iControl Sample Clauses

iControl i. iControl will process all files submitted by Distributors through the ACH payment network within the timeframe indicated on the Distributor’s invoice to Retailer.
AutoNDA by SimpleDocs
iControl. (e) The Price for the Cloud Services includes installation and use of iControl on 5 devices.
iControl. 4.1.1 icontrol package Submodules icontrol.authtoken module‌‌‌‌‌ A requests-compatible system for BIG-IP token-based authentication. BIG-IP only allows users with the Administrator role to authenticate to iControl using HTTP Basic auth. Non- Administrator users can use the token-based authentication scheme described at: xxxxx://xxxxxxxxxx.x0.xxx/wiki/xxxxxxxx.xxxxxxxxxxxxxx_with_the_f5_rest_api.ashx Use this module with requests to automatically get a new token, and attach requests.Session object, so that it is used to authenticate future requests. Instead of using this module directly, it is easiest to enable it by passing a token=True argument when creating the iControlRESTSession: >>> iCRS = iControlRESTSession('bob', 'secret', token=True) class icontrol.authtoken.iControlRESTTokenAuth(username, password, lo- gin_provider_name=’tmos’) Bases: requests.auth.AuthBase Acquire and renew BigIP iControl REST authentication tokens. Parameters • username (str) – The username on BigIP • password (str) – The password for username on BigIP • login_provider_name (str) – The name of the login provider that BigIP should consult when creating the token. If username is configured locally on the BigIP, login_provider_name should be "tmos" (default). Otherwise (for example, username is configured on LDAP that BigIP consults), consult BigIP documentation or your system administrator for the value of login_provider_name. get_new_token(netloc) Get a new token from BIG-IP and store it internally. Throws relevant exception if it fails to get a new token. This method will be called automatically if a request is attempted but there is no authentication token, or the authentication token is expired. It is usually not necessary for users to call it, but it can be called if it is known that the authentication token has been invalidated by other means.
iControl 

Related to iControl

  • Control Notwithstanding any other provision of the Agreement, it is understood and agreed that the Trust shall at all times retain the ultimate responsibility for and control of all functions performed pursuant to this Agreement and has reserved the right to reasonably direct any action hereunder taken on its behalf by the Sub-Adviser.

  • Input Control The possibility to subsequently verify and determine whether, and by whom, personal data was entered into, changed or removed from data processing systems must be ensured. • Definition of entry authorisation • Logging of logins

  • Job Control Personal Data being processed on commission (i.e., Personal Data processed on a customer’s behalf) is processed solely in accordance with the Agreement and related instructions of the customer. Measures: • SAP uses controls and processes to monitor compliance with contracts between SAP and its customers, subprocessors or other service providers. • As part of the SAP Security Policy, Personal Data requires at least the same protection level as “confidential” information according to the SAP Information Classification standard. • All SAP employees and contractual subprocessors or other service providers are contractually bound to respect the confidentiality of all sensitive information including trade secrets of SAP customers and partners.

  • Quality Control A. Controlled Affiliate agrees to use the Licensed Marks and Name only in connection with the licensed services and further agrees to be bound by the conditions regarding quality control shown in attached Exhibit A as they may be amended by BCBSA from time-to-time.

  • Eksportkontrol Licenstager må kun bruge og eksportere xxxxx reeksportere Apple-softwaren i overensstemmelse med gældende amerikansk lov og med gældende lov i det land, hvor Apple-softwaren blev købt. I særdeleshed – men ikke begrænset til – må Apple-software ikke eksporteres xxxxx reeksporteres (a) til xxxxx, som er underlagt handelsboykot fra USA, xxxxx (b) til personer opført på det amerikanske finansministeriums liste over "Specially Designated Nationals" xxxxx på det amerikanske handelsministeriums "Denied Person's List or Entity List". Ved at bruge Apple-software garanterer licenstager ikke at være bosiddende i et af ovennævnte xxxxx xxxxx være opført på nogen af ovennævnte lister. Licenstager erklærer sig desuden indforstået med ikke at ville bruge Apple-software til forbudte formål i henhold til gældende amerikansk lov, inklusive – men ikke begrænset til – udvikling, design og fremstilling af kernevåben, missiler og kemiske xxxxx biologiske våben.

  • Traffic Control The Surveyor shall control traffic in and near surveying operations adequately to comply with provisions of the latest edition of the Texas Manual on Uniform Traffic Control Devices – Part VI which can be found on the State’s internet site. In the event field crew personnel must divert traffic or close traveled lanes, a Traffic Control Plan based upon principles outlined in the latest edition of the Texas Manual on Uniform Traffic Control Devices – Part VI shall be prepared by the Surveyor and approved by the State prior to commencement of field work. A copy of the approved plan shall be in the possession of field crew personnel on the job site at all times and shall be made available to the State’s personnel for inspection upon request.

  • Cost Control The budget established by the OWNER for the construction of the Project and CONSULTANT fee shall be considered as absolute. The CONSULTANT shall advise OWNER in writing of the following:

  • Pest Control A. Whenever a department utilizes a pest control chemical in State owned or managed buildings/grounds, the department will provide at least forty-eight (48) hours notice prior to application of the chemical, unless an infestation occurs which requires immediate action. Notices will be posted in the lobby of the building and will be disseminated to building tenant contacts.

  • Data Input Control It will be possible to retrospectively examine and establish whether and by whom Personal Data have been entered, modified or removed from SAP data processing systems. Measures: • SAP only allows authorized personnel to access Personal Data as required in the course of their duty. • SAP has implemented a logging system for input, modification and deletion, or blocking of Personal Data by SAP or its subprocessors within the Cloud Service to the extent technically possible.

  • Infection Control Consistent with the Centers for Disease Control and Prevention Guideline for Infection Control in Health Care Personnel, and University Policy 3364-109-EH-603, the parties agree that all bargaining unit employees who come in contact with patients in the hospital or ambulatory care clinics will need to be vaccinated against influenza when flu season begins each fall. The influenza vaccine will be offered to all health care workers, including pregnant women, before the influenza season, unless otherwise medically contraindicated or it compromises sincerely held religious beliefs.

Time is Money Join Law Insider Premium to draft better contracts faster.