Glossary

abstract schema

Part of the deployment descriptor for an entity bean that is used to define the bean relationships, persistent fields, or query statements.

access bean

An enterprise bean wrapper that is typically used by client programs, such as Java Server Pages (JSP) files and servlets. Access beans hide the complexity of using enterprise beans and improve the performance of reading and writing multiple enterprise bean properties.

access control

In computer security, the process of ensuring that the resources of a computer system can be accessed only by authorized users in authorized ways.

access control list (ACL)

In computer security, a list associated with an object that identifies all the subjects that can access the object and their specific access rights.

access ID

The unique identification of a user used during authorization to determine if access is permitted to the resource.

access intent

Metadata that optimizes the run-time behavior of an entity bean with respect to concurrency control, resource management, and database access strategies.

access intent policy

A grouping of access intents that governs a type of data access pattern for enterprise bean persistence.

access point group

A collection of core groups that defines the set of core groups in the same cell or in different cells that communicate with each other.

ACL

See access control list.

adapter

A mechanism for connecting two unlike parts or machines, or for electronically or physically connecting a device to a computer or to another device.

administrative agent

A program that provides administrative support without requiring a direct connection to a database.

agent

A function that represents a requester to a server.

alarm listener

A type of asynchronous bean that is called when a high-speed transient alarm expires.

algorithm

A set of well-defined rules for the solution of a problem in a finite number of steps.

algorithm mapping

A process by which service providers can define the mapping of Uniform Resource Identifier (URI) algorithms to cryptographic algorithms that are used for XML digital signature and XML encryption.

Apache

An open source Web server.

API

See application programming interface.

applet

A small application program that performs a specific task and is usually portable between operating systems. Often written in Java code, applets can be downloaded from the Internet and run in a Web browser.

applet client

A client that runs within a browser-based Java run-time environment, and is capable of interacting with enterprise beans directly instead of indirectly through a servlet.

application

One or more computer programs or software components that provide functionality in direct support of a specific business process or processes.

application assembly

The process of creating an EAR file containing all the files related to an application as well as an Extensible Markup Language (XML) deployment descriptor for the application.

Application Assembly Tool

A tool that provides a graphical interface for packaging code artifacts into modules and for configuring Java 2 Platform Enterprise Edition (J2EE)-compliant deployment descriptions.

application client module

A JAR file that contains a client that accesses a Java application. The Java application runs inside a client container and can connect to remote or client-side J2EE resources.

application programming interface (API)

A functional interface by which an application program that is written in a high-level language can use specific data or functions of the operating system or another program.

Application Response Measurement (ARM)

An application programming interface developed by a group of leading technology vendors that can be used to monitor the availability and performance of business transactions within and across diverse applications and systems.

Application Response Measurement (ARM) agent

The implementation of the ARM standard by an implementation provider.

application server

A server program in a distributed network that provides the execution environment for an application program.

ARM

See Application Response Measurement.

artifact

A physical piece of information that is used or produced by a software development process. Examples of artifacts include models, source files, scripts, and binary executable files.

association

(1) For XML documents, the linkage of the document to the rules that govern its structure, which can be defined by a document type definition (DTD) or an XML schema.

(2) In enterprise beans, a relationship that exists between two container-managed persistence (CMP) entity beans. Two types of association exist: one-to-one and one-to-many.

asymmetric algorithm

See public-key algorithm.

asymmetric cryptography

In computer security, pertaining to the use of different keys for encryption and decryption; a synonym for public key cryptography.

asynchronous bean

A Java object or an enterprise bean that a Java 2 Platform Enterprise Edition (J2EE) application can run asynchronously.

asynchronous messaging

A method of communication between programs in which a program places a message on a message queue, then proceeds with its own processing without waiting for a reply to its message.

authentication

In computer security, a process that ensures that the identities of both the sender and the receiver of a network transaction are true.

authenticity

The validation of client and server identities during a Secure Sockets Layer (SSL) connection by both communicating parties using public key cryptography and asymmetric cryptography.

authorization

The process of granting a user either complete or restricted access to an object, a resource, or a function.

authorization table

A table that contains the role-to-user or group mapping information that identifies the permitted access of a client to a particular resource.

automatic restart management

The facilities that detect failures and manage server restarts.

AXIS

An implementation of the SOAP on which Java Web services can be implemented.

basic authentication

An authentication method that uses a user name and a password.

bean

A definition or instance of a JavaBeans component.

bean-managed messaging

A function of asynchronous messaging that gives an enterprise bean complete control over the messaging infrastructure.

bean-managed persistence (BMP)

Pertaining to an entity bean that manages its own persistence.

bean-managed transaction (BMT)

The capability of the session bean, servlet, or application client component to manage its own transactions directly, instead of through a container.

Bean Scripting Framework

An architecture for incorporating scripting language functions within Java applications.

bind

To establish a connection between software components on a network using an agreed-to-protocol. In Web services, the bind operation occurs when the service requestor invokes or initiates an interaction with the service at run time using the binding details in the service description to locate, contact, and invoke the service.

block decryption

Symmetric algorithms that decrypt a block of data at one time.

block encryption

Symmetric algorithms that encrypt a block of data at one time.

BMP

See bean-managed persistence.

BMT

See bean-managed transaction.

bootstrapping

The process by which an initial reference of the naming service is obtained. The bootstrap setting and the host name form the initial context for Java Naming and Directory Interface (JNDI) references.

BOM

See byte order mark.

bottleneck

A place in the system where contention for a resource is affecting performance.

bridge interface

A node and a server that run a core group bridge service.

broker archive

A file that is the unit of deployment to the broker that can contain any number of compiled message flow and message set files and a single deployment descriptor. You need a separate broker archive file for each configuration that you want to deploy.

brute force collision

A programming style that relies on computing power to try all the possibilities with a known hash until the solution is found.

bucket

One or more fields that accumulate the result of an operation.

bulk decryption

A synonym for block decryption.

bulk encryption

A synonym for block encryption.

bus

Interconnecting messaging engines that manage communication resources.

bus member

The application servers within which the messaging engines run to support the bus.

business logic tier

The set of components that reside between the presentation and database tiers. This logic tier hosts the enterprise bean containers, which run the business logic.

business process container

A process engine that contains process modules.

byte order mark (BOM)

A character code at the beginning of a data stream that can be used as a signature that defines the byte order and encoding form.

CA

See certificate authority.

cache instance resource

A location where any J2EE application can store, distribute, and share data

cache replication

The sharing of cache IDs, cache entries, and cache invalidations with other servers in the same replication domain.

callback handler

A mechanism that uses a Java Authentication and Authorization Service (JAAS) interface to pass a security token to the Web service security runtime for propagation in the Web service security header

capability list

A list of associated resources and their corresponding privileges per user.

CBR

See content based routing.

cell

An arbitrary grouping of one or more nodes in a WebSphere Application Server distributed network.

cell-scoped binding

A binding scope where the binding is not specific to, and not associated with any node or server. This type of name binding is created under the persistent root context of a cell.

certificate authority (CA)

An organization that issues certificates. The CA authenticates the certificate owner’s identity and the services that the owner is authorized to use, issues new certificates, renews existing certificates, and revokes certificates.

certificate revocation list (CRL)

A list of certificates issued by a certificate authority (CA). The certificates on this list might not be expired, but are no longer trusted by the CA.

chain

The name of a channel framework connection that contains an endpoint definition.

channel

An entry point to the Web services gateway that carries requests and responses between Web services and the gateway.

channel framework

A common model for connection management, thread usage, channel management, and message access within WebSphere Application Server.

cheat sheet

An interface that guides users through the wizards and steps that are required to perform a complex task, and links to relevant sections of the online help.

CICS

An IBM licensed program that provides online transaction-processing services and management for business applications.

cipher

A cryptographic algorithm that is used to encrypt data that is unreadable until converted into plain data with a predefined key.

cipher suite

A set of ciphers.

class

In object-oriented design or programming, a model or template that can be used to create objects with a common definition and common properties, operations, and behavior. An object is an instance of a class.

class file

A compiled Java source file.

class hierarchy

The relationships between classes that share a single inheritance. All Java classes inherit from the Object class.

class loader

Part of the Java virtual machine code that is responsible for finding and loading class files. A class loader affects the packaging of applications and the run-time behavior of packaged applications deployed on application servers.

class path

A list of directories and JAR files that contain resource files or Java classes that a program can load dynamically at run time.

client proxy

An object on the client side of a network connection that provides a remote procedure call interface to a service on the server side.

client/server

Pertaining to the model of interaction in distributed data processing in which a program on one computer sends a request to a program on another computer and awaits a response. The requesting program is called a client; the answering program is called a server

client type detection

A process in which a servlet determines the markup language type required by a client and calls the appropriate JavaServer Pages file.

Cloudscape

An embeddable, all Java, object-relational database management system (ORDBMS).

cluster

A group of application servers that collaborates for the purposes of workload balancing and failover.

CMP

See container-managed persistence.

coexistence

The ability of multiple installations of WebSphere Application Server to run in the same machine at the same time.

collection certificate store

A collection of intermediate certificates or certificate revocation lists (CRL) that are used by a certificate path to build up a certificate chain for validation.

Collector Tool

A tool that gathers information about a WAS installation and packages this data in a JAR file to assist in problem determination and analysis. This information includes logs, property files, configuration files, operating system data, Java data, and prerequisite software presence and levels.

Common Object Request Broker Architecture (CORBA)

An architecture specification for distributed object-oriented computing that separates client and server programs with a formal interface definition.

CSIv2 (CSIv2)

An authentication protocol developed by the Object Management Group (OMG) that supports interoperability, authentication delegation and privileges.

compilation unit

A Java source file.

complex type

In XML, a type that supports elements in its content and that can carry attributes.

concurrency control

The management of contention for data resources.

configuration repository

A storage area of configuration data that is typically located in a subdirectory of the product installation root directory.

configured name binding

Persistent storage of an object in the name space that is created using either the administrative console or the wsadmin program.

connection factory

A set of configuration values that produces connections that enable a J2EE component to access a resource. Connection factories provide on-demand connections from an application to an enterprise information system (EIS).

connection handle

A representation of a physical connection.

connection pooling

A technique used for establishing a pool of resource connections that applications can share on an application server.

connector

In J2EE, a standard extension mechanism for containers to provide connectivity to enterprise information systems (EISs). A connector consists of a resource adapter and application development tools. (Sun)

container

In J2EE, an entity that provides life-cycle management, security, deployment, and run-time services to components. (Sun)

Each type of container (EJB, Web, JSP, servlet, applet, and application client) also provides component-specific services.

container-managed persistence (CMP)

In J2EE technology, a data transfer between the variables of an entity bean and a resource manager administered by the entity bean container.

container-managed transaction (CMT)

A transaction whose boundaries are defined by an EJB container. An entity bean must use container-managed transactions. (Sun)

container transaction

A transaction that has its boundaries set by the container for method invocations of the enterprise bean.

content based routing (CBR)

An optional feature of the caching proxy that provides intelligent routing to back-end application servers. This routing is based on HTTP session affinity and a weighted round-robin algorithm.

context parameters

A definition of the server view of the Web application within which the servlet is running and supports servlet access to available resources.

control region

A virtual storage area that provides the control, scheduling, and work management mechanisms that are necessary to coordinate shared resources.

CORBA

See Common Object Request Broker Architecture.

core group

A group of processes that are directly accessible to each other and are connected using a local area network (LAN).

core group access point

A definition of a set of servers that provides access to the core group.

core group bridge

The means by which core groups communicate.

core group member

A server within the cluster in a core group.

create method

In enterprise beans, a method that is defined in the home interface and invoked by a client to create an enterprise bean. (Sun)

credential

In the Java Authentication and Authorization Service (JAAS) framework, a subject class that owns security-related attributes. These attributes can contain information used to authenticate the subject to new services.

CRL

See certificate revocation list.

cryptographic token

A logical view of a hardware device that performs cryptographic functions and stores cryptographic keys, certificates, and user data.

CSIv2

See CSIv2.

custom service

A configurable service that plugs in to a WebSphere Application Server and defines a hook point that runs when the server starts and shuts down when the server stops.

custom user registry

A customer-implemented user registry that implements the UserRegistry Java interface. This registry type can support virtually any kind of accounts repository from a relational database and can provide flexibility in adapting product security to various environments.

daemon

A program that runs unattended to perform continuous or periodic system-wide functions, such as network control. Some daemons are triggered automatically to perform their task; others operate periodically.

data access bean

A class library that provides a rich set of features and functions, while hiding the complexity associated with accessing relational databases.

data definition language (DDL)

A language for describing data and its relationships in a database.

data replication service (DRS)

A service that transfers data, objects, or events among application servers.

data source

The means by which an application accesses data from a database.

datagram

A form of asynchronous messaging in which an application sends a message, but does not want a response.

DB2

A family of IBM licensed programs for relational database management.

DDL

See data definition language.

debugger

A tool that is used to detect and trace errors in computer programs.

declarative security

The security configuration of an application during assembly stage that is defined in the deployment descriptors and enforced by the security run time.

delegation

The process of propagating a security identity from a caller to a called object. According to the J2EE specification, a servlet and an enterprise bean can propagate either the client identity when invoking enterprise beans, or can use another specified identity as indicated in the corresponding deployment descriptor.

demarshall

The conversion of a data stream into an object.

demilitarized zone (DMZ)

A configuration including multiple firewalls to add layers of protection between a corporate intranet and a public network, like the Internet.

deploy

The placement of files or the installation of software into an operational environment. In J2EE, this action involves creating a deployment descriptor suitable to the type of application that is being deployed.

deployer

A person who installs modules and J2EE applications into an operational environment.

deployment descriptor

An XML file that describes how to deploy a module or application by specifying configuration and container options.

deployment manager

A special type of server that manages operations for a cell.

deprecated

Pertaining to an entity, such as a programming element or feature that is supported, but no longer recommended and that might become obsolete.

deserializer

A method for converting a serialized variable into object data.

digest code

A number that is the result of a message digest function or a secure hash algorithm distilling a document.

digital certificate

An electronic document used to identify an individual, server, company, or some other entity, and to associate a public key with the entity. A digital certificate is issued by a certification authority and is digitally signed by that authority.

digital signature

The encrypted digest code that is appended to a document. In an authentication system that uses public-key encryption, digital signatures are used to sign certificates.

directive

A first-failure data capture (FFDC) construct that can be contained in a WAS symptom database to provide information and suggested actions to assist a diagnostic module in customizing the data that is logged.

discover

In Universal Discovery Description and Integration (UDDI), to browse the business registry to locate existing Web services integration.

discovery protocol

Pertaining to the protocol that is followed to retrieve information from a network.

distinguished name (DN)

A set of name-value pairs (such as CN=person's name and C=country or region) that uniquely identifies an entity in a digital certificate.

distributed application

An application made up of distinct components that are physically located on different computer systems, connected by a network.

DMZ

See demilitarized zone.

Document Object Model (DOM)

A system in which a structured document, for example an XML file, is viewed as a tree of objects that can be programmatically accessed and updated.

document type definition (DTD)

The rules that specify the structure for a particular class of SGML or XML documents.

DOM

See Document Object Model.

domain

An object, icon, or container that contains other objects representing the resources of a domain. Use the domain object to manage those resources.

drop-down

Pertaining to a list or a menu that opens when clicked and stays open until the user selects a menu or a list item or clicks elsewhere in the user interface.

DRS

See data replication service.

DTD

See document type definition.

dynamic cache

A consolidation of several caching activities, including servlets, Web services, and WebSphere commands into one service where these activities work together to improve performance and share configuration parameters.

dynamic cluster

A server cluster that uses weights to balance the workloads of its cluster members dynamically, based on performance information that is collected from cluster members.

dynamic policy

A template of permissions for a particular type of resource.

dynamic reloading

The ability to change an existing component without restarting the server for the changes to become effective.

EAR

See enterprise archive.

ECSA

See extended common system area.

Edge Side Include (ESI)

A technology supporting cacheable and noncacheable Web page components that can be gathered and assembled at the edge of a network.

EIS

See enterprise information system.

EJB

See Enterprise JavaBeans.

EJB container

A container that implements the EJB component contract of the J2EE architecture. This contract specifies a run-time environment for enterprise beans that includes security, concurrency, life-cycle management, transactions, deployment, and other services. An EJB container is provided by an EJB or J2EE server. (Sun)

EJB context

In enterprise beans, an object that allows an enterprise bean to invoke services provided by the container and to obtain information about the caller of a client-invoked method. (Sun)

EJB inheritance

A form of inheritance in which an enterprise bean inherits properties, methods, and method-level control descriptor attributes from another enterprise bean that resides in the same group.

EJB module

A software unit that consists of one or more enterprise beans and an EJB deployment descriptor. (Sun)

EJB object

In enterprise beans, an object whose class implements the enterprise bean remote interface (Sun).

EJB query

A string that contains an optional SELECT clause that specifies the EJB objects to return, a FROM clause that names the bean collections, an optional WHERE clause that contains search predicates over the collections, an optional ORDER BY clause that specifies the ordering of the result collection; and input parameters that correspond to the argument of the finder method.

EJB reference

A logical name that is used by an application to locate the home interface of an enterprise bean in the target operational environment.

EJB server

Software that provides services to an EJB container. An EJB server may host one or more EJB containers (Sun).

element

In HTML, XML, or XSL, a basic unit that consists of a start-tag, an end-tag, associated attributes and their values, and any text that is contained between the two.

enclave

A construct that represents a business transaction or unit of work on the OS/390 workload manager.

endian

A data type that is longer than a byte and that is stored in computer memory with the most significant byte first or last.

endpoint

The system that is the origin or the destination of a session.

endpoint listener

The point or the address at which incoming messages for a Web service are received by a service integration bus.

enterprise application

An application that conforms to the Java 2 Platform Enterprise Edition specification.

EAR

A specialized JAR file, defined by the J2EE standard used to deploy J2EE applications to J2EE application servers. An EAR file contains enterprise beans, a deployment descriptor, and WAR files for individual Web applications.

enterprise bean

A component that implements a business task or business entity and resides in an EJB container. Entity beans, session beans, and message-driven beans are all enterprise beans. (Sun)

enterprise information system (EIS)

The applications that comprise the existing system of an enterprise for handling company-wide information. Examples of enterprise information systems include: an enterprise resource planning (ERP) system, a mainframe transaction processing system, and a legacy database system. (Sun)

Enterprise JavaBeans (EJB)

A component architecture defined by Sun Microsystems for the development and deployment of object-oriented, distributed, enterprise-level applications.

entity

In markup languages such as XML, a collection of characters that can be referenced as a unit; for example, to incorporate often repeated text or special characters within a document.

entity bean

In EJB programming, an enterprise bean that represents persistent data maintained in a database. Each entity bean carries its own identity. (Sun)

There are two types of entity beans: container-managed persistence (CMP) entity beans and bean-managed persistence (BMP) entity beans.

environment variable

A variable that specifies how an operating system or another program runs, or the devices that the operating system recognizes.

error

A discrepancy between a computed, observed, or measured value or condition and the true, specified, or theoretically correct value or condition.

error log stream

A continuous flow of error information that is transmitted using a predefined format.

ESI

See Edge Side Include.

ESI processor

A feature in the WebSphere Web server plug-in that supports fragment caching and fragment assembly into full pages.

event

The encapsulated data that is sent as a result of an occurrence or situation in the system.

event listener

A type of asynchronous bean that serves as a notification mechanism and through which J2EE components within a single application can notify each other about various asynchronous events.

event source

An object that supports an asynchronous notification server within a single Java virtual machine. Using an event source, the event listener object can be registered and used to implement any interface.

exception

An event during program execution that prevents the program from continuing normally.

exception handler

A block of code that reacts to a specific type of exception.

extended common system area (ECSA)

A major element of MVS/ESA virtual storage above the 16 MB line. This area contains pageable system data areas that are addressable by all active virtual storage address spaces. It duplicates the common system area (CSA), which exists below the 16 MB line.

extended deployment

Software that monitors network efficiency and distributes unexpected workloads.

extended messaging

A function of asynchronous messaging where the application server manages the messaging infrastructure and additional types of messaging beans are provided to add functionality to that provided by message-driven beans.

extension

A class of objects or a set of elements that have been added into a programming language or a program to provide additional capabilities.

factory

In object-oriented programming, a class that is used to create instances of another class. A factory is used to isolate the creation of objects of a particular class into one place so that new functions can be provided without widespread code changes.

failover

A cluster event where the primary database server or application server switches over to a backup system due to the failure of the primary server.

fast response cache accelerator (FRCA)

A cache that resides in the kernel on AIX and Windows platforms that provides support for caching on multiple Web servers and on servers with multiple IP addresses.

fault message

An object that contains status information and details about a problem with a message.

federation

The process of hooking together naming systems so that the aggregate system can process composite names that span the naming systems.

file serving

A function that supports the serving of static files by Web applications.

filter

A device or program that separates data, signals, or material in accordance with specified criteria.

finder method

In enterprise beans, a method defined in the home interface and invoked by a client to locate an entity bean. (Sun)

fingerprint

A synonym for digest code.

firewall

A network configuration, usually both hardware and software that prevents unauthorized traffic into and out of a secure network.

fix pack

A cumulative collection of fixes that does not contain new functions. A fix pack can contain fixes that have not been shipped previously. Full regression testing is performed on fix packs.

folder

A container used to organize objects.

form-based login

An authentication process where a user ID and a password are retrieved using an HTML form, and sent to the server over the HTTP or HTTPS protocol.

form logout

A mechanism to log out without having to close all Web browser sessions.

forwardable credentials

A mechanism-specific security credential that is issued to access a resource, which is used to obtain another credential for access to a different resource.

FRCA

See fast response cache accelerator.

garbage collection

A routine that searches memory to reclaim space from program segments or inactive data.

gateway

A middleware component that bridges Internet and intranet environments during Web service invocations.

gateway destination

A type of service destination that receives messages for gateway services. Gateway destinations are divided into those that are used for request processing and those that are used for reply processing.

gateway service

A Web service that is made available through the Web services gateway.

General Inter-ORB Protocol (GIOP)

A protocol that Common Object Request Broker Architecture (CORBA) uses to define the format of messages.

generic server

A server that is managed in, but not supplied by WebSphere Application Server. Any server or process that is necessary to support the Application Server environment, including a Java server, a C or C++ server or process, a CORBA server, or a RMI server.

generic server cluster

A group of remote servers that need routing by the proxy server.

getter method

A method whose purpose is to get the value of an instance or a class variable. With this capability, another object can find out the value of one of its variables.

GIOP

See General Inter-ORB Protocol.

global security

Pertains to all applications running in the environment and determines whether security is used, the type of registry used for authentication, and other values, many of which act as defaults.

grammar

A document type definition (DTD) or schema providing a structured format used for successful processing by the trace service.

group

A collection of users who can share access authorities for protected resources.

HA

See high availability.

HA group

A collection of one or more members. A common group name relates the members together.

HA policy

A set of rules that is defined for an HA group that dictate whether zero (0), or more members are activated. The policy is associated with a specific HA group by matching the policy match criteria with the group name.

handle

In the J2EE specification, an object that identifies an enterprise bean. A client may serialize the handle, and then later deserialize it to obtain a reference to the enterprise bean. (Sun).

handler

In Web services, a mechanism for processing service content and extending the function of a JAX-RPC run-time system.

handshake

The exchange of messages at the start of a Secure Sockets Layer session that allows the server to authenticate itself to the client using public-key techniques, then allows the client and the server to cooperate in creating symmetric keys for encryption, decryption, and detection of tampering.

hash

In computer security, a number generated from a string of text that is used to ensure that transmitted messages arrived intact.

hierarchical

Pertaining to data that is organized on computer systems using a hierarchy of containers, often called folders (directories) and files. In this scheme, folders can contain other folders and files. The successive containment of folders within folders creates the levels of organization, which is the hierarchy.

high availability

Pertaining to a clustered system that is reconfigured when node or daemon failures occur, so that workloads can be redistributed to the remaining nodes in the cluster.

high availability file system

A cluster file system that can be used for component redundancy to provide continued operations during failures.

high availability manager

A framework within which core group membership is determined and status is communicated between core group members.

HMAC

See Keyed-Hashing Message Authentication Code.

home interface

In enterprise beans, an interface that defines zero or more create and remove methods for a session bean or zero or more create, finder, and remove methods for an entity bean.

home method

A method in the home interface that is used by a client to create, locate, and remove instances of enterprise beans.

horizontal scaling

A topology in which more than one application server running on multiple computing nodes is used to run a single application.

host

(1) A computer that is connected to a network and provides an access point to that network. The host can be a client, a server, or both a client and server simultaneously.

(2) In performance profiling, a machine or a machine starting partition on which an application under test resides. The host owns the processes that are profiled.

host name

The network name for a network adaptor on a physical machine in which the node is installed.

hot deployment

The process of adding new components to a running server without stopping and restarting the application server or application.

hot servant region

A servant region that has a request dispatched to it previously and now has available threads.

hover help

A form of online help that can be viewed by moving a mouse or other pointing device over a GUI item such as an icon or field.

HTTP

See Hypertext Transfer Protocol.

HTTP channel

A type of channel within a transport chain that provides client applications with persistent HTTP connections to remote hosts that are either blocked by firewalls or require an HTTP proxy server. An HTTP channel is used to exchange application data in the body of an HTTP request and an HTTP response that are sent to and received from a remote server.

HTTPS

See Hypertext Transfer Protocol Secure.

Hypertext Transfer Protocol (HTTP)

In the Internet suite of protocols, the protocol that is used to transfer and display hypertext and XML documents on the Web.

Hypertext Transfer Protocol Secure (HTTPS)

An Internet protocol that is used by Web servers and Web browsers to transfer and display hypermedia documents securely across the Internet.

IDE

See integrated development environment.

identifier

The name of an item in a program written in the Java language.

identity

The data that represents a person and that is stored in one or more repositories.

identity assertion

The invocation credential that is asserted to the downstream server. This credential can be set as the originating client identity, the server identity, or another specified identity, depending on the RunAs mode for the enterprise bean.

identity token

The token that contains the invocation credential identity, which with the client authentication token are required by the receiving server to accept the asserted identity.

IDL

See Interface Definition Language.

IETF

See Internet Engineering Task Force.

IIOP

See Internet Inter-ORB Protocol.

inbound authentication

The configuration that determines the type of accepted authentication for inbound requests.

inbound port

A type of port that takes a message that is received at an endpoint listener and passes the message to the service integration bus for forwarding to the appropriate inbound service.

inbound service

The external interface for a service provided by your own organization and hosted in a location that is directly available through the service destination.

inbound transport

Network ports in which a server listens for incoming requests.

inheritance

An object-oriented programming technique that supports the use of existing classes as a basis for creating other classes.

initial context

The starting point in a namespace.

initial reference

A well-known reference associated with an identifier.

INS

See Interoperable Naming Service.

instance

In object-oriented programming, an object of a particular class.

integrated development environment (IDE)

A set of software development tools such as source editors, compilers, and debuggers, that is accessible from a single user interface.

In Eclipse, the IDE is called the Workbench.

Interactive System Productivity Facility (ISPF)

An IBM licensed program that serves as a full-screen editor and dialog manager. Used for writing application programs, it provides a means of generating standard screen panels and interactive dialogs between the application programmer and terminal user.

Interface Definition Language (IDL)

In Common Object Request Broker Architecture (CORBA), a declarative language that is used to describe object interfaces, without regard to object implementation.

internationalized

An application that has been coded such that it can present information to users in different locales or languages, and accept input data from users in multiple locales.

Internet Engineering Task Force (IETF)

The task force of the Internet Architecture Board (IAB) that is responsible for solving the short-term engineering needs of the Internet. The IETF consists of numerous working groups, each focused on a particular problem. Internet standards are typically developed or reviewed by individual working groups before they can become standards.

Internet Inter-ORB Protocol (IIOP)

A protocol used for communication between Common Object Request Broker Architecture (CORBA) Object Request Brokers.

interoperability

The capability to communicate, run programs, or transfer data among various functional units in a way that requires the user to have little or no knowledge of the unique characteristics of these units.

Interoperable Naming Service (INS)

A program that supports the configuration of the Object Request Broker (ORB) administratively to return object references.

interoperable object reference (IOR)

An object reference with which an application can make a remote method call on a CORBA object. This reference contains all the information needed to route a message directly to the appropriate server.

invocation

The activation of a program or a procedure.

invocation credential

An identity with which to invoke a downstream method. The receiving server requires this identity with the sending server identity to accept the asserted identity.

invoker attribute

An assembly property for a Web module that is used by the servlet that implements the invocation behavior.

IOR

See interoperable object reference.

ISPF

See Interactive System Productivity Facility.

J2EE

See Java 2 Platform Enterprise Edition.

J2EE application

Any deployable unit of J2EE functionality. This unit can be a single module or a group of modules packaged into an EAR file with a J2EE application deployment descriptor. (Sun)

J2EE Connector architecture (JCA)

A standard architecture for connecting the J2EE platform to heterogeneous enterprise information systems (EIS).

J2EE server

A run-time environment that provides enterprise bean or Web containers.

JAAS

See Java Authentication and Authorization Service.

Jacl

See Java Command Language.

JAF

See JavaBeans Activation Framework.

Java

An object-oriented programming language for portable interpretive code that supports interaction among remote objects. The Java language was developed and specified by Sun Microsystems, Incorporated.

Java 2 Connector Security

An architecture designed to extend the end-to-end security model for J2EE-based applications to include enterprise information systems (EIS).

Java 2 Platform Enterprise Edition (J2EE)

An environment for developing and deploying enterprise applications, defined by Sun Microsystems Inc. The J2EE platform consists of a set of services, APIs, and protocols that provide the functionality for developing multitiered, Web-based applications.

Java API for XML (JAX)

Refers to a set of Java-based application programming interfaces for handling various operations involving data that is defined through Extensible Markup Language (XML).

Java API for XML-based RPC (JAX-RPC)

A specification that describes application programming interfaces and conventions for supporting XML-based remote procedure call (RPC) protocols in the Java platform.

Java Authentication and Authorization Service (JAAS)

A package through which services can authenticate and authorize users while enabling the applications to remain independent from underlying technologies.

Java Command Language (Jacl)

A scripting language for the Java 2 environment that is used to create Web content and to control Java applications.

Java Database Connectivity (JDBC)

An industry standard for database-independent connectivity between Java code and a wide range of databases. The JDBC provides a call-level application programming interface (API) for SQL-based database access.

Java Management Extensions (JMX)

A means of doing management of and through Java technology. JMX was developed through the Java Community ProcessSM program, by Sun Microsystems, Inc. and some leading companies in the management field. JMX is a universal, open extension of the Java programming language for management that can be deployed across all industries, wherever management is needed.

Java Message Service (JMS)

A Java API that supports the creation and communication of various messaging implementations.

Java Naming and Directory Interface (JNDI)

A Java extension that provides an interface for various directory and naming services in an enterprise.

Java platform

A collective term for the Java language for writing programs; a set of APIs, class libraries, and other programs used in developing, compiling, and error-checking programs; and a Java virtual machine which loads and executes the class files. (Sun)

Java Runtime Environment (JRE)

A subset of the Java Software Development Kit (SDK) that contains the core executables and files that constitute the standard Java platform. The JRE includes the Java virtual machine (JVM), core classes, and supporting files.

Java Secure Socket Extension (JSSE)

A Java package that enables secure Internet communications. It implements a Java version of the SSL and Transport Layer Security (TLS) protocols and supports data encryption, server authentication, message integrity, and optionally, client authentication.

Java virtual machine (JVM)

A software implementation of a central processing unit that runs compiled Java code (applets and applications).

Java Virtual Machine Profiler Interface (JVMPI)

A profiling tool that supports the collection of information, such as data about garbage collection and the Java virtual machine (JVM) API that runs the application server.

JavaBeans

As defined for Java by Sun Microsystems, a portable, platform-independent, reusable component model.

JavaBeans Activation Framework (JAF)

A standard extension to the Java platform that determines arbitrary data types and available operations and can instantiate a bean to run pertinent services.

JavaMail API

A platform and protocol-independent framework for building Java-based mail client applications.

JSP

A server-side scripting technology that enables Java code to be dynamically embedded within Web pages (HTML files) and run when the page is served to return dynamic content to a client.

JSP file

Application building blocks coded to the Sun Microsystems JavaServer Pages (JSP) specification. JSP files enable the separation of the Hypertext Markup Language (HTML) code from the business logic in Web pages so that HTML programmers and Java programmers can collaborate when creating and maintaining pages.

JAX

See Java API for XML.

JAX-RPC

See Java API for XML-based RPC.

JAX-RPC handler

A Java class that performs a range of handling tasks, including logging messages, transforming message content, or terminating an incoming request.

JCA

See J2EE Connector architecture.

JDBC

See Java Database Connectivity.

JMS

See Java Message Service.

JMX

See Java Management Extensions.

JNDI

See Java Naming and Directory Interface.

JRas

A toolkit that consists of a set of Java packages that enable developers to incorporate message logging and trace facilities into Java applications.

JRE

See Java Runtime Environment.

JSP

See JavaServer Pages file.

JSP page

A text-based document using fixed template data and JSP elements that describes how to process a request to create a response. (Sun)

JSSE

See Java Secure Socket Extension.

JVM

See Java virtual machine.

JVMPI

See Java Virtual Machine Profiler Interface.

junction

A logical connection created to establish a path from one server to another.

kernel

The part of an operating system that performs basic functions such as allocating hardware resources.

key

A cryptographic mathematical value that is used to digitally sign, verify, encrypt, or decrypt a message.

key database file

A synonym for a key ring.

key file

A synonym for key ring. The file that stores the keys used during the authentication of a message.

key locator

A mechanism that retrieves the key for XML signing, XML digital signature verification, XML encryption, and XML decryption.

Keyed-Hashing Message Authentication Code (HMAC)

A mechanism for message authentication that uses cryptographic hash functions.

key ring

In computer security, a file that contains public keys, private keys, trusted roots, and certificates.

keystore file

A key database file that contains both public keys stored as signer certificates and private keys stored in personal certificates.

keystring

Additional specification of the entry within the naming service.

launchpad

A graphical interface for launching the product installation.

lazy authentication

The process whereby the security run time obtains the required authentication data when the Java client accesses a protected enterprise bean for the first time.

LDAP

See Lightweight Directory Access Protocol .

Lightweight Directory Access Protocol (LDAP)

An open protocol that uses TCP/IP to provide access to information directories that support an X.500 model and that does not incur the resource requirements of the more complex X.500 Directory Access Protocol (DAP). For example, LDAP can be used to locate people, organizations, and other resources in an Internet or intranet directory.

Lightweight Third Party Authentication (LTPA)

A protocol that uses cryptography to support security in a distributed environment.

link name

A name that is defined in the deployment descriptor of the encompassing application.

link pack area (LPA)

A major element of MVS/ESA virtual storage below the 16MB line. The storage areas that make up the LPA contain all the common reentrant modules shared by the system. The LPA provides economy of real storage by sharing one copy of the modules, protection because LPA code cannot be overwritten even by key 0 programs, and reduced path length because the modules can be branched to.

listener

A program that detects incoming requests and starts the associated channel.

listener port

An object that defines the association between a connection factory, a destination, and a deployed message-driven bean. Listener ports simplify the administration of the associations between these resources.

load balancing

The monitoring of application servers and management of the workload on servers. If one server exceeds its workload, requests are forwarded to another server with more capacity.

local

Pertaining to a device, file, or system that is accessed directly from a user’s system, without a communication line.

local transaction containment (LTC)

A bounded scope that is managed by the container to define the application server behavior in an unspecified transaction context.

location service daemon

A component of the Remote Method Invocation and Internet inter-ORB Protocol (RMI/IIOP) communication function that works with workload management to distribute RMI requests among application servers in a cell.

logger

A named and stateful object with which the user code interacts that logs messages for a specific system or application component.

log handler

A class that uses loggers, levels, and filters to direct whether events are processed or suppressed.

logging

The recording of data about specific events on the system, such as errors.

logging level

A value that controls which events are processed by Java logging.

login binding

A definition of the implementation to provide login information per authentication methods.

login mapping

A Java Authentication and Authorization Service (JAAS) login configuration that is used to authenticate a security token in a Web service security header.

location service daemon

A component of the Remote Method Invocation and Internet Inter-ORB Protocol (RMI/IIOP) communication function that works with workload management to distribute RMI requests among application servers in a cell.

long name

The property that specifies the logical name for the server on the z/OS platform in WebSphere Application Server.

LPA

See link pack area.

LTC

See local transaction containment.

LTPA

See Lightweight Third Party Authentication.

mail session

A resource collection of protocol providers that authenticate users and control user access to messaging systems.

Managed Bean (MBean)

In the Java Management Extensions (JMX) specification, the Java objects that implement resources and their instrumentation. MBeans must follow the design patterns and interfaces defined in the instrumentation level of the JMX specification. This ensures that all MBeans provide the instrumentation of managed resources in a standardized way. MBeans are manageable by any JMX agent, but they can also be managed by non-compliant agents that support the MBean concept.

managed node

A node with an application server and a node agent that belongs to a cell.

managed resource

An entity that exists in the run-time environment of an IT system and can be managed.

marshall

The conversion of an object into a data stream for transmission over a network.

MBean

See Managed Bean.

MBean provider

A library containing an implementation of a Java Management Extensions (JMX) MBean and its MBean XML descriptor file.

MD5

A type of message algorithm that converts a message of arbitrary length into a 128-bit message digest. This algorithm is used for digital signature applications where a large message must be compressed in a secure manner.

message digest

A hash value or a string of bits resulting from the conversion of processing data to a number.

message-driven bean

An enterprise bean that provides asynchronous message support and clearly separates message and business processing.

metadata

Data that describes the characteristics of stored data; descriptive data. For example, the metadata for a database table might include the name of the table, the name of the database that contains the table, the names of the columns in the table, and the column descriptions, either in technical terms or business terms. Database catalogs and information catalogs contain metadata.

method

In object-oriented design or programming, the software that implements the behavior specified by an operation.

method extension

An IBM extension to the standard deployment descriptors for enterprise beans that define transaction isolation methods and control the delegation of credentials.

method permission

A mapping between one or more security roles and one or more methods that a member of a role can call.

MIME

See Multipurpose Internet Mail Extensions.

module

In J2EE, a software unit that consists of one or more components of the same container type and one deployment descriptor of that type. Examples include EJB, Web, and application client modules. Modules can be deployed as stand-alone units or assembled into an application. (Sun).

monitor

In performance profiling, to collect data about an application from the running agents that are associated with that application

mount point

A logical drive through which volumes are accessed in a sequential access device class. For removable media device types, such as cartridges, a mount point is a logical drive associated with a physical drive. For the file device type, a mount point is a logical drive associated with an I/O stream.

MPMT

See multiprocess multithread.

multiple configuration instances

More than one instance of a product running in the same machine at the same time.

multiprocess multithread (MPMT)

A process architecture of the IBM HTTP Server that supports multiple processes as well as multiple threads per process.

Multipurpose Internet Mail Extensions (MIME)

An Internet standard that allows different forms of data including video, audio, or binary data to be attached to e-mail without requiring translation into ASCII text.

namespace

A space reserved by a file system to contain the names of its objects.

naming

An operation that is used by clients of WAS applications to obtain references to objects related to those applications.

naming contexts

A logical namespace containing name and object bindings.

naming federation

The process of hooking together naming systems so that the aggregate system can process composite names that span the naming systems.

naming service

An implementation of the Java Naming and Directory Interface (JNDI) standard.

NAT

See network address translation.

native

Pertaining to the relationship between a transport user and a transport provider that are both based on the same transport protocol.

network address translation (NAT)

The conversion of a network address that is assigned to a logical unit in one network into an address in an adjacent network.

network protocol stack

A set of network protocol layers and software that work together to process the protocols.

node

A logical grouping of managed servers.

node agent

An administrative function that manages all application servers on a node and represents the node in the management cell.

node federation

The process of combining the managed resources of one node into a distributed network such that the central manager application can access and administer the resources on the node.

node group

A collection of WAS nodes that defines a boundary for server cluster formation.

node name

The machine name or host name; an arbitrary WebSphere Application Server-specific name that must be unique.

nonce

A unique cryptographic number that is embedded in a message to help detect a replay attack.

nonrepudiation

In business-to-business communication, the ability of the recipient to prove who sent a message based on the contents of the message. This proof is derived from the use of a digital signature in the message, which links the sender to the message.

notification

A message that contains the event descriptions that are sent to managed resources, autonomic managers, and other resources.

object

In object-oriented design or programming, a concrete realization (instance) of a class that consists of data and the operations associated with that data. An object contains the instance data that is defined by the class, but the class owns the operations that are associated with the data.

object adapter

A Common Object Request Broker Architecture (CORBA) term, denoting the primary interface that a server implementation uses to access Object Request Broker (ORB) functions.

object reference

A Common Object Request Broker Architecture (CORBA) term, denoting the information needed to reliably identify a particular object.

Object Request Broker (ORB)

In object-oriented programming, software that serves as an intermediary by transparently enabling objects to exchange requests and responses.

one-way hash

An algorithm that converts processing data into a string of bits; known as a hash value or a message digest.

Open Servlet Engine (OSE)

A lightweight communications protocol developed by IBM for interprocess communication.

ORB

See Object Request Broker.

OSE

See Open Servlet Engine.

outbound authentication

The configuration that determines the type of accepted authentication for outbound requests.

outbound port

The mechanism through which an outbound service communicates with the externally-hosted Web service. Messages pass between the outbound service and the external service through the appropriate port.

outbound service

A service that provides access through one or more outbound ports to a Web service that is hosted externally.

package

(1) In Java programming, a group of types. Packages are declared with the package keyword. (Sun)

(2) In J2EE technology, to assemble components into modules and modules into enterprise applications.

page list

An assembly property that specifies the location to forward a request, but automatically tailors that location, depending on the Multipurpose Internet Mail Extensions (MIME) type of the servlet.

parallel garbage collection

A type of garbage collection that uses several garbage collection threads at one time.

part reference

An object that is used by a configuration to reference other related configuration objects.

passivation

In enterprise beans, the process of transferring an enterprise bean from memory to secondary storage. (Sun)

PassTicket

In RACF secured signon, a dynamically generated, random, one-time-use, password substitute that a workstation or other client can use to sign on to the host rather than sending a RACF password across the network.

payload

The body of the message that holds the content.

peer access point

A means by which core groups can communicate with other cells.

Performance Monitoring Infrastructure (PMI)

A set of packages and libraries assigned to gather, deliver, process, and display performance data.

permission

Authorization to perform activities, such as reading and writing local files, creating network connections, and loading native code.

persist

To be maintained across session boundaries, usually in nonvolatile storage such as a database system or a directory.

persistence

(1) A characteristic of data that is maintained across session boundaries, or of an object that continues to exist after the execution of the program or process that created it, usually in nonvolatile storage, such as a database system.

(2) In J2EE technology, the protocol for transferring the state of an entity bean between its instance variables and an underlying database. (Sun)

plug-in

A software module, often written by a third party that adds function to an existing program or application, such as a Web browser.

PME

See programming model extension.

PMI

See Performance Monitoring Infrastructure.

point-to-point

A style of messaging application in which the sending application knows the destination of the message.

policy

A set of considerations that influence the behavior of a managed resource or a user.

port

As defined in a Web Services Description Language (WSDL) document, a single endpoint that is defined as a combination of a binding and a network address.

port destination

The specialization of a service integration bus destination. Each port destination represents a particular message format and transport protocol that use to pass messages to an externally-hosted service.

port number

In the Internet suite of protocols, the identifier for a logical connector between an application entity and the transport service.

presumed trust

A type of identity assertion where trust is presumed and additional trust validation is not performed. Use this mode only in an environment where trust is established with some other mechanism.

primary key

An object that uniquely identifies an entity bean within a home (Sun).

primitive key

In Java programming, a category of data type that describes a variable that contains a single value of the appropriate size and format for its type: a number, a character, or a Boolean value. Examples of primitive types include byte, short, int, long, float, double, char, boolean.

principal

An entity that can communicate securely with another entity.

private key

In secure communication, an algorithmic pattern that is used to encrypt messages that only the corresponding public key can decrypt. The private key is also used to decrypt messages that were encrypted by the corresponding public key. The private key is kept on the user’s system and is protected by a password.

process definition

A specification of the run-time characteristics of an application server process.

process module

A program unit that contains a set of process templates that support administrative tasks.

profile

Data that describes the characteristics of a user, group, resource, program, device, or remote location.

programmatic login

A type of form login that supports application presentation site-specific login forms for the purpose of authentication.

programmatic security

A collection of methods used by applications when declarative security is not sufficient to express the security model of the application.

programming model extension (PME)

The programming model capabilities that ship with WebSphere Application Server Enterprise Edition. These capabilities are also known as enterprise services.

property

A characteristic or attribute that describes a unit of information.

proxy cluster

A group of proxy servers that distributes HTTP requests across the cluster.

proxy peer access point

A means of identifying the communication settings for a peer access point that cannot be accessed directly.

proxy server

A server that acts as an intermediary for HTTP Web requests that are hosted by an application or a Web server. A proxy server acts as a surrogate for the content servers in the enterprise.

public

In the Java programming language, pertains to a method or variable that can be accessed by elements residing in other classes. (Sun)

public key

In secure communication, an algorithmic pattern used to decrypt messages that were encrypted by the corresponding private key. A public key is also used to encrypt messages that can be decrypted only by the corresponding private key. Users broadcast their public keys to everyone with whom they must exchange encrypted messages.

public-key algorithm

An algorithm designed so that the key used for encryption is different from the key used for decryption. The decryption key cannot be derived, at least not in any reasonable amount of time, from the encryption key.

publish

(1) To make a Web site public, for example by putting files in a path known to the HTTP server.

(2) In UDDI, to advertise a Web service so that other businesses can find and bind with it. Service providers publish the availability of their services through a registry.

QoS

See quality of service.

quality of service (QoS)

A set of communication characteristics required by an application. QoS defines a specific transmission priority, level of route reliability, and security level.

queue

A WebSphere MQ object to which message queuing applications can put messages, and from which they can get messages. Local queues can contain a list of messages waiting to be processed. Queues of other types cannot contain messages: they point to other queues, or can be used as models for dynamic queues.

queueing network

A group of interconnected components.

RACF

See Resource Access Control Facility.

rapid deployment tools

Tools to rapidly develop and deploy Java 2 Platform, Enterprise Edition (J2EE) artifacts on the server and package the J2EE artifacts into the deployed EAR file.

RAR

See resource adapter archive.

realm

A collection of resource managers that honor a common set of user credentials and authorizations.

realm name

The machine name of a user registry.

reentrance

A situation where a thread of control attempts to enter a bean instance again.

reference

A logical name defined in the application deployment descriptor that is used to locate external resources for enterprise applications. At deployment, the references are bound to the physical location of the resource in the target operational environment.

referential integrity

In XML tools, the condition that exists when all references to items in the XML schema editor or DTD editor are automatically cleaned up when the schema is detected or renamed.

refresh pack

A fix pack, which is a cumulative collection of fixes, that also contains new functions. Full regression testing is performed on refresh packs.

region

A contiguous area of virtual storage that has common characteristics and that can be shared between processes.

registry

A repository that contains access and configuration information for users, systems, and software.

remote

Pertaining to a system, program, or device that is accessed through a communications line.

remote home interface

In enterprise beans, an interface that specifies the methods used by remote clients for locating, creating, and removing instances of enterprise bean classes.

remote interface

In enterprise beans, an interface that defines the business methods that can be called by a client.

remote method

A business method in the remote interface that is callable by a client.

RMI

A protocol that is used to communicate method invocations over a network. Java Remote Method Invocation is a distributed object model in which the methods of remote objects written in the Java programming language can be invoked from other Java virtual machines, possibly on different hosts.

Remote Method Invocation over Internet InterORB Protocol (RMI/IIOP)

Part of the Java 2 Platform, Standard Edition (J2SE) model that developers can use to program in the Java language to work with RMI interfaces, but use IIOP as the underlying transport.

Remote OSE

The use of the Open Servlet Engine (OSE) protocol as a transport mechanism to communicate between two separate machines in the WebSphere Application Server environment.

remote procedure call (RPC)

A protocol that allows a program on a client computer to run a program on a server.

remove method

In enterprise beans, a method that is defined in the home interface and invoked by a client to destroy an enterprise bean.

repertoire

Configuration information that contains the details necessary for building a SSL connection.

replication

The process of copying objects from one node in a cluster to one or more other nodes in the cluster, which makes the objects on all the systems identical.

replication entry

A run-time component that handles the transfer of internal WebSphere Application Server data.

repository

A persistent storage area for source code and other application resources.

request consumer binding

A definition of the security requests for the request message that is received by a Web service.

request generator binding

A definition of the security requests for the request message that is sent to a Web service.

request metrics

A mechanism to monitor and troubleshoot performance bottlenecks in the system at an individual request level.

request receiver binding

A definition of the security requirements for the request message that is received from a request to a Web service.

request sender binding

A definition of the security requirements for the request message that is sent to a Web service.

Resource Access Control Facility (RACF)

An IBM licensed program that provides access control by identifying users to the system; verifying users of the system; authorizing access to protected resources; logging detected, unauthorized attempts to enter the system; and logging detected access to protected resources.

resource adapter

A system-level software driver that is used by an EJB container or an application client to connect to an enterprise information system (EIS). A resource adapter plugs in to a container; the application components deployed on the container then use the client API (exposed by adapter) or tool-generated, high-level abstractions to access the underlying EIS. (Sun).

resource adapter archive (RAR)

A JAR file that is used to package a resource adapter for the Java 2 Connector (J2C) architecture for WebSphere Application Server.

resource environment reference

A reference that maps a logical name used by the client application to the physical name of an object.

resource manager local transaction (RMLT)

A resource manager view of a local transaction that represents a unit of recovery on a single connection that is managed by the resource manager.

resource property

A property for a Java DataBase Connectivity (JDBC) data source in a server configuration; for example the server name, user ID, or password.

Resource Recovery Services (RRS)

A z/OS facility that provides two-phase synchronization point support across participating resource managers.

response consumer binding

A definition of the security requests for the response message that is received by a Web service

response generator binding

A definition of the security requests for the response message that is sent to a Web service.

response receiver binding

A definition of the security requirements for the response message that is received from a request to a Web service.

response sender binding

A definition of the security requirements for the response message that is sent to a Web service.

reverse proxy

An IP-forwarding topology where the proxy is on behalf of the back-end HTTP server. It is an application proxy for servers using HTTP.

ripplestart

An action where the system waits for each member in a cluster to start before starting the next member of the cluster.

RMI

See Remote Method Invocation.

RMI/IIOP

See Remote Method Invocation over Internet InterORB Protocol.

RMLT

See resource manager local transaction.

role

A logical group of principals that provide a set of permissions. Access to operations is controlled by granting access to a role.

role-based authorization

The use of authorization information to determine whether a caller has the necessary privilege to request a service.

role mapping

The process of associating groups and principals recognized by the container to security roles specified in the deployment descriptor.

routing policy

A set of rules that determine how the server routes incoming requests.

RPC

See remote procedure call.

RRS

See Resource Recovery Services.

run time

The time period during which a computer program is running.

RunAs role

A role used by a servlet or an enterprise bean component to invoke and delegate a role to another enterprise bean.

SAAJ

See SOAP with attachments API for Java.

SAF

See System Authorization Facility.

SAML

See Security Assertion Markup Language.

SAS

See Secure Association Service.

scalability

The ability of hardware, software, or a distributed system to continue to function well as it is changed in size or volume. For example, the ability to retain performance levels when adding processors, memory, and storage.

scheduler

A service that provides time-dependent services.

schema

(1) A collection of database objects such as tables, views, indexes, or triggers that define a database. A database schema provides a logical classification of database objects.

(2) In XML, a mechanism for describing and constraining the content of XML files by indicating which elements are allowed and in which combinations. XML schemas are an alternative to the document type definition (DTD) and can be used to extend functionality in the areas of data typing, inheritance, and presentation.

scope

A specification of the boundary within which system resources can be used.

script

A series of commands, combined in a file that carry out a particular function when the file is run. Scripts are interpreted as they are run.

scripting

A style of programming that reuses existing components as a base for building applications.

SDO

See Service Data Objects.

SDO repository

A database that the service integration bus for Web services enablement uses for storing and serving Web Services Description Language (WSDL) definitions

Secure Association Service (SAS)

An authentication protocol used to communicate securely for the client principal by establishing a secure association between the client and server.

SSL

A security protocol that provides transport layer security: authenticity, integrity, and confidentiality, for a secure connection between a client and a server. The protocol runs above TCP/IP and below application protocols.

Security Assertion Markup Language (SAML)

An XML framework for exchanging authentication and authorization information.

security attribute propagation

The transportation of security attributes from one server to another server in a WAS configuration.

security constraints

A declaration of how to protect Web content, and how to protect data that is communicated between the client and the server.

security domain

The set of all the servers that are configured with the same user registry realm name.

security permission

Authorization granted to access a system resource.

security policy

A written document that defines the security controls that you institute for your computer systems. A security policy describes the risks that you intend these controls to minimize and the actions that should be taken if someone breaches your security controls.

security role reference

A role that defines the access levels a user has and the specific resources they can modify at those levels.

security token

A representation of a set of claims that are made by a client that can include a name, password, identity, key, certificate, group, privilege, and so on.

sequence grouping

The specification of the order in which entity beans update relational database tables.

servant region

A contiguous area of virtual storage that is dynamically started as load increases and automatically stopped as load eases.

server

In a network, hardware or software that provides facilities to other stations. Examples of a server include a file server, a printer server, and a mail server.

server class

A subset of a workload having the same service goals or performance objectives, resource requirements, or availability requirements. For workload management, you assign a service goal to a service class.

server cluster

A group of servers that are typically on different physical machines and have the same applications configured within them, but operate as a single logical server.

server implementation object

Enterprise beans that client applications require to access and implement the services that support those objects.

server-side include

A facility for including dynamic information in documents sent to clients, such as current date, the last modification date of a file, and the size or last modification of other files.

service context

Part of a General InterORB Protocol (GIOP) message that is identified with an ID and contains data used in specific interactions, such as security actions, character codeset conversion, and Object Request Broker (ORB) version information.

Service Data Objects (SDO)

An open standard for enabling applications to handle data from heterogeneous data sources in a uniform way.

service description

The description of a Web service, which can be defined in any format such as WSDL, UDDI, or HTML.

service destination

A specialization of a service integration bus destination. Each service destination can directly represent a Web service implementation or can indirectly represent the service through a Web Services Definition Language (WSDL) document.

service integration bus

A managed communication mechanism that supports service integration through synchronous and asynchronous messaging. A bus consists of interconnecting messaging engines that manage bus resources.

service integration bus Web services enablement

A software component that enables Web services to use IBM service integration technologies. This capability provides a quality of service choice and message distribution options for Web services, with mediations that support message rerouting or modification.

service type definition

In Universal Discovery Description and Integration (UDDI), a description of specifications for services or taxonomies.

servlet

A Java program that runs on a Web server and extends the capabilities of a Web server by generating dynamic content in response to Web client requests. Servlets are commonly used to connect databases to the Web.

servlet filtering

The process of transforming a request or modifying a response without exposing the resource used by the servlet engine.

servlet mapping

A correspondence between a client request and a servlet that defines their association.

session

A series of requests to a servlet originating from the same user at the same browser.

session affinity

A method of configuring applications in which a client is always connected to the same server. These configurations disable workload management after an initial connection by forcing a client request to always go to the same server.

session bean

An enterprise bean that is created by a client and that usually exists only for the duration of a single client/server session. (Sun)

setter method

A method whose purpose is to set the value of an instance or class variable. With this capability, another object can set the value of one of its variables.

SHA-1

A Secure Hash Algorithm for computing a condensed representation of a message or data file.

shared library file

A file that consists of a symbolic name, a Java class path and a native path for loading Java Native Interface (JNI) libraries. Applications that are deployed on the same node as this file can access this information.

short name

In personal communications, the one-letter name (A through Z) of the presentation space or emulation session.

signer certificate

The trusted certificate entry that is usually in a truststore file.

SOAP

A lightweight, XML-based protocol for exchanging information in a decentralized, distributed environment. SOAP can be used to query and return information and invoke services across the Internet.

simple type

In XML, a type that cannot have element content and cannot carry attributes. Elements that contain numbers (and strings, and dates, and so on) but do not contain any sub-elements are said to have simple types.

single signon

An authentication process in a client and server relationship in which the user can enter one name and password, and have access to more than one application.

smart card

An intelligent token that is embedded with an integrated circuit chip that provides memory capacity and computational capabilities.

SOAP

See Simple Object Access Protocol .

SOAP with attachments API for Java (SAIJ)

An application programming interface (API) that is used to send XML documents over the Internet from a Java base.

socket

A method of communication between two processes. A socket is an identifier that the application uses to uniquely identify an end point of communications. The user associates a protocol address with the socket by associating a socket address with the socket.

SOCKS

A client/server architecture that transports TCP/IP traffic through a secure gateway. A SOCKS server performs many of the same services that a proxy server does.

special-subject

Generalization of a particular class of users; a product-defined entity independent of the user registry.

SQL

See Structured Query Language.

SQLJ

See Structured Query Language for Java.

SSL

See Secure Sockets Layer.

SSL channel

A type of channel within a transport chain that associates a Secure Sockets Layer (SSL) configuration repertoire with the transport chain.

SSO

See single signon.

stateful session bean

A session enterprise bean that acts on behalf of a single client and maintains client-specific session information (called conversational state) across multiple method calls and transactions.

stateless session bean

A session bean that is a collection of operations. The server can optimize resources by reusing bean instances on every method call.

static

A Java programming language keyword that is used to define a variable as a class variable.

static cluster

A backup cluster that is defined statically to handle requests if the primary cluster fails.

stored procedure

A block of procedural constructs and embedded SQL statements that is stored in a database and can be called by name. Stored procedures allow an application program to be run in two parts, one on the client and the other on the server, so that one call can produce several accesses to the database.

stream decryption

A symmetric algorithm that decrypts data one bit or byte of data at a time.

stream encryption

A symmetric algorithm that encrypts data one bit or byte of data at a time.

string

In programming languages, the form of data that is used for storing and manipulating text.

Structured Query Language (SQL)

A standardized language for defining and manipulating data in a relational database.

Structured Query Language for Java (SQLJ)

A standard set of programming extensions that allows embedded SQL statements in a Java program.

Struts

An open source framework for building Java Web applications.

Struts module

A Struts configuration file and a set of corresponding actions, form beans, and Web pages. A Struts application comprises at least one Struts module.

stub

A small program routine that substitutes for a longer, possibly remote, program. For example, a stub might be a program module that transfers procedure calls (RPCs) and responses between a client and a server. In Web services, a stub is an implementation of a Java interface generated from a Web Services Definition Language (WSDL) document.

symmetric algorithm

An algorithm where the encryption key can be calculated from the decryption key and vice versa. In most symmetric algorithms, the encryption key and the decryption key are the same.

syntax

The rules for the construction of a command or statement.

sysplex

A set of MVS or OS/390 systems communicating and cooperating with each other through certain multisystem hardware components and software services to process customer workloads.

System Authorization Facility (SAF)

An interface defined by MVS that enables programs to use system authorization services to protect access to resources such as data sets and MVS commands. The IBM Resource Access Control Facility (RACF) is a product that uses the SAF interface.

system logger

A central logging facility provided by MVS/ESA SP 5.2. The MVS system logger provides an integrated MVS logging facility that can be used by system and subsystem components. For example, it is used by the CICS log manager.

tag library

In JSP technology, a collection of tags identifying custom actions described using a taglib descriptor and Java classes. A JSP tag library can be imported into any JSP file and used with various scripting languages. (Sun)

TAI

See trust association interceptor.

target service

A service that exists outside of the gateway.

TCP channel

A type of channel within a transport chain that provides client applications with persistent connections within a local area network (LAN).

temporary file system (TFS)

A temporary, in-memory physical file system that supports in-storage mountable file systems. Normally, a TFS runs in the kernel address space, but it can be run in a logical file system (LFS) colony address space.

TFS

See temporary file system.

thin application client

A lightweight, downloadable Java application run time capable of interacting with enterprise beans.

thin client

A client that has little or no installed software, but has access to software that is managed and delivered by network servers that are attached to it. A thin client is an alternative to a full-function client, such as a workstation.

thread

A stream of computer instructions that is in control of a process. A multithread process begins with one stream of instructions (one thread) and might later create other instruction streams to perform tasks.

throughput

The measure of the amount of work performed by a device, such as a computer or printer, over a period of time; for example, number of jobs per day.

Time Sharing Option (TSO)

An option of the MVS operating system that provides interactive time sharing from remote terminals.

Tivoli Performance Viewer

A Java client that retrieves the Performance Monitoring Infrastructure (PMI) data from an application server and displays it in various formats.

TLS

See Transport Layer Security.

token

A particular message or bit pattern that signifies permission or temporary control to transmit on a network.

transaction

A specific set of input data that triggers execution of a specific processor job; a message destined for an application program.

transaction class

An interface class that defines all of the methods that a business object implements and that an application can use.

transform algorithm

A procedure that is used to transform the message for Web services security message processing, such as the C14N (canonicalization) transform that is used for XML digital signatures.

transport

The request queue between a WAS plug-in for Web servers and a Web container in which the Web modules of an application reside. When a user at a Web browser requests an application, the request is passed to the Web server, then along the transport to the Web container.

transport channel chain

A specification of the transport channels that are used by a server for receiving information. Transport channel chains contain end points.

transport chain

A representation of a network protocol stack that is operating within an application server

Transport Layer Security (TLS)

An Internet Engineering Task Force (IETF)-defined security protocol that is based on SSL and is specified in RFC 2246.

trust anchor

A trusted keystore file that contains a trusted certificate or a trusted root certificate that is used to assert the trust of a certificate.

trust association

An integrated configuration between the security server of the product and third-party security servers. A reverse proxy server acts as a front-end authentication server, while the product applies its own authorization policy onto the resulting credentials passed by the proxy server.

trust association interceptor (TAI)

The mechanism by which trust is validated in the product environment for every request received by the proxy server. The method of validation is agreed upon by the proxy server and the interceptor.

trust file

A file that contains signer certificates.

trust relationship

An established and trusted communication path through which a computer in one domain can communicate with a computer in the other domain. Users in a trusted domain can access resources in the trusting domain.

trusted identity (ID) evaluator

A mechanism that is used by a server to determine whether to trust a user identity during identity assertion.

truststore file

A key database file that contains the public keys for that target server.

TSO

See Time Sharing Option.

type

(1) In Java programming, a class or interface. (2) In a Web Services Definition Language (WSDL) document, a container for data type definitions using some type system (such as XSD).

type hierarchy

The complete context for a Java class or interface including its superclasses and subclasses.

UDDI node

A set of Web services that supports at least one of the Universal Description, Discovery, and Integration (UDDI) APIs. A UDDI node consists of one or more instances of a UDDI application running in an application server or a cluster of application servers with an instance of the UDDI database.

UDDI node initialization

The process by which values are set in the Universal Description, Discovery, and Integration (UDDI) database and the behavior of the UDDI node is established.

UDDI node state

A description of the current status of the Universal Description, Discovery, and Integration (UDDI) node.

UDDI policy

A statement of the required and expected behavior of a Universal Description, Discovery, and Integration (UDDI) registry that is specified through policy values that are defined in the UDDI specification.

UDDI property

A characteristic or attribute that controls the behavior of a Universal Description, Discovery, and Integration (UDDI) node.

UML

See Unified Modeling Language.

Unified Modeling Language (UML)

A standard notation for the modeling of a real-world object as a first step in developing an object-oriented design methodology.

Uniform Resource Identifier (URI)

A compact string of characters for identifying an abstract or physical resource.

Uniform Resource Locator (URL)

The unique address of a file that is accessible in a network such as the Internet. The URL includes the abbreviated name of the protocol used to access the information resource and the information used by the protocol to locate the information resource.

Universal Discovery Description and Integration (UDDI) registry

A distributed registry of businesses and their service descriptions that adhere to the Universal Description, Discovery, and Integration (UDDI) standard for managing the discovery of Web services. UDDI registries come in two forms, public and private, both of which are implemented in a common XML format.

universally unique identifier (UUID)

The 128-bit numerical identifier that is used to ensure that two components do not have the same identifier. The identifier is unique for all space and time.

unmanaged node

A node that is defined in the cell topology that does not have a node agent that manages the process. An unmanaged node is typically used to manage Web servers.

URI

See Uniform Resource Identifier.

URL

See Uniform Resource Locator.

URL scheme

The identification of an electronically accessible resource, the path to that resource, and the resource name.

user name token

A type of token that is represented by a user name and optionally, by a password.

user registry

A database of known users and user-provided information that is used for authentication purposes.

validation

The checking of data or code for correctness or for compliance with applicable standards, rules, and conventions.

variable

A configuration property that provides a parameter for any value in the system. It has a name and a value to use in place of that name wherever the variable name is located within the configuration files.

vertical scaling

The process of setting up multiple application servers on one machine, usually by creating cluster members.

view synchronous high-availability manager group

A special class of high availability (HA) group that can be created and used by components that require a certain virtual synchrony (VS) quality of service (QoS) for group communication.

virtual host

A configuration enabling a single host machine to resemble multiple host machines. Resources associated with one virtual host cannot share data with resources associated with another virtual host, even if the virtual hosts share the same physical machine.

virtual machine

An abstract specification for a computing device that can be implemented in different ways in software and hardware.

virtual private network (VPN)

An extension of a company intranet over the existing framework of either a public or a private network. A VPN ensures that the data that is sent between the two endpoints of its connection remains secure.

virtual synchrony (VS)

A property of group communication that guarantees how messages are delivered when the view changes, for example, when existing members fail or new members join.

VPN

See virtual private network.

VS

See virtual synchrony.

waiter

A thread waiting for a connection.

WAR

See Web archive.

WCCM

See WebSphere Common Configuration Model.

Web application

An application that consists of one or more related servlets, JavaServer Pages technology, and HyperText Markup Language (HTML) files that are managed as a unit.

WAR

A compressed file format, defined by the J2EE standard for storing all the resources required to install and run a Web application in a single file.

Web browser

A client program that initiates requests to a Web server and displays the information that the server returns.

Web component

A servlet, JavaServer Pages (JSP) file, or a HyperText Markup Language (HTML) file. One or more Web components make up a Web module.

Web container

A container that implements the Web component contract of the J2EE architecture. (Sun).

Web container channel

A type of channel within a transport chain that creates a bridge in the transport chain between an HTTP inbound channel and a servlet or JavaServer Pages (JSP) engine.

Web module

A unit that consists of one or more Web components and a Web deployment descriptor. (Sun)

Web property extension (WPX)

IBM extensions to the standard deployment descriptors for Web applications. These extensions include Multipurpose Internet Mail Extensions (MIME) filtering and servlet caching.

Web resource

Any one of the resources that are created during the development of a Web application; for example, Web projects, HTML pages, JavaServer Pages (JSP) files, servlets, custom tag libraries, and archive files.

Web resource collection

A list of URL patterns and HTTP methods that describe a set of resources to be protected. (Sun)

Web server plug-in

A software module that supports the Web server in communicating requests for dynamic content, such as servlets, to the application server.

Web server separation

A topology where the Web server is physically separated from the application server.

Web service

A software system designed to support interoperable machine-to-machine interaction over a network. It has an interface described in a machine-processable format, specifically Web Services Description Language (WSDL).

Web Services Description Language (WSDL)

An XML-based specification for describing networked services as a set of endpoints operating on messages containing either document-oriented or procedure-oriented information.

Web Services Invocation Framework (WSIF)

A Java API that supports dynamic invoking of Web services, regardless of the format in which the service is implemented or the access mechanism.

WebSphere Common Configuration Model (WCCM)

A model for programmatic access to configuration data used by the WAS tooling, run time, and administrative console.

wizard

An active form of help that guides users through each step of a particular task.

work manager

A thread pool for Java 2 Platform Enterprise Edition (J2EE) applications.

work object

A type of asynchronous bean that applications implement to run code blocks asynchronously.

workflow

The sequence of activities performed in accordance with the business processes of an enterprise.

workload management

The optimization of the distribution of incoming work requests to the application servers, enterprise beans, servlets and other objects that can effectively process the request.

workspace

A temporary repository of configuration information that administrative clients use.

World Wide Web Consortium (W3C)

An international industry consortium set up to develop common protocols to promote evolution and interoperability of the World Wide Web.

WPX

See Web property extension.

wrapper

An alternate and supported interface that hides unsupported data types required by a server object behind a thin intermediate server object.

WSDL

See Web Services Description Language.

WSIF

See Web Services Invocation Framework.

X.509 certificate

A certificate that contains information that is defined by the X.509 standard.

X/Open XA

The X/Open Distributed Transaction Processing XA interface. A proposed standard for distributed transaction communication. The standard specifies a bidirectional interface between resource managers that provide access to shared resources within transactions, and between a transaction service that monitors and resolves transactions.

XML digital signature

A specification that defines the XML syntax and the processing rules to sign and verify the digital signatures for the digital content.

XML encryption

A specification that defines how to encrypt the content of an XML element.

XML parser

A program that interprets the contents of an XML file and determines what to do with the input.

XML token

A security token that is in an XML format, such as a Security Assertion Markup Language (SAML) token.

zip

One or more files compressed and stored in a single file with a name ending in .zip.

Various Java definitions reprinted with permission from SUN Microsystems, Inc.