Migration Guide for the Cisco Secure Access Control System 5.1
Glossary
Downloads: This chapterpdf (PDF - 75.0KB) The complete bookPDF (PDF - 6.95MB) | Feedback

Glossary

Table Of Contents


Glossary


A
 
ACL
Access Control List. A list of permissions attached to an object.


B
 
BLOB
Binary Large Object. A collection of unstructured binary data stored as a single entity in a database management system.


E
 
EFT
Engineering Field Trial.


H
 
HTTPS
Hypertext Transfer Protocol Secure. A URL scheme which is syntactically identical to the HTTP scheme normally used for accessing resources using HTTP. Using an HTTPS: URL indicates that HTTP is to be used, but with a different default port (443) and an additional encryption/authentication layer between HTTP and TCP.


J
 
JDBC
JAVA Database Connectivity. An API for the JAVA programming language that defines how a client may access a database. It provides methods for querying and updating data in a database.


M
 
MAC address
Media Access Control address. A quasi-unique identifier assigned by the manufacturer to most network adapters or network interface cards for identification.


N
 
NAP
Network Access Profile.


P
 
PI
Programmatic Interface. A mechanism for external applications to interact with ACS.
POC
Proof of concept.


S
 
SOAP
Simple Object Access Protocol. A protocol for exchanging XML-based messages over a computer network, normally using HTTP. SOAP forms the foundation layer of the Web services stack.


V
 
VSA
Vendor Specific Attribute. A proprietary property or characteristic not provided by the standard RADIUS attribute set. VSAs are defined by vendors of remote access servers to customize RADIUS for their servers.


W
 
WSDL
Web Services Description Language. An XML-based language that provides a model for describing Web services.


X
 
XML
Extensible Markup Language.