CCC

If you are viewing this Novell® ZENworks® glossary in .html format, click a term in the left frame. If you are viewing this glossary in .pdf format, scroll to the term.

CA

Certificate authority.

An entity that issues the digital certificates used in public-key cryptography. It attests to the identity of the person or organization to whom it issues the digital certificates.

.cab

A file extension denoting a "cabinet" file, which is used to store one or more files in a compressed format.

In Desktop Management, the .cab file format is used for downloads of the Novell Application LauncherTM (NAL) plug-in.

In Handheld Management, the .cab file format is used for downloads to Windows CE devices.

cache

NAL cache.

In Desktop Management, a hidden directory (nalcache) that Novell Application Launcher creates on the root of the Windows drive. The cache directory contains subdirectories for each application associated with the workstation's user (for example, c:\nalcache\novell_tree\.app1.apps.novell and c:\nalcache\novell_tree\.app2.apps.novell). These subdirectories contain the information used by Novell Application Launcher to install, launch, verify, and uninstall applications while the user is disconnected from Novell eDirectoryTM.

See also disconnected mode; install cache; launch cache.

Capture Packets

In Server Management, software that enables the system administrator to collect packets in order to analyze traffic in a particular LAN segment, using the Novell LANalyzer Agent or the standard RMON Agent.

certificate

1. In public-key cryptography, a file issued by a certificate authority. The file is used to establish the identity of the certificate holder.

2. In Server Management, an inter-server communications security file issued by an internal certificate signer. Valid only within the context of the ZENworks family of products.

See also certificate signer; self-signed certificate.

Certificate Authority

CA.

An entity that issues the digital certificates used in public-key cryptography. It attests to the identity of the person or organization to whom it issues the digital certificates.

certificate signer

CS.

In Server Management, the trusted certificate source responsible for digitally signing certificates. In ZENworks, this can be local source, in which case the certificate is valid only within the context of the ZENworks family of products.

certificate signing request

CSR1. An electronic document that contains distinguishing information about a Web server or service and its associated organization. A CSR must be submitted to a certificate authority (CA) in order to receive a certificate for a service.

2. In Server Management, when a CA internal to the product (such as a Distributor) receives a CSR and digitally signs a certificate, that certificate is valid only within the context of the ZENworks family of products.

Channel

In Server Management, an eDirectoryTM object (TED Channel) that is used to connect Distributions with Subscribers, External Subscribers, and Subscriber Groups. Multiple Distributors can list Distributions in a given Channel. Channels must be scheduled using the Send schedule. All Distributions listed in a Channel are sent to any ZENworks entity subscribed to the Channel.

See also Distribution; External Subscriber; Send schedule; Subscriber; Subscriber Group.

checkpoint restart

In Desktop Management, a distribution download mechanism used by Novell Application Launcher while the user is connected to eDirectory through a remote connection. If an application download is postponed or interrupted, the download is resumed at the point where it left off, not at the beginning.

See also remote mode.

CIFS

Common Internet File System.

A protocol that lets programs make requests for files and services on remote computers on the Internet. CIFS uses the client/server programming model. A client program makes a request of a server program (usually in another computer) for access to a file or to pass a message to a program that runs in the server computer. The server takes the requested action and returns a response. CIFS is a public or open variation of the Server Message Block Protocol developed and used by Microsoft.

See also SMB.

CIM

Common Information Model.

An approach to system and network management defined by the Distributed Management Task Force that describes the components of a managed computing and networking environment using an object-oriented modeling approach. In Server Management and Desktop Management, it is used to define the Inventory database schema.

See also CIM schema; Inventory database .

CIM schema

1. A collection of class definitions used to represent managed objects that occur in every management environment.

2. In Desktop Management and Server Management, an approach to system and network management that is used to apply object-oriented structuring and conceptualization techniques to the Inventory database. The Inventory database schema in ZENworks is based on the CIM schema.

See also CIM.

clear text password

A password that has not been encrypted.

client

1. A networked computer that exchanges data with a server.

2. Software that is used on a client computer to exchange data with software running on a server.

See also imaging client; Novell Client; thin client; ZENworks Handheld Management BlackBerry client; ZENworks Handheld Management handheld client; ZENworks Handheld Management IP client; ZENworks Handheld Management sync client.

Client32

Novell ClientTM.

Novell software that provides basic connectivity and access to NetWare network resources for workstations. Additionally, it provides advanced networking services such as rapid data transfer, file and print management, and access to eDirectory.

See also client; imaging client; thin client.

clientless architecture

In Desktop Management, the lack of dependence on the Novell Client for workstations to authenticate to eDirectory.

See also firewall; ZENworks Desktop Management Agent.

cluster

In Desktop Management and Server Management, a grouping of from two to 32 NetWare servers configured using Novell Cluster ServicesTM so that data storage locations and applications can transfer from one server to another without interrupting their availability to users.

See also failback; failover; node; resource.

cluster-enabled shared volume

In Server Management, a shared volume for which a Volume Resource object has been created in eDirectory.

See also cluster; shared volume; volume.

cluster-safe

In Desktop Management, being able to install the Desktop Management services in a Novell Cluster Services environment, but if the cluster volume goes down, an interruption in services will occur while the cluster fails over.

Common Information Model

CIM.

An approach to system and network management defined by the Distributed Management Task Force that describes the components of a managed computing and networking environment using an object-oriented modeling approach. In Server Management and Desktop Management, it is used to define the Inventory database schema.

See also CIM schema; Inventory database .

Common Internet File System

CIFS.

A protocol that lets programs make requests for files and services on remote computers on the Internet. CIFS uses the client/server programming model. A client program makes a request of a server program (usually in another computer) for access to a file or to pass a message to a program that runs in the server computer. The server takes the requested action and returns a response. CIFS is a public or open variation of the Server Message Block Protocol developed and used by Microsoft.

See also SMB.

community string

In Server Management, an arbitrary ASCII string of up to 64 characters used to authenticate SNMP commands received at the NetWare Management Agent server.

See also Management Agent.

Computer Extensible policy

In Desktop Management, a policy that sets user-defined policies (from .adm files) for workstation objects. This policy is contained in the Workstation package.

See also policy; policy package ; Workstation Package.

configuration policy

In Server Management, a type of policy that affects the configuration of a single server or many servers. For example, a policy can be scheduled to run at regular intervals to ensure that the server's configuration continues to be set correctly.

See also behavioral policy; cumulative policy; plural policy; policy; policy package .

Configuration policy

In Handheld Management, one of three policies (BlackBerry Configuration policy, Palm Configuration policy, and WinCE Configuration policy) used to set general preferences for associated handheld devices.

See also policy; policy package .

configuration tree

In Desktop Management, the portion of the eDirectory tree searched by Novell Application Launcher to determine the configuration settings to use when running on behalf of a logged-in user or a logged-in workstation.

console

In Desktop Management, Handheld Management, and Server Management, an interface where the administrator views and controls software and hardware settings and activity.

See also ConsoleOne; management console, RConsoleJ; Remote Web Console; SNMP Manager.

ConsoleOne

In Desktop Management, Handheld Management, and Server Management, a Java-based administration tool used to manage Novell and third-party products on a variety of platforms. It provides a single point of administration for network resources, including Novell eDirectory objects, schema, partitions, replicas, and NetWare servers.

If you use Desktop Management, Novell ConsoleOne® run from Windows is the only viewer or console that can be used for administration.

See also console; iManager; management console; RConsoleJ; Remote Web Console; SNMP Manager.

Consolidator

In Server Management, NetExplorerTM discovery software that resides on the site server and helps manage information in the Server Management database.

See also discovery; NetExplorer.

Container Package

In Desktop Management, Handheld Management, and Server Management, short for Container Package object. For Desktop Management and Server Management, it contains the Search policy by default. For Handheld Management, it contains the Search and Application Search policies by default.

See also Application Search policy; policy; policy package ; Search policy.

cookie

Data created by a Web server that is stored on a user's computer either temporarily for that session only or permanently on the hard disk (persistent cookie). It provides a way for the Web site to identify users and keep track of their preferences.

Copy Files policy

In Server Management, a policy that enables copying or moving of files on a server from one location to another by using policy configurations. The policy is contained in the Distributed Server Package.

See also policy; policy package ; Distributed Server Package.

.cpk

In Server Management, a file extension indicating a compiled Server Software Package, which means that the files and applications and their configurations have been compressed into one file for distribution.

See also Distribution; Server Software Package; .spk.

CS

Certificate signer.

The trusted certificate source responsible for digitally signing certificates. In ZENworks, this can be local source, in which case the certificate is valid only within the context of the ZENworks family of products.

CSR

Certificate Signing Request.An electronic document that contains distinguishing information about a Web server or service and its associated organization. A CSR must be submitted to a certificate authority (CA) in order to receive a certificate for a service.

When an external certificate authority is used, the CSR must be submitted to the CA to be digitally signed. When an internal certificate authority is used, the certificate is valid only within the context of the ZENworks family of products.

.csv

In Desktop Management and Server Management, a file extension indicating that the file is in a comma-separated value format.

cumulative policy

In Desktop Management, Handheld Management, and Server Management, policies that allow multiples of the same policy to be in effect when multiple policy packages are distributed to a desktops, handheld devices, or servers. For example, the changes from a Text File Changes policy distributed to a server could be accumulated with a differently configured Text File Changes policy changes also distributed to the server. All of the text file changes from both policies would be effective for the server.

See also behavioral policy; plural policy; policy; policy package .

Custom Scan Editor

In Desktop Management and Server Management, a tool that allows administrators to add new applications for scanning by the inventory scanner.

Custom Map

In Server Management, enables you to create and delete custom atlases and custom containers and group nodes into containers. You can also create a hierarchy of objects in atlas.

See also atlas.