All > Technology > Operating System > Microsoft Windows > Microsoft Windows Server > Microsoft Active Directory
The object identifier that is assigned to Active Directory Application Mode (ADAM). This object identifier can be used to programmatically differentiate ADAM from other directory services.- Browse Related Terms: 1.2.840.113556.1.4.1851, Active Directory Application Mode (ADAM) instance, ADAM, ADAM instance, ADAMSync, csvde, Globally Unique Identifier (GUID), ldifde
All > Technology > Operating System > Microsoft Windows > Microsoft Windows Server
A security feature of Windows that allows administrators to perform normal day-to-day tasks while running with a standard user token. If administrator privileges are needed for an operation, the administrator will be notified and asked to provide either consent or credentials, depending on system policy settings.
- Browse Related Terms: AAM, Admin Approval Mode, administrative task, AIS, Application Information Service, consent prompt, credential prompt, elevation prompt, OTS, Over The Shoulder, secure desktop
Also listed in:
All > Technology > Operating System > Microsoft Windows > Microsoft Windows Server > Microsoft Active Directory
The management of permissions for logging on to a computer or network.
- Browse Related Terms: access control, access control entry (ACE), access control list (ACL), access token, Firewall, group, Group memberships, Network Service account, Owner, Permissions, security context, security descriptor, Security Groups, security identifier (SID), Security principal, Security protocol, service account, user account
Also listed in:
- All > Technology > Collaboration > SharePoint
- All > Technology > E-mail > Lotus Domino
- All > Technology > E-mail > Microsoft Email > Microsoft Exchange > Microsoft Exchange 2003
- All > Technology > E-mail > Microsoft Email > Microsoft Exchange > Microsoft Exchange 2007
- All > Technology > Programming > Java
- All > Technology > Security
- All > Technology > Telecommunications
All > Technology > Operating System > Microsoft Windows > Microsoft Windows Server > Microsoft Active Directory
In Windows-based systems, an entry in an access control list containing the security identifier for a user or group and an access mask that specifies which operations by the user or group are allowed, denied, or audited. All objects in the Active Directory are protected by a security descriptor – the security descriptor contains an access control list which contains access control entries (ACEs) – these ACEs collectively specify the set of permissions that various security principals (users, groups, computers) have on that object.An entry in an object's discretionary access control list (DACL) that grants permissions to a user or group. An ACE is also an entry in an object's system access control list (SACL) that specifies the security events to be audited for a user or group.
- Browse Related Terms: access control, access control entry (ACE), access control list (ACL), access token, Firewall, group, Group memberships, Network Service account, Owner, Permissions, security context, security descriptor, Security Groups, security identifier (SID), Security principal, Security protocol, service account, user account
Also listed in:
- All > Technology > Collaboration > SharePoint
All > Technology > Operating System > Microsoft Windows > Microsoft Windows Server > Microsoft Active Directory
In Windows-based systems, a list of access control entries that apply to an entire object, a set of the object's properties, or an individual property of an object, which define the access granted to one or more security principals. All objects in the Active Directory are protected by a security descriptor – the security descriptor contains an access control list which contains access control entries (ACEs) – these ACEs collectively specify the set of permissions that various security principals (users, groups, computers) have on that object.A list of security protections that apply to an entire object, a set of the object's properties, or an individual property of an object. There are two types of access control lists: discretionary and system.
Also listed in:
All > Technology > Operating System > Microsoft Windows > Microsoft Windows Server
A component of Cisco Identity Based Networking Services (IBNS) architecture that improves network access security for Cisco network devices.
- Browse Related Terms: Access Control Server, ACS, boundary network, compliant computer, exemption certificate, Group Policy client-side extension, health policy, noncompliant computer, Resource Monitor, restricted network, secure network
All > Technology > Operating System > Microsoft Windows > Microsoft Windows Server
A data structure that contains authentication and authorization information for a user. Windows creates the access token when the user logs on and the user's identity is confirmed. The access token contains the user's security ID (SID), the list of groups that the user is a member of, and the list of privileges held by that user. Each process or thread started for the user inherits a copy of the access token. In some cases a user may have more than one access token, with different levels of authority.
- Browse Related Terms: access token, privilege isolation, process access token, quiet mode, UI Privilege Isolation, UIPI, User Interface Privilege Isolation
All > Technology > Operating System > Microsoft Windows > Microsoft Windows Server > Microsoft Active Directory
A data structure that contains authorization information for a user or group. A system uses an access token to control access to securable objects and to control the ability of a user to perform various system-related operations on a local computer.- Browse Related Terms: access control, access control entry (ACE), access control list (ACL), access token, Firewall, group, Group memberships, Network Service account, Owner, Permissions, security context, security descriptor, Security Groups, security identifier (SID), Security principal, Security protocol, service account, user account
Also listed in:
- All > Technology > Collaboration > SharePoint
All > Technology > Operating System > Microsoft Windows > Microsoft Windows Server
The federation server that is located in the corporate network of the account partner organization. The account federation server issues security tokens to users based on user authentication. The server authenticates a user, pulls the relevant attributes and group membership information out of the account store, and generates and signs a security token to return to the userâeither to be used in its own organization or to be sent to a partner organization.
- Browse Related Terms: account federation server, account partner, AD FS-enabled Web server, AppCompat database, application compatibility database, federated application, federated user, organization claim, requested execution level, resource federation server, resource partner, run level, token-signing certificate, verification certificate, Windows NT token-based application
All > Technology > Operating System > Microsoft Windows > Microsoft Windows Server
The federation server proxy that is located in the perimeter network of the account partner organization. The account federation server proxy collects authentication credentials from a client that logs on over the Internet (or from the perimeter network) and passes those credentials to the account federation server.
- Browse Related Terms: account federation server proxy, client authentication certificate, federation server, federation server proxy, Firewall, resource federation server proxy, scalability, server authentication certificate
All > Technology > Operating System > Microsoft Windows > Microsoft Windows Server
A federation partner that is trusted by the Federation Service to provide security tokens to its users (that is, users in the account partner organization) so that they can access Web-based applications in the resource partner.
- Browse Related Terms: account federation server, account partner, AD FS-enabled Web server, AppCompat database, application compatibility database, federated application, federated user, organization claim, requested execution level, resource federation server, resource partner, run level, token-signing certificate, verification certificate, Windows NT token-based application
All > Technology > Operating System > Microsoft Windows > Microsoft Windows Server > Microsoft Active Directory
See definition for: Access Control Entry (ACE)- Browse Related Terms: ACE, ACL, ADSI, DNS, DSML, ESE, GC, GUID, KCC, LDAP, OU, RDN, RPC, SID, SSL, SSP, SSPI, Token
Also listed in:
- All > Technology > Collaboration > SharePoint
- All > Technology > Defense
All > Technology > Operating System > Microsoft Windows > Microsoft Windows Server > Microsoft Active Directory
See definition for: Access Control List (ACL)- Browse Related Terms: ACE, ACL, ADSI, DNS, DSML, ESE, GC, GUID, KCC, LDAP, OU, RDN, RPC, SID, SSL, SSP, SSPI, Token
Also listed in:
- All > Technology > Collaboration > SharePoint
- All > Technology > Defense
- All > Technology > Storage
All > Technology > Operating System > Microsoft Windows > Microsoft Windows Server
A component of Cisco Identity Based Networking Services (IBNS) architecture that improves network access security for Cisco network devices.
- Browse Related Terms: Access Control Server, ACS, boundary network, compliant computer, exemption certificate, Group Policy client-side extension, health policy, noncompliant computer, Resource Monitor, restricted network, secure network
Also listed in:
- All > Technology > Defense
All > Technology > Operating System > Microsoft Windows > Microsoft Windows Server > Microsoft Active Directory
The Windows-based directory service. Active Directory stores information about objects on a network and makes this information available to users and network administrators. Active Directory gives network users access to permitted resources anywhere on the network using a single logon process. It provides network administrators with an intuitive, hierarchical view of the network, and a single point of administration for all network objects.A Hierarchical Database, a secure environment where users can interact either with each other or with network components all according to the business rules of the enterprise.
- Browse Related Terms: Active Directory, Active Directory (AD), Computers, Directory, Hierarchical namespace, Resource Publishing, Users
Also listed in:
All > Technology > Operating System > Microsoft Windows > Microsoft Windows Server > Microsoft Active Directory
A structure supported by Windows 2000 that lets any object on a network be tracked and located. Active Directory is the directory service used in Windows 2000 Server and provides the foundation for Windows 2000 distributed networks. The directory service that stores information about objects on a network and makes this information available to users and network administrators. Active Directory gives network users access to permitted resources anywhere on the network using a single logon process. It provides network administrators with an intuitive, hierarchical view of the network and a single point of administration for all network objects.
- Browse Related Terms: Active Directory, Active Directory (AD), Computers, Directory, Hierarchical namespace, Resource Publishing, Users
All > Technology > Operating System > Microsoft Windows > Microsoft Windows Server > Microsoft Active Directory
A stand-alone directory service that is designed specifically for use with directory-enabled applications. Active Directory Application Mode (ADAM) does not require or depend on Active Directory forests or domains. ADAM stores and replicates only application-related information. ADAM does not store or replicate network operating system (NOS)-related information.- Browse Related Terms: Active Directory Application Mode (ADAM), Application Partition, Application partition (in Active Directory), Application partition (in ADAM), Configuration partition (in Active Directory), Configuration partition (in ADAM), configuration set, Directory partition, Forest trusts, Global Catalog (GC), Multi-master Replication, Multi-master replication (in Active Directory), Multi-master replication (in ADAM), Partition, Replica, Schema partition, Synchronization
All > Technology > Operating System > Microsoft Windows > Microsoft Windows Server > Microsoft Active Directory
For Active Directory Application Mode (ADAM), a single copy of the ADAM directory service, along with its associated directory store, assigned Lightweight Directory Access Protocol (LDAP) and Secure Sockets Layer (SSL) ports, and application event log. You can run multiple ADAM instances simultaneously on a single computer.- Browse Related Terms: 1.2.840.113556.1.4.1851, Active Directory Application Mode (ADAM) instance, ADAM, ADAM instance, ADAMSync, csvde, Globally Unique Identifier (GUID), ldifde
All > Technology > Operating System > Microsoft Windows > Microsoft Windows Server
The Microsoft Windows based directory service. Active Directory stores information about objects on a network and makes this information available to users and network administrators.
- Browse Related Terms: Active Directory Domain Services, Active Directory Domain Services Installation Wizard, AD DS, claim mapping, claims-aware application, client account partner discovery Web page, client logoff Web page, contiguous namespace, disjoint namespace, Group Policy container, Password Settings Container, pre-staged client, primary DNS suffix, PSC, resource account, resource group, Web Services Security, WS-Security
All > Technology > Operating System > Microsoft Windows > Microsoft Windows Server
The tool that is used to install and remove Active Directory Domain Services (AD DS).
- Browse Related Terms: Active Directory Domain Services, Active Directory Domain Services Installation Wizard, AD DS, claim mapping, claims-aware application, client account partner discovery Web page, client logoff Web page, contiguous namespace, disjoint namespace, Group Policy container, Password Settings Container, pre-staged client, primary DNS suffix, PSC, resource account, resource group, Web Services Security, WS-Security
All > Technology > Operating System > Microsoft Windows > Microsoft Windows Server
A component that provides Web single-sign-on (SSO) technologies. AD FS provides SSO by securely sharing digital identity and entitlement rights across security and enterprise boundaries. AD FS supports the WS-Federation Passive Requestor Profile (WS-F PRP).
- Browse Related Terms: Active Directory Federation Services, AD FS, AD FS Web Agent, claim, client logon Web page, Federation Service Proxy, FSP, passive client, WS-F PRP, WS-Federation Passive Requestor Profile