Glossary entry (derived from question below)
English term or phrase:
Enterprise User Authorization (EUA)
Portuguese translation:
autorização de usuário corporativo/ empresarial
Added to glossary by
ferreirac
May 28, 2022 12:33
2 yrs ago
25 viewers *
English term
Enterprise User Authorization (EUA)
English to Portuguese
Tech/Engineering
IT (Information Technology)
Rename in the Enterprise User Authorization (EUA) application the section “Account Management” as “Customer Search” and replace the user permissions “Customer Support” and “Customer Profile Support” with one single user permission called “Customer Profile”.
Proposed translations
(Portuguese)
Change log
Dec 27, 2022 17:59: ferreirac Created KOG entry
Proposed translations
4 mins
Selected
autorização de usuário corporativo/ empresarial
Sug.
--------------------------------------------------
Note added at 8 mins (2022-05-28 12:42:12 GMT)
--------------------------------------------------
https://www.microsoft.com/en-us/language/Search?&searchTerm=...
--------------------------------------------------
Note added at 9 mins (2022-05-28 12:43:17 GMT)
--------------------------------------------------
https://www.microsoft.com/en-us/language/Search?&searchTerm=...
--------------------------------------------------
Note added at 8 mins (2022-05-28 12:42:12 GMT)
--------------------------------------------------
https://www.microsoft.com/en-us/language/Search?&searchTerm=...
--------------------------------------------------
Note added at 9 mins (2022-05-28 12:43:17 GMT)
--------------------------------------------------
https://www.microsoft.com/en-us/language/Search?&searchTerm=...
4 KudoZ points awarded for this answer.
Comment: "Obrigada!"
+1
4 mins
5 mins
Autorização de Usuário Empresarial
Autorização de Usuário Empresarial
10 mins
English term (edited):
enterprise user authorization
Autenticação empresarial do usuário
:)
Dictionary of Health Information Technology and Securityhttps://books.google.com.br › books· Traduzir esta página
Hope Rachel Hetico, RN, MHA, CMPTM · 2007 · Medical
ENTERPRISE USER AUTHENTICATION (EUA): An access control computer management system using secure sign-in verification and identification;
Dictionary of Health Information Technology and Securityhttps://books.google.com.br › books· Traduzir esta página
Hope Rachel Hetico, RN, MHA, CMPTM · 2007 · Medical
ENTERPRISE USER AUTHENTICATION (EUA): An access control computer management system using secure sign-in verification and identification;
1 hr
Autorização empresarial do usuário
Português do Brasil
8 hrs
autorização do utilizador definida pela empresa/pelo setor
O termo tem alguma coisa a ver com sistemas informáticos de segurança em certos setores, como a saúde e o direito?
Pelo que pesquisei, é o que me parece.
http://www.apdsi.pt/wp-content/uploads/prev/Estudo_APDSI_Int...
Abstract— In many common enterprise architecture frameworks
access control information is not represented in the business and
process layer. Access control is composed of three main activities:
authentication of users, authorization to perform a certain action
and audit of the actions that were performed.
Access control enables an authority to control access to
resources in a given system and, in the realm of computer
engineering,. It includes:
Authentication – Verifies that an entity that is trying to
access the system is the one who claims to be.
Authorization – Checks the permissions required to
perform a certain action on a system.
Audit – Stores some access control events
(authentication, actions performed, etc.) to verify that
those events are valid.
Aqui encontra uma boa explicação entre autenticação e autorização:
Authorization in system security is the process of giving the user permission to access a specific resource or function. This term is often used interchangeably with access control or client privilege.
Giving someone permission to download a particular file on a server or providing individual users with administrative access to an application are good examples of authorization.
In secure environments, authorization must always follow authentication. Users should first prove that their identities are genuine before an organization’s administrators grant them access to the requested resources.
https://www.okta.com/identity-101/authentication-vs-authoriz...
Eu mantinha em inglês de acordo com o "link" em pt-pt acima e colocaria uma tradução aproximada (visto não haver nenhuma consagrada, pelo menos que eu encontrasse), entre parênteses
--------------------------------------------------
Note added at 8 hrs (2022-05-28 20:55:52 GMT)
--------------------------------------------------
https://www.infopedia.pt/dicionarios/ingles-portugues/Enterp...
Pelo que pesquisei, é o que me parece.
http://www.apdsi.pt/wp-content/uploads/prev/Estudo_APDSI_Int...
Abstract— In many common enterprise architecture frameworks
access control information is not represented in the business and
process layer. Access control is composed of three main activities:
authentication of users, authorization to perform a certain action
and audit of the actions that were performed.
Access control enables an authority to control access to
resources in a given system and, in the realm of computer
engineering,. It includes:
Authentication – Verifies that an entity that is trying to
access the system is the one who claims to be.
Authorization – Checks the permissions required to
perform a certain action on a system.
Audit – Stores some access control events
(authentication, actions performed, etc.) to verify that
those events are valid.
Aqui encontra uma boa explicação entre autenticação e autorização:
Authorization in system security is the process of giving the user permission to access a specific resource or function. This term is often used interchangeably with access control or client privilege.
Giving someone permission to download a particular file on a server or providing individual users with administrative access to an application are good examples of authorization.
In secure environments, authorization must always follow authentication. Users should first prove that their identities are genuine before an organization’s administrators grant them access to the requested resources.
https://www.okta.com/identity-101/authentication-vs-authoriz...
Eu mantinha em inglês de acordo com o "link" em pt-pt acima e colocaria uma tradução aproximada (visto não haver nenhuma consagrada, pelo menos que eu encontrasse), entre parênteses
--------------------------------------------------
Note added at 8 hrs (2022-05-28 20:55:52 GMT)
--------------------------------------------------
https://www.infopedia.pt/dicionarios/ingles-portugues/Enterp...
Something went wrong...