(n.) Where an application-specific stateful session bean is used to manage various Enterprise JavaBeansTM components.
(n.) In a Messaging Server log-file entry, a designation of the software subsystem (such as Network or Account) that generated the log entry.
(n.) A class that creates persistence managers. See also connection factory
(2) (n.) The automatic transfer of a computer service from one system to another to provide redundant backup.
(n.) A user who has administrative privileges to add and remove family members in a family group. This user can grant family group administrative access to other members of the group.
(n.) A method of indexing that provides more information than simple indexing. Fancy indexing displays a list of contents by name with file size, last modification date, and an icon reflecting file type. Because of this, fancy indexes might take longer than simple indexes for the client to load.
(n.) A fatal error occurs in the SAX parser when a document is not well formed or otherwise cannot be processed. See also warning.
(n.) The amalgamation of the account information in all service providers that are accessed by one user (for example, personal data, authentication information, buying habits and history, shopping preferences, and so on). The information is administered by the user and, with the user’s consent, securely shared with the user’s providers of choice.
(n.) A federation cookie is a cookie implemented by Access Manager with the name fedCookie. It can have a value of either yes or no based on the principal’s federation status. It is not a defined part of the LAP specifications.
(n.) The process by which users cancel affiliations established between the user’s identity provider and federated service provider accounts. Also called defederation.
(n.) The file cache contains information about files and static file content. The file cache is turned on by default.
(n.) The last part of a file name that typically defines the type of file. For example, in the file name index.html, the file extension is html.
(n.) The format of a given file. For example, a graphics file does not have the same file type as a text file. File types are usually identified by their file extension. See also file extension.
(1) (n.) In a search request, a pattern which an entry in the scope of the search must match for that entry to be returned in the search response. Filters are also used in constructing role and access control definitions.
(2) (n.) A set of rules that define particular types of resources. These filters are used by site definitions to define types of resources the robot should accept or ignore.
(3) (n.) An object that can transform the header or content (or both) of a request or response. Filters differ from web components in that they usually do not themselves create responses but rather modify or adapt the requests for a resource, and modify or adapt responses from a resource. A filter should not have any dependencies on a web resource for which it is acting as a filter so that it can be composable with more than one type of web resource.
(n.) A concatenation of XSLT transformations in which the output of one transformation becomes the input of the next.
(n.) A method by which roles are assigned to entries. Allows you to assign entries to the role depending upon the attribute contained by each entry. You do this by specifying an LDAP filter. Entries that match the filter are said to possess the role.
(n.) The process of determining whether a document is part of a site that should be included in the index.
(n.) A network configuration, usually both hardware and software, that protects networked computers within an organization from outside access. Firewalls are commonly used to protect information such as a network’s email and data files within a physical building or organization site.
(n.) A format used by the server for entering information into the access logs.
(n.) A specially defined method in servlet or application logic that performs an action based on a named button on a form.
(n.) An authentication mechanism in which a Web container provides an application-specific form for logging in. This form of authentication uses Base 64 encoding and can expose user names and passwords unless all connections are over SSL.
(n.) An encryption system used by U.S. government agencies to manage sensitive but unclassified information.
See message forwarding.
(n.) A set of APIs together with the CDC that provide a J2METM application runtime environment targeted at next generation applications, consumer electronic, and embedded devices.
(n.) The MIME feature that allows the breaking of a large message into smaller messages. See also defragmentation.
(n.) Starting the robot from its starting points. A fresh start deletes the robot\qs state information, causing the robot to begin its next run from its initial state. Opposite of a restart.
(Flexible Single-Master Operation role) (n.) The mechanism used by Active Directory to prevent update conflicts in multimaster replication deployments. Some objects are updated in a single-master mode even if the deployment is multimaster, which is very similar to the old concept of a Primary Domain Controller (PDC) in Windows NT domains. There are five FSMO roles in an Active Directory deployment, but only the PDC-emulator role affects Identity Synchronization for Windows. Because password updates are replicated immediately only to the Active Directory domain control with the PDC emulator role, Identity Synchronization for Windows use this domain controller for synchronization. Otherwise, synchronization with the Directory Server might be delayed for several minutes.
(file transfer protocol) (n.) An Internet protocol that allows files to be transferred from one computer to another over a network.
(n.) The full name of a system, containing its host name and its domain name. For example: example.sun.com, where example is the host name (of a server) sun.com in the domain name.