Owner's Manual
185
A
A. Glossary
Access Control Refers to mechanisms and policies that restrict access to computer resources. An
access control list (ACL), for example, specifies what operations different users can
perform on specific files and directories.
Alarm A signal alerting the user to an error or fault. Alarms are produced by events. Alarms
produce a message within the Alarm Window.
API Application Programing Interface — A set of routines used by the application to direct
the performance of procedures
by the computer’s operating system.
Authentication The process of determining the identity of a user that is attempting to access a
network. Authentication occurs through challenge/response, time-based code
sequences or other techniques. See CHAP and PAP.
Authorization The process of determining what types of acti
vities or access are permitted on a
network. Usually used in the context of authentication: once you have authenticated a
user, they may be authorized to have access to a specific service.
CoS Class of Service — Describes the level of service provided to a user. Also provides a
way of managing traffic in a network by grouping similar types of traffic.
Database An organized collection of Oware objects.
Deployment The distribution of solution blades throughout the domain.
Digital Certificate A digital certificate is an electronic “credit card” that
establishes your credentials when
doing business or other transactions on the Web. It is issued by a certification
authority (CA). It contains your name, a serial number, expiration dates, a copy of the
certificate holder's public key (used for encrypting and decrypting messages and
digital signatures), and the digital signature of the certificate-issuing authority so that a
recipient can verify that the certificate is real.
Domain A goal-oriented environment that can include an industry, company, or department.
You can use Oware to create solutions within your particular domain.
Encryption Scrambling data in such a way that it can on
ly be unscrambled through the application
of the correct cryptographic key.
Equipment A network device managed by the system.