file type

The format of a given file. For example, graphics files are often saved in GIF format, while a

 

text file is usually saved as ASCII text format. File types are usually identified by the file

 

extension (for example, .GIF or .HTML).

filter

A constraint applied to a directory query that restricts the information returned.

filtered role

Allows you to assign entries to the role depending upon the attribute contained by each entry.

 

You do this by specifying an LDAP filter. Entries that match the filter are said to possess the

 

role.

G

 

general access

When granted, indicates that all authenticated users can access directory information.

GSS-API

Generic Security Services. The generic access protocol that is the native way for UNIX-based

 

systems to access and authenticate Kerberos services; also supports session encryption.

H

 

host name

A name for a machine in the form machine.domain.dom, which is translated into an IP address.

 

For example, www.example.com is the machine www in the subdomain example and com

 

domain.

HTML

Hypertext Markup Language. The formatting language used for documents on the World Wide

 

Web. HTML files are plain text files with formatting codes that tell browsers such as the Mozilla

 

Firefox how to display text, position graphics, and form items and to display links to other

 

pages.

HTTP

Hypertext Transfer Protocol. The method for exchanging information between HTTP servers

 

and clients.

HTTPD

An abbreviation for the HTTP daemon or service, a program that serves information using the

 

HTTP protocol. The daemon or service is often called an httpd.

HTTPS

A secure version of HTTP, implemented using the Secure Sockets Layer, SSL.

hub

In the context of replication, a server that holds a replica that is copied from a different server,

 

and, in turn, replicates it to a third server.

 

See also cascading replication.

I

 

ID list scan limit

A size limit which is globally applied to any indexed search operation. When the size of an

 

individual ID list reaches this limit, the server replaces that ID list with an all IDs token.

index key

Each index that the directory uses is composed of a table of index keys and matching entry ID

 

lists.

indirect CoS

An indirect CoS identifies the template entry using the value of one of the target entry's attributes.

international

Speeds up searches for information in international directories.

index

 

International

See ISO.

Standards

 

Organization

 

IP address

Internet Protocol address. A set of numbers, separated by dots, that specifies the actual location

 

of a machine on the Internet (for example, 198.93.93.10).

ISO

International Standards Organization.

K

 

knowledge

Pointers to directory information stored in different databases.

reference

 

250 Glossary

Page 250
Image 250
HP UX Identity Security Software manual Gss-Api