the first of the three digits following the # symbol indicates… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”

We are using cookies for the best presentation of our site. Continuing to use this site, you agree with this.