Cisco Systems OL-24201-01 Camera Accessories User Manual


 
Glossary
GL-16
User Guide for Cisco Secure Access Control System 5.3
OL-24201-01
Schema (LDAP)
A package of attributes and object classes that are sometimes (nominally) related. The schema(s) in
which the object classes and attributes that the application will use (reference) are packaged are
identified to the LDAP server so that it can read and parse all that wonderful ASN.1 stuff. In
OpenLDAP this done using the slapd.conf file.
search (LDAP)
An operation that is carried out by defining a base directory name (DN), a scope, and a search filter.
Secure Sockets
Layer(SSL)
A protocol developed by Netscape for transmitting private documents via the Internet. SSL works by
using a public key to encrypt data that's transferred over the SSL connection. SSL is a cryptographic
protocol which provides secure communications on the Internet for such things as web browsing,
e-mail, Internet faxing, and other data transfers. There are slight differences between SSL 3.0 and TLS
1.0, but the protocol remains substantially the same. The term "TLS" as used here applies to both
protocols unless clarified by context.
Security Policy
A set of rules and practices that specify or regulate how a system or organization provides security
services to protect sensitive and critical system resources.
server
A system entity that provides a service in response to requests from other system entities called
clients.
service provisioning
Service provisioning refers to the "preparation beforehand" of IT systems' materials or supplies
required to carry out a specific activity. This includes the provisioning of digital services such as user
accounts and access privileges on systems, networks and applications, as well as the provisioning of
non-digital or "physical" resources such as cell phones and credit cards.
service selection
policy
A set of rules that determines which access policy applies to an incoming request.
Session
A session is a virtual connection between two hosts by which network traffic is passed.
session (LDAP)
A session occurs between a LDAP client and a server when the client sends a bind command. A
session may be either anonymous or authenticated.
session conditions
Custom conditions, and date and time conditions.
Session Key
In the context of symmetric encryption, a key that is temporary or is used for a relatively short period
of time. Usually, a session key is used for a defined period of communication between two computers,
such as for the duration of a single connection or transaction set, or the key is used in an application
that protects relatively large amounts of data and, therefore, needs to be re-keyed frequently.
shell profiles
The basic “permissions container” for a TACACS+ based device administration policy, in which you
define permissions to be granted for a shell access request.
SLA (Service Level
Agreement)
A SLA is that part of a service contract in which a certain level of service is agreed upon. A SLA is a
formal negotiated agreement between two parties. It is a contract that exists between customers and
their service provider, or between service providers. It transcripts the common understanding about
services, priorities, responsibilities, guarantee, etc. It then specifies the levels of availability,
serviceability, performance, operation or other attributes of the service like billing.
SNMP (Simple
Network
Management
Protocol)
A TCP/IP network protocol that provides a means to monitor and control network devices, and to
manage configurations, statistics collection, performance, and security.