Glossary
GL-3
User Guide for Cisco Secure Access Control System 5.4
OL-26225-01
authenticity The validity and conformance of the original information.
authorization The approval, permission, or empowerment for someone or something to do something.
authorization profile The basic "permissions container" for a RADIUS-based network access service. The authori zation
profile is where you define all permissions to be granted for a network access request. VLANs, ACLs,
URL redirects, session timeout or reauthorization timers, or any other RADIUS attributes to be returned
in a response are defined in the authorization profile.
B
basic authentication The simplest web-based authentication scheme that works by sending the username a nd password with
each request.
BIND Berkeley Internet Name Domain. An implementation of DNS. DNS is used for domain name to IP
address resolution.
bind (LDAP) When connection is made to an LDAP server the first operation of the sequence is called a bind. The
bind operation sends the dn of the entry that will be used for authentication and the password to be used.
In the case of an anonymous bind both values will be NULL.
block cipher Encrypts one block of data a t a time.
bridge A product that connects a local area network (LAN) to another local area network that uses the sa me
protocol (for example, Ethernet or token ring).
broadcast To simultaneously send the same message to multiple recipients. One host to all hosts on network.
broadcast address An address used to broadcast a datagram to all hosts on a given network using UDP or ICMP protocol.
browser A client computer program that can retrieve and display inform ation from servers on the World Wide
Web.
C
CA Signature A digital code that vouches for the authenticity of a digital certificate. The CA signature is provided by
the certificate authority (CA) that issued the certificate.
cache A special high-speed storage mechanism. It can be either a reserved section of main memory or an
independent high-speed storage device. Two types of caching are commonly used in personal
computers: memory caching and disk caching.
CSS cascading style sheet. A Web page derived from multiple sources with a defined order of precedence
where the definitions of any style element conflict.
CA certificate authority. An authority in a network that issues and manages security credentials and public
keys for message encryption and decryption. As part of a public key infrastructure (PKI), a CA che cks
with a registration authority (RA) to verify information provided by the requestor of a digital
certificate. If the RA verifies the requestor's information, the CA can then issue a certificate.