Home > Cisco > Control System > Cisco Acs 5x User Guide

Cisco Acs 5x User Guide

Here you can view all the pages of manual Cisco Acs 5x User Guide. The Cisco manuals for Control System are available online for free. You can easily download all the documents as PDF.

Page 631

Glossary
GL-11
User Guide for Cisco Secure Access Control System 5.3
OL-24201-01
I
I18NInternationalization and localization are means of adapting software for non-native environments, 
especially other nations and cultures. Internationalization is the adaptation of products for potential 
use virtually everywhere, while localization is the addition of special features for use in a specific 
locale.
identityWhom someone or what something is, for example, the name by which something is known.
identity...

Page 632

Glossary
GL-12
User Guide for Cisco Secure Access Control System 5.3
OL-24201-01
ISOInternational Organization for Standardization, a voluntary, non-treaty, non-government organization, 
established in 1947, with voting members that are designated standards bodies of participating nations 
and non-voting observer organizations.
ISPInternet Service Provider. A business or organization that provides to consumers access to the Internet 
and related services. In the past, most ISPs were run by the phone...

Page 633

Glossary
GL-13
User Guide for Cisco Secure Access Control System 5.3
OL-24201-01
M
MAC AddressA physical address; a numeric value that uniquely identifies that network device from every other 
device on the planet.
matchingRule 
(LDAP) The method by which an attribute is compared in a search operation. A matchingRule is an ASN.1 
definition that usually contains an OID a name (for example, caseIgnoreMatch [OID = 2.5.23.2]), and 
the data type it operates on (for example, DirectoryString).
MD5A one way...

Page 634

Glossary
GL-14
User Guide for Cisco Secure Access Control System 5.3
OL-24201-01
PI (Programmatic 
Interface)The ACS PI is a programmatic interface that provides external applications the ability to communicate 
with ACS to configure and operate ACS; this includes performing the following operations on ACS 
objects: create, update, delete and read.
policy conditionRule-based single conditions that are based on policies, which are sets of rules used to evaluate an 
access request and return a decision....

Page 635

Glossary
GL-15
User Guide for Cisco Secure Access Control System 5.3
OL-24201-01
R
RDN (LDAP)The Relative Distinguished Name (frequently but incorrectly written as Relatively Distinguished 
Name). The name given to an attribute(s) that is unique at its level in the hierarchy. RDNs may be 
single valued or multi-valued in which case two or more attributes are combined using + (plus) to 
create the RDN e.g. cn+uid. The term RDN is only meaningful when used as part of a DN to uniquely 
describe the...

Page 636

Glossary
GL-16
User Guide for Cisco Secure Access Control System 5.3
OL-24201-01
Schema (LDAP)A package of attributes and object classes that are sometimes (nominally) related. The schema(s) in 
which the object classes and attributes that the application will use (reference) are packaged are 
identified to the LDAP server so that it can read and parse all that wonderful ASN.1 stuff. In 
OpenLDAP this done using the slapd.conf file.
search (LDAP) An operation that is carried out by defining a base...

Page 637

Glossary
GL-17
User Guide for Cisco Secure Access Control System 5.3
OL-24201-01
SOAP (Simple 
Object Access 
Protocol)A lightweight XML-based protocol for exchange of information in a decentralized, distributed 
environment. SOAP consists of three parts: an envelope that defines a framework for describing what 
is in a message and how to process it, a set of encoding rules for expressing instances of 
application-defined datatypes, and a convention for representing remote procedure calls and...

Page 638

Glossary
GL-18
User Guide for Cisco Secure Access Control System 5.3
OL-24201-01
U
UDPUser Datagram Protocol. A communications protocol that offers a limited amount of service when 
messages are exchanged between computers in a network that uses the Internet Protocol (IP)
URLUniform Resource Locator. The unique address for a file that is accessible on the Internet.
user and identity 
storeA repository of users, user attributes, and user authentication options.
user authentication 
optionAn option to...

Page 639

Glossary
GL-19
User Guide for Cisco Secure Access Control System 5.3
OL-24201-01
X
X.509A standard for public key infrastructure. X.509 specifies, amongst other things, standard formats for 
public key certificates and a certification path validation algorithm.
XML (eXtensible 
Markup Language)XML is a flexible way to create common information formats and share both the format and the data 
on the World Wide Web, intranets, and elsewhere. 

Page 640

Glossary
GL-20
User Guide for Cisco Secure Access Control System 5.3
OL-24201-01 
Start reading Cisco Acs 5x User Guide

Related Manuals for Cisco Acs 5x User Guide

All Cisco manuals