Authenticated Access definition

Authenticated Access means the secured validation of a user's unique identity when accessing a HCL Domino server. The user's unique identity could be defined by their Notes ID/password ("PW") combination, their HCL Domino HTTP Name/PW combination, or any other third party authentication source which defines the user's unique identity. In contrast to Authenticated Access, "Anonymous Access" is a level of connectivity without verification of a user's unique identity which is not supported under this license. Entitlement Requirements Customer must have the adequate volume of User Entitlements for the use of the Program as set forth in the Customer and HCL licensing contract. Entitlement to the program is provided through two models:
Authenticated Access means the secured validation of a user's unique identity when accessing a HCL Domino server. The user's unique identity could be defined by their Notes ID/password ("PW") combination, their HCL Domino HTTP Name/PW combination, or any other third party authentication source which defines the user's unique identity. In contrast to Authenticated Access, "Anonymous Access" is a level of connectivity without verification of a user's unique identity.
Authenticated Access means the secured validation of a user's unique identity when accessing the Program. Licensee must obtain separate, dedicated entitlements for each A/U given access to the Program in any manner directly or indirectly (for example: via a multiplexing program, device, or application server) through any means. An entitlement for an A/U is unique to that A/U and may not be shared, nor may it be reassigned other than for the permanent transfer of the A/U entitlement to another person. For the avoidance of doubt, an entitlement for an A/U is required to use any portion of the Program, including but not limited to attending meetings, initiating and managing meetings and participating in chats. Program-unique Terms The A/U entitlement includes access for Anonymous Guest users to HCL Sametime servers deployed under this entitlement. An "Anonymous Guest" is a unique person, not employed or paid by, or acting on behalf of Licensee's enterprise, who is given access to the Program in any manner directly or indirectly (for example: via a multiplexing program, device, or application server) without verification of the user's unique identity. Anonymous Guests are permitted access to meetings (of HCL Sametime Premium) initiated and managed by the A/U. THE PROGRAM SHOULD NOT BE USED TO MAKE EMERGENCY CALLS (E.G. 211, 911, 999, ETC). WITHOUT LIMITING THE GENERALITY OF ANY OF THE FOREGOING, HCL, ITS AFFILIATES, SUPPLIERS AND RESELLERS SPECIFICALLY DISCLAIM ANY EXPRESS OR IMPLIED WARRANTY OF FITNESS FOR SUCH PURPOSE. Entitlement Requirements Customer must have the adequate volume of user entitlements for the use of the Program as set forth in the Customer and HCL licensing contract. Entitlement to the program is provided through two models:

Examples of Authenticated Access in a sentence

  • The confidentiality by Password Authenticated Access Control (PACE) is a mandatory security feature of the TOE.

  • Steve Cox, a McComb architect, drafted the plans for the City and supervised the work through completion.

  • But you must be aware that %UnknownUser of such a Web Application is running with %ALL as a role and likely has the privileges of the account used to start and stop the system with regard to operating system level privileges.When the conversion section is written, put this sentence after the one ending LDQUORoles and ResourcesRDQUO, with a link: See the section Converting Web Applications from Unknown User to Authenticated Access for guidance on how to perform this conversion.

  • Use of the Program by any means of Authenticated Access requires an entitlement to HCL Domino Enterprise client access, or a subscription to either HCL SmartCloud Notes or a HCL Connections Cloud S1.

  • WebAccess supports Anonymous Access, Authenticated Access (Integrated Windows authentication), Secure Communications including Certificates, Secure Sockets, Virtual Private Networks (VPN) and secure intranets.

  • We utilised industry standard third party Secured Service APIs and Authenticated Access All services are managed through a secured global API gateway infrastructure created by Fitizzy.

  • Also the Decryption of database takes place as users end which leads to lag at system.[2] Securing Data Stored in Clouds Using Privacy Preserving Authenticated Access Control (2014)This paper proposes access control scheme for data storage, which supports anonymous authentication and performs decentralized key management.

  • Web Security: WebAccess supports Anonymous Access, Authenticated Access (Integrated Windows authentication) and Secure Communications including Certificates, Secure Sockets and Virtual Private Networks (VPN).

  • This flag will only be set when the PC Controller is included in the network as a secondary controller.Current Network Keys are shown in grey (disabled editing) textboxes according to security level: Network Key S0, Unauthenticated, Authenticated, Access and LR Authenticated, LR Access for Long Range, and Last Used Temp.

  • Use of the Program by an Authorized User is only permitted with Authenticated Access.


More Definitions of Authenticated Access

Authenticated Access means the secured validation of a user's unique identity when accessing the Program. Licensee must obtain separate, dedicated entitlements for each A/U given access to the Program in any manner directly or indirectly (for example: via a multiplexing program, device, or application server) through any means. An entitlement for an A/U is unique to that A/U and may not be shared, nor may it be reassigned other than for the permanent transfer of the A/U entitlement to another person. Program-unique Terms The A/U entitlement includes access for Anonymous Guest users to HCL Sametime servers deployed under this entitlement. An "Anonymous Guest" is a unique person, not employed or paid by, or acting on behalf of Licensee's enterprise, who is given access to the Program in any manner directly or indirectly (for example: via a multiplexing program, device, or application server) without verification of the user's unique identity. Anonymous Guests are permitted access to meetings (of HCL Sametime Premium) initiated and managed by the A/U. THE PROGRAM SHOULD NOT BE USED TO MAKE EMERGENCY CALLS (E.G. 211, 911, 999, ETC). WITHOUT LIMITING THE GENERALITY OF ANY OF THE FOREGOING, HCL, ITS AFFILIATES, SUPPLIERS AND RESELLERS SPECIFICALLY DISCLAIM ANY EXPRESS OR IMPLIED WARRANTY OF FITNESS FOR SUCH PURPOSE. Entitlement Requirements Customer must have the adequate volume of user entitlements for the use of the Program as set forth in the Customer and HCL licensing contract. Entitlement to the program is provided through two models:
Authenticated Access means the secured validation of a user's unique identity when accessing the Program. Licensee must obtain separate, dedicated entitlements for each A/U given access to the Program in any manner directly or indirectly (for example: via a multiplexing program, device, or application server) through any means. An entitlement for an A/U is unique to that A/U and may not be shared, nor may it be reassigned other than for the permanent transfer of the Authorized User entitlement to another person.

Related to Authenticated Access

  • Authenticated means (a) with respect to the issuance of a Warrant Certificate, one which has been duly signed by the Corporation and authenticated by manual signature of an authorized officer of the Warrant Agent, (b) with respect to the issuance of an Uncertificated Warrant, one in respect of which the Warrant Agent has completed all Internal Procedures such that the particulars of such Uncertificated Warrant as required by Section 2.7 are entered in the register of holders of Warrants, “Authenticate”, “Authenticating” and “Authentication” have the appropriate correlative meanings;

  • Authenticate “Certificated Security”, “Chattel Paper”; “Commercial Tort Claim”, “Deposit Account”, “Documents”, “Electronic Chattel Paper”, “Equipment”, “Farm Products” “Fixture”, “General Intangible”, “Instrument”, “Inventory”, “Investment Company Security”, “Investment Property”, “Issuer”, “Letter of Credit Rights”, “Proceeds”, “Record”, “Registered Organization”, “Security”, “Securities Entitlement”, “Securities Intermediary”, “Securities Account”, “Supporting Obligation”, “Tangible Chattel Paper”, and “Uncertificated Security”.

  • Authentication Agent means an institution, reasonably acceptable to the Company, appointed by the Trustee to authenticate the Notes.

  • Certificated Notes means Notes that are in the form of Exhibit A attached hereto.

  • Strong Customer Authentication means an authentication based on the use of two or more elements categorised as knowledge (something only the user knows), possession (something only the user possesses) and inherence (something the user is) that are independent, in that the breach of one does not compromise the reliability of the others, and is designed in such a way as to protect the confidentiality of the authentication data;

  • Authenticating Agents As defined in Section 9.10.

  • Regulation S Temporary Global Security with respect to any series of Securities, means one or more temporary Global Securities, bearing the Private Placement Legend and the Regulation S Temporary Global Security Legend, issued in an aggregate amount of denominations equal in total to the outstanding principal amount of the Securities of such series initially sold, if required by Rule 903 of Regulation S.

  • Authenticating Agent means any Person authorized by the Trustee pursuant to Section 614 to act on behalf of the Trustee to authenticate Securities of one or more series.

  • Certificated Note means a Note in registered individual form without interest coupons.

  • Authentication Order has the meaning specified in Section 2.01 hereof.

  • Regulation S Temporary Global Note Legend means the legend set forth in Section 2.06(g)(iii) hereof.

  • Authentication of product history means, but is not limited to, identifying the purchasing source, the ultimate fate, and any intermediate handling of any component of a radiopharmaceutical.

  • Global Security Legend means the legend set forth in Section 2.6(g)(2), which is required to be placed on all Global Securities issued under this Indenture.

  • Authentication means a procedure which allows the payment service provider to verify the identity of a payment service user or the validity of the use of a specific payment instrument, including the use of the user’s personalised security credentials;

  • Notation of Guarantee means a notation, substantially in the form of Exhibit A, executed by a Guarantor and affixed to each Security of any Series to which the Guarantee of such Guarantor under Article XII of this Indenture applies.

  • Multi-factor Authentication means controlling access to computers and other IT resources by requiring two or more pieces of evidence that the user is who they claim to be. These pieces of evidence consist of something the user knows, such as a password or PIN; something the user has such as a key card, smart card, or physical token; and something the user is, a biometric identifier such as a fingerprint, facial scan, or retinal scan. “PIN” means a personal identification number, a series of numbers which act as a password for a device. Since PINs are typically only four to six characters, PINs are usually used in conjunction with another factor of authentication, such as a fingerprint.

  • Definitive Bearer Note means a Bearer Note in definitive form being in the form or substantially in the form set out in Appendix B-3 hereto (or in such other form as may be agreed between the relevant Issuer, the Agent and the relevant Purchaser or Purchasers) issued or to be issued by the relevant Issuer pursuant to this Agreement in exchange for the whole or (subject to the terms of the relevant Temporary Global Note and/or Permanent Global Note) part of a Temporary Global and/or Permanent Global Note;

  • Regulation S Temporary Global Certificate means, with respect to any Class of Certificates offered and sold outside of the United States in reliance on Regulation S, a single temporary global Certificate, in definitive, fully registered form without interest coupons.

  • Issuer Order and “Issuer Request” means a written order or request of the Issuer signed in the name of the Issuer by any one of its Authorized Officers and delivered to the Indenture Trustee.

  • Unrestricted Definitive Security means Definitive Securities and any other Securities that are not required to bear, or are not subject to, the Restricted Securities Legend.

  • Regulation S Temporary Global Note means a temporary Global Note in the form of Exhibit A2 hereto deposited with or on behalf of and registered in the name of the Depositary or its nominee, issued in a denomination equal to the outstanding principal amount of the Notes initially sold in reliance on Rule 903 of Regulation S.

  • Unrestricted Definitive Notes means Definitive Notes that are not required to bear, or are not subject to, the Restricted Notes Legend.

  • Temporary Global Note means a global note in the form or substantially in the form set out in Part 1 of Schedule 6 together with the copy of the applicable Final Terms attached to it with such modifications (if any) as may be agreed between the Issuer, the Agent and the relevant Dealer, comprising some or all of the Notes of the same Series issued by the Issuer under the Programme Agreement or any other agreement between the Issuer and the relevant Dealer;

  • Global Notes Legend means the legend set forth under that caption in the applicable Exhibit to this Indenture.

  • 144A Global Security means a permanent Global Security in the form of the Security attached hereto as Exhibit A-1, and that is deposited with and registered in the name of the Depositary, representing Securities sold in reliance on Rule 144A under the Securities Act.

  • DTC Legend means the legend set forth in Exhibit D.