DictionaryForumContacts

   French
Terms for subject Microsoft containing Accès | all forms | exact matches only
FrenchEnglish
accès au pilote personnalisécustom driver access (Device IO Control to 3rd party driver, a form of restricted device interface access for privileged apps)
accès authentifiéauthenticated access (A user access option that you specify at the default Web site level or Application level in IIS. Authenticated access requires a user to have a valid account and password to access the site)
accès aux informations de l'autoritéauthority information access (A certificate extension that contains information useful for verifying the trust status of a certificate, as defined by the 2008 Memo of the Network Working Group. This information potentially includes Uniform Resource Locations (URLs) where the issuing CA's certificate can be retrieved, as well as a location of an Online Certificate Status Protocol (OCSP) responder configured to provide status for the certificate in question)
accès clientclient access (The ability of client computers to connect to a server or resource, for example, a file on a server or a cluster resource)
accès concurrentiel optimisteoptimistic concurrency (A method of managing concurrency by using a cached object's version information. Because every update to an object changes its version number, using version information prevents the update from overwriting someone else's changes)
accès concurrentiel pessimistepessimistic concurrency (A method of managing concurrency by using a lock technique to prevent other clients from updating the same object at the same time)
accès de niveau Opérateurcustodian access (The highest level of access)
accès directdirect access (The ability of a computer to find and go directly to a particular storage location without having to search sequentially from the beginning location. The human equivalent of random access would be the ability to find a desired address in an address book without having to proceed sequentially through all the addresses. A computer's semiconductor memory (both RAM and ROM) provides random access. Certain types of files stored on disk under some operating systems also allow random access. Such files are best used for data in which each record has no intrinsic relationship to what comes physically before or after it, as in a client list or an inventory)
accès direct à la mémoiredirect memory access A technology that allows certain devices, such as hard disks and CD or DVD drives, to transfer information directly through the computer's memory without using the computer's processor. DMA improves the performance of the device and frees the computer's processor so it can perform other tasks (DMA)
accès direct à la mémoire par ventilation-regroupementscatter/gather direct memory access (A form of direct memory access (DMA) in which data is transferred to and from noncontiguous ranges of physical memory)
Accès direct à la mémoire à distanceRemote Direct Memory Access A networking feature that lets one computer directly place information into the memory of another computer (RDMA)
accès en lectureread access (A privilege on a computer system that allows a user to read stored data)
Accès en tout lieuAnywhere Access (A collection of product and platform remote access technologies that enable users anywhere on the Internet to access information located behind the corporate firewall)
accès en écriturewrite access (A privilege on a computer system that allows a user to save, change, or delete stored data. Write access is usually set by the system administrator for a networked or server system and by the owner of the computer for a stand-alone machine)
accès externeexternal access (Authenticated access that can be granted to external partners and clients to enable sharing of selected SharePoint Online content)
accès hors-bandeout-of-band access (Access to host via a connection that doesn't use the IP network)
accès intrabandein-band access (Access to host via a connection that does use the IP Network)
accès invitéguest access (A type of access that allows visitors to use their own desktop computers on limited resources (such as the Internet or LAN printers) without compromising a company's internal network security)
accès limitélimited access (Access to fewer features than the computer normally has. This reduced access will last for a short amount of time before the computer becomes inoperable)
Accès mobile pour Windows SharePoint ServicesMobile Access for Windows SharePoint Services (A feature that enables mobile devices, such as cellular phones, to access some SharePoint services)
accès multithread non synchronisémultithreaded unsynchronized access (The operation in which two or more threads attempt to call simultaneously into the heap)
accès mémoire non uniformenon-uniform memory access (Access by a CPU of local as well as foreign memory. This process, which is enabled by NUMA architecture, results in different access speeds)
accès opérateurcustodian access (The highest level of access)
Accès rapideQuick Path (A control that provides the essential user interface needed for a task, making the interaction straightforward. This feature shows only the most most relevant and most often used information options in a simple format)
Accès rapide à ExchangeExchange Fast Access (A feature that enables Exchange users to see new email messages and up-to-date calendar items as soon as they open Outlook, without waiting for it to finish synchronizing)
accès redirigéredirected access (Functionality that redirects all I/O operations over the network to another node that has access to the required drive)
accès réseau à distancedial-up networking (Connecting to other computers or to the Internet by using a modem and a telephone line)
accès TAPTest Access Port (A collection of boundary scan control signals that define a serial protocol for scan-based devices. There are five pins, TCK/clock, TMS/mode select, TDI/data in, TDO/data out, and TRST/reset)
accès totalfull access (A privilege on a computer system that allows a user to read, write, and delete data)
accès utilisateur anonymeanonymous user access (The ability to gain access to a Web server on which one does not have an account)
Accès Web Windows PowerShellWindows PowerShell Web Access (A feature that lets a server act as a web gateway through which an organization's users can manage remote computers by running Windows PowerShell sessions in a web browser)
accès à distanceremote access (Part of the integrated Routing and Remote Access service that provides remote networking for telecommuters, mobile workers, and system administrators who monitor and manage servers at multiple branch offices. Users can use Network Connections to dial in to remotely access their networks for services such as file and printer sharing, electronic mail, scheduling, and SQL database access)
Accès à distanceDUN (A Windows CE-based application that enables remote users to connect to a network)
Accès à distanceDial-Up Networking (A Windows CE-based application that enables remote users to connect to a network)
accès à InternetInternet access (The capability of a user to connect to the Internet)
API d'accès aux périphériquesDevice Access API (A set of COM interfaces that a device companion app can use to send requests, to a specialized device, synchronously or asynchronously)
assistance en cas d'accès refuséaccess-denied assistance (" Assistance provided to users who receive an "access denied" error while attempting to access a file or folder on a file server for which access-denied assistance has been enabled by the administrator of the server.")
attribution de privilèges d'accèsprovisioning (The assignment of access privileges and system resources to users, including employees, contingent staff and business partners; frequently automated as part of Identity and Access Management solutions in order to reduce ongoing support costs and enable corporations to demonstrate their compliance with documented security policies)
autorisation d'accès en lectureRead permission (Authorization for a user or role to read data in a form or report, but not to enter data, make edits, or modify the properties of the form or report)
autorisation d'accès en lecture/écritureRead+Write permission (A designation that indicates that certain users or roles have both Read and Write permissions to an object or data set)
autorisation d'accès en écritureWrite permission (A designation that indicates that certain users or roles may enter data, make edits, or modify the properties of a form or report)
autorisations d'accèsaccess permissions (Authorization to perform operations associated with a specific shared resource, such as a file, directory, or printer. Permissions must be granted by the system administrator to individual user accounts or administrative groups)
barre d'accèsaccess bar (A toolbar that docks to the desktop, similar to the taskbar)
barre d'outils Accès rapideQuick Access Toolbar (A customizable toolbar that provides one-click access to commands)
chemin d'accèspath (A sequence of folders (directories) that leads to a specific file or folder. A backslash is used to separate each folder in the path. For example, the path to a file called invoice.txt might be C:\Documents\July\invoice.txt)
chemin d'accès absoluabsolute path (A path to a file that begins with the drive identifier and root directory or with a network share and ends with the complete file name (for example, C:\docs\work\contract.txt or \\netshare\docs\work\contract.txt))
chemin d'accès associé à une racinerooted path (A sequence of folders (directories) that begins with a drive letter and colon (for example, C:) or a directory separator character (\) and leads to a specific file or folder)
chemin d'accès au script d'ouverture de sessionlogon script path (A sequence of directory names that specifies the location of the logon script. When a user logs on, the authenticating computer locates the specified logon script (if one has been assigned to that user account) by following that computer's local logon script path (usually systemroot\\\\System32\\\\Repl\\\\Import\\\\Scripts))
chemin d'accès canoniquecanonical path (The definitive path for navigating to a category or product that is a member of more than one category. The primary parent category determines the canonical path to a category or product)
chemin d'accès completfully qualified path (A path to a file that begins with the drive identifier and root directory or with a network share and ends with the complete file name (for example, C:\docs\work\contract.txt or \\netshare\docs\work\contract.txt))
chemin d'accès completfull path (In a hierarchical filing system, a path name containing all the possible components of a pathname, including the network share or drive and root directory, as well as any subdirectories and the file or object name)
chemin d'accès de certificationcertification path (A sequence of certificates, where each certificate in the sequence is signed by the subsequent certificate. The last certificate in the chain is normally a self-signed certificate)
chemin d'accès de la requêtequery path (A string representation of a path that specifies which related objects to return when a typed object query is executed)
chemin d'accès de partageshare path (The full name of a resource on a network in the format \\servername\sharename, which can include a directory path under the share name)
chemin d'accès d'ordinateur hôtehost path (A sequence of host group names that specifies the location of a virtual machine host or host group within the hierarchy of host groups. All host paths begin with the root host group, Managed Computers)
chemin d'accès du fichier journallog file path (The location of the log file on a computer)
chemin d'accès physiquephysical path (The physical location of a directory or file. May be either a path on the local computer or a universal naming convention (UNC) path on a remote computer)
chemin d'accès relatifrelative path (A path that is implied by the current working directory. When a user enters a command that refers to a file, if the full pathname is not entered, the current working directory becomes the relative path of the file referred to)
chemin d'accès UNCUniversal Naming Convention path The standard path to access network shares (Universal Naming Convention)
chemin d'accès UNCUNC path (The standard path to access network shares)
chemin d'accès virtuelvirtual path (A sequence of names that is used to locate a file and that has the same form as a pathname in the file system but is not necessarily the actual sequence of directory names under which the file is located. The part of a URL that follows the server name is a virtual path. For example, if the directory c:\bar\sinister\forces\distance on the server miles is shared on the local area network at foo.com under the name \\miles\baz and contains the file elena.html, that file may be returned by a Web request for http://miles.foo.com/baz/elena.html)
chemin d'accès à l'objetobject path (A formatted string used to access namespaces, classes, and instances. Each object on the system has a unique path that identifies it locally or over the network. Object paths are conceptually similar to Universal Resource Locators (URL))
cheval de Troie autorisant un accès à distanceremote access Trojan (A type of Trojan that provides remote access to a computer)
clé d'accès de stockagestorage access key (A value that is unique to a storage account and that can be used to connect to the storage account from code running in a Windows Azure cloud service, locally on a developer's machine, or anywhere else that has Internet connectivity)
code d'accèsaccess code (A string of characters entered by a user to verify his or her identity to a network or to a local computer, device, or client, or to sign in to an account, app, and so on)
code d'accès en cas d'urgenceemergency access code (An emergency access code is a set of letters and numbers that can be included on your emergency profile wallet card or sheet)
code d'accès à l'internationalinternational access code (The prefix that is used to direct a call internationally. The International Access Code is 011 in the United States and 00 in much of the rest of the world)
code d'accès à une ligne extérieureoutside line access code (The prefix that is used to access an outside line. In the United States, this prefix is typically 9)
compte d'accèsaccess account (An account used to crawl Web sites, servers and network resources included in a content index)
compte d'accès au contenucontent access account (An account used to crawl Web sites, servers and network resources included in a content index)
compteur de page d'accèsentry page count (The number of visitors who entered a web site on a particular page on that site)
Configuration de l'accès Web aux programmes RemoteApp et aux services Bureau à distanceRemoteApp and Desktop Web Access Configuration (An option on the Remote Desktop Services menu on the Administrative Tools menu that opens the RAD Web Access Web site for administrative purposes)
Configuration de l'accès Web des services Bureau à distanceRemote Desktop Web Access Configuration (In Remote Desktop Services, the site where you can configure the RD Web Access Web Part)
Configuration de l'accès Web RADRAD Web Access Configuration (An option on the Remote Desktop Services menu on the Administrative Tools menu that opens the RAD Web Access Web site for administrative purposes)
connexion d'accès à distancedial-up connection (A connection to other computers or to the Internet using a device that uses the telephone network)
contrôle d'accèsaccess control (A security mechanism that determines which operations a user, group, service, or computer is authorized to perform on a computer or on a particular object, such as a file, printer, registry subkey, or directory service object)
contrôle d'accès au contenucontent rating (A value assigned to an item of media content that indicates its suitability for a particular audience)
contrôle d'accès dynamiquedynamic access control (The ability for IT pros to define how users access a system based on dynamic qualities, such as a user's location or role)
demandes d'accès à un site WebWebsite requests (The tab on the Family Safety website that displays requests a child has made via e-mail to view a blocked website)
dispositif de stockage à accès directdirect access storage device (A data storage device by which information can be accessed directly, instead of by passing sequentially through all storage areas. For example, a disk drive is a DASD, but a tape unit is not, because, with a tape unit, the data is stored as a linear sequence)
déploiement avec accès via InternetInternet-facing deployment (A method of deploying on-premises CRM so that remote users can connect to the application from the Internet)
entrée de contrôle d'accèsaccess control entry (An entry in either a securable object's discretionary access control list (DACL) or an object's system access control list (SACL). In a DACL, the entry grants or denies permissions to a user or group. In a SACL, the entry specifies which security events to audit for a particular user or group or controls the Windows Integrity Level for the object)
fournisseur d'accèsaccess provider (A business that supplies Internet connectivity services to individuals, businesses, and other organizations. An ISP provides a telephone number, a user name, a password, and other connection information so that users can access the Internet through the ISP's computers)
fournisseur d'accès à InternetInternet access provider (A business that supplies Internet connectivity services to individuals, businesses, and other organizations. An ISP provides a telephone number, a user name, a password, and other connection information so that users can access the Internet through the ISP's computers)
Gestion des niveaux d'accèsAccess Levels Management (A UI element that displays a user's contacts and access level entries (ACEs) organized by access level)
gestionnaire d'accèsContent Advisor (A tool in Microsoft Internet Explorer that lets you control which sites users on your computer can visit. This is particularly helpful for parents who want to control the content their children view on the Web)
groupe de demandes d'accèschallenge group (The group that consists of requests/connections awaiting authentication)
jeton d'accèsaccess token (A data structure that contains authentication and authorization information for a user. Windows creates the access token when the user logs on and the user's identity is confirmed. The access token contains the user's security ID (SID), the list of groups that the user is a member of, the list of privileges held by that user. Each process or thread started for the user inherits a copy of the access token. In some cases a user may have more than one access token, with different levels of authority)
jeton d'accès combinésplit access token (A combination of full access token and filtered access token linked together by the local security authority (LSA) component of the operating system)
jeton d'accès completfull privilege access token (An access token with the maximum privileges authorized for the account. Used by User Account Control (UAC))
jeton d'accès completfull access token (An access token with the maximum privileges authorized for the account. Used by User Account Control (UAC))
jeton d'accès du processusprocess access token (A data structure that contains authentication and authorization information for a user. Windows creates the access token when the user logs on and the user's identity is confirmed. The access token contains the user's security ID (SID), the list of groups that the user is a member of, the list of privileges held by that user. Each process or thread started for the user inherits a copy of the access token. In some cases a user may have more than one access token, with different levels of authority)
jeton d'accès filtré, utilisateur avec accès restreintfiltered access token (An access token with the least administrative privileges required for the session. It is a restricted access token where all elevated privileges have been filtered out. A filtered access token is created by default for all interactive users that are not standard users, except the built-in administrator)
jeton d'accès restreintrestricted access token (An access token with restricted access to securable objects or performing privileged tasks)
jeton d'accès UACUAC access token (An access token with the least administrative privileges required for the session. It is a restricted access token where all elevated privileges have been filtered out. A filtered access token is created by default for all interactive users that are not standard users, except the built-in administrator)
jeton d'accès à faible niveau d'intégritélow integrity access token (A filtered access token that is created with a low integrity level. This access token is used by Internet Explorer Protected Mode, but can also be used by other applications)
Journalisation des accès utilisateurUser Access Logging (A logging feature that gathers unique client records and events for later retrieval by an administrator using WMI or PowerShell)
licence d'accès client aux services Bureau à distanceRemote Desktop Services client access license (A license that is required for a user or a device to connect to a remote desktop server)
licence d'accès client aux services Bureau à distanceRDS CAL (A license that is required for a user or a device to connect to a remote desktop server)
licence d'accès client aux services Bureau à distance par appareilRemote Desktop Services Per Device client access license (One of the two types of Remote Desktop Services client access licenses (RDS CALs) that permits one device (used by any user) to connect to a remote desktop server)
licence d'accès client aux services Bureau à distance par appareilRDS Per Device CAL (One of the two types of Remote Desktop Services client access licenses (RDS CALs) that permits one device (used by any user) to connect to a remote desktop server)
licence d'accès client aux services Bureau à distance par utilisateurRemote Desktop Services Per User client access license (One of the two types of Remote Desktop Services client access licenses (RDS CALs) that permits one user to access remote desktop servers from an unlimited number of client computers or devices)
licence d'accès client aux services Bureau à distance par utilisateurRDS Per User CAL (One of the two types of Remote Desktop Services client access licenses (RDS CALs) that permits one user to access remote desktop servers from an unlimited number of client computers or devices)
limitation des tentatives d'accèsrequest throttling (A method of preventing a denial of service attack by limiting the number of requests that can be made to a system)
liste d'accès à la publicationpublication access list (The primary mechanism for securing the Publisher. It contains a list of logins, accounts, and groups that are granted access to the publication)
liste d'accès à la publicationPAL (The primary mechanism for securing the Publisher. It contains a list of logins, accounts, and groups that are granted access to the publication)
liste de contrôle d'accèsaccess control list (In Windows-based systems, a list of access control entries (ACE) that apply to an entire object, a set of the object's properties, or an individual property of an object, and that define the access granted to one or more security principals)
liste de contrôle d'accès discrétionnairediscretionary access control list (An access control list that is controlled by the owner of an object and that specifies the access particular users or groups can have to the object)
liste de contrôle d'accès systèmesystem access control list (An ACL that controls the generation of audit messages for attempts to access a securable object. The ability to get or set an object's SACL is controlled by a privilege typically held only by system administrators)
mappage des accès de substitutionalternate access mapping (An alternate URL mapping that Windows SharePoint Services preserves in the mapping table. It is the URL a user would see, but is not a URL that IIS would give to WSS)
masque d'accèsaccess mask (In Windows-based computers, a 32-bit value (a bitmask) that specifies the permissions that are assigned in an access control entry (ACE). An access mask is also part of the access request when an object is opened. The access mask in the request is compared to the access mask in each ACE to determine whether or not to grant the request)
Microsoft Dynamics CRM pour Microsoft Office Outlook avec accès hors connexionMicrosoft Dynamics CRM for Microsoft Office Outlook with Offline Access (The laptop client version of the Microsoft Dynamics CRM product suite for Microsoft Office Outlook)
Modifier le niveau d'accèsChange Level of Access (Contact context menu item that allows the user to assign an access level to the selected contact(s))
Modèle d'accès à dispositif spécialiséSpecialized Device Access Model (The model that describes the two ways that a Windows Store app can access a specialized device: Open Access Model and Restricted Device Access Model)
modèle d'accès à un périphérique ouvertOpen Device Access Model (The access model for horizontal solutions, which enables a horizontal strategy. Open Device Access enables many different Windows Store apps to access a specialized device. Examples: a smartphone with multiple apps that synchronize contacts; a pedometer that allows multiple apps to read its data and post it to a website)
modèle d'accès à un périphérique restreintRestricted Device Access Model (The device access model for vertical solutions. Restricted Device Access does not allow other applications to access a specialized device)
méthode d'accès séquentiel indexéindexed sequential access method (A technique for indexing database records that allows sequential or random access of records. When records are accessed sequentially they are accessed in the order in which they were entered in the database, and when records are accessed randomly, the records are accessed through an index)
niveau d'accèsaccess level (A security role setting that determines for a given object type at which levels within the organization hierarchy a user can act on that object type)
niveau d'accès du champfield-level access (The permission that is assigned to a user or users that allow them to read, update, or create a specific field)
Nom du point d'accèsAccess Point Name (A field in the Properties dialog box for GPRS installation items in the Mobile Deployment Manager MMC snap-in that enables the user to specify the wireless access point for the device)
nom du point d'accès, APNAPN (The name of the access point used to establish wireless connectivity)
nombre d'accèshit count (The number of times a function or line of source code is called (or hit), as reported by the profiler when analyzing a program at run time)
numéro d'accès d'abonnésubscriber access number (A number that is configured in a Private Branch eXchange (PBX) that allows a subscriber to access their Microsoft Exchange mailbox over the telephone)
option Restriction de l'accès à la mise en quarantaine du courrier indésirable sur la base de l'adresse IPIP Restrict Spam Quarantine option (The option on the Spam Filter page that restricts access to monitoring and managing Spam Quarantine by IP address)
ordinateur en accès partagéshared access computer (A computer in a public environment that is accessed by several different users on a daily basis)
page d'accèsentry page (The page on which a visitor entered a web site (e.g. Home page, About Us page, or Contact Us page))
page d'accès aux donnéesdata access page (A Web page, published from Access, that has a connection to a database. In a data access page, you can view, add to, edit, and manipulate the data stored in the database)
Point d'accèsAPN (The name of the access point used to establish wireless connectivity)
point d'accèshotspot (A public place (such as a coffee shop, airport, or hotel) with a wireless network that you can use to connect to the Internet)
point d'accèsaccess point (A device used to connect wireless computers and other wireless devices to a wired network)
point d'accès au serviceservice access point (A logical address that allows a system to route data between a remote device and the appropriate communications support)
point d'accès clientclient access point (In SMS 2003 and earlier releases, an SMS site system that provides a communication point between the SMS site server and Legacy Client computers. Legacy Clients deliver their collected files, inventory information, discovery data records, software metering data, and status information to CAPs)
point d'accès clientCAP (In SMS 2003 and earlier releases, an SMS site system that provides a communication point between the SMS site server and Legacy Client computers. Legacy Clients deliver their collected files, inventory information, discovery data records, software metering data, and status information to CAPs)
point d'accès InternetInternet APN (An APN (Access Point Name) that determines the cellular data networks to which a phone can connect. It includes information about what kind of connection, security, and type of IP address the phone should use for the Internet connection)
point d'accès MMSMMS APN (The APN (Access Point Name) a phone can use to send MMS messages (text messages with multimedia files attached))
point d'accès sans fil compatible 802.1X802.1X-capable wireless access point (A network access server that adheres to both the Institute of Electrical and Electronics Engineers (IEEE) 802.1X and the Remote Authentication Dial-in User Service (RADIUS) standards, and that is deployed in networks to enforce 802.1X authenticated IEEE 802.3 wired Ethernet access)
point d'accès sans fil mobilemobile hotspot (A device that shares its Internet connection with other Wi-Fi-enabled devices)
point d'accès Wi-FiWi-Fi hotspot (A public place (such as a coffee shop, airport, or hotel) with a wireless network that you can use to connect to the Internet)
Principes d'accès aux données et de testabilité de documents numériquesPrinciples for the data access and the testability of digital documents (A German law that requires tax authorities to be capable of digitally checking data from electronic bookkeeping systems)
privilèges d'accèsaccess privileges (The type of operations permitted for a given user of a certain system resource on a network or a file server)
profil d'accès aux champsfield access profile (The set of field-level access permissions that have been granted to a user or users)
profil d'accès par câblewired profile (A collection of security and connectivity settings that are used for 802.1X authenticated wired access)
protection d'accès permanenteon-access protection (Virus protection (e.g. antivirus software) that is active continuously, as opposed to on demand)
Protection d'accès réseauNetwork Access Protection (A set of operating system components that can help protect access to a private network by enforcing health policies. System administrators establish health policies which NAP enforces by inspecting and assessing the health of client computers, restricting network access when client computers are deemed noncompliant, and remediating noncompliant client computers for full network access. NAP also provides ongoing health compliance enforcement while a client computer is connected to a network)
Protection d'accès réseauNAP A set of operating system components that can help protect access to a private network by enforcing health policies. System administrators establish health policies which NAP enforces by inspecting and assessing the health of client computers, restricting network access when client computers are deemed noncompliant, and remediating noncompliant client computers for full network access. NAP also provides ongoing health compliance enforcement while a client computer is connected to a network (NAP)
redirection du serveur d'accès clientClient Access server redirection (A process by which Outlook Web Access users who access an Internet-facing Client Access server that is in a different Active Directory site than the site that contains their mailbox can be redirected to the Client Access server that is in the same site as their Mailbox server if that Client Access server is Internet-facing)
Restrictions d'accès au WebWeb restrictions (A feature of Parental Controls that allows users to block Web sites that they don't want to view)
runtime d'accès concurrentielConcurrency Runtime (A concurrent programming framework for C++ that simplifies parallel programming and helps developers write robust, scalable, and responsive parallel applications)
règle de chemin d'accès au sitesite path rule (A rule for a specific part of a site that includes or excludes content from the content index)
rôle de contrôle d'accès en fonction du rôlerole-based access control role (The user role that is assigned to a user account, which determines the options that are visible to that user and the tasks that the user can perform in the management interface for Exchange Labs)
rôle serveur d'accès au clientClient Access server role (A set of components and services that enable users to access their Exchange mailboxes through the application Outlook Web Access and the protocols Exchange ActiveSync, Post Office Protocol version 3 (POP3), and Internet Message Access Protocol 4rev1 (IMAP4). The Client Access server role also includes Web services that are used by other Exchange 2007 server roles)
rôle serveur d'accès au client ExchangeClient Access server role (A set of components and services that enable users to access their Exchange mailboxes through the application Outlook Web Access and the protocols Exchange ActiveSync, Post Office Protocol version 3 (POP3), and Internet Message Access Protocol 4rev1 (IMAP4). The Client Access server role also includes Web services that are used by other Exchange 2007 server roles)
Serveur d'accès au clientClient Access server (A set of components and services that enable users to access their Exchange mailboxes through the Outlook Web Access application)
serveur d'accès réseaunetwork access server (The device that accepts Point-to-Point Protocol (PPP) connections and places clients on the network that the NAS serves)
serveur Edge d'accèsAccess Edge Server (A service that runs on Lync Server that resides in the perimeter network and routes instant messaging (IM) and presence information from external users to internal users)
service d'accès aux données System CenterSystem Center Data Access service (A Windows service that runs on the management servers in each management group, and that allows client applications to access Operations Manager data and functionality)
Service d'accès IASInformation Access Service A part of an IrDA infrared communication protocol used so that devices can learn about the services offered by another device (Information Access Service)
Service de contrôle d'accèsAccess Control Service (The Windows Azure service that provides federated authentication and rules-driven, claims-based authorization for REST Web services)
service Edge d'accèsAccess Edge service (A service that runs on Lync Server that resides in the perimeter network and routes instant messaging (IM) and presence information from external users to internal users)
signature d'accès partagéShared Access Signature (A URL that grants access rights to containers, blobs, queues, and tables)
stratégie d'accèsaccess policy (A policy which defines the permissions and duration of access to an asset)
stratégie d'accès centraliséecentral access policæ (An access policy that allows organizations to centrally deploy and manage authorization policies that include conditional expressions using user groups, user claims, device claims, and resource properties)
stratégie d'autorisation d'accès aux ressources via les services Bureau à distanceRemote Desktop resource authorization policy (A policy that allows an administrator to specify the network resources that users can connect to through an RD Gateway server. Administrators can configure RD RAPs by using the Add Roles Wizard during installation of the RD Gateway role service, or by using RD Gateway Manager after installation)
stratégie d'autorisation d'accès aux ressources via les services Bureau à distanceRD RAP (A policy that allows an administrator to specify the network resources that users can connect to through an RD Gateway server. Administrators can configure RD RAPs by using the Add Roles Wizard during installation of the RD Gateway role service, or by using RD Gateway Manager after installation)
stratégie de sécurité d'accès du codecode access security CAS policy A set of rules that defines security permissions for a collection of assemblies by associating attributes of those assemblies, such as location and signature, with a set of code access security permissions (CAS)
supprimer les privilèges d'accèsdeprovision (To remove an account from a connected data source)
système d'accès par clavierKeyboard Access System (A set of accelerator keys with associated icons)
sécurité d'accès du codecode access security (A mechanism provided by the common language runtime whereby managed code is granted permissions by security policy and these permissions are enforced, helping to limit the operations that the code will be allowed to perform)
temps d'accès au disquedisk access time (The time needed for a read/write head in a disk drive to locate a track on a disk. Access time is usually measured in milliseconds and is used as a performance measure for hard disks and CD-ROM drives)
touche d'accèsKeyTip (A keyboard shortcut that is displayed over the option to which it corresponds in the user interface and tells the user which key(s) can be used to access or activate that feature or command)
touche d'accès rapideaccess key (Any combination of keys that must be pressed sequentially)
trappe d'accès à la lampelamp access door (The metal door in the I/O connections area that you must remove to access the lamp assembly)
URL d'accèsaccess URL (The internal URL that is used by a crawler to identify and access an item)
utilisateur avec accès restreintrestricted user (A user who has limited access to certain features or limited ability to perform certain actions in an application or system)
violation d'accèsaccess violation (An attempt to run a memory operation that the underlying page protection does not allow. An access violation applies to memory operations, but does not apply when the security manager checks user-mode access rights to objects)
Vue de gestion des entrées de contrôle d'accèsAccess Control Entry Management View (A feature that allows the user to set access levels for a group of contacts)
Vue de gestion des entrées de contrôle d'accèsACE Management View (A feature that allows the user to set access levels for a group of contacts)
zone d'accès sans filhotspot (A public place (such as a coffee shop, airport, or hotel) with a wireless network that you can use to connect to the Internet)
énumération basée sur l'accèsaccess-based enumeration (A feature that displays only the files and folders that a user has permissions to access)