Sun ONE logo      Previous      Contents      Index      Next     

Sun ONE Portal Server, Secure Remote Access 6.1 Administrator's Guide

Glossary

access control     Implements the privileges granted by authorization.

address     In networking, a unique code that identifies a node to the network. Names like host1.siroe.com are translated to "dotted quad" addresses (1.2.3.4) by the Domain Name Service. (DNS).

administration console     The administrator’s Sun™ ONE Identity Server graphical user interface to Sun™ ONE Portal Server .

API     Application Program Interface, a set of calling conventions or instructions defining how programs invoke services in existing software packages.

applet     A program written in the Java™ programming language to run within a Web browser. An example would be the Java front end to the portal server’s NetMail and NetFile applications.

attribute     Defines the parameters that an Identity Server service provides to an organization. The attributes that make up an Identity Server service are classified as one of the following: Dynamic, Policy, User, Organization, or Global. Using these types to subdivide the attributes in each service allows for a more consistent arrangement of the service schema and easier management of the service parameters.

ASP     Access Service Provider. A company that, for a fee, provides access to applications that users can run without owning their own copies. See Internet Service Provider (ISP).

authentication     The process of verifying a user’s identity.

authentication module     An authentication module controls a specific authentication process. For example, Sun™ ONE Portal Server software provides authentication modules for Microsoft Windows NT, UNIX, S/key, and others, as well as opening the authentication API so other authentication modules can be written as needed.

authorization     The process of granting specific access privileges to a user. Authorization is based on authentication and enforced by access control.

CA     See Certificate Authority.

cache     In Web browsers, the archive of recently visited Web pages, graphics, or other files that is stored in memory or on users’ disks.

CDP     See Certificate Discovery Protocol.

certificate     A set of data that identifies a person, machine, or application.

certificate identifier (ID)     Generic term used to identify a particular self-generated or issued certificate. It effectively decouples the identification of a key for purposes of key lookup and access control from issues of network topology, routing, and IP addresses.

Certificate Authority (CA)     Trusted network entity that digitally signs a certificate containing information that identifies the user; such as the user’s name, the issued certificate, and the certificate’s expiration date. VeriSign is one of the best known CAs.

channel     In the portal server Desktop, a channel consists of a provider and configuration. Channels generate content which can consist of markup fragments, a frameset, an HTML page, and so on. Channel content is often aggregated with other channel content to form a portal Desktop.

cipher     See encryption algorithm.

component     An application or a service in portal server. Components have attributes and privileges, much like users.

content filtering     Practice of allowing or disallowing traffic based on the content of the data being sent.

content provider     A Java class that can write HTML content to a mini-frame in the desktop. Content providers are used to create information in specific areas of a user's desktop.

cookie     General mechanism that server-side connections can use to store and retrieve information on the client side of the connection. Cookies are small data files written to a user’s hard drive by some Web sites when viewed in a Web browser. These data files contain information that the site can use to track things such as passwords, lists of pages visited, and the date when a certain page was last viewed.

customization     The ability to change preferences in the portal such as content received, layout, and color (that is, user-driven). It can also refer to the ability to modify the UI or order of menu events.

data compression     Application of an algorithm to reduce the space required to store or the bandwidth required to transmit data.

decryption     Process of decrypting information that has been encrypted. See encryption.

demilitarized zone (DMZ)     Small protected network between the public Internet and a private intranet, usually demarcated with firewalls on both ends. This area is used to provide limited public access to resources such as Web servers, FTP servers, and other information resources.

Desktop     What the user sees on the screen. In the case of portal server, it is the HTML presentation of the portal. This usually includes a preferred set of applications and access privileges.

digital signatures     Data added to a document to identify the sender using a public-key encryption scheme.

directory server     A server that serves out information about people and resources within an organization from a logically centralized repository. See also Lightweight Directory Access Protocol (LDAP), Sun™ ONE Directory Server, and Sun™ ONE Identity Server.

DMZ     See demilitarized zone.

DNS     See Domain Name Service

domain     The last part of a fully qualified domain name that identifies the company or organization that owns the domain name (for example, siroe.com, host.siroe.uk).

Domain Name Service     A distributed name and address lookup mechanism used to translate domain names (siroe.com) to IP addresses (10.23.134.24). It also allows reverse lookup, to translate IP addresses back into names.

encryption     Process of protecting information from unauthorized use by making the information unintelligible. Some encryption methods employ codes, called keys, which are used to encrypt the information. Contrast with decryption.

encryption algorithm     The method or standard that is used to encrypt the information. Some of the common encryption algorithms are RC4 and RC6.

end user    

Refers to the person serviced by the customer (for example, a corporate employee).

Extensible Markup Language (XML)     XML, a programming language, is essentially a simplified version of SGML that enables Web developers to create customized tags that will organize and deliver content more efficiently. XML is a metalanguage, containing a set of rules for constructing other markup languages. By enabling people to create their own tags, it expands the amount and kinds of information that can be provided about the data held in documents.

File Transfer Protocol (FTP)     A file transfer protocol often used on TCP/IP networks to copy files to and from remote computers.

firewall     Computer situated between an internal network and the rest of the network, and filters data packets according to user-specified criteria. Firewalls are normally used to protect systems on one side from unauthorized access by users on the other side.

FTP     See File Transfer Protocol

fully qualified domain name (FQDN)     The complete domain name of a system, including the host name, network name if applicable, and domain; for example host1.siroe.com.

gateway     A system that provides and controls connections to another network. The gateway in the portal server is part of Secure Remote Access. See VPN.

host     Name of a device on a TCP/IP network that has an IP address.

HTML     Hypertext Markup Language. A file format, based on SGML, for hypertext documents on the Internet.

HTTP     Hypertext Transfer Protocol, which describes how Web browsers and Web servers exchange information. See URL.

HTTPS     Hypertext Transfer Protocol Secure, which describes the use of HTTP over an SSL connection, usually on port 443.

ICMP     Internet Control Message Protocol. IP protocol that handles errors and control messages, to enable routers to inform other routers (or hosts) of IP routing problems or make suggestions of better routes. See ping.

IMAP     Internet Message Access Protocol allows remote access to mailboxes and folders. IMAP clients usually leave some or all messages and folders on the server, unlike POP, in which all messages are downloaded.

Internet Protocol     Protocol within TCP/IP suite used to link networks worldwide, developed by the United States Department of Defense and used on the Internet. The prominent feature of this suite is the IP protocol.

IP     See Internet Protocol.

iPlanet Compass Server     iPlanet's technology to improve user access to network resources typically used with iPlanet Portal Server 3.0. Sun™ ONE Portal Server 6.0 and higher contains a tightly integrated Search Engine which provides the functionality that iPlanet Compass Server provided with iPlanet Portal Server 3.0.

Sun™ ONE Identity Server     Provides user and service configuration, authentication, and single-sign-on services, policy management, logging services, debug utility, the admin console, and client support interfaces for the portal server.

ISP     Internet Service Provider. A company providing Internet access. This service often includes a phone number access code, username, and software—all for a provider fee.

issued certificate     Certificate that is issued by a Certificate Authority. See self-generated certificate.

ISV     Independent Software Vendor. Third-party software developer.

J2ME     See Java 2 Platform, Micro Edition.

JATO     A library for converting between Java and XML.

Java     Object-oriented, platform-independent programming language developed by Sun Microsystems to solve a number of problems in modern programming practice.

Java 2 Platform, Micro Edition (J2ME)     Small application environment suitable for mobile devices.

Java Development Kit (JDK)     Software tools used to write Java applets or application programs.

JDK     See Java Development Kit.

JSP     Java Server Page.

JSS     See Network Security Services for Java.

key     Code for encrypting or decrypting data.

LAN     Local area network, a private network at a single location. Multiple LANs can be interconnected to form a WAN.

LDAP Data Interchange Format (LDIF)     The format used to represent directory server entries in text form.

Lightweight Directory Access Protocol (LDAP)     Directory service protocol designed to run over TCP/IP and across multiple platforms. A simplification of the X.500 Directory Access Protocol (DAP) that allows a single point of management for storage, retrieval, and distribution of information, including user profiles, distribution lists, and configuration data across Sun ONE servers. The directory server uses the LDAP protocol.

load balancer     A load balancer controls connections to multiple gateway machines to allow approximately equivalent loads on each of the available systems.

NetFile     Java-based file server application that enables users remote access to file systems as well as enabling remote operations on files and directories. This component is available with the Sun™ ONE Portal Server, Secure Remote Access software.

Netlet     A Java applet used in the portal server to allow any TCP/IP-based applications to securely connect to servers through an authenticated portal server connection. This component is available with Secure Remote Access.

NFS™     Network File System. A file system distributed by Sun Microsystems that enables a set of computers to cooperatively access each others files in a transparent manner.

node     A transfer point within a network. Data is passed from node to node in a network until the data reaches its final destination. Used interchangeably with machine.

organization     In Identity Server, an object that represents the top level of a hierarchical structure used by an enterprise to manage its departments and resources. Upon installation, the identity server dynamically creates a top-level organization (default o=isp) to manage the identity server enterprise configurations. Additional organizations can be created after installation to manage separate enterprises. All created organizations fall beneath the top-level organization. See also suborganization.

passphrase     Collection of characters used in a similar manner to, although typically longer than, a password. See password.

password     Unique string of characters that a user types as an identification code; a security measure to restrict access to computer systems and sensitive files.

personal digital certificate (PDC)     An electronic certificate attached to a message that authenticates a user. A personal digital certificate can be created by correctly entering a user ID and password, or by using an SSL certificate request that in turn uses the security certificate of the server through which the user is connected. PDCs are issued by a Certification Authority (CA) and signed with the CA's private key. The CA validates the identity of a requesting body before issuing a certificate. Thus the presence of a PDC is a very powerful mechanism of authentication.

PDC     See personal digital certificate.

POP     Post Office Protocol. Defines a mechanism with which Internet users can connect to and download their waiting email messages.

PPP     See Point-to-Point Protocol.

port     The location (or socket) to which TCP/IP connections are made. Web servers traditionally use port 80, while FTP uses port 21 and telnet uses port 23. the portal server uses some special ports, particularly on client systems, to securely communicate through the portal server session to servers.

portal     A “doorway” or entry point to a set of resources that an enterprise wants to make available to the portal’s users. For some consumer portals, the set of resources includes the entire World Wide Web, but for most enterprises, the set of resources includes information, applications, and other resources that are specific to the relationship between the user and the enterprise. The portal server Desktop is the application used to generate the portal in the portal server.

portal node     A physical machine that is running the portal server.. Also called a “host.”

privilege     A type of access right that is granted to a user, a set of users, or a resource that is specified by the particular type of authorization implemented.

protocol     A formal description of messages to be exchanged and rules to be followed for two or more systems to exchange information.

provider     The programmatic aspect of a channel. Adding configuration data to a provider differentiates it into an instance of a channel. A provider is a Java class and is responsible for converting the content in a file, or the output of an application or service into the proper format for a channel. A number of providers are shipped with the Portal Server, Secure Remote Access including a bookmark provider, an application provider, and a notes provider. As the Desktop is imaged, each provider is queried in turn for the content of its associated channel. Some providers are capable of generating multiple channels based upon their configuration.

Examples of content providers include the UserInfoProvider and BookmarkProvider.

Examples of container providers include the TabContainerProvider and SingleContainerProvider.

Examples of leaf providers include the JSPProvider, XMLProvider, URLScraperProvider and SimpleWebServicesProvider.

proxy     An intermediary program that makes and services requests on behalf of clients. Proxies act as servers and clients in turn and are used to control the content of various network services. See reverse proxy.

preference     A user-specified choice about what displays or does not appear on the desktop, and how it displays, or other traits such as timeout settings.

private network     A network of computers that is inaccessible unless you have appropriate access privileges. Private networks may be as small as a one-office LAN or as large as a multi-country enterprise network. See also public network.

privilege     A type of access right that is granted to a user, a set of users, or a resource that is specified by the particular type of authorization implemented.

profile     The attributes and privileges for a portal server entity, such as user, role, domain, or component.

profile server     A special segment of portal server that is devoted to storing profile information.

protocol     A formal description of messages to be exchanged and rules to be followed for two or more systems to exchange information.

provider     A Java class that can write HTML content to a mini-frame in the desktop. Providers (also called content providers) are used to create information in specific areas of a user’s desktop.

proxy     An intermediary program that makes and services requests on behalf of clients. Proxies act as servers and clients in turn, and are used to control the content of various network services. See reverse proxy.

public-key certificate     A data structure containing a user’s public key, as well as information about the time and date during which the certificate is valid.

public-key cryptography     Also known as asymmetric key cryptography. In public-key cryptosystems, everyone has two related complementary keys: a publicly revealed key and a secret key (also called a private key). Each key unlocks the code that the other key makes. Knowing the public key does not help you deduce the corresponding secret key. The public key can be published and widely disseminated across a communications network. This protocol provides privacy without the need for the secure channels that a conventional cryptosystem requires.

public network     Like the Internet, a public network carries traffic from a variety of companies, individuals, and sources and is inherently insecure. Contrast with private network.

reverse proxy     A proxy which performs bi-directional URL rewriting and translation between clients and servers. Unlike a proxy, which exists at the client side, a reverse proxy exists at the server side of the network. In the portal server, the reverse proxy exists on the gateway.

Rewriter     The Rewriter provides a Java class library for rewriting URL references in various web languages such as HTML, Javascript, and XML and in HTTP location headers (redirections). The Rewriter defines an identity server service for storing rules that define how rewriting is to be done and the data to be rewritten. The Rewriter also includes an admin console module for editing these rules.

role     Defines all aspects of a user’s experience when running in the portal server environment. A role can correspond to a job title (such as manager, engineer, and sales) or can be defined in other ways, such as a full member of a working group or an observer. A role determines what a user sees and can use on the desktop.

Secure Socket Layer (SSL)     A form of secure, low-level encryption that is used by other protocols such as HTTP and FTP. The SSL protocol includes provisions for server authentication, encryption of data in transit, and optional client authentication. The version used in the portal server uses RSA’s public and private key encryption, as well as a digital certificate.

self-generated certificate     Public key value only used when entities are named using the message digest of their public value, and when these names are securely communicated. See issued certificate.

Server Message Block (SMB) protocol     A protocol that provides a method for client applications in a computer to read and write to files on and to request services from server programs in a computer network. The SMB protocol can be used over the Internet on top if its TCP/IP protocol or on top of other network protocols such as Internetwork Packet Exchange and NetBEUI. The portal server uses SMB for NetFile.

session     A portal server session is a sequence of interactions between a user and one or more applications, starting with login and ending with logout or timeout.

session key     Common cryptographic technique to encrypt each individual conversation between two people with a separate key.

SGML     See Standard Generalized Markup Language.

shared-key cryptography     Also known as symmetric key cryptography. Cryptography where each party must have the same key to encrypt or decrypt ciphertext.

Simple Mail Transfer Protocol (SMTP)     The email protocol most commonly used by the Internet and the protocol supported by the Sun™ ONE Messaging Server product. Defined in RFC 821, with associated message format descriptions in RFC 822.

Simple Network Management Protocol (SNMP)     Network management protocol that enables a user to monitor and configure network hosts remotely.

Simple Object Access Protocol (SOAP)     A lightweight protocol for exchange of information in a decentralized, distributed environment. SOAP is an XML-based protocol.

single sign-on (SSO)     The ability for a user to authenticate once and gain access to multiple services.

SMB protocol     See Server Message Block protocol.

SMTP     See Simple Mail Transfer Protocol.

SMTP proxy     A variant of SMTP that sends messages from one computer to another on a network and is used on the Internet to route email.

SNMP     See Simple Network Management Protocol.

SSL     See Secure Socket Layer.

SSL Certificate     An electronic token that means you or a vendor have given approval to encrypt and decrypt your secure transactions, using PKI. You create a self-signed SSL Certificate when you install the portal server. However, you can also obtain an SSL Certificate from a certificate vendor who authorizes secure communications services over the Internet.

SSO     See single sign-on.

Standard Generalized Markup Language (SGML)     Method of tagging a document to apply to many format elements.

static web content     Refers to static HTML files, images, applet JAR files, and anything else that can be served up directly by the web server without using the Java web container. For the portal server, this gets installed in the web server (same place as dynamic web application).

subdomain     The next-to-last part of a fully qualified domain name that identifies the division or department within a company or organization that owns the domain name (for example, support.siroe.com, sales.siroe.com); not always specified.

suborganization     IIdentity Server, an object created under an organization and used by an enterprise for more granular control of its departments and resources. For example, when setting up your portal server, you might create a suborganization called mycompany under the top-level object isp.

Sun™ ONE Directory Server     Provides the primary configuration and user profile data repository for the portal server. It is installed by the identity server if it is not already installed on the portal server system.

Sun™ ONE Portal Server     Enables remote users to securely access their organization’s network and its services over the Internet. Additionally, it creates a secure internet portal, providing access to content, applications, and data to any targeted audience-employees, business partners, or the general public.

This is also referred to as the “core” part of the portal server product.

Sun™ ONE Portal Server Desktop     Often referred simply as “Desktop.” Provides the primary end-user interface and a mechanism for extensible content aggregation through the Content Provider Interface (PAPI). The Desktop includes a variety of providers that provide a container hierarchy and the basic building blocks for building some types of channels. The Desktop implements a display profile data storage mechanism on top of an identity server service for storing content provider and channel data. The Desktop also includes an admin console module for editing the display profile and other Desktop service data.

Sun™ ONE Portal Server Instant Collaboration Pack     Sun ONE’s instant messaging product which includes the server, multiplexor and Sun ONE Instant Messenger components. Also known as Instant Messaging Server.

Sun™ ONE Web Server     This is used as the web container for the portal server and web applications. The Web Server is included with the identity server product.

symmetric key cryptography     See shared-key cryptography.

TCP     See transmission control protocol.

TCP/IP     Transmission Control Protocol/Internet Protocol. Protocol suite originally developed for the Internet. It is also called the internet protocol suite. Solaris networks run on TCP/IP by default.

target host     The host or machine that you are trying to access.

telnet     Virtual terminal protocol in the Internet suite of protocols. Enables users of one host to log in to a remote host and interact as normal terminal users of that host.

telnet proxy     An application which sits between the telnet client and telnet server and acts as an intelligent relay.

transmission control protocol (TCP)     Major transport protocol in the internet suite of protocols providing reliable, connection-oriented, full-duplex streams. Uses IP for delivery. Encrypts only IP packet data, but not the headers. Corresponds to the transport layer, which is the fourth of the seven ISO layers. See TCP/IP.

transparent clustering     A condition whereby multiple machines appear as a single machine to the user. In the portal server, the condition where multiple gateways appear as a single gateway to the user.

tunneling     Process of encrypting an entire IP packet, and wrapping it in another (unencrypted) IP packet. The source and destination addresses on the inner and outer packets may be different.

tunnel address     Destination address on the outer (unencrypted) IP packet to which tunnel packets are sent. Generally used for encrypted gateways where the IP address of the host serves as the intermediary for any or all hosts on a network whose topology must remain unknown or hidden from the rest of the world.

Uniform Resource Indicator (URI)     A standard notation for specifying the path and file name of a resource on a server. The server translates the URI into the native format for its operating system.

URL     Uniform Resource Locator. A code that searches for the location of a specific address on the Internet.

user ID     Name by which a user is known to the system.

Virtual Private Network     A network with the appearance and functionality of a regular network, but which is really like a private network within a public one. The use of encryption in the lower protocol layers provides a secure connection through an otherwise insecure network, typically the Internet. VPNs are generally cheaper than true private networks using private lines, but rely on having the same encryption system at both ends. The encryption may be performed by firewall software or possibly by routers.

VPN gateway     The entry point to a VPN. Typically protected by a firewall.

VPN     See Virtual Private Network.

Watchdog     A process that monitors a gateway and restarts the gateway if its processes fail.

Web page     Document on the Web.

web server     An application that responds to web requests such as HTTP and FTP.

World Wide Web     Network of servers on the Internet that provide information and can include hypertext links to other documents on that server and often other servers as well.

XML     See Extensible Markup Language.

XSL     See Extensible Style Language.



Previous      Contents      Index      Next     


Copyright 2003 Sun Microsystems, Inc. All rights reserved.