Cisco Acs 5x User Guide
Here you can view all the pages of manual Cisco Acs 5x User Guide. The Cisco manuals for Control System are available online for free. You can easily download all the documents as PDF.
Page 631
Glossary GL-11 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 I I18NInternationalization and localization are means of adapting software for non-native environments, especially other nations and cultures. Internationalization is the adaptation of products for potential use virtually everywhere, while localization is the addition of special features for use in a specific locale. identityWhom someone or what something is, for example, the name by which something is known. identity...
Page 632
Glossary GL-12 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 ISOInternational Organization for Standardization, a voluntary, non-treaty, non-government organization, established in 1947, with voting members that are designated standards bodies of participating nations and non-voting observer organizations. ISPInternet Service Provider. A business or organization that provides to consumers access to the Internet and related services. In the past, most ISPs were run by the phone...
Page 633
Glossary GL-13 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 M MAC AddressA physical address; a numeric value that uniquely identifies that network device from every other device on the planet. matchingRule (LDAP) The method by which an attribute is compared in a search operation. A matchingRule is an ASN.1 definition that usually contains an OID a name (for example, caseIgnoreMatch [OID = 2.5.23.2]), and the data type it operates on (for example, DirectoryString). MD5A one way...
Page 634
Glossary GL-14 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 PI (Programmatic Interface)The ACS PI is a programmatic interface that provides external applications the ability to communicate with ACS to configure and operate ACS; this includes performing the following operations on ACS objects: create, update, delete and read. policy conditionRule-based single conditions that are based on policies, which are sets of rules used to evaluate an access request and return a decision....
Page 635
Glossary GL-15 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 R RDN (LDAP)The Relative Distinguished Name (frequently but incorrectly written as Relatively Distinguished Name). The name given to an attribute(s) that is unique at its level in the hierarchy. RDNs may be single valued or multi-valued in which case two or more attributes are combined using + (plus) to create the RDN e.g. cn+uid. The term RDN is only meaningful when used as part of a DN to uniquely describe the...
Page 636
Glossary GL-16 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Schema (LDAP)A package of attributes and object classes that are sometimes (nominally) related. The schema(s) in which the object classes and attributes that the application will use (reference) are packaged are identified to the LDAP server so that it can read and parse all that wonderful ASN.1 stuff. In OpenLDAP this done using the slapd.conf file. search (LDAP) An operation that is carried out by defining a base...
Page 637
Glossary GL-17 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 SOAP (Simple Object Access Protocol)A lightweight XML-based protocol for exchange of information in a decentralized, distributed environment. SOAP consists of three parts: an envelope that defines a framework for describing what is in a message and how to process it, a set of encoding rules for expressing instances of application-defined datatypes, and a convention for representing remote procedure calls and...
Page 638
Glossary GL-18 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 U UDPUser Datagram Protocol. A communications protocol that offers a limited amount of service when messages are exchanged between computers in a network that uses the Internet Protocol (IP) URLUniform Resource Locator. The unique address for a file that is accessible on the Internet. user and identity storeA repository of users, user attributes, and user authentication options. user authentication optionAn option to...
Page 639
Glossary GL-19 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 X X.509A standard for public key infrastructure. X.509 specifies, amongst other things, standard formats for public key certificates and a certification path validation algorithm. XML (eXtensible Markup Language)XML is a flexible way to create common information formats and share both the format and the data on the World Wide Web, intranets, and elsewhere.