Примеры использования Authenticated user на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
Authenticated user should be the Account owner, or.
The login routes above will have the authenticated user if there is one.
Allow any authenticated user to update DNS records with the same owner name.
For each CLI command the Server checks the authenticated user access rights.
An authenticated user can take advantage of this flaw for remote privilege escalation.
Public methods that transfer the extended information to the authenticated user.
Logs the name of the authenticated user who accessed the server.
Requests from non-logged on users for services that require an authenticated user i.e.
Select to record the name of the authenticated user who accessed your server.
An authenticated user could execute arbitrary SQL commands via the Send Trackbacks field.
Preferences A client can retrieve and update the authenticated user Preferences and Public Info data.
This allowed an authenticated user to bypass those filters by simply rebuilding an instance.
The Network Service account is a special, built-in account,with authority similar to the authority of an authenticated user account.
If the Mailbox is a foreign one, the authenticated user must have the Delete access right for that Mailbox.
The authenticated user should be granted a File Access Right to the specified file or directory(only if AUTH parameter is not specified).
Information leak vulnerability in the VFS code,allowing an authenticated user to retrieve eight bytes of uninitialized memory when shadow copy is enabled.
The authenticated user should have proper access rights to retrieve and/or modify data in Mailboxes belonging to other users. .
When an"initiate call" request is received, CommuniGate Pro starts the parlayMakeCall Real-Time application on behalf of the authenticated user.
The following commands allow an authenticated user to deal with files in the Account File Storage area.
This function returns a null-value if thesession starting request was not authenticated, or a string with the authenticated user E-mail address.
By default, any authenticated user has this right and can create up to 10 computer accounts in the domain.
When LDAP directories are used for access control, and this is done using user attributes, an authenticated user can leverage this to gain access to unauthorized resources.
An authenticated user attempting to read a Unicode path using a non-Unicode request can force the daemon to overwrite memory at an invalid address.
Make sure that the application pool identity that serves this application has Read access to the physical path, so that the authenticated user can access the content in the physical path.
By default, in a fresh AD DS installation, any authenticated user can join up to ten computers into the domain- computer objects will be created in the default"Computers" container.
A target server, which must be in the current or trusted domain/realm, is given a valid general purposeKerberos Ticket Granting Ticket(TGT), which can be used to fully impersonate the authenticated user or service.
If the SMTP module receives a message from an authenticated user, the message is marked as being"submitted from a local Account", and this message can be relayed to the Internet.
Bastian Blank from credativ discovered that cinder, a storage-as-a-service system for the OpenStack cloud computing suite,contained a bug that would allow an authenticated user to read any file from the cinder server.
If the authenticated user does not have a right to delete messages in the selected Mailbox, the DELE protocol operations fail and an error code is returned to the user mailer.
When LDAP directories are used for access control, andthis is done using user attributes, an authenticated user can leverage this to gain access to unauthorized resources.