- Industry: Computer
- Number of terms: 98482
- Number of blossaries: 0
- Company Profile:
Sometimes referred to as “Big Blue” IBM is a multinational corporation headquartered in Armonk, New York. It manufactures computer hardware and software and provides information technology and services.
(1) In the Java Authentication and Authorization Service (JAAS) framework, a subject class that owns security-related attributes. These attributes can contain information used to authenticate the subject to new services.<br />(2) Detailed information, acquired during authentication, that describes the user, any group associations, and other security-related identity attributes. Credentials can be used to perform a multitude of services, such as authorization, auditing, and delegation. For example, the sign-on information (user ID and password) for a user are credentials that allow the user to access an account.
Industry:Software
(1) A value passed to or returned from a function or procedure at run time.<br />(2) An independent variable or any value of an independent variable. Examples of arguments are a search key and a number identifying the location of an item in a table.
Industry:Software
(1) In certain software configuration management (SCM) systems, to copy the latest revision of a file from the repository so that it can be modified.<br />(2) To remove an active document, project WBS element, scope element, requirement or resource record from its repository directory in order to modify it. Only one individual may cheque out the same element at a time.
Industry:Software
(1) In the Kerberos protocol, a file that contains service principal names and secret keys. The secret keys should be known only to the services that use the key table file and to the key distribution centre (KDC).<br />(2) A file on the service's host system. Each entry in the file contains the service principal's name and secret key. On i5/OS, a key table file is created during configuration of network authentication service. When a service requests authentication to i5/OS with Network Authentication Service configured, that i5/OS cheques the key table file for that service's credentials.
Industry:Software
(1) A value returned by a programme to indicate the result of its processing.<br />(2) The collective name for completion codes and reason codes.
Industry:Software
(1) In CICS intercommunication, the chain of sessions that results when a system requests a resource in a remote system, but the remote system discovers that the resource is in a third system and has itself to make a remote request.<br />(2) See serial connection.
Industry:Software
(1) In the Kerberos protocol, the set of principals for which a specific key distribution centre (KDC) is the authenticating authority.<br />(2) A grouping of customers, organised by division, region, or company, which is used to separate customer data.<br />(3) A collection of resource managers that honour a common set of user credentials and authorizations.
Industry:Software
(1) A value that identifies the interfaces supported by a service program. Signatures are based on the exports and the sequence of the exports allowed from a service program.<br />(2) The collection of types associated with a method. The signature includes the type of the return value, if any, as well as the number, order, and type of each of the method's arguments.<br />(3) The set of unique information that identifies a software application, such as the name, version, and file size of an application.<br />(4) The name and parameters of a behavioural feature.
Industry:Software
(1) In CICS Transaction Server 3.3 (and earlier) and CICS/VSE, a user-replaceable CICS programme (DFHRTY) used to modify the conditions under which a transaction is restarted by CICS after dynamic transaction backout.<br />(2) In CICS Transaction Server 4.1 (and later), a user-replaceable programme (DFHREST) that enables you to participate in the decision as to whether a transaction should be restarted or not.
Industry:Software
(1) In the Lightweight Directory Access Protocol (LDAP), a pointer from one LDAP directory server to another.<br />(2) A way for servers to refer clients to additional directory servers. With referrals you can: distribute namespace information among multiple servers, provide knowledge of where data resides within a set of interrelated servers, and route client requests to the appropriate server.<br />(3) A record that shows number of times a third-party business or Web site has referred customers to the Web site. Referrals can be measured for recognition purposes through various techniques including clickstream analysis, clickthrough rates, affiliate marketing services, and surveys.
Industry:Software