Examples of using Identity-based in English and their translations into German
{-}
-
Colloquial
-
Official
-
Ecclesiastic
-
Medicine
-
Financial
-
Ecclesiastic
-
Political
-
Computer
-
Programming
-
Official/political
-
Political
CloudWatch supports only identity-based policies.
Identity-based permissions can be managed or inline.
With DAUBERMANN you rely on"identity-based concepts.
Identity-based IAM policies are attached to an IAM user, group, or role.
Provides context awareness withCisco TrustSec security group tags and identity-based firewall technology.
CloudWatch Events supports both identity-based(IAM policies) and resource-based policies.
HP FlexCampus converges high-performance wired andwireless networks to deliver secure, identity-based user access.
Employer Branding is the identity-based, internal and external positioning of an organisation as an attractive and authentic employer.
Policies that are attached to an IAM identity are referred to as identity-based policies IAM policies.
Through central and identity-based management CLT provides an integral security system uniting control and checking functions.
America approaching the stage of decay Local identity-based communities emerge to fill the void.
Layer 8 Identity-based Security Cyberoam's Layer 8 Technology treats user identity as the 8th layer or the"human layer" in the network protocol stack.
Access to the platform is protected with passwords and identity-based user accounts to deliver maximum security.
You can attach an identity-based permissions policy to an IAM role to grant cross-account permissions.
It is a very nice feeling and I take it mostly as validation of our identity-based approach and the design quality of our work.
The appliances offer Layer 8 Identity-based security, allowing administrators to apply identity-based security policies to gain visibility over user activity in the Wi-Fi network.
Throughout the AWS documentation, when we refer to an IAM policy without mentioning any of the specific categories, we mean an identity-based, customer managed policy.
Level 3 devices are measured on tamper detection and response, identity-based authentication and enhanced protection of secret and private keys.
In 2016, the drive, the desire for an artistic self-determination couldbe overshadowed, again, by the renewed expectations of a culture industry hungry for easy definable identity-based movements.
Cyberoam Next-Generation Firewalls(NGFW) with Layer 8 Identity-based technology offer actionable intelligence and controls to enterprises that allow complete security controls over L2-L8 for their future-ready security.
In the aftermath of the Nuclear Deal, the desire for self-determination of Iran's artscene could be overshadowed, again, by the renewed expectations of a Western culture industry hungry for easy definable identity-based movements.
In a kind of politics of self-affirmation,SSCs were locked into identity-based dynamics, with their own languages for communicating and describing the world, operating as a kind of political faction.
Million identities and devices in the mobile and telecommunications sector with vendors and carriers around the world implementing Liberty Federation andLiberty Web Services for identity-based consumer and enterprise applications;
Level 3 also includes robust cryptographic protection and key management, identity-based authentication, and physical or logical separation between the interfaces by which critical security parameters enter and leave.
Close HP MSM7xx Controllers centrally control the wireless network,pushing QoS and security policies and identity-based services to MSM APs at the network edge, where traffic is forwarded directly from source to destination.
In this ideology,the territory is understood as a strongly unified social, identity-based, and institutional unit that must fight hard to compete with other territories in order to achieve a positive trade balance and attract investment.