Access Control and Privilege Management Sample Clauses

Access Control and Privilege Management. Administrators and End Users must authenticate themselves via a central authentication system or via a Customer’s single sign on system in order to use the Services. Each application checks credentials in order to allow the display of data to an authorized End User or authorized Administrator.
Access Control and Privilege Management. We restrict administrative access to customer production systems to operational personnel. We require such personnel to have unique IDs and associated cryptographic keys. These keys are used to authenticate and identify each Person’s activities on Our systems, including access to Service Data. Upon hire, Our operational personnel are assigned unique keys. Upon termination, these keys are revoked. Access rights and levels are based on Our employees’ job function and role, using the concepts of least-privilege and need-to-know to match access privileges to defined responsibilities.
Access Control and Privilege Management. Subscriber’s administrators must authenticate themselves via a central authentication system or via a single sign-on system in order to administer the Services.
Access Control and Privilege Management. The Data Exporter’s administrators and end users must authenticate themselves via a central authentication system or via a single sign on system in order to use the Service. Each application checks credentials in order to allow the display of data to an authorized end user or authorized administrator.
Access Control and Privilege Management. TeleSign’s and Client’s administrators and end users must authenticate themselves via a central authentication system or via a single sign on system in order to use the Services. Each application checks credentials in order to allow the display of data to an authorized user or administrator.
Access Control and Privilege Management. Customer's administrators must authenticate themselves via a service-specific authentication system in order to administer the Services.
Access Control and Privilege Management. Aquant’s and Customer’s administrators and end users must authenticate themselves via a Multi-Factor authentication system or via a single sign on system in order to use the Services
Access Control and Privilege Management. Company’s and Customer’s administrators and end users must authenticate themselves via Passwords as per Password Policy in order to use the Services
Access Control and Privilege Management. Processor’s and Client’s administrators and end users must authenticate themselves via a central authentication system or via a single sign on system in order to use the Platform. Each application checks credentials in order to allow the display of data to an authorized user or administrator.

Related to Access Control and Privilege Management

  • Access Control Supplier will maintain an appropriate access control policy that is designed to restrict access to Accenture Data and Supplier assets to authorized Personnel. Supplier will require that all accounts have complex passwords that contain letters, numbers, and special characters, be changed at least every 90 days, and have a minimum length of 8 characters.

  • Real and Reactive Power Control and Primary Frequency Response 9.5.1 Power Factor Design Criteria.

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization.

  • Configuration Management The Contractor shall maintain a configuration management program, which shall provide for the administrative and functional systems necessary for configuration identification, control, status accounting and reporting, to ensure configuration identity with the UCEU and associated cables produced by the Contractor. The Contractor shall maintain a Contractor approved Configuration Management Plan that complies with ANSI/EIA-649 2011. Notwithstanding ANSI/EIA-649 2011, the Contractor’s configuration management program shall comply with the VLS Configuration Management Plans, TL130-AD-PLN-010-VLS, and shall comply with the following:

  • Access Controls a. Authorized Access - DST shall have controls that are designed to maintain the logical separation such that access to systems hosting Fund Data and/or being used to provide services to Fund will uniquely identify each individual requiring access, grant access only to authorized personnel based on the principle of least privileges, and prevent unauthorized access to Fund Data. b. User Access - DST shall have a process to promptly disable access to Fund Data by any DST personnel who no longer requires such access. DST will also promptly remove access of Fund personnel upon receipt of notification from Fund.