Cisco Systems OL-24201-01 Camera Accessories User Manual


 
Glossary
GL-3
User Guide for Cisco Secure Access Control System 5.3
OL-24201-01
authenticity
The validity and conformance of the original information.
authorization
The approval, permission, or empowerment for someone or something to do something.
authorization profile
The basic "permissions container" for a RADIUS-based network access service. The authorization
profile is where you define all permissions to be granted for a network access request. VLANs, ACLs,
URL redirects, session timeout or reauthorization timers, or any other RADIUS attributes to be returned
in a response are defined in the authorization profile.
B
basic authentication
The simplest web-based authentication scheme that works by sending the username and password with
each request.
BIND
Berkeley Internet Name Domain. An implementation of DNS. DNS is used for domain name to IP
address resolution.
bind (LDAP)
When connection is made to an LDAP server the first operation of the sequence is called a bind. The
bind operation sends the dn of the entry that will be used for authentication and the password to be used.
In the case of an anonymous bind both values will be NULL.
block cipher
Encrypts one block of data at a time.
bridge
A product that connects a local area network (LAN) to another local area network that uses the same
protocol (for example, Ethernet or token ring).
broadcast
To simultaneously send the same message to multiple recipients. One host to all hosts on network.
broadcast address
An address used to broadcast a datagram to all hosts on a given network using UDP or ICMP protocol.
browser
A client computer program that can retrieve and display information from servers on the World Wide
Web.
C
CA Signature
A digital code that vouches for the authenticity of a digital certificate. The CA signature is provided by
the certificate authority (CA) that issued the certificate.
cache
A special high-speed storage mechanism. It can be either a reserved section of main memory or an
independent high-speed storage device. Two types of caching are commonly used in personal
computers: memory caching and disk caching.
CSS
cascading style sheet. A Web page derived from multiple sources with a defined order of precedence
where the definitions of any style element conflict.
CA
certificate authority. An authority in a network that issues and manages security credentials and public
keys for message encryption and decryption. As part of a public key infrastructure (PKI), a CA checks
with a registration authority (RA) to verify information provided by the requestor of a digital
certificate. If the RA verifies the requestor's information, the CA can then issue a certificate.