French | English |
accès au pilote personnalisé | custom driver access (Device IO Control to 3rd party driver, a form of restricted device interface access for privileged apps) |
accès authentifié | authenticated access (A user access option that you specify at the default Web site level or Application level in IIS. Authenticated access requires a user to have a valid account and password to access the site) |
accès aux informations de l'autorité | authority information access (A certificate extension that contains information useful for verifying the trust status of a certificate, as defined by the 2008 Memo of the Network Working Group. This information potentially includes Uniform Resource Locations (URLs) where the issuing CA's certificate can be retrieved, as well as a location of an Online Certificate Status Protocol (OCSP) responder configured to provide status for the certificate in question) |
accès client | client access (The ability of client computers to connect to a server or resource, for example, a file on a server or a cluster resource) |
accès concurrentiel optimiste | optimistic concurrency (A method of managing concurrency by using a cached object's version information. Because every update to an object changes its version number, using version information prevents the update from overwriting someone else's changes) |
accès concurrentiel pessimiste | pessimistic concurrency (A method of managing concurrency by using a lock technique to prevent other clients from updating the same object at the same time) |
accès de niveau Opérateur | custodian access (The highest level of access) |
accès direct | direct access (The ability of a computer to find and go directly to a particular storage location without having to search sequentially from the beginning location. The human equivalent of random access would be the ability to find a desired address in an address book without having to proceed sequentially through all the addresses. A computer's semiconductor memory (both RAM and ROM) provides random access. Certain types of files stored on disk under some operating systems also allow random access. Such files are best used for data in which each record has no intrinsic relationship to what comes physically before or after it, as in a client list or an inventory) |
accès direct à la mémoire | direct memory access A technology that allows certain devices, such as hard disks and CD or DVD drives, to transfer information directly through the computer's memory without using the computer's processor. DMA improves the performance of the device and frees the computer's processor so it can perform other tasks (DMA) |
accès direct à la mémoire par ventilation-regroupement | scatter/gather direct memory access (A form of direct memory access (DMA) in which data is transferred to and from noncontiguous ranges of physical memory) |
Accès direct à la mémoire à distance | Remote Direct Memory Access A networking feature that lets one computer directly place information into the memory of another computer (RDMA) |
accès en lecture | read access (A privilege on a computer system that allows a user to read stored data) |
Accès en tout lieu | Anywhere Access (A collection of product and platform remote access technologies that enable users anywhere on the Internet to access information located behind the corporate firewall) |
accès en écriture | write access (A privilege on a computer system that allows a user to save, change, or delete stored data. Write access is usually set by the system administrator for a networked or server system and by the owner of the computer for a stand-alone machine) |
accès externe | external access (Authenticated access that can be granted to external partners and clients to enable sharing of selected SharePoint Online content) |
accès hors-bande | out-of-band access (Access to host via a connection that doesn't use the IP network) |
accès intrabande | in-band access (Access to host via a connection that does use the IP Network) |
accès invité | guest access (A type of access that allows visitors to use their own desktop computers on limited resources (such as the Internet or LAN printers) without compromising a company's internal network security) |
accès limité | limited access (Access to fewer features than the computer normally has. This reduced access will last for a short amount of time before the computer becomes inoperable) |
Accès mobile pour Windows SharePoint Services | Mobile Access for Windows SharePoint Services (A feature that enables mobile devices, such as cellular phones, to access some SharePoint services) |
accès multithread non synchronisé | multithreaded unsynchronized access (The operation in which two or more threads attempt to call simultaneously into the heap) |
accès mémoire non uniforme | non-uniform memory access (Access by a CPU of local as well as foreign memory. This process, which is enabled by NUMA architecture, results in different access speeds) |
accès opérateur | custodian access (The highest level of access) |
Accès rapide | Quick Path (A control that provides the essential user interface needed for a task, making the interaction straightforward. This feature shows only the most most relevant and most often used information options in a simple format) |
Accès rapide à Exchange | Exchange Fast Access (A feature that enables Exchange users to see new email messages and up-to-date calendar items as soon as they open Outlook, without waiting for it to finish synchronizing) |
accès redirigé | redirected access (Functionality that redirects all I/O operations over the network to another node that has access to the required drive) |
accès réseau à distance | dial-up networking (Connecting to other computers or to the Internet by using a modem and a telephone line) |
accès TAP | Test Access Port (A collection of boundary scan control signals that define a serial protocol for scan-based devices. There are five pins, TCK/clock, TMS/mode select, TDI/data in, TDO/data out, and TRST/reset) |
accès total | full access (A privilege on a computer system that allows a user to read, write, and delete data) |
accès utilisateur anonyme | anonymous user access (The ability to gain access to a Web server on which one does not have an account) |
Accès Web Windows PowerShell | Windows PowerShell Web Access (A feature that lets a server act as a web gateway through which an organization's users can manage remote computers by running Windows PowerShell sessions in a web browser) |
accès à distance | remote access (Part of the integrated Routing and Remote Access service that provides remote networking for telecommuters, mobile workers, and system administrators who monitor and manage servers at multiple branch offices. Users can use Network Connections to dial in to remotely access their networks for services such as file and printer sharing, electronic mail, scheduling, and SQL database access) |
Accès à distance | DUN (A Windows CE-based application that enables remote users to connect to a network) |
Accès à distance | Dial-Up Networking (A Windows CE-based application that enables remote users to connect to a network) |
accès à Internet | Internet access (The capability of a user to connect to the Internet) |
API d'accès aux périphériques | Device Access API (A set of COM interfaces that a device companion app can use to send requests, to a specialized device, synchronously or asynchronously) |
assistance en cas d'accès refusé | access-denied assistance (" Assistance provided to users who receive an "access denied" error while attempting to access a file or folder on a file server for which access-denied assistance has been enabled by the administrator of the server.") |
attribution de privilèges d'accès | provisioning (The assignment of access privileges and system resources to users, including employees, contingent staff and business partners; frequently automated as part of Identity and Access Management solutions in order to reduce ongoing support costs and enable corporations to demonstrate their compliance with documented security policies) |
autorisation d'accès en lecture | Read permission (Authorization for a user or role to read data in a form or report, but not to enter data, make edits, or modify the properties of the form or report) |
autorisation d'accès en lecture/écriture | Read+Write permission (A designation that indicates that certain users or roles have both Read and Write permissions to an object or data set) |
autorisation d'accès en écriture | Write permission (A designation that indicates that certain users or roles may enter data, make edits, or modify the properties of a form or report) |
autorisations d'accès | access permissions (Authorization to perform operations associated with a specific shared resource, such as a file, directory, or printer. Permissions must be granted by the system administrator to individual user accounts or administrative groups) |
barre d'accès | access bar (A toolbar that docks to the desktop, similar to the taskbar) |
barre d'outils Accès rapide | Quick Access Toolbar (A customizable toolbar that provides one-click access to commands) |
chemin d'accès | path (A sequence of folders (directories) that leads to a specific file or folder. A backslash is used to separate each folder in the path. For example, the path to a file called invoice.txt might be C:\Documents\July\invoice.txt) |
chemin d'accès absolu | absolute path (A path to a file that begins with the drive identifier and root directory or with a network share and ends with the complete file name (for example, C:\docs\work\contract.txt or \\netshare\docs\work\contract.txt)) |
chemin d'accès associé à une racine | rooted path (A sequence of folders (directories) that begins with a drive letter and colon (for example, C:) or a directory separator character (\) and leads to a specific file or folder) |
chemin d'accès au script d'ouverture de session | logon script path (A sequence of directory names that specifies the location of the logon script. When a user logs on, the authenticating computer locates the specified logon script (if one has been assigned to that user account) by following that computer's local logon script path (usually systemroot\\\\System32\\\\Repl\\\\Import\\\\Scripts)) |
chemin d'accès canonique | canonical path (The definitive path for navigating to a category or product that is a member of more than one category. The primary parent category determines the canonical path to a category or product) |
chemin d'accès complet | fully qualified path (A path to a file that begins with the drive identifier and root directory or with a network share and ends with the complete file name (for example, C:\docs\work\contract.txt or \\netshare\docs\work\contract.txt)) |
chemin d'accès complet | full path (In a hierarchical filing system, a path name containing all the possible components of a pathname, including the network share or drive and root directory, as well as any subdirectories and the file or object name) |
chemin d'accès de certification | certification path (A sequence of certificates, where each certificate in the sequence is signed by the subsequent certificate. The last certificate in the chain is normally a self-signed certificate) |
chemin d'accès de la requête | query path (A string representation of a path that specifies which related objects to return when a typed object query is executed) |
chemin d'accès de partage | share path (The full name of a resource on a network in the format \\servername\sharename, which can include a directory path under the share name) |
chemin d'accès d'ordinateur hôte | host path (A sequence of host group names that specifies the location of a virtual machine host or host group within the hierarchy of host groups. All host paths begin with the root host group, Managed Computers) |
chemin d'accès du fichier journal | log file path (The location of the log file on a computer) |
chemin d'accès physique | physical path (The physical location of a directory or file. May be either a path on the local computer or a universal naming convention (UNC) path on a remote computer) |
chemin d'accès relatif | relative path (A path that is implied by the current working directory. When a user enters a command that refers to a file, if the full pathname is not entered, the current working directory becomes the relative path of the file referred to) |
chemin d'accès UNC | Universal Naming Convention path The standard path to access network shares (Universal Naming Convention) |
chemin d'accès UNC | UNC path (The standard path to access network shares) |
chemin d'accès virtuel | virtual path (A sequence of names that is used to locate a file and that has the same form as a pathname in the file system but is not necessarily the actual sequence of directory names under which the file is located. The part of a URL that follows the server name is a virtual path. For example, if the directory c:\bar\sinister\forces\distance on the server miles is shared on the local area network at foo.com under the name \\miles\baz and contains the file elena.html, that file may be returned by a Web request for http://miles.foo.com/baz/elena.html) |
chemin d'accès à l'objet | object path (A formatted string used to access namespaces, classes, and instances. Each object on the system has a unique path that identifies it locally or over the network. Object paths are conceptually similar to Universal Resource Locators (URL)) |
cheval de Troie autorisant un accès à distance | remote access Trojan (A type of Trojan that provides remote access to a computer) |
clé d'accès de stockage | storage access key (A value that is unique to a storage account and that can be used to connect to the storage account from code running in a Windows Azure cloud service, locally on a developer's machine, or anywhere else that has Internet connectivity) |
code d'accès | access code (A string of characters entered by a user to verify his or her identity to a network or to a local computer, device, or client, or to sign in to an account, app, and so on) |
code d'accès en cas d'urgence | emergency access code (An emergency access code is a set of letters and numbers that can be included on your emergency profile wallet card or sheet) |
code d'accès à l'international | international access code (The prefix that is used to direct a call internationally. The International Access Code is 011 in the United States and 00 in much of the rest of the world) |
code d'accès à une ligne extérieure | outside line access code (The prefix that is used to access an outside line. In the United States, this prefix is typically 9) |
compte d'accès | access account (An account used to crawl Web sites, servers and network resources included in a content index) |
compte d'accès au contenu | content access account (An account used to crawl Web sites, servers and network resources included in a content index) |
compteur de page d'accès | entry page count (The number of visitors who entered a web site on a particular page on that site) |
Configuration de l'accès Web aux programmes RemoteApp et aux services Bureau à distance | RemoteApp and Desktop Web Access Configuration (An option on the Remote Desktop Services menu on the Administrative Tools menu that opens the RAD Web Access Web site for administrative purposes) |
Configuration de l'accès Web des services Bureau à distance | Remote Desktop Web Access Configuration (In Remote Desktop Services, the site where you can configure the RD Web Access Web Part) |
Configuration de l'accès Web RAD | RAD Web Access Configuration (An option on the Remote Desktop Services menu on the Administrative Tools menu that opens the RAD Web Access Web site for administrative purposes) |
connexion d'accès à distance | dial-up connection (A connection to other computers or to the Internet using a device that uses the telephone network) |
contrôle d'accès | access control (A security mechanism that determines which operations a user, group, service, or computer is authorized to perform on a computer or on a particular object, such as a file, printer, registry subkey, or directory service object) |
contrôle d'accès au contenu | content rating (A value assigned to an item of media content that indicates its suitability for a particular audience) |
contrôle d'accès dynamique | dynamic access control (The ability for IT pros to define how users access a system based on dynamic qualities, such as a user's location or role) |
demandes d'accès à un site Web | Website requests (The tab on the Family Safety website that displays requests a child has made via e-mail to view a blocked website) |
dispositif de stockage à accès direct | direct access storage device (A data storage device by which information can be accessed directly, instead of by passing sequentially through all storage areas. For example, a disk drive is a DASD, but a tape unit is not, because, with a tape unit, the data is stored as a linear sequence) |
déploiement avec accès via Internet | Internet-facing deployment (A method of deploying on-premises CRM so that remote users can connect to the application from the Internet) |
entrée de contrôle d'accès | access control entry (An entry in either a securable object's discretionary access control list (DACL) or an object's system access control list (SACL). In a DACL, the entry grants or denies permissions to a user or group. In a SACL, the entry specifies which security events to audit for a particular user or group or controls the Windows Integrity Level for the object) |
fournisseur d'accès | access provider (A business that supplies Internet connectivity services to individuals, businesses, and other organizations. An ISP provides a telephone number, a user name, a password, and other connection information so that users can access the Internet through the ISP's computers) |
fournisseur d'accès à Internet | Internet access provider (A business that supplies Internet connectivity services to individuals, businesses, and other organizations. An ISP provides a telephone number, a user name, a password, and other connection information so that users can access the Internet through the ISP's computers) |
Gestion des niveaux d'accès | Access Levels Management (A UI element that displays a user's contacts and access level entries (ACEs) organized by access level) |
gestionnaire d'accès | Content Advisor (A tool in Microsoft Internet Explorer that lets you control which sites users on your computer can visit. This is particularly helpful for parents who want to control the content their children view on the Web) |
groupe de demandes d'accès | challenge group (The group that consists of requests/connections awaiting authentication) |
jeton d'accès | access token (A data structure that contains authentication and authorization information for a user. Windows creates the access token when the user logs on and the user's identity is confirmed. The access token contains the user's security ID (SID), the list of groups that the user is a member of, the list of privileges held by that user. Each process or thread started for the user inherits a copy of the access token. In some cases a user may have more than one access token, with different levels of authority) |
jeton d'accès combiné | split access token (A combination of full access token and filtered access token linked together by the local security authority (LSA) component of the operating system) |
jeton d'accès complet | full privilege access token (An access token with the maximum privileges authorized for the account. Used by User Account Control (UAC)) |
jeton d'accès complet | full access token (An access token with the maximum privileges authorized for the account. Used by User Account Control (UAC)) |
jeton d'accès du processus | process access token (A data structure that contains authentication and authorization information for a user. Windows creates the access token when the user logs on and the user's identity is confirmed. The access token contains the user's security ID (SID), the list of groups that the user is a member of, the list of privileges held by that user. Each process or thread started for the user inherits a copy of the access token. In some cases a user may have more than one access token, with different levels of authority) |
jeton d'accès filtré, utilisateur avec accès restreint | filtered access token (An access token with the least administrative privileges required for the session. It is a restricted access token where all elevated privileges have been filtered out. A filtered access token is created by default for all interactive users that are not standard users, except the built-in administrator) |
jeton d'accès restreint | restricted access token (An access token with restricted access to securable objects or performing privileged tasks) |
jeton d'accès UAC | UAC access token (An access token with the least administrative privileges required for the session. It is a restricted access token where all elevated privileges have been filtered out. A filtered access token is created by default for all interactive users that are not standard users, except the built-in administrator) |
jeton d'accès à faible niveau d'intégrité | low integrity access token (A filtered access token that is created with a low integrity level. This access token is used by Internet Explorer Protected Mode, but can also be used by other applications) |
Journalisation des accès utilisateur | User Access Logging (A logging feature that gathers unique client records and events for later retrieval by an administrator using WMI or PowerShell) |
licence d'accès client aux services Bureau à distance | Remote Desktop Services client access license (A license that is required for a user or a device to connect to a remote desktop server) |
licence d'accès client aux services Bureau à distance | RDS CAL (A license that is required for a user or a device to connect to a remote desktop server) |
licence d'accès client aux services Bureau à distance par appareil | Remote Desktop Services Per Device client access license (One of the two types of Remote Desktop Services client access licenses (RDS CALs) that permits one device (used by any user) to connect to a remote desktop server) |
licence d'accès client aux services Bureau à distance par appareil | RDS Per Device CAL (One of the two types of Remote Desktop Services client access licenses (RDS CALs) that permits one device (used by any user) to connect to a remote desktop server) |
licence d'accès client aux services Bureau à distance par utilisateur | Remote Desktop Services Per User client access license (One of the two types of Remote Desktop Services client access licenses (RDS CALs) that permits one user to access remote desktop servers from an unlimited number of client computers or devices) |
licence d'accès client aux services Bureau à distance par utilisateur | RDS Per User CAL (One of the two types of Remote Desktop Services client access licenses (RDS CALs) that permits one user to access remote desktop servers from an unlimited number of client computers or devices) |
limitation des tentatives d'accès | request throttling (A method of preventing a denial of service attack by limiting the number of requests that can be made to a system) |
liste d'accès à la publication | publication access list (The primary mechanism for securing the Publisher. It contains a list of logins, accounts, and groups that are granted access to the publication) |
liste d'accès à la publication | PAL (The primary mechanism for securing the Publisher. It contains a list of logins, accounts, and groups that are granted access to the publication) |
liste de contrôle d'accès | access control list (In Windows-based systems, a list of access control entries (ACE) that apply to an entire object, a set of the object's properties, or an individual property of an object, and that define the access granted to one or more security principals) |
liste de contrôle d'accès discrétionnaire | discretionary access control list (An access control list that is controlled by the owner of an object and that specifies the access particular users or groups can have to the object) |
liste de contrôle d'accès système | system access control list (An ACL that controls the generation of audit messages for attempts to access a securable object. The ability to get or set an object's SACL is controlled by a privilege typically held only by system administrators) |
mappage des accès de substitution | alternate access mapping (An alternate URL mapping that Windows SharePoint Services preserves in the mapping table. It is the URL a user would see, but is not a URL that IIS would give to WSS) |
masque d'accès | access mask (In Windows-based computers, a 32-bit value (a bitmask) that specifies the permissions that are assigned in an access control entry (ACE). An access mask is also part of the access request when an object is opened. The access mask in the request is compared to the access mask in each ACE to determine whether or not to grant the request) |
Microsoft Dynamics CRM pour Microsoft Office Outlook avec accès hors connexion | Microsoft Dynamics CRM for Microsoft Office Outlook with Offline Access (The laptop client version of the Microsoft Dynamics CRM product suite for Microsoft Office Outlook) |
Modifier le niveau d'accès | Change Level of Access (Contact context menu item that allows the user to assign an access level to the selected contact(s)) |
Modèle d'accès à dispositif spécialisé | Specialized Device Access Model (The model that describes the two ways that a Windows Store app can access a specialized device: Open Access Model and Restricted Device Access Model) |
modèle d'accès à un périphérique ouvert | Open Device Access Model (The access model for horizontal solutions, which enables a horizontal strategy. Open Device Access enables many different Windows Store apps to access a specialized device. Examples: a smartphone with multiple apps that synchronize contacts; a pedometer that allows multiple apps to read its data and post it to a website) |
modèle d'accès à un périphérique restreint | Restricted Device Access Model (The device access model for vertical solutions. Restricted Device Access does not allow other applications to access a specialized device) |
méthode d'accès séquentiel indexé | indexed sequential access method (A technique for indexing database records that allows sequential or random access of records. When records are accessed sequentially they are accessed in the order in which they were entered in the database, and when records are accessed randomly, the records are accessed through an index) |
niveau d'accès | access level (A security role setting that determines for a given object type at which levels within the organization hierarchy a user can act on that object type) |
niveau d'accès du champ | field-level access (The permission that is assigned to a user or users that allow them to read, update, or create a specific field) |
Nom du point d'accès | Access Point Name (A field in the Properties dialog box for GPRS installation items in the Mobile Deployment Manager MMC snap-in that enables the user to specify the wireless access point for the device) |
nom du point d'accès, APN | APN (The name of the access point used to establish wireless connectivity) |
nombre d'accès | hit count (The number of times a function or line of source code is called (or hit), as reported by the profiler when analyzing a program at run time) |
numéro d'accès d'abonné | subscriber access number (A number that is configured in a Private Branch eXchange (PBX) that allows a subscriber to access their Microsoft Exchange mailbox over the telephone) |
option Restriction de l'accès à la mise en quarantaine du courrier indésirable sur la base de l'adresse IP | IP Restrict Spam Quarantine option (The option on the Spam Filter page that restricts access to monitoring and managing Spam Quarantine by IP address) |
ordinateur en accès partagé | shared access computer (A computer in a public environment that is accessed by several different users on a daily basis) |
page d'accès | entry page (The page on which a visitor entered a web site (e.g. Home page, About Us page, or Contact Us page)) |
page d'accès aux données | data access page (A Web page, published from Access, that has a connection to a database. In a data access page, you can view, add to, edit, and manipulate the data stored in the database) |
Point d'accès | APN (The name of the access point used to establish wireless connectivity) |
point d'accès | hotspot (A public place (such as a coffee shop, airport, or hotel) with a wireless network that you can use to connect to the Internet) |
point d'accès | access point (A device used to connect wireless computers and other wireless devices to a wired network) |
point d'accès au service | service access point (A logical address that allows a system to route data between a remote device and the appropriate communications support) |
point d'accès client | client access point (In SMS 2003 and earlier releases, an SMS site system that provides a communication point between the SMS site server and Legacy Client computers. Legacy Clients deliver their collected files, inventory information, discovery data records, software metering data, and status information to CAPs) |
point d'accès client | CAP (In SMS 2003 and earlier releases, an SMS site system that provides a communication point between the SMS site server and Legacy Client computers. Legacy Clients deliver their collected files, inventory information, discovery data records, software metering data, and status information to CAPs) |
point d'accès Internet | Internet APN (An APN (Access Point Name) that determines the cellular data networks to which a phone can connect. It includes information about what kind of connection, security, and type of IP address the phone should use for the Internet connection) |
point d'accès MMS | MMS APN (The APN (Access Point Name) a phone can use to send MMS messages (text messages with multimedia files attached)) |
point d'accès sans fil compatible 802.1X | 802.1X-capable wireless access point (A network access server that adheres to both the Institute of Electrical and Electronics Engineers (IEEE) 802.1X and the Remote Authentication Dial-in User Service (RADIUS) standards, and that is deployed in networks to enforce 802.1X authenticated IEEE 802.3 wired Ethernet access) |
point d'accès sans fil mobile | mobile hotspot (A device that shares its Internet connection with other Wi-Fi-enabled devices) |
point d'accès Wi-Fi | Wi-Fi hotspot (A public place (such as a coffee shop, airport, or hotel) with a wireless network that you can use to connect to the Internet) |
Principes d'accès aux données et de testabilité de documents numériques | Principles for the data access and the testability of digital documents (A German law that requires tax authorities to be capable of digitally checking data from electronic bookkeeping systems) |
privilèges d'accès | access privileges (The type of operations permitted for a given user of a certain system resource on a network or a file server) |
profil d'accès aux champs | field access profile (The set of field-level access permissions that have been granted to a user or users) |
profil d'accès par câble | wired profile (A collection of security and connectivity settings that are used for 802.1X authenticated wired access) |
protection d'accès permanente | on-access protection (Virus protection (e.g. antivirus software) that is active continuously, as opposed to on demand) |
Protection d'accès réseau | Network Access Protection (A set of operating system components that can help protect access to a private network by enforcing health policies. System administrators establish health policies which NAP enforces by inspecting and assessing the health of client computers, restricting network access when client computers are deemed noncompliant, and remediating noncompliant client computers for full network access. NAP also provides ongoing health compliance enforcement while a client computer is connected to a network) |
Protection d'accès réseau | NAP A set of operating system components that can help protect access to a private network by enforcing health policies. System administrators establish health policies which NAP enforces by inspecting and assessing the health of client computers, restricting network access when client computers are deemed noncompliant, and remediating noncompliant client computers for full network access. NAP also provides ongoing health compliance enforcement while a client computer is connected to a network (NAP) |
redirection du serveur d'accès client | Client Access server redirection (A process by which Outlook Web Access users who access an Internet-facing Client Access server that is in a different Active Directory site than the site that contains their mailbox can be redirected to the Client Access server that is in the same site as their Mailbox server if that Client Access server is Internet-facing) |
Restrictions d'accès au Web | Web restrictions (A feature of Parental Controls that allows users to block Web sites that they don't want to view) |
runtime d'accès concurrentiel | Concurrency Runtime (A concurrent programming framework for C++ that simplifies parallel programming and helps developers write robust, scalable, and responsive parallel applications) |
règle de chemin d'accès au site | site path rule (A rule for a specific part of a site that includes or excludes content from the content index) |
rôle de contrôle d'accès en fonction du rôle | role-based access control role (The user role that is assigned to a user account, which determines the options that are visible to that user and the tasks that the user can perform in the management interface for Exchange Labs) |
rôle serveur d'accès au client | Client Access server role (A set of components and services that enable users to access their Exchange mailboxes through the application Outlook Web Access and the protocols Exchange ActiveSync, Post Office Protocol version 3 (POP3), and Internet Message Access Protocol 4rev1 (IMAP4). The Client Access server role also includes Web services that are used by other Exchange 2007 server roles) |
rôle serveur d'accès au client Exchange | Client Access server role (A set of components and services that enable users to access their Exchange mailboxes through the application Outlook Web Access and the protocols Exchange ActiveSync, Post Office Protocol version 3 (POP3), and Internet Message Access Protocol 4rev1 (IMAP4). The Client Access server role also includes Web services that are used by other Exchange 2007 server roles) |
Serveur d'accès au client | Client Access server (A set of components and services that enable users to access their Exchange mailboxes through the Outlook Web Access application) |
serveur d'accès réseau | network access server (The device that accepts Point-to-Point Protocol (PPP) connections and places clients on the network that the NAS serves) |
serveur Edge d'accès | Access Edge Server (A service that runs on Lync Server that resides in the perimeter network and routes instant messaging (IM) and presence information from external users to internal users) |
service d'accès aux données System Center | System Center Data Access service (A Windows service that runs on the management servers in each management group, and that allows client applications to access Operations Manager data and functionality) |
Service d'accès IAS | Information Access Service A part of an IrDA infrared communication protocol used so that devices can learn about the services offered by another device (Information Access Service) |
Service de contrôle d'accès | Access Control Service (The Windows Azure service that provides federated authentication and rules-driven, claims-based authorization for REST Web services) |
service Edge d'accès | Access Edge service (A service that runs on Lync Server that resides in the perimeter network and routes instant messaging (IM) and presence information from external users to internal users) |
signature d'accès partagé | Shared Access Signature (A URL that grants access rights to containers, blobs, queues, and tables) |
stratégie d'accès | access policy (A policy which defines the permissions and duration of access to an asset) |
stratégie d'accès centralisée | central access policæ (An access policy that allows organizations to centrally deploy and manage authorization policies that include conditional expressions using user groups, user claims, device claims, and resource properties) |
stratégie d'autorisation d'accès aux ressources via les services Bureau à distance | Remote Desktop resource authorization policy (A policy that allows an administrator to specify the network resources that users can connect to through an RD Gateway server. Administrators can configure RD RAPs by using the Add Roles Wizard during installation of the RD Gateway role service, or by using RD Gateway Manager after installation) |
stratégie d'autorisation d'accès aux ressources via les services Bureau à distance | RD RAP (A policy that allows an administrator to specify the network resources that users can connect to through an RD Gateway server. Administrators can configure RD RAPs by using the Add Roles Wizard during installation of the RD Gateway role service, or by using RD Gateway Manager after installation) |
stratégie de sécurité d'accès du code | code access security CAS policy A set of rules that defines security permissions for a collection of assemblies by associating attributes of those assemblies, such as location and signature, with a set of code access security permissions (CAS) |
supprimer les privilèges d'accès | deprovision (To remove an account from a connected data source) |
système d'accès par clavier | Keyboard Access System (A set of accelerator keys with associated icons) |
sécurité d'accès du code | code access security (A mechanism provided by the common language runtime whereby managed code is granted permissions by security policy and these permissions are enforced, helping to limit the operations that the code will be allowed to perform) |
temps d'accès au disque | disk access time (The time needed for a read/write head in a disk drive to locate a track on a disk. Access time is usually measured in milliseconds and is used as a performance measure for hard disks and CD-ROM drives) |
touche d'accès | KeyTip (A keyboard shortcut that is displayed over the option to which it corresponds in the user interface and tells the user which key(s) can be used to access or activate that feature or command) |
touche d'accès rapide | access key (Any combination of keys that must be pressed sequentially) |
trappe d'accès à la lampe | lamp access door (The metal door in the I/O connections area that you must remove to access the lamp assembly) |
URL d'accès | access URL (The internal URL that is used by a crawler to identify and access an item) |
utilisateur avec accès restreint | restricted user (A user who has limited access to certain features or limited ability to perform certain actions in an application or system) |
violation d'accès | access violation (An attempt to run a memory operation that the underlying page protection does not allow. An access violation applies to memory operations, but does not apply when the security manager checks user-mode access rights to objects) |
Vue de gestion des entrées de contrôle d'accès | Access Control Entry Management View (A feature that allows the user to set access levels for a group of contacts) |
Vue de gestion des entrées de contrôle d'accès | ACE Management View (A feature that allows the user to set access levels for a group of contacts) |
zone d'accès sans fil | hotspot (A public place (such as a coffee shop, airport, or hotel) with a wireless network that you can use to connect to the Internet) |
énumération basée sur l'accès | access-based enumeration (A feature that displays only the files and folders that a user has permissions to access) |