This glossary defines terms used by the Internet Connection Secure Server.
- accessory script
- A CGI script program that processes SEARCH, POST, PUT, or DELETE
requests.
The accessory scripts process requests that are not explicitly
mapped to a CGI script program named on an EXEC directive.
- address
- The unique code assigned to each device or
workstation connected to a network.
A standard Internet address (or IP address) is a 32-bit address field.
This field contains two parts.
The first part is the network address;
the second part is the host number.
See also IP address.
- agent
-
In systems management, a user that, for a particular interaction,
has assumed an agent role.
-
An entity that represents one or more managed objects by
(a) emitting notifications regarding the objects and
(b) handling requests from managers for management operations
to modify or query the objects.
- alias
- A name assigned to a server.
The alias makes the server independent of the name of its host machine.
The alias must be defined in the domain name server.
- asymmetric keys
- In secure communications, the two keys in a key pair.
The keys are called asymmetric because one key holds more of the
encryption pattern than the other does.
See key pair.
- authentication
- In secure communications, a means of verifying the identity
of a server or browser (client) with whom you wish to communicate.
A sender's authenticity is demonstrated
by the digital certificate issued to the sender.
See also certificate.
- browser
- A client program that initiates requests to a server
and displays the returned information.
- cache
- A special-purpose buffer storage, smaller and faster than main
storage, used to hold a copy of data that may be frequently accessed.
Use of a cache reduces access time,
but may increase memory requirements.
- caching proxy server
- A proxy server that can store the documents it retrieves
from other servers in a local cache.
The server can then respond to subsequent requests for the
same documents without having to retrieve them from other servers.
This can improve response time.
- CERN
- Conseil Europeen pour la Recherche Nucleaire (European Laboratory
for Particle Physics).
Located in Geneva, CERN initiated the World Wide Web,
and was the first to create a Web server.
The CERN Web server is the basis for many commercially
available servers, such as IBM's Internet Connection Secure Server.
- certificate
- In secure communications, a digital document that binds
an encryption key to the identity of the certificate owner,
so that the certificate owner can be authenticated.
A certificate is issued by a certification authority (CA).
See also encryption, certificate, and
certification authority (CA).
- certification authority (CA)
- In secure communications,
a trusted third party (such as VeriSign, Inc.)
or a designated internal authority who issues certificates.
See also certificate.
- CGI (common gateway interface)
- A standard interface between Web servers and external programs.
CGI scripts are programs that use this interface to perform tasks
not usually done by the server, such as form processing.
- CGI program
- A program that uses the common gateway interface (CGI)
to perform tasks not usually done by the server, such as form processing.
CGI programs can be written in any language supported by the operating
system on which the server is run.
The language can be a scripting language or a programming language.
- client
- A computer system or process that requests a service of
another computer system or process.
For example, a workstation or personal computer
requesting HTML documents from an IBM Internet Connection Secure Server
is a client of the IBM Internet Connection Secure Server it connects to.
- configuration file
- A file that describes the devices, optional features,
communications parameters, and programs installed on a workstation.
This configuration file is named httpd.cnf.
The configuration file contains directives
that define the various settings for the server.
- cookie
- A general mechanism that server-side connections, such as
CGI scripts, can use to store information on the
client side of the connection for later retrieval.
For example, a retail Web site can
store per-user preferences on the client, and have the client supply
those preferences every time that site is connected to. A cookie
is introduced to the client in a Set-Cookie header, which is included
as part of an HTTP response.
- default
- A value, attribute, or option that is assumed
when none is explicitly specified.
- directive
- A statement used in the Internet Connection Secure Server configuration file
to define a particular setting for the server.
- directory
- A named grouping of files in a file system.
- Distinguished Name
- In secure communications, the name and address of the person
and organization to whom a certificate has been issued.
See also certificate.
- document root directory
- The primary directory where a Web server stores accessible documents.
When the server receives requests that do not point to a specific
directory, it tries to serve the request from this directory.
- domain
- In an internet, a part of the naming hierarchy.
A domain name consists of a sequence
of names (labels) separated by periods (dots).
- domain name
- A name of a host system in a network.
A domain name consists of a sequence
of names (labels) separated by periods (dots).
- domain name server
- A server program that supplies address-to-name
translation by mapping Internet addresses to domain names.
Use of a domain name server allows users
to request services of another computer using a symbolic name,
which is easier to remember than an Internet address.
- dotted-decimal notation
- The syntactical representation for a 32-bit integer that consists of
four 8-bit numbers, written in base 10 and separated by periods (dots).
It is used to represent IP addresses.
- dynamic link library (DLL)
- A file containing executable code and data bound to a program
at load time or run time. The code and data in a dynamic link
library can be shared by several applications simultaneously.
- encryption
- In secure communications, a means of scrambling data
to prevent the data from being read by
anyone other than the intended recipient.
The sender uses a key to encrypt the message;
the recipient uses the decryption key.
See also key and key pair.
- file extension
- The last part of a file's name, following the period (dot).
For example, in the filename welcome.html, the file extension is html.
- firewall
- A computer that connects a private network, such as a business,
to a public network, such as the Internet.
It contains programs that limit the access between two networks.
See also proxy gateway.
- FTP (File Transfer Protocol)
- An application protocol used for transferring files to
and from host computers.
FTP requires a user ID, and a password to allow
access to files on a remote host system.
- gateway
- A functional unit that connects a local data network with
another network.
See also proxy gateway.
- Gopher
- The protocol, developed at the University of Minnesota,
that provides a menu-driven interface for accessing files
and information on other computers.
- home page
- The welcome page on the document root directory of a Web server.
Commonly used as the entry point for the contents of the server.
See also welcome page.
- host
- A computer, connected to a network, which provides
an access point to that network.
A host can be a client, a server, or a client and server
simultaneously.
- host name
- A name, such as tcpipidd.raleigh.ibm.com, that is defined
for an IP address, such as 9.67.97.103.
- HTML (Hypertext Markup Language)
- A language used to create hypertext documents.
Hypertext documents can include links to other related documents.
HTML controls the format of text and position of form input areas,
for example, as well as the navigable links.
- HTML document
- A document written in HTML that may contain links to other documents
that contain additional information about related terms or subjects.
- HTTP (Hypertext Transfer Protocol)
- The protocol used to transfer and display hypertext documents.
- HTTP method
- An action used by the Hypertext Transfer Protocol.
For example, HTTP methods include GET, POST, and PUT.
- icon
- A graphical representation of an object (a file or program),
consisting of an image, image background, and a label.
- Internet
- A wide area network connecting thousands of disparate networks
in industry, education, government, and research.
The Internet network uses TCP/IP as the standard
for transmitting information.
- IP address
- The unique 32-bit address that specifies the actual location
of each device or workstation in the Internet.
For example, 9.67.97.103 is an IP address.
- key
- In secure communications,
an algorithmic pattern used by a sender to encrypt messages,
and by a recipient to decrypt messages.
See also encryption, key pair, and
key ring.
- key pair
- In secure communications, a public key and a private key.
The sender uses the private key to encrypt the message;
the recipient uses the public key to decrypt the message.
Because the private key holds more of the encryption pattern
than the public key does, the key pair is called asymmetric.
See also public key and private key.
- key ring
- In secure communications, a file that contains public keys,
private keys, trusted roots, and certificates.
See also public key, private key,
trusted root, and certificate.
- managed node
-
In Internet communications, a workstation, server, or router
that contains a network management agent.
In the Internet Protocol (IP), the managed node usually contains a
Simple Network Management Protocol (SNMP) agent.
- method
- An action used by the Hypertext Transfer Protocol.
For example, HTTP methods include GET, POST, and PUT.
- MIB
-
Management Information Base.
A collection of objects that can be accessed by means of
a network management protocol.
-
A definition for management information that specifies
the information available from a host or gateway
and the operations allowed.
- MIME (Multipurpose Internet Mail Extensions)
- An Internet standard for multimedia e-mail,
including graphics, audio, and fax.
- name server
- A host that provides name resolution for a network.
Name servers translate symbolic names assigned to networks
and hosts into the Internet (IP) addresses used by machines.
- network management station
-
In the Simple Network Management Protocol (SNMP),
a station that executes management application programs
that monitor and control network elements.
- password
- In secure communications, a string of characters that you use
to protect access to your key ring.
See also key ring.
- path
- A statement that indicates where a file is stored
on a particular drive.
The path consists of all the directories
that must be opened to get to a particular file.
The directory names are separated by the backslash (\).
- persistent connection
- A TCP/IP connection that allows the server to accept multiple
requests and to sent responses over the same connection.
- PICS
- Platform for Internet Content Selection.
An evolving set of specifications governing the creation and
use of ratings for Web information, including HTML files, as well
as image, sound, and animation files. Content providers can rate
and label their own Web information; also, independent rating
services can rate Web information. Internet users can then request
the ratings as a way to preview and filter Web information for
acceptable content.
- port
- An end point for communication between applications,
generally referring to a logical connection.
A port provides queues for sending and receiving data.
Each port has a port number for identification.
When the port number is combined with an Internet address,
it is called a socket address.
- private key
- In secure communications, an algorithmic pattern used
to encrypt messages that can be decrypted only
by the corresponding public key.
A private key is also used to decrypt messages
that were encrypted by the corresponding public key.
You keep your private key on your own system in a key
ring, protected by a password.
See also encryption, public key,
and key ring.
- protection setup
- A group of protection subdirectives that work together
to define how the server should control access to
the resources being protected.
You can define protection setups within the configuration file,
in separate protection setup files, or by using the
Configuration and Administration forms.
- protocol
- The set of rules governing the operation of functional units of a
communication system if communication is to take place.
Protocols can determine low-level details of machine-to-machine
interfaces, such as the order in which bits from a byte are sent;
they can also determine high-level exchanges
between application programs, such as file transfer.
- proxy gateway
- A type of firewall that protects computers in a business network
from access by users outside that network.
See also firewall.
- proxy server
- A server that can retrieve documents from other servers for
its clients.
- public key
- In secure communications, an algorithmic pattern used
to decrypt messages that were encrypted
by the corresponding private key.
A public key is also used to encrypt messages
that can only be decrypted by the corresponding private key.
You broadcast your public key to everyone who will
need to exchange encrypted messages with you.
See also encryption, private key, and
key ring.
- README file
- A file containing information and instructions for using the
associated program or programs
- request
- The part of a URL that follows the protocol and server host name.
For example, in the URL http://www.server.com/rfoul/sched.html,
the request is: /rfoul/sched.html
- server
- A computer that provides shared services to other computers
over a network;
for example, a file server, a print server, or a mail server.
- server root directory
- The directory where the Internet Connection Secure Server program is installed.
By default, the server root directory is
C:\WWW\BIN.
- server-side includes (SSI)
- A facility for including dynamic information in documents sent
to clients, such as current date, the file's last modification date,
and the size or last modification of other files.
- SSL
- Secure Sockets Layer.
SSL is a popular security scheme developed by Netscape Communications
Corp., along with RSA Data Security, Inc.
SSL allows the client to authenticate the server and all
data and requests to be encrypted.
The URL of a secure server protected by
SSL begins with https (rather than http).
See also authentication.
- subdirectory
- A directory contained within another directory in a file
system hierarchy.
- thread
- The smallest unit of operation performed within a process.
- thread pool
- The threads that are either being used or available to Internet Connection Secure Server.
- trusted root
- In secure communications, the public key and
associated Distinguished Name of a certification authority (CA).
See also public key, Distinguished Name, and
certification authority (CA).
- URL (Uniform Resource Locator)
- The address convention that indicates the location of an item on
the World Wide Web.
It includes the protocol followed by the fully-qualified host name,
and the request.
The server typically maps the request
portion of the URL to a path and file name.
For example, http://www.ibm.com/index.html
- virtual host
- One of several host names that you can define for a single
IP address in the domain name server. That IP address can then
serve multiple files, rather than requiring different IP addresses
for different files.
- WAIS (Wide Area Information Service)
- A network information system that enables
clients to search documents on the World Wide Web.
- Web
- The World Wide Web: the network of HTTP
servers that contain programs and files,
such as hypertext documents that contain links to other
documents on HTTP servers.
- Web server
- A server on the World Wide Web.
See also Web.
- welcome page
- A document that is returned by a Web server in response to
a request that points to a directory but does not contain a file name.
Each accessible directory on the server can have a welcome page.
See also home page.
- wildcard character
- An asterisk (*) used in a template.
For the template to be matched, an asterisk can be replaced
by any character string or single character.
A question mark must be replaced by one single character.
[ Top of Page | Previous Page | Next Page | Table of Contents ]