DictionaryForumContacts

   Hungarian
Terms for subject Microsoft containing hozzáfér | all forms
HungarianEnglish
alacsony integritású hozzáférési jogkivonatlow integrity access token (A filtered access token that is created with a low integrity level. This access token is used by Internet Explorer Protected Mode, but can also be used by other applications)
biztonsági hozzáférési szolgáltatásAccess Edge service (A service that runs on Lync Server that resides in the perimeter network and routes instant messaging (IM) and presence information from external users to internal users)
folyamat hozzáférési jogkivonataprocess access token (A data structure that contains authentication and authorization information for a user. Windows creates the access token when the user logs on and the user's identity is confirmed. The access token contains the user's security ID (SID), the list of groups that the user is a member of, the list of privileges held by that user. Each process or thread started for the user inherits a copy of the access token. In some cases a user may have more than one access token, with different levels of authority)
hozzáférési engedélyekaccess permissions (Authorization to perform operations associated with a specific shared resource, such as a file, directory, or printer. Permissions must be granted by the system administrator to individual user accounts or administrative groups)
hozzáférési fiókaccess account (An account used to crawl Web sites, servers and network resources included in a content index)
hozzáférési hivatkozásLinkAccess (A feature that allows access to SharePoint documents and sites and documents on shares inside of a corporate network through Outlook Web Access when it is used remotely)
hozzáférési jogkivonataccess token (A data structure that contains authentication and authorization information for a user. Windows creates the access token when the user logs on and the user's identity is confirmed. The access token contains the user's security ID (SID), the list of groups that the user is a member of, the list of privileges held by that user. Each process or thread started for the user inherits a copy of the access token. In some cases a user may have more than one access token, with different levels of authority)
hozzáférési kulcspasskey (A number similar to a personal identification number (PIN) that identifies (or authenticates) a Bluetooth enabled device to a computer)
hozzáférési kódauthorization code (A code that grants rights to an individual, for example to use a system or access stored data)
hozzáférési maszkaccess mask (In Windows-based computers, a 32-bit value (a bitmask) that specifies the permissions that are assigned in an access control entry (ACE). An access mask is also part of the access request when an object is opened. The access mask in the request is compared to the access mask in each ACE to determine whether or not to grant the request)
hozzáférési pont neveaccess point name (The name of the access point used to establish wireless connectivity)
hozzáférési szintaccess level (A security role setting that determines for a given object type at which levels within the organization hierarchy a user can act on that object type)
Hozzáférési szint kezeléseAccess Levels Management (A UI element that displays a user's contacts and access level entries (ACEs) organized by access level)
Hozzáférési szint módosításaChange Level of Access (Contact context menu item that allows the user to assign an access level to the selected contact(s))
indexelt szekvenciális hozzáférési eljárás, ISAMindexed sequential access method (A technique for indexing database records that allows sequential or random access of records. When records are accessed sequentially they are accessed in the order in which they were entered in the database, and when records are accessed randomly, the records are accessed through an index)
információ-hozzáférési szolgáltatásInformation Access Service (A part of an IrDA infrared communication protocol used so that devices can learn about the services offered by another device)
korlátozott hozzáférési jogkivonatrestricted access token (An access token with restricted access to securable objects or performing privileged tasks)
központi hozzáférési házirendcentral access policæ (An access policy that allows organizations to centrally deploy and manage authorization policies that include conditional expressions using user groups, user claims, device claims, and resource properties)
mező-hozzáférési profilfield access profile (The set of field-level access permissions that have been granted to a user or users)
osztott hozzáférési jogkivonatsplit access token (A combination of full access token and filtered access token linked together by the local security authority (LSA) component of the operating system)
speciális hozzáférési engedélyekspecial permissions (On NTFS volumes, a custom set of permissions. You can customize permissions on files and directories by selecting the individual components of the standard sets of permissions)
szolgáltatás hozzáférési pontservice access point (A logical address that allows a system to route data between a remote device and the appropriate communications support)
szűrt hozzáférési jogkivonatfiltered access token (An access token with the least administrative privileges required for the session. It is a restricted access token where all elevated privileges have been filtered out. A filtered access token is created by default for all interactive users that are not standard users, except the built-in administrator)
tartalom-hozzáférési fiókcontent access account (An account used to crawl Web sites, servers and network resources included in a content index)
teljes jogú hozzáférési jogkivonatfull privilege access token (An access token with the maximum privileges authorized for the account. Used by User Account Control (UAC))
teljes körű hozzáférési jogkivonatfull access token (An access token with the maximum privileges authorized for the account. Used by User Account Control (UAC))
UAC hozzáférési jogkivonatUAC access token (An access token with the least administrative privileges required for the session. It is a restricted access token where all elevated privileges have been filtered out. A filtered access token is created by default for all interactive users that are not standard users, except the built-in administrator)
802.1X-kompatibilis vezeték nélküli hozzáférési pont802.1X-capable wireless access point (A network access server that adheres to both the Institute of Electrical and Electronics Engineers (IEEE) 802.1X and the Remote Authentication Dial-in User Service (RADIUS) standards, and that is deployed in networks to enforce 802.1X authenticated IEEE 802.3 wired Ethernet access)