user id


Also found in: Dictionary, Acronyms.
Related to user id: email

user id

user ID

(user IDentification) See username.
References in periodicals archive ?
Lakhs of reward points have been redeemed by this gang and the figures may also rise in the future." According to the police, the carrier has said that these accounts have not been in use since March and also they have deactivated all such suspicious user IDs. " It seems that with the connivance of AI staff and agents, gang duped innocent passengers who earned points by travelling with Air India.
It checked its system after severing access and found traces of an attempt to steal user IDs.
The provider of customer protection for online businesses found that 73% of bank customers use their online account password to access other websites, while 47% use both their online banking user ID and password to login elsewhere on the Internet.
Enter your User ID and password in the Login section located in the upper right-hand corner of the Homepage.
Your company's points of contact with the Central Contractor Registration (CCR) must choose a new user ID and password to access the system.
Policy and process improvements include user ID naming conventions; process work instructions that clearly detail steps for user administration functions; defined segregation of duties policies; and user ID reviews that focus on higher risk systems.
To see whether the system has this worst-case scenario, select a user ID without any administrative rights and attempt to launch an FTP session against the System i.
The report concludes, "Network attacks could have been prevented in 84 percent of all cases if the organization had implemented device identification and authentication in addition to user ID and password protections.
PHISHNET also determines and informs the users who access these sites whether the website to which they are attempting to send personal information including their User ID and credit card number is real or counterfeit.
Each time the key is used, a record of the user ID, date, and time is stored in both key and cylinder, creating a lock history and a key history.
It also supports authentication schemes such as user ID and password, RADIUS, Secure ID, Active Directory and LDAP.
Both User ID and Password are needed to access this area.