Access control to systems. Access to systems and applications is built-up by numerous directives providing individual and personal user identification and authentication, access control, logging and traceability. Access to the system is carried out by aid of Kerberos session tickets. Remote access to the network resources requires supplementary equipment in terms of ‘tokens’ (onetime pass- word generator). Passwords are automatically checked to contain special characters and other qualities and must be changed regularly. User ID’s/passwords are automatically blocked after a predefined number of erroneous attempts and clients are put to stand-by after a predefined time of inactivity. Portable clients are encrypted as a standard. Stationary clients, servers and disk arrays are encrypted as needed.
Appears in 2 contracts
Samples: Data Management Agreement, Telematic Services Agreement
Access control to systems. Access to systems and applications is built-up by numerous directives providing individual and personal user identification and authentication, access control, logging and traceability. Access to the system is carried out by aid of Kerberos session tickets. Remote access to the network resources requires supplementary equipment in terms of ‘tokens’ (onetime pass- word password generator). Passwords are automatically checked to contain special characters and other qualities and must be changed regularly. User ID’s/passwords are automatically blocked after a predefined number of erroneous attempts and clients are put to stand-by after a predefined time of inactivity. Portable clients are encrypted as a standard. Stationary clients, servers and disk arrays are encrypted as needed.
Appears in 2 contracts
Samples: Framework Agreement for the Provision of Connected Services, Framework Agreement
Access control to systems. Access to systems and applications is built-up by numerous directives di- rectives providing individual and personal user identification and authentication, access control, logging and traceability. Access to the system is carried out by aid of Kerberos session tickets. Remote access to the network resources requires supplementary supplemen- tary equipment in terms of ‘tokens’ (onetime pass- word generatorpassword genera- tor). Passwords are automatically checked to contain special characters and other qualities and must be changed regularly. User ID’s/passwords are automatically blocked after a predefined prede- fined number of erroneous attempts and clients are put to stand-stand- by after a predefined time of inactivity. Portable clients are encrypted en- crypted as a standard. Stationary clients, servers and disk arrays are encrypted as needed.
Appears in 1 contract
Samples: Data Management Agreement