Subject | English | Japanese |
comp., MS | account federation server proxy | アカウント フェデレーション サーバー プロキシ (The federation server proxy that is located in the perimeter network of the account partner organization. The account federation server proxy collects authentication credentials from a client that logs on over the Internet (or from the perimeter network) and passes those credentials to the account federation server) |
comp., MS | cache/proxy server | キャッシュ/プロキシ サーバー (A server running Windows Media Services for which a cache/proxy plug-in has been enabled, allowing the server to provide cache and proxy support to another Windows Media server) |
comp., MS | federation server proxy | フェデレーション サーバー プロキシ (A computer that has been configured to host the Federation Service Proxy component of Active Directory Federation Services (AD FS). Federation server proxies provide intermediary proxy services between an Internet client and a federation server that is located behind a firewall on the corporate network) |
comp. | n proxy server | プロキシサーバ |
comp. | n proxy server | プロクシサーバ |
comp. | n proxy server | プロキシ・サーバ |
comp. | n proxy server | プロクシ・サーバ |
comp., MS | proxy server | プロキシ サーバー (A server located on a network between client software, such as a Web browser, and another server. It intercepts all requests to the server to determine whether it can fulfill them itself. If not, it forwards the request to another server) |
comp. | n proxy server | 代理サーバー |
comp. | n proxy server | プロキシー・サーバー |
comp. | n proxy server | プロキシ・サーバー |
comp. | n proxy server | プロキシーサーバー |
comp. | n proxy server | プロキシサーバー |
comp., MS | resource federation server proxy | リソース フェデレーション サーバー プロキシ (The federation server proxy that is located in the perimeter network of the resource partner organization. The resource federation server proxy performs account partner discovery for Internet clients, and it redirects incoming security tokens to the resource federation server) |
comp., MS | Trojan proxy server | プロキシ サーバー型のトロイの木馬 (A proxy server installed by a Trojan on a machine providing what appears to be an uninterrupted Internet connection while allowing unauthorized access to an affected machine) |