If you are viewing this Novell® ZENworks® glossary in .html format, click a term in the left frame. If you are viewing this glossary in .pdf format, scroll to the term.
CA
Certificate authority.
An entity that issues the digital certificates used in public-key cryptography. It attests to the identity of the person or organization to whom it issues the digital certificates.
.cab
A file extension denoting a "cabinet" file, which is used to store one or more files in a compressed format.
In Desktop Management, the .cab file format is used for downloads of the Novell Application LauncherTM (NAL) plug-in.
In Handheld Management, the .cab file format is used for downloads to Windows CE devices.
cache
NAL cache.
In Desktop Management, a hidden directory (nalcache) that Novell Application Launcher creates on the root of the Windows drive. The cache directory contains subdirectories for each application associated with the workstation's user (for example, c:\nalcache\novell_tree\.app1.apps.novell and c:\nalcache\novell_tree\.app2.apps.novell). These subdirectories contain the information used by Novell Application Launcher to install, launch, verify, and uninstall applications while the user is disconnected from Novell eDirectoryTM.
See also disconnected mode; install cache; launch cache.
Capture Packets
In Server Management, software that enables the system administrator to collect packets in order to analyze traffic in a particular LAN segment, using the Novell LANalyzer Agent or the standard RMON Agent.
certificate
1. In public-key cryptography, a file issued by a certificate authority. The file is used to establish the identity of the certificate holder.
2. In Server Management, an inter-server communications security file issued by an internal certificate signer. Valid only within the context of the ZENworks family of products.
See also certificate signer; self-signed certificate.
Certificate Authority
CA.
An entity that issues the digital certificates used in public-key cryptography. It attests to the identity of the person or organization to whom it issues the digital certificates.
certificate signer
CS.
In Server Management, the trusted certificate source responsible for digitally signing certificates. In ZENworks, this can be local source, in which case the certificate is valid only within the context of the ZENworks family of products.
certificate signing request
CSR1. An electronic document that contains distinguishing information about a Web server or service and its associated organization. A CSR must be submitted to a certificate authority (CA) in order to receive a certificate for a service.
2. In Server Management, when a CA internal to the product (such as a Distributor) receives a CSR and digitally signs a certificate, that certificate is valid only within the context of the ZENworks family of products.
Channel
In Server Management, an eDirectoryTM object (TED Channel) that is used to connect Distributions with Subscribers, External Subscribers, and Subscriber Groups. Multiple Distributors can list Distributions in a given Channel. Channels must be scheduled using the Send schedule. All Distributions listed in a Channel are sent to any ZENworks entity subscribed to the Channel.
See also Distribution; External Subscriber; Send schedule; Subscriber; Subscriber Group.
checkpoint restart
In Desktop Management, a distribution download mechanism used by Novell Application Launcher while the user is connected to eDirectory through a remote connection. If an application download is postponed or interrupted, the download is resumed at the point where it left off, not at the beginning.
See also remote mode.
CIFS
Common Internet File System.
A protocol that lets programs make requests for files and services on remote computers on the Internet. CIFS uses the client/server programming model. A client program makes a request of a server program (usually in another computer) for access to a file or to pass a message to a program that runs in the server computer. The server takes the requested action and returns a response. CIFS is a public or open variation of the Server Message Block Protocol developed and used by Microsoft.
See also SMB.
CIM
Common Information Model.
An approach to system and network management defined by the Distributed Management Task Force that describes the components of a managed computing and networking environment using an object-oriented modeling approach. In Server Management and Desktop Management, it is used to define the Inventory database schema.
See also CIM schema; Inventory database .
CIM schema
1. A collection of class definitions used to represent managed objects that occur in every management environment.
2. In Desktop Management and Server Management, an approach to system and network management that is used to apply object-oriented structuring and conceptualization techniques to the Inventory database. The Inventory database schema in ZENworks is based on the CIM schema.
See also CIM.
clear text password
A password that has not been encrypted.
client
1. A networked computer that exchanges data with a server.
2. Software that is used on a client computer to exchange data with software running on a server.
See also imaging client; Novell Client; thin client; ZENworks Handheld Management BlackBerry client; ZENworks Handheld Management handheld client; ZENworks Handheld Management IP client; ZENworks Handheld Management sync client.
Client32
Novell ClientTM.
Novell software that provides basic connectivity and access to NetWare network resources for workstations. Additionally, it provides advanced networking services such as rapid data transfer, file and print management, and access to eDirectory.
See also client; imaging client; thin client.
clientless architecture
In Desktop Management, the lack of dependence on the Novell Client for workstations to authenticate to eDirectory.
See also firewall; ZENworks Desktop Management Agent.
cluster
In Desktop Management and Server Management, a grouping of from two to 32 NetWare servers configured using Novell Cluster ServicesTM so that data storage locations and applications can transfer from one server to another without interrupting their availability to users.
See also failback; failover; node; resource.
cluster-enabled shared volume
In Server Management, a shared volume for which a Volume Resource object has been created in eDirectory.
See also cluster; shared volume; volume.
cluster-safe
In Desktop Management, being able to install the Desktop Management services in a Novell Cluster Services environment, but if the cluster volume goes down, an interruption in services will occur while the cluster fails over.
Common Information Model
CIM.
An approach to system and network management defined by the Distributed Management Task Force that describes the components of a managed computing and networking environment using an object-oriented modeling approach. In Server Management and Desktop Management, it is used to define the Inventory database schema.
See also CIM schema; Inventory database .
Common Internet File System
CIFS.
A protocol that lets programs make requests for files and services on remote computers on the Internet. CIFS uses the client/server programming model. A client program makes a request of a server program (usually in another computer) for access to a file or to pass a message to a program that runs in the server computer. The server takes the requested action and returns a response. CIFS is a public or open variation of the Server Message Block Protocol developed and used by Microsoft.
See also SMB.
community string
In Server Management, an arbitrary ASCII string of up to 64 characters used to authenticate SNMP commands received at the NetWare Management Agent server.
See also Management Agent.
Computer Extensible policy
In Desktop Management, a policy that sets user-defined policies (from .adm files) for workstation objects. This policy is contained in the Workstation package.
See also policy; policy package ; Workstation Package.
configuration policy
In Server Management, a type of policy that affects the configuration of a single server or many servers. For example, a policy can be scheduled to run at regular intervals to ensure that the server's configuration continues to be set correctly.
See also behavioral policy; cumulative policy; plural policy; policy; policy package .
Configuration policy
In Handheld Management, one of three policies (BlackBerry Configuration policy, Palm Configuration policy, and WinCE Configuration policy) used to set general preferences for associated handheld devices.
See also policy; policy package .
configuration tree
In Desktop Management, the portion of the eDirectory tree searched by Novell Application Launcher to determine the configuration settings to use when running on behalf of a logged-in user or a logged-in workstation.
console
In Desktop Management, Handheld Management, and Server Management, an interface where the administrator views and controls software and hardware settings and activity.
See also ConsoleOne; management console, RConsoleJ; Remote Web Console; SNMP Manager.
ConsoleOne
In Desktop Management, Handheld Management, and Server Management, a Java-based administration tool used to manage Novell and third-party products on a variety of platforms. It provides a single point of administration for network resources, including Novell eDirectory objects, schema, partitions, replicas, and NetWare servers.
If you use Desktop Management, Novell ConsoleOne® run from Windows is the only viewer or console that can be used for administration.
See also console; iManager; management console; RConsoleJ; Remote Web Console; SNMP Manager.
Consolidator
In Server Management, NetExplorerTM discovery software that resides on the site server and helps manage information in the Server Management database.
See also discovery; NetExplorer.
Container Package
In Desktop Management, Handheld Management, and Server Management, short for Container Package object. For Desktop Management and Server Management, it contains the Search policy by default. For Handheld Management, it contains the Search and Application Search policies by default.
See also Application Search policy; policy; policy package ; Search policy.
cookie
Data created by a Web server that is stored on a user's computer either temporarily for that session only or permanently on the hard disk (persistent cookie). It provides a way for the Web site to identify users and keep track of their preferences.
Copy Files policy
In Server Management, a policy that enables copying or moving of files on a server from one location to another by using policy configurations. The policy is contained in the Distributed Server Package.
See also policy; policy package ; Distributed Server Package.
.cpk
In Server Management, a file extension indicating a compiled Server Software Package, which means that the files and applications and their configurations have been compressed into one file for distribution.
See also Distribution; Server Software Package; .spk.
CS
Certificate signer.
The trusted certificate source responsible for digitally signing certificates. In ZENworks, this can be local source, in which case the certificate is valid only within the context of the ZENworks family of products.
CSR
Certificate Signing Request.An electronic document that contains distinguishing information about a Web server or service and its associated organization. A CSR must be submitted to a certificate authority (CA) in order to receive a certificate for a service.
When an external certificate authority is used, the CSR must be submitted to the CA to be digitally signed. When an internal certificate authority is used, the certificate is valid only within the context of the ZENworks family of products.
.csv
In Desktop Management and Server Management, a file extension indicating that the file is in a comma-separated value format.
cumulative policy
In Desktop Management, Handheld Management, and Server Management, policies that allow multiples of the same policy to be in effect when multiple policy packages are distributed to a desktops, handheld devices, or servers. For example, the changes from a Text File Changes policy distributed to a server could be accumulated with a differently configured Text File Changes policy changes also distributed to the server. All of the text file changes from both policies would be effective for the server.
See also behavioral policy; plural policy; policy; policy package .
Custom Scan Editor
In Desktop Management and Server Management, a tool that allows administrators to add new applications for scanning by the inventory scanner.
Custom Map
In Server Management, enables you to create and delete custom atlases and custom containers and group nodes into containers. You can also create a hierarchy of objects in atlas.
See also atlas.