A software platform designed by the Microsoft Corporation. It is an environment
for writing C#, Visual Basic, and C++ programs that can easily and securely
interoperate.
An environment for building, deploying, and running Web services and other
applications. It consists of three main parts: the Common Language Runtime, the
Framework classes, and ASP.NET.
A set of documentation, samples, command-line tools, compilers, and the
.NET Framework; that is, everything you need to write, build, test, and
deploy .NET Framework applications.
A binding template element that indicates where you can find the endpoint of the
Web service that is described by this entity. This may be a URL, an electronic mail
address, or even a telephone number.
The core System Web service, allowing you to manage advanced settings for each
deployed service on a Systinet Server. Using this Web service it is possible to manage
settings like security mechanisms, transport interceptors, polymorphism, automatic
Web service authentication, and automatic authorization checks per Web service
method.
When an enterprise application is deployed on the server, it contains a set of
deployment descriptors. They contain application metadata. Format and meaning of
Application Server Dependent Deployment Descriptor is closely related to the
application server and cannot be used in the context of any other application
server.
Web services can be categorized into the three groups: System, Application, and
Utility Web services. Application Services are created for specific tasks by the
developer. To accomplish the task they typically use Utility Web services.
The process of establishing the validity of a claimed identity, it usually
consists of two steps: 1/ identification - presenting identity credentials to the
security system, 2/ verification - generating identity that corroborates the binding
between the identity principals and credentials.
The process of determining what types of activities are permitted. Usually,
authorization is in the context of authentication. Once you have authenticated
principals, they may be authorized different types of access or activity.
For a businessService entry, a list of binding templates that point to
specifications and other technical information about the service is associated. For
example, a binding template might point to a URL that supplies information on how to
invoke the service. The binding template also associates the service with a service
type.
A representation of information about a business. Each business entity contains a
unique identifier, the business name, a short description of the business, some
basic contact information, a list of categories and identifiers that describe the
business, and a URL pointing to more information about the business.
A set of requirements, codified in Technical Policies, and their associations with
a set of artifacts in an SOA. A Business Policy should always represent a course of
action that is needed to achieve a particular business objective. Systinet business policies are covered by the WS-PolicyAttachment specification.
A structure associated with a businessEntity that consists of a list of
businessService structures offered by the businessEntity. Each businessService entry
contains a business description of the service, a list of categories that describe
the service, and a list of pointers to references and information related to the
service.
A Tomcat 4.0 servlet container. Tomcat is the servlet container that is used in
the official Reference Implementation for the Java Servlet and JavaServer Pages
technologies.
An electronic identifier from a certification authority that includes the
certification authority signature made with its private key. The authenticity of the
signature is validated by other users who trust the certification authority public
key.
A list of Certificates (usually X.509 Certificates), starting with a certificate
for a given subject that is signed by the authority represented by the next
certificate in the list. This list usually ends with the root certification
authority certificate.
Client side-specific information needed to invoke a specific Web service. This
usually consists of a deployment descriptor and custom code, such as header
processors, interceptors, serializers.
The act of connecting multiple computers and making them act like a single
machine. Corporations often cluster servers to distribute computing-intensive tasks
and risks. If one server in a cluster fails, some operating systems can move its
processes to another server, allowing end users to continue working while the first
server is revived.
Data that is transferred to establish the claimed identity of an entity. According
to RFC2828, a credential is the information one entity presents to another to
authenticate the other's identity.
A definition of how types work within runtime (their declaration and usage), which
enables types in one language to interoperate with types in another language,
including cross-language exception handling.
An unprotected server on which all parties have access to everything. A web server
may be put in the DMZ while the assets it accesses, such as databases, remain behind
a firewall. It works in conjunction with transport layer security.
A distinguished name (DN) is a set of attribute values that identify the path
leading from the base of the directory information tree to the object that is named.
An X.509 public-key certificate or CRL contains a DN that identifies its issuer, and
an X.509 attribute certificate contains a DN or other form of a name that identifies
its subject.
Document Object Model - a tree of objects with interfaces for traversing the tree
and writing an XML version of it, as defined by the W3C specification.
Applications deployed on an application server are usually delivered as one
compressed file with .ear extension. The file may contain software components, web
applications, and resources.
Sun Microsystems Forte For Java. An IDE for development of Java applications. It
was a branded and commercial version of NetBeans; now it is named Sun ONE Studio
(SOS). Systinet Developer for Sun ONE Studio is a plug-in that can be plugged into
SOS and lets developers develop Web service based applications right in the IDE.
Generic Security Services API (GSS-API) is a programming interface that allows two
applications to establish a security context independent of the underlying security
mechanisms. Specified in RFC-2743.
A secure platform for building and deploying business applications, hosting and
managing Web sites, and publishing and sharing information across a company intranet
or the Internet.
The Java Authentication and Authorization Service (JAAS) is a set of Java packages
that enable services to authenticate and enforce access controls upon users.
Standard services used to determine the type of an arbitrary piece of data,
encapsulate access to it, discover the operations available on it, and to
instantiate the appropriate bean to perform said operation(s).
The Java Cryptography Extension - a set of packages that provide a framework and
implementations for encryption, key generation and key agreement, and Message
Authentication Code (MAC) algorithms. Support for encryption includes symmetric,
asymmetric, block, and stream ciphers. The software also supports secure streams and
sealed objects.
The Java Naming and Directory Interface; provides support for the common features
of naming services including COS (Common Object Services), DNS (Domain Name System),
LDAP (Lightweight Directory Access Protocol), and NIS (Network Information System).
The Java Secure Socket Extension - a set of Java packages that enable secure
Internet communications. It implements a Java version of SSL (Secure Sockets Layer)
and TLS (Transport Layer Security) protocols and includes functionality for data
encryption, server authentication, message integrity, and optional client
authentication. Using JSSE, developers can provide for the secure passage of data
between a client and a server running any application protocol (such as HTTP,
Telnet, NNTP, and FTP) over TCP/IP.
A system developed at the Massachusetts Institute of Technology that uses
passwords and symmetric cryptography (DES) to implement a ticket-based, peer-entity
authentication service and an access control service distributed in a client-server
network environment.
Lightweight Directory Access Protocol (RFC-1777) - a client-server protocol that
supports basic use of the directory servers, that is, database servers or other
systems that provide information (such as digital certificates or CRL) about an
entity whose name is known.
Java class packages that provide their classes to other deployed packages. Java
classes deployed in Systinet Server are normally accessible only inside their own
packages.
Namespaces are typically established to distinguish between multiple
interpretations of a single token or phrase. For example, a "nut" in the "food"
namespace is something to eat, while in the "hardware" namespace something to fasten
to a bolt (something you would not want to attempt with a "food:nut" and
vice-versa). In XML, it can be thought of as a collection of names, identified by a
URI reference [RFC2396], that are used in XML documents.
An open source platform primarily used for development of Java applications; it
has evolved into a Tools Platform. The commercial and branded version of NetBeans is
a product called Sun ONE Studio (formerly Sun Forte For Java).
Organization for the Advancement of Structured Information Standards
(http://www.oasis-open.org) - an international, not-for-profit consortium that
designs and develops industry standard specifications for interoperability based on
XML.
A part of a Systinet Server representation/Client Profile that is responsible for
management of deployment/client packages. It also lets you view the installed
packages and their Web services.
The Public-Key Cryptography Standards are specifications produced by RSA
Laboratories in cooperation with secure systems developers worldwide for the purpose
of accelerating the deployment of public-key cryptography.
Public-Key Infrastructure - a system of certification authorities (and,
optionally, other supporting servers and agents) that perform some set of
certificate management, archive management, key management, and token management
functions for a community of users in an application of asymmetric cryptography.
A Java object that acts as a proxy to a Web service. Invoking methods on this
object results in a SOAP request and response exchange with the Web service.
A referenceable entity that accepts messages. This can be overseen as a Web
service, an asynchronous endpoint, or a stub/proxy that accepts a response.
A reference to data that are defined in another part of the message. An example
might be a reference to the next MIME part of a message or a reference to repeated
Java objects.
Debugging of Web services that are deployed to a remote Systinet Server. In
Systinet Server for Java Developer, you can place a breakpoint into your Web service source code,
switch-on Remote Debugging Support for Systinet Server and debug this Web
service remotely even when it is running on a remote machine.
In Systinet Developer, you have a list of Systinet Servers that you can work with.
You can register any running Systinet Server into this list so you can work with it
(remotely manage this server, deploy Web services to this server etc.).
REpresentational State Transfer is an architectural module used to implement
networked IT systems. The modeling of communication between components is similar to
that used by HTTP. The main distinguishing features of this model relate to
resources.
One possible SOAP message encoding, indicating that the message format is
logically given by the XML schema present in the WSDL. The physical representation
of the message is given by the encoding of the message.
Security Assertions Markup Language - an XML framework for exchanging security
information over the Internet. SAML enables disparate security services systems to
interoperate. It resides within a system's security mechanisms to enable exchange of
identities and entitlements with other services.
How well a system can adapt to increased demands. For example, a scalable network
system would be one that can start with just a few nodes, but easily expand to
thousands of nodes.
A mechanism that implements a security function. Some examples of security
mechanisms are authentication exchange, checksum, digital signature, encryption, and
traffic padding.
A load balancer node that handles all the messages in a WS-RM reliable managing
sequence. The reliable message sequence corresponds to a load balancer session.
A system of applications, where a principal (user) authenticates with one system
entity (called identity provider) and has that authentication honored by other
system entities (called service providers or partners).
Simple Mail Transfer Protocol - a protocol for sending email messages between
servers. Most email systems that send mail over the Internet use SMTP to send
messages from one server to another; the messages can then be retrieved with an
email client using either POP or IMAP. In addition, SMTP is generally used to send
messages from a mail client to a mail server.
The W3C document SOAP Security Extensions: Digital Signature specifies the syntax
and processing rules for a SOAP header entry to carry digital signature information
within a SOAP 1.1 Envelope.
Binding for a SOAP message to be carried within a MIME multipart/related message
in such a way that the processing rules for the SOAP 1.1 message are preserved.
A SOAP message-tracking tool that scans communication between the client and
sever. The communication is visually displayed. You can also manually change and
send the messages.
The Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols were
designed to help protect the privacy and integrity of data while it is transferred
across a network. The Internet Engineering Task Force (IETF) standard called
Transport Layer Security (TLS) is based on SSL.
A grouping of related information for a single entity, such as a person. Such
information includes the Subject's identities, as well as its security-related
attributes (passwords and cryptographic keys, for example).
Sun ONE Studio (formerly Sun Forte For Java) is an IDE for development of Java
applications. It is a branded and commercial version of NetBeans. Systinet Developer
for Sun ONE Studio is a plug-in that can be used with SOS and lets developers
develop Web service-based applications in the IDE.
A product of Systinet Corporation that lets developers create, test, debug, and
manage Web services using their favorite IDE. Systinet Developer is a plug-in that
enhances IDEs such as Sun Microsystems Sun ONE Studio, Borland JBuilder, and IBM
Eclipse.
The URL where Systinet Server runs. The Global URL of the Web service running
on Systinet Server is <Systinet Server for Java Root URL> + <path of the
Service Endpoint>.
Web services can be categorized into three groups: System, Application, and
Utility Web services. System Web services facilitates fundamental functions such as
service deployment, administration and security settings management.
A set of assertions that represent a business requrement. Technical policies are
associated with SOA artifacts to which the requirement applies; a set of technical
policies and associated artifacts forms a Business Policy. In WS-Policy terms, a Systinet technical policy = WS-Policy + name +
documentation.
Transport Layer Security protocol. Its primary goal is to provide privacy and data
integrity between two communicating applications. The first version of TLS is
described in RFC-2246.
A structure that takes the form of keyed metadata (data about data). In a general
sense, the purpose of a tModel within the UDDI registry is to provide a reference
system based on abstraction. Among the roles that a tModel plays in UDDI is the
ability to provide and to describe compliance with a specification or concept to a
taxonomy, for example.
Universal Business Registry (also known as Public Cloud) - a set of UDDI
Registries that form a global distributed registry of information about Web
services. Note that UBR nodes (members of the Public Cloud) are run by Microsoft,
IBM, SAP, HP, and NNTP. They replicate the content of Public Cloud.
UDDI accepts and organizes three types of information into three broad categories:
White, Yellow, and Green Pages. Green Pages hold the technical information about
services that are exposed by the business, including references and interfaces to
the services a company can deliver.
Every UDDI Registry implementation provides two ports with which you can interact:
inquiry and publishing. The inquiry port allows you to browse and search information
that is published to a UDDI Registry.
The UDDI node is a collection of Web services, each of which implements the APIs
in a UDDI API set, and that are managed according to a common set of policies.
Typically, a node consists of at least an implementation of the Inquiry, the
Publication, and the Custody and Ownership Transfer API sets; often a node will
implement additional API sets such as Subscription and Replication.
Every UDDI Registry implementation provides two ports with which you can interact
with: inquiry and publishing. The publishing port allows you to publish information
about your Web services.
A UDDI Registry is an implementation of the UDDI specification that allows Web
service vendors to register information about the Web services they offer so that
others can find them.
UDDI accepts and organizes three types of information into three broad categories:
White, Yellow, and Green Pages. White Pages include address, contact, and known
identifiers.
UDDI accepts and organizes three types of information into three broad categories:
White, Yellow, and Green Pages. Yellow Pages include industrial categorizations
based on standard taxonomies.
Uniform Resource Identifier - the generic term for all types of names and
addresses that refer to objects on the World Wide Web. A URL is one kind of
URI.
Uniform Resource Locator - the global address of documents and other resources on
the World Wide Web. The first part of the address indicates what protocol to use and
the second part specifies the IP address or the domain name where the resource is
located.
Any person who interacts directly with a computer system. Note that 'users' do not
typically include 'operators,' 'system programmers,' 'technical control officers,'
'system security officers,' and other system support personnel.
Web services can be categorized into three groups: System, Application, and
Utility Web. A Utility Service typically provides commonly required functionality
utilized by any Application Web service. It provides an easy way for developers to
reuse common functions to produce more reliable code and reduce redundancy.
A format for compressing files, similar to a JAR file. Web applications that may
be deployed to an application server are often compressed into WAR files.
A part of Systinet Server for Java that creates deployment packages that can be
deployed to Systinet Servers or client packages that are used for Web service
Clients.
A special kind of Sun ONE Studio Debugger Type that must be used for debugging Web
service clients. This Debugger Type ensures the correct initialization of the client
part of Systinet Server for Java.
A special kind of Sun ONE Studio Executor that must be used for running Web
service Clients. This Executor ensures the correct initialization of the client part
of Systinet Server for Java.
Former name of the WSDL2Java Web service, a utility Web service that offers SOAP
access to the WSDL2Java tool used for the generation of Java source files from a
WSDL document.
A protocol that provides transport-neutral mechanisms to address Web services and
messages. Specifically, WS-Addressing defines XML elements to identify Web service
endpoints and to secure end-to-end endpoint identification in messages. It enables
messaging systems to support message transmission through networks that include
processing nodes such as endpoint managers, firewalls, and gateways in a
transport-neutral manner. For more information, please see the WS-Addressing specification.
Specification which describes a protocol that allows Web services to subscribe to or
accept subscriptions for event notification messages. For more information, please see the WS-Eventing specification.
The Web Services Policy Framework (WS-Policy) provides a general purpose model and
corresponding syntax to describe and communicate the policies of a Web Service.
WS-Policy defines a base set of constructs that can be used and extended by other
Web Services specifications to describe a broad range of service requirements,
preferences, and capabilities. For more information, please see the WS-Policy specification.
A protocol that allows messages to be delivered reliably between distributed
applications in the presence of software component, system, or network failures. Is
used in conjunction with other specifications and application-specific protocols
within the SOAP [SOAP] and WSDL [WSDL] extensibility model. The draft version of
this protocol was known as WS-Reliability. For more information, please see the WS-ReliableMessaging specification.
WS-Security describes enhancements to SOAP messaging to provide quality of
protection through message integrity, message confidentiality, and single message
authentication. It enables the user to encrypt and/or sign individual SOAP messages. Systinet Server for Java provides an implementation of OASIS' working draft 13. It is based on a
Systinet-modified version of Apache
XML-Security package 1.0.4. For more information, please see the WS-Security specification.
Part of the ITU-T X.500 specification that defines a framework to provide and
support data origin authentication and peer entity authentication services,
including formats for X.509 public-key certificates, X.509 attribute certificates,
and X.509 CRLs.
The XML Key Management Specification - a specification designed to extend the
public key infrastructure (PKI) model by using XML to provide new levels of ease and
interoperability when implementing secure applications.
A method for generating a physical representation, the canonical form, of an XML
document that accounts for permissible changes or variations in syntax. It is a
reduction of a document to a standard minimal form useful, among other things, for
document or structure comparisons. Except for limitations regarding a few unusual
cases, if two documents have the same canonical form, then the two documents are
logically equivalent within the given application context.
A standard that specifies the process for encrypting data and representing the
result in an XML document. The data may be an XML element, or XML element content,
or any arbitrary data (including an XML document).
A means for defining the structure, content and semantics of XML documents through
XML itself. It defines a richer set of data types - such as booleans, numbers, dates
and times, and currencies - than the more traditional DTD. XML Schemas make it
easier to validate documents based on namespaces. It is defined in the W3C's XML
Schema Working Group.
A way of providing integrity, message authentication, and/or signer authentication
services for data of any type, whether located within the XML that includes the
signature or elsewhere.
A query language able to express queries across data structured as XML. The result
of an XQuery program is also XML. XQuery can be viewed as a transformation language.
See XQuery 1.0.
A language for transforming XML documents to other XML documents or more generally
any text output. Its expressive power is greater than XQuery. Hence it is more
universal. See XSLT 1.0 and XSLT 2.0.