Glossary

Schema (LDAP) A package of attributes and object classes that are sometimes (nominally) related. The schema(s) in which the object classes and attributes that the application will use (reference) are packaged are identified to the LDAP server so that it can read and parse all that wonderful ASN.1 stuff. In OpenLDAP this done using the slapd.conf file.

search (LDAP)

An operation that is carried out by defining a base directory name (DN), a scope, and a search filter.

Secure Sockets A protocol developed by Netscape for transmitting private documents via the Internet. SSL works by

Layer(SSL) using a public key to encrypt data that's transferred over the SSL connection. SSL is a cryptographic protocol which provides secure communications on the Internet for such things as web browsing, e-mail, Internet faxing, and other data transfers. There are slight differences between SSL 3.0 and TLS 1.0, but the protocol remains substantially the same. The term "TLS" as used here applies to both protocols unless clarified by context.

Security Policy

server

service provisioning

service selection policy

Session

session (LDAP)

session conditions

Session Key

A set of rules and practices that specify or regulate how a system or organization provides security services to protect sensitive and critical system resources.

A system entity that provides a service in response to requests from other system entities called clients.

Service provisioning refers to the "preparation beforehand" of IT systems' materials or supplies required to carry out a specific activity. This includes the provisioning of digital services such as user accounts and access privileges on systems, networks and applications, as well as the provisioning of non-digital or "physical" resources such as cell phones and credit cards.

A set of rules that determines which access policy applies to an incoming request.

A session is a virtual connection between two hosts by which network traffic is passed.

A session occurs between a LDAP client and a server when the client sends a bind command. A session may be either anonymous or authenticated.

Custom conditions, and date and time conditions.

In the context of symmetric encryption, a key that is temporary or is used for a relatively short period of time. Usually, a session key is used for a defined period of communication between two computers, such as for the duration of a single connection or transaction set, or the key is used in an application that protects relatively large amounts of data and, therefore, needs to be re-keyed frequently.

shell profiles

The basic “permissions container” for a TACACS+ based device administration policy, in which you

 

define permissions to be granted for a shell access request.

SLA (Service Level

A SLA is that part of a service contract in which a certain level of service is agreed upon. A SLA is a

Agreement)

formal negotiated agreement between two parties. It is a contract that exists between customers and

 

their service provider, or between service providers. It transcripts the common understanding about

 

services, priorities, responsibilities, guarantee, etc. It then specifies the levels of availability,

 

serviceability, performance, operation or other attributes of the service like billing.

SNMP (Simple

A TCP/IP network protocol that provides a means to monitor and control network devices, and to

Network

manage configurations, statistics collection, performance, and security.

Management

 

Protocol)

 

 

User Guide for Cisco Secure Access Control System 5.3

GL-16

OL-24201-01

Page 636
Image 636
Cisco Systems OL-24201-01 manual GL-16