翻訳と辞書
Words near each other
・ Authority (album)
・ Authority (disambiguation)
・ Authority (management)
・ Authority (novel)
・ Authority (sociology)
・ Authority (textual criticism)
・ Authority Always Wins
・ Authority control
・ Authority figures in comedy
・ Authority for Mandate Delay Act
・ Authority for the Financing of the Infrastructure of Puerto Rico
・ Authority for Use of Military Force to Combat Terrorist Activities Within the United States
・ Authority of Jesus questioned
・ Authority problem
・ Authority Zero
Authorization
・ Authorization bill
・ Authorization certificate
・ Authorization for the Use of Military Force Against the Government of Syria to Respond to Use of Chemical Weapons
・ Authorization for Use of Military Force
・ Authorization for Use of Military Force Against Iraq Resolution of 1991
・ Authorization for Use of Military Force Against Terrorists
・ Authorization hold
・ Authorization Open Service Interface Definition
・ Authorization to Carry
・ Authorization to Transport
・ Authorize.Net
・ Authorized (horse)
・ Authorized domain
・ Authorized economic operator


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

Authorization : ウィキペディア英語版
Authorization

Authorization or authorisation is the function of specifying access rights to resources related to information security and computer security in general and to access control in particular. More formally, "to authorize" is to define an access policy. For example, human resources staff is normally authorized to access employee records and this policy is usually formalized as access control rules in a computer system. During operation, the system uses the access control rules to decide whether access requests from (authenticated) consumers shall be approved (granted) or disapproved (rejected). Resources include individual files or an item's data, computer programs, computer devices and functionality provided by computer applications. Examples of consumers are computer users, computer programs and other devices on the computer.
==Overview==
Access control in computer systems and networks rely on access policies. The access control process can be divided into the following two phases: 1) policy definition phase where access is authorized, and 2) policy enforcement phase where access requests are approved or disapproved. Authorization is thus the function of the policy definition phase which precedes the policy enforcement phase where access requests are approved or disapproved based on the previously defined authorizations.
Most modern, multi-user operating systems include access control and thereby rely on authorization. Access control also uses authentication to verify the identity of consumers. When a consumer tries to access a resource, the access control process checks that the consumer has been authorized to use that resource. Authorization is the responsibility of an authority, such as a department manager, within the application domain, but is often delegated to a custodian such as a system administrator. Authorizations are expressed as access policies in some types of "policy definition application", e.g. in the form of an access control list or a capability, on the basis of the "principle of least privilege": consumers should only be authorized to access whatever they need to do their jobs. Older and single user operating systems often had weak or non-existent authentication and access control systems.
"Anonymous consumers" or "guests", are consumers that have not been required to authenticate. They often have limited authorization. On a distributed system, it is often desirable to grant access without requiring a unique identity. Familiar examples of access tokens include keys and tickets: they grant access without proving identity.
Trusted consumers are often authorized for unrestricted access to resources on a system, but must be authenticated so that the access control system can make the access approval decision. "Partially trusted" and guests will often have restricted authorization in order to protect resources against improper access and usage. The access policy in some operating systems, by default, grant all consumers full access to all resources. Others do the opposite, insisting that the administrator explicitly authorizes a consumer to use each resource.
Even when access is controlled through a combination of authentication and access control lists, the problems of maintaining the authorization data is not trivial, and often represents as much administrative burden as managing authentication credentials. It is often necessary to change or remove a user's authorization: this is done by changing or deleting the corresponding access rules on the system. Using atomic authorization is an alternative to per-system authorization management, where a trusted third party securely distributes authorization information.

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「Authorization」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.