A group of activities normally (but not always) performed by one person and often implemented with a security group. Often, one person may play multiple roles.
— Computer ScienceA symbolic name that defines a class of users for a set of components. Each role defines which users are allowed to invoke interfaces on a component.
— Computer ScienceAn administrative classification that is associated with a defined set of user rights.
— Computer ScienceA set of software programs that, when installed and properly configured, allows a computer running a Windows Server operating system to perform a specific function for multiple users or other computers within a network.
— Computer ScienceThe name given to each End of an association to clarify the semantics of the relationship.
— Computer ScienceA specific part or function in an application or architecture. For example, a Web server, a database server, or a client.
— Computer ScienceThe user role that is assigned to a user account, which determines the options that are visible to that user and the tasks that the user can perform in the management interface for Exchange Labs.
— Computer ScienceA behavior pattern of a participant in a relationship.
— Computer ScienceIn the security model, a behavior pattern of a person playing an organization role, a functional role, and an application role.
— Computer ScienceThe type of operating environment for applications that runs within a Microsoft Azure cloud service.
— Computer Science