Tuesday, December 29, 2009

Resources for MQ(Link)

WebSphere MQ Documentation Index

The following are the topics that we get from the link

WebSphere MQ Introduction Documentation
WebSphere MQ Cluster Documentation
WebSphere MQ .NET Documentation
WebSphere MQ JMS Documentation
WebSphere MQ Pub/Sub Documentation
WebSphere MQ Security Documentation
WebSphere MQ SSL Documentation
Troubleshooting Documentation
General Documentation

http://www.capitalware.biz/library_wmq.html

Thursday, December 3, 2009

What are metrics that are collected by Wily

The following is the data that is collected by Wily

1.) CORBA method timers
2.) Remote Method Invocation (RMI) method timers
3.) Thread Counters
4.) Network bandwidth
5.) JDBC update and query timers
6.) Servlet timers
7.) Java Server Pages(JSP) timers
8.) System logs
9.) File system input and output bandwith meters
10.)Available and used memory
11.) EJB (Enterprise JavaBean) timers

Monday, November 23, 2009

Tools for trouble shooting WAS

Contains informative links for trouble shooting issues with WAS.

Some helpful tools for trouble shooting WAS issues:

ThreadAnalyzer: IBM Thread and Monitor Dump (javacore) Analyzer for Java Technology
HeapAnalyzer: views heapdumps(out of memory or memory leak conditions)
VerboseGC Viewer: IBM Pattern Modeling and Analysis Tool for Java Garbage Collector


From this link you can download the latest versions of each tool: http://www.alphaworks.ibm.com/tech/jca


The WAS InfoCenter for WAS 5.1 ND is here:
http://publib.boulder.ibm.com/infocenter/wasinfo/v5r1/index.jsp


In case ThreadAnalyzer is no longer available, IBM has a new set of tools called IBM Support Assistant (http://www.ibm.com/software/support/isa), into which you can add ThreadAnalyzer.
Info on the new ThreadAnalyzer is available here -> http://www.ibm.com/support/docview.wss?uid=swg21259758

Also, the other tools mentioned below are available as follows (use the Tabs on top to see the OverView):

HeapAnalyzer: -> http://www.alphaworks.ibm.com/tech/heapanalyzer/download

VerboseGC Viewer: IBM Pattern Modeling and Analysis Tool for Java Garbage Collector: http://www.alphaworks.ibm.com/tech/pmat/download

Install JBoss Application Server

Install JBoss Application Server

1. Copy jboss-4.2.2.GA.zip from google.com to local desktop
2. Unzip zip into c:\ (when you unzip files will be copied under c:\jboss-4.2.2.GA)
3. Open command prompt and execute:
C:\jboss-4.2.2.GA\bin\run.bat --configuration=default -b localhost

4. Verify you are able to view webpage for http://127.0.0.1:8080

Monday, November 16, 2009

How to apply fix pack for websphere 6.1(demo_video)

How to apply fix pack for websphere 6.1(demo_video)

http://download.boulder.ibm.com/ibmdl/pub/software/dw/lotus/IEA/Viewlets/Install_WAS_6.1_FP/install_was_61_fp_viewlet_swf.html

Tuesday, November 10, 2009

Run Websphere on other user than root




For his installation Websphere need to use root account. The installation's script don't propose the creation or utilisation of an other user account. This is disturbing because all the objets created by Webphere belong to root.
But it's easy to correct this problem.

Modifications to do
-------------------
I take in account that you have created the user and the group that you wanted. After that you just have to connect yourself to the Websphere's administration console to change some parametres in this page : Execution process parameters.
You can go to this page thanks to the menu Servers > Applications server > name_of_your_server and (in the options of this page) Server Infrastructure > Gestion des processus and Java > Processus Execution.




So you can change the user and group wich is going to run the principal process of Websphere ( java ). With that, all objects created by websphere (images, files, ...) are accessible even to other user than root.

Warning : after this you must change the owner of all files and directorys read by Websphere ( $WAS_HOME/ and your WebApp and all other required files)

ref: http://www.berthou.com/us/category/websphere/

Tuesday, November 3, 2009

.nifregistry and vpd.properties files

.nifregistry and vpd.properties files

The installer program for WebSphere Process Server uses the InstallShield MultiPlatform (ISMP) program to install code. The .nifregistry and vpd.properties files list program components that are currently installed. The file helps ISMP and the installer programs of WebSphere Process Server recognize previous installations of WebSphere Process Server and control options for new installations.
Location of the .nifregistry file
The location of the .nifregistry file varies per operating platform:

* Icon indicating AIX platforms On AIX® platforms: The root directory /usr/.ibm/.nif/.nifregistry or the non-root directory /.ibm/.nif/.nifregistry
* Icon indicating HP-UX platforms On HP-UX platforms: The root directory /opt/.ibm/.nif/.nifregistry or the non-root directory /.ibm/.nif/.nifregistry
* Icon indicating i5/OS platform only On i5/OS® platforms: The root directory /QIBM/WAS/.ibm/.nif/.nifregistry
* Icon indicating Linux platforms On Linux® platforms: The root directory /opt/.ibm/.nif/.nifregistry
* Icon indicating Solaris platforms On Solaris platforms: The root directory /opt/.ibm/.nif/.nifregistry or the non-root directory /.ibm/.nif/.nifregistry
* Icon indicating Windows platforms On Windows® platforms: The root directory C:\Windows\.nifregistry

For example:

NON-ROOT user: fvttest
NON-ROOT-HOME: /home/fvttest .nifregistry dir: /home/fvttest/.ibm/.nif/.nifregistry

Examples of the .nifregistry file

For a particular product the .nifregistry file contains one entry (line) each for every PAK that gets installed and one entry (line) for the product offering (e.g. WebSphere® Business Integration, Enterprise Service Bus, and so on).
The following line shows an example of a PAK entry in the .nifregistry file:

paklocationuri="zip:///C:/IBM/WebSphere/ProcServer/properties/version/nif/backup/
wbi.primary.pak" productid="WBI"/
productid=""/>

The following line shows an example of a product offering entry in the .nifregistry file:

lastvisited="2007-10-29 00:07:43-0500" productid="WBI" version="6.1.0.0"/>
productid="" version="6.1.0.0"/>

Cleaning up the .nifregistry file after a failed uninstallation
For these steps to clean the .nifregistry file after a failed uninstallation:

1. Backup the .nifregistry file.
2. Open the .nifregistry file in a text editor (ensure that line wrapping is turned off).
3. Search and delete all lines that have the and in them where is the install location where you have a failed uninstallation and is the product offering ID of the product that you are trying to uninstall.
4. Save the .nifregistry file and close the text editor.

Icon indicating HP-UX platforms Icon indicating Solaris platforms Operating system exceptions for using the vpd.properties file

* ISMP uses the vpd.properties file to track WebSphere products that it installs on all platforms but Solaris and HP-UX.
* ISMP uses native operating system registration on these platforms when installing as root, and does not create a vpd.properties file.

When installing as a non-root installer, the installer programs create a vpd.properties file on all platforms, including Solaris and HP-UX.

Situations that require you to edit the vpd.properties file

Certain situations require you to edit the vpd.properties file before reinstalling WebSphere Process Server. The uninstaller programs for WebSphere Process Server edit the vpd.properties while uninstalling a product, to remove entries for the product and any of its features that might have entries in the file.
Some situations that occur require you to manually remove product entries from the vpd.properties file before you can reinstall a product. These situations include:

* Bypassing the uninstaller program to uninstall a product manually
* Uninstalling a product manually when the uninstaller program is not present or is not working

If the vpd.properties file has entries for a product that you uninstalled, you must edit the file and remove the entries. If you do not edit the vpd.properties file to remove entries for a product or features of a product, you cannot reinstall the product into the same directory structure. If product entries in the vpd.properties file are present, the installer program reads the vpd.properties file, determines that the product is already installed, and displays the panel that prompts you to install additional features into the existing product or to install the binaries a second time. Unfortunately, the existing binaries might not be valid at that point. The installer program does not verify the products that it finds listed in the vpd.properties file.
Location of the vpd.properties file
The location of the vpd.properties file varies per operating platform:

* Icon indicating AIX platforms On AIX platforms: The root directory or the usr/lib/objrepos directory
* Icon indicating i5/OS platform only On i5/OS platforms: /InstallShield/VitalProductData/vpd.properties
* Icon indicating Linux platforms On Linux platforms: The root directory
* Icon indicating Windows platforms On Windows platforms: Installation directory of the operating system, such as the C:\WINNT directory or the C:\windows directory

Example of the vpd.properties file

The following example shows the entry for the vpd.properties file for Version 6.1.0.0 of the WebSphere product on a Windows platform. The example shows entire lines but wraps each line for formatting purposes.

WSEAA61|6|1|0|0|6.1.0.0|1=IBM WebSphere Process Server|IBM WebSphere Process Server|
IBM WebSphere Process Server V6.1.0.0|IBM|http://www.ibm.com|6.1.0.0|C:\Program Files\
IBM\WebSphere\ESB1|0|0|1|WSEAA61|6|1|0|0|6.1.0.0|1|0|false|"_uninst" "uninstall.jar" "
uninstall.dat" ""|true|3|WSEAA61|6|1|0|0|6.1.0.0|1

Identifying entries in the vpd.properties file

Use the following table to help identify product entries.
Table 1. Identifer in the vpd.properties file for WebSphere productsIdentifier Product
WSE...61 All version 6.1 products use this identifier to identify the core product files:

* WebSphere Process Server, Version 6.1
* WebSphere Enterprise Service Bus, Version 6.1


href:http://publib.boulder.ibm.com/infocenter/dmndhelp/v6r1mx/index.jsp?topic=/com.ibm.websphere.wps.610.doc/doc/rins_vpd.html

configuration archive file(CAR File)

A configuration archive (CAR) file captures the configuration of a standalone application server profile for later restoration on another application server node. The CAR can help clone the original profile to another machine or system.

A configuration archive file is an exported configuration file from an existing standalone application server profile and contains all application server configuration data including security settings, resources, defined ports, and so on. The advantage of using a CAR is that all of this configuration, including any enterprise archive (EAR) files, can be reliably restored to many application server nodes. Importing a configuration archive also offers some performance advantages over creating a standalone application server in the normal way.


The WebSphere Configuration Archive is new features in WebSphere Application Server v6.0.
This feature allows a set of complete or subset of WebSphere configuration archive. WebSphere
Application Server V6 provides a mechanism that allows you to export certain profiles, or server
objects from a profile, to an archive. The archive can be distributed and imported to other
installations. An exported archive is a zip file of the config directory with host-specific information
removed. The recommended extension of the zip file is .car. The exported archive can be the
complete configuration or a subset. Importing the archive creates the configurations defined in the
archive. The target configuration of an archive export / import can be a specific server or an entire
profile.
To use an archive you would:
1. Export a WebSphere configuration. This creates a zip file with the configuration.
2. Unzip the files for browsing or update for use on other systems. For example, you might need
to update resource references.
3. Send the configuration to the new system. An import can work with the zip file or with the
expanded format.
4. Import the archive. The import process requires that you identify the object in the configuration
you want to import and the target object in the existing configuration. The target can be the
same object type as the archive or its parent:
– If you import a server archive to a server configuration the configurations are merged.
– If you import a server archive to a node, the server is added to the node.
A tutorial on creating and using archives can be found in the Information Center. See
ftp://ftp.software.ibm.com/software/eod/was/6.0/SystemManagement/WASv6_SM_Configuration_
Archives/playershell.swf
Prof ile archives
The following command can be used to create an archive of a profile:
$AdminTask expor tWasprof ile {-archive }
You can only create an archive of an unfederated profile (standalone application server).
$AdminTask impor tWasprof ile {-archive }
exportWasprofile:
Use the exportWasprofile command to export the entire cell configuration to a configuration
archive. (myArchive.car)
• Using Jacl:
22 5/15/2006
$AdminTask exportWasprofile {-archive c:\myCell.ear}
• Using Jython string:
AdminTask.exportWasprofile('[-archive c:\myCell.ear]')
Interactive mode example usage:
• Using Jacl:
$AdminTask exportWasprofile {-interactive}
• Using Jython string:
AdminTask.exportWasprofile ('[-interactive]')
importWasprofile:
Use the importWasprofile command to import a cell configuration in the configuration archive to
the system. Only a base single server configuration is supported for this command.
• Using Jacl:
$AdminTask importWasprofile {-archive c:\myCell.ear}
• Using Jython string:
AdminTask.importWasprofile('[-archive c:\myCell.ear]')
Interactive mode example usage:
• Using Jacl:
$AdminTask importWasprofile {-interactive}
• Using Jython string:
AdminTask.importWasprofile ('[-interactive]')

ref: http://publib.boulder.ibm.com/infocenter/wasinfo/v6r0/index.jsp?topic=/com.ibm.websphere.express.doc/info/exp/ae/cins_if_config_archive.html

WebSphere Password Decoder

WebSphere Password Decoder

This utility can decode WebSphere encoded passwords.
If you have lost your password(s), use this utility to recover them.

url: http://www.sysman.nl/wasdecoder/

Monday, October 26, 2009

Plug point for custom password encryption in websphere

Plug point for custom password encryption

Problem(Abstract) A plug point for custom password encryption must be created to encrypt and decrypt all passwords in WebSphere Application Server that are currently encoded or decoded using Base64-encoding. The implementation class of this plug point has the responsibility for managing keys, determining the encryption algorithm to use, and for protecting the master secret.

Cause A custom provider of this plug point must implement an interface designed to encrypt and decrypt passwords. The interface is called by the WebSphere Application Server run time whenever the custom plug point is enabled. The custom algorithm becomes one of the supported algorithms when the plug point is enabled. Resolving the problem How to create, enable or disable a plug point for custom password encryption:
Plug point for custom password encryption
A plug point for custom password encryption can be created to encrypt and decrypt all passwords in WebSphere Application Server that are currently encoded or decoded using Base64-encoding. The implementation class of this plug point has the responsibility for managing keys, determining the encryption algorithm to use, and for protecting the master secret. The WebSphere Application Server run time stores the encrypted passwords in their existing locations preceded with {custom:alias} tags instead of {xor} tags. The “custom” part of the tag indicates that it is a custom algorithm. The “alias” part of the tag is specified by the custom implementation, which helps to indicate how the password was encrypted. The implementation can include the key alias, encryption algorithm, encryption mode, or encryption padding.
A custom provider of this plug point must implement an interface designed to encrypt and decrypt passwords. The interface is called by the WebSphere Application Server run time whenever the custom plug point is enabled. The custom algorithm becomes one of the supported algorithms when the plug point is enabled. Other supported algorithms include {xor} (standard base64 encoding) and {os400} (used on the iSeries platform).
The interface example shown below is com.ibm.wsspi.security.crypto.CustomPasswordEncryption:
package com.ibm.wsspi.security.crypto;
public interface CustomPasswordEncryption
{

/**
* The encrypt operation takes a UTF-8 encoded String in the form of a byte[].
* The byte[] is generated from String.getBytes("UTF-8").
* An encrypted byte[] is returned from the implementation in the EncryptedInfo
* object. Additionally, a logically key alias is returned in EncryptedInfo so
* which is passed back into the decrypt method to determine which key was used
* to encrypt this password. The WebSphere Application Server runtime has no
* knowledge of the algorithm or key used to encrypt the data.
*
* @param byte[]
* @return com.ibm.wsspi.security.crypto.EncryptedInfo
* @throws com.ibm.wsspi.security.crypto.PasswordEncryptException
**/
public EncryptedInfo encrypt (byte[] decrypted_bytes) throws PasswordEncryptException;

/**
* The decrypt operation takes the EncryptedInfo object containing a byte[]
* and the logical key alias and converts it to the decrypted byte[]. The
* WebSphere Application Server runtime will convert the byte[] to a String
* using new String (byte[], "UTF-8");
*
* @param com.ibm.wsspi.security.crypto.EncryptedInfo
* @return byte[]
* @throws com.ibm.wsspi.security.crypto.PasswordDecryptException
**/
public byte[] decrypt (EncryptedInfo info) throws PasswordDecryptException;

/**
* This is reserved for future use and is currently not called by the
* WebSphere Application Server runtime.
*
* @param java.util.HashMap
**/
public void initialize (java.util.HashMap initialization_data);
}
The com.ibm.wsspi.security.crypto.EncryptedInfo class contains the encrypted bytes along with the user-defined alias associated with the encrypted bytes. This information is passed back into the encryption method to help to determine how the password was originally encrypted.
package com.ibm.wsspi.security.crypto;
public class EncryptedInfo
{
private byte[] bytes;
private String alias;

/**
* This constructor takes the encrypted bytes and a keyAlias as parameters.
* This is used to pass to or from the WebSphere Application Server runtime to
* enable the runtime to associate the bytes with a specific key used to encrypt
* the bytes.
*/

public EncryptedInfo (byte[] encryptedBytes, String keyAlias)
{
bytes = encryptedBytes;
alias = keyAlias;
}

/**
* This returns the encrypted bytes.
*
* @return byte[]
*/
public byte[] getEncryptedBytes()
{
return bytes;
}

/**
* This returns the key alias. The key alias is a logical string associated
* with the encrypted password in the model. The format is
* {custom:keyAlias}encrypted_password. Typically, just the key alias is placed
* here, but algorithm information can also be returned.
*
* @return String
*/
public String getKeyAlias()
{
return alias;
}

}
The encryption method is called for password processing whenever the custom class is configured and custom encryption is enabled. The decryption method is called whenever the custom class is configured and the password contains the {custom:alias} tag . The custom:alias tag is stripped prior to decryption.
To enable custom password encryption, two properties must first be configured:
property com.ibm.wsspi.security.crypto.customPasswordEncryptionClass
Defines the custom class that implements the password encryption interface (com.ibm.wsspi.security.crypto.CustomPasswordEncryption).
com.ibm.wsspi.security.crypto.customPasswordEncryptionEnabled
Defines when the custom class is used for default password processing. When passwordEncryptionEnabled is not specified or set to false, and the passwordEncryptionClass is specified, the decryption method is called whenever a {custom:alias} tag still exists in the configuration repository.
If the custom implementation class defaults to com.ibm.wsspi.security.crypto.CustomPasswordEncryptionImpl, and this class is present in the classpath, then encryption is enabled by default. This simplifies the enablement process for all nodes. It is not necessary to define any other properties except for those the custom implementation requires. To disable encryption, but still use this class for decryption, specify the class com.ibm.wsspi.security.crypto.customPasswordEncryptionEnabled=false.
To configure custom password encryption, configure both of these properties in security.xml. The custom encryption class (com.acme.myPasswordEncryptionClass) must be placed in a JAR file in the ${WAS_INSTALL_ROOT}/classes directory in all WebSphere Application Server processes. Every configuration document that contains a password (security.xml and any application bindings that contain RunAs passwords), must be saved before all of the passwords become encrypted with the custom encryption class.
For client side property files such as sas.client.props, soap.client.props, use the PropFilePasswordEncoder.bat (Windows) or PropFilePasswordEncoder.sh (UNIX) script to enable custom processing. This script must have the two properties configured as system properties on the Java™ command line of the script. The same tools used for encoding and decoding can be used for encryption and decryption when custom password encryption is enabled.
Additional information
Whenever a custom encryption class encryption operation is called, and it throws a runtime exception or a defined PasswordEncryptException, the WebSphere Application Server run time uses the (xor} algorithm to encode the password. This prevents the password from being stored in plain text. Once the problem with the custom class has been resolved, it automatically encrypts the password the next time the configuration document is saved.
When a RunAs role is assigned a user ID and password, it currently is encoded using the WebSphere Application Server encoding function. Therefore, once the custom plug point is configured to encrypt the passwords, it encrypts the passwords for the RunAs bindings as well. If the deployed application is moved to a cell that does not have the same encryption keys, or the custom encryption is not yet enabled, it causes a login failure since the password is not readable.
One of the responsibilities of the custom password encryption implementation is to manage the encryption keys. This class must decrypt any password that it encrypted. Any failure to decrypt a password causes that password to be unusable, and the password must be changed in the configuration. All encryption keys must be made available for decryption until there are no passwords left using those keys. The master secret must be maintained by the custom password encryption class to protect the encryption keys.
You can manage the master secret by using a stash file for the keystore, or by using a password locator that enables the custom encryption class to locate the password so that it can be locked down.


Enabling custom password encryption
Complete the following steps to enable custom password encryption:
1. Add the following system properties for every server and client process. For server processes, update the server.xml for each process. Add these properties as a genericJvmArgument preceded by a -D prefix.

com.ibm.wsspi.security.crypto.customPasswordEncryptionClass=com.
acme.myPasswordEncryptionClass
com.ibm.wsspi.security.crypto.customPasswordEncryptionEnabled=true

Note: If the custom encryption class name is com.ibm.wsspi.security.crypto.CustomPasswordEncryptionImpl, it is automatically enabled when this class is present in the classpath. Do not define the system properties listed above when the custom implementation has this package and class name. To disable encryption for this class, you must specify com.ibm.wsspi.security.crypto.customPasswordEncryptionEnabled=false as a system property.

2. Add the JAR file containing the implementation class to the ${WAS_INSTALL_ROOT}/classes directory so that it can be loaded by the WebSphere Application Server runtime.
3. Restart all server processes.
4. Edit each configuration document that contains a password and save the configuration. All password fields are then run through the WSEncoderDecoder utility, which calls the plug point when it is enabled. Tags {custom:alias} appear in the configuration documents. The passwords, even though they are encrypted, are still Base64-encoded. They appear similar to encoded passwords except for the tags difference.
5. Any passwords that are in client-side property files must be encrypted using the PropsFilePasswordEncoder.bat (Windows) or PropsFilePasswordEncoder.sh (UNIX) utility. This utility requires that the properties listed above are defined as system properties in the script to encrypt new passwords instead of encoding them.
6. To decrypt passwords from client JVMs, the properties listed above must be added as system properties for each client utility.
7. For Network Deployment (ND) environments, the order in which enablement occurs is important. Ensure that all nodes have the custom encryption classes in their classpaths prior to enabling this function. When adding a new node to a cell that contains password encryption, the new node must contain the custom encryption classes prior to using addNode. Consider the following ND enablement scenarios:
a. StandAloneProfile is encrypting passwords with a different key prior to federation to a deployment manager cell. For this scenario, you must uninstall custom password encryption to ensure that the configuration has {xor} tags preceding the passwords prior to running addNode. The same implementation of the plug point must be in the /classes directory prior to running addNode, and the proper configuration properties are set so that the new node can recognize the encrypted password format of the security.xml after federation has completed.
b. StandAloneProfile does not have password encryption configured prior to federation to a deployment manager cell. The same implementation of the plug point must be in the /classes directory prior to running addNode, and the proper configuration properties are set so that the new node can recognize the encrypted password format of the security.xml after federation has completed.
c. If enabling custom password encryption in a cell with multiple nodes present, update the correct configuration properties and have the custom password encryption implementation class located on all nodes. Stop all processes in the cell, and then start the deployment manager. Use the administrative console to edit the security configuration and then save it. Ensure that the passwords are encrypted by looking at security.xml to see if the passwords are preceded by {custom:alias} tags.
d. Run syncNode on each node, and start them up one at a time. If any nodes fail to start, make sure that they have custom password encryption enabled properly in each security.xml and the implementation class is in the /classes directory appropriate for the platform.

Disabling custom password encryption
Complete the following steps to disable custom password encryption:
1. Change the com.ibm.wsspi.security.crypto.customPasswordEncryptionEnabled property to be false in security.xml, but leave the com.ibm.wsspi.security.crypto.customPasswordEncryptionClass property configured. Any passwords in the model which still have the tag {custom:alias} are decrypted by using the customer password encryption class.
2. If an encryption key is lost, any passwords encrypted with that key can not be retrieved. To recover a password, retype the password in the password field in plaintext and save the document. The new password must be written out using encoding with the {xor} tag. This can be performed by using scripting or from the administrative console. com.ibm.wsspi.security.crypto.customPasswordEncryptionClass=com.
acme.myPasswordEncryptionClass
com.ibm.wsspi.security.crypto.customPasswordEncryptionEnabled=false
3. Restart all processes to make the changes effective.
4. Edit each configuration document that contains an encrypted password and save the configuration. All password fields are then run through the WSEncoderDecoder utility, which calls the plug point due to the presence of the {custom:alias} tag. The {xor} tags reappear in the configuration documents after they are saved.
5. Any passwords that are in client-side property files must be decrypted and then encoded using the PropsFilePasswordEncoder.bat (Windows) and PropsFilePasswordEncoder.sh (UNIX) utility. If the encryption class is specified, but custom encryption is disabled, running this utility converts the encryption to encoding and causes the {xor} tags to reappear.

6. Disable custom password encryption from the client Java virtual machines (JVMs) by adding the system properties listed above to all client scripts. This enables the code to decrypt passwords, but it is not used to encrypt them again. The {xor} algorithm becomes the default for encoding. Leave the custom password encryption class defined for a period of time in the event that any encrypted passwords still exist in the configuration.

ref:http://www-01.ibm.com/support/docview.wss?rs=180&uid=swg21210244

Friday, October 23, 2009

Keywords that are used in websphere(interview questions)

* abstract schema
Part of the deployment descriptor for an entity bean that is used to define the bean relationships, persistent fields, or query statements.
* * access bean *
An enterprise bean wrapper that is typically used by client programs, such as JavaServer Pages (JSP) files and servlets. Access beans hide the complexity of using enterprise beans and improve the performance of reading and writing multiple enterprise bean properties.
* * access control *
In computer security, the process of ensuring that only authorized users can access the resources of a computer system in authorized ways.
* access control list (ACL)
In computer security, a list that is associated with an object that identifies all the subjects that can access the object and their specific access rights.
* * access ID *
The unique identification of a user that is used during authorization to determine if access is permitted to the resource.
* * access intent *
Metadata that optimizes the runtime behavior of an entity bean with respect to concurrency control, resource management, and database access strategies.
* * access intent policy *
A grouping of access intents that governs a type of data access pattern for enterprise bean persistence.
* * access point group *
A collection of core groups that defines the set of core groups in the same cell or in different cells that communicates with each other.
* accessibility
An attribute of a software or hardware product that is usable by individuals who have disabilities.
* * ACL *
See access control list.
* activation
In EJB, the process of transferring an enterprise bean from secondary storage to memory. (Sun)
* * adapter *
A mechanism for connecting two unlike parts or machines, or for electrically or physically connecting a device to a computer or to another device.
* * add rule*
A conditional expression that states the conditions necessary for a given action to occur.
* * administrative agent *
A program that provides administrative support without requiring a direct connection to a database.
* * agent *
A function that represents a requester to a server.
* alarm listener
A type of asynchronous bean that is called when a high-speed transient alarm expires.
* * algorithm *
A set of well-defined rules for the solution of a problem in a finite number of steps. For example, a full statement of an arithmetic procedure for evaluating "sin x" to a stated precision.
* * algorithm mapping *
A process by which service providers can define the mapping of Uniform Resource Identifier (URI) algorithms to cryptographic algorithms that are used for Extensible Markup Language (XML) digital signature and XML encryption.
* * Apache *
An open-source Web server. IBM offers a Web server, called the IBM HTTP Server, which is based on Apache.
* * API *
See application programming interface.
* * applet *
A small application program that performs a specific task and is usually portable between operating systems. Often written in Java, applets can be downloaded from the Internet and run in a Web browser.
* application
One or more computer programs or software components that provide functionality in direct support of a specific business process or processes.
* * application assembly *
The process of creating an enterprise archive (EAR) file containing all the files related to an application as well as an Extensible Markup Language (XML) deployment descriptor for the application.
* * applet client *
A client that runs within a browser-based Java runtime environment, and is capable of interacting with enterprise beans directly instead of indirectly through a servlet.
* application client
In J2EE, a first-tier client component that executes in its own Java virtual machine. Application clients have access to some J2EE platform APIs, for example JNDI, JDBC, RMI-IIOP, and JMS. (Sun)
* * application client module *
A Java archive (JAR) file that contains a client that accesses a Java application. The Java application runs inside a client container and can connect to remote or client-side Java 2 Platform, Enterprise Edition (J2EE) resources.
* * application programming interface (API) *
An interface that allows an application program that is written in a high-level language to use specific data or functions of the operating system or another program.
* * Application Response Measurement (ARM) *
An application programming interface that is developed by a group of leading technology vendors that can be used to monitor the availability and performance of business transactions within and across diverse applications and systems.
* * Application Response Measurement (ARM) agent*
The implementation of the ARM standard by an implementation provider.
* * application server *
A server program in a distributed network that provides the startup environment for an application program.
* application server root
The top directory for a WebSphere Application Server node.
* ARM
See Application Response Measurement.
* artifact
A physical piece of information that is used or produced by a software development process. Examples of artifacts include models, source files, scripts, and binary executable files.
* * association *
1. For Extensible Markup Language (XML) documents, the linkage of the document itself to the rules that govern its structure, which can be defined by a document type definition (DTD) or an XML schema. 2. In enterprise beans, a relationship that exists between two container-managed persistence (CMP) entity beans. Two types of associations exist: one-to-one and one-to-many.
* asymmetric algorithm
See public-key algorithm.
* * asymmetric cryptography *
In computer security, pertaining to the use of different keys for encryption and decryption; a synonym for public key cryptography.
* * asynchronous bean *
A Java object or an enterprise bean that a Java 2 Platform, Enterprise Edition (J2EE) application can run asynchronously.
* * asynchronous messaging *
A method of communication between programs in which a program places a message on a message queue, then proceeds with its own processing without waiting for a reply to its message. See also synchronous messaging.
* atomic
Pertaining to transaction changes to the state of resources: either all occur or none occur. The atomic characteristic maintains data integrity by making sure that some updates are not made while others fail.
* * authentication *
In computer security, a process that ensures that the identities of both the sender and the receiver of a network transaction are true.
* authenticity
The validation of client and server identities during a Secure Sockets Layer (SSL) connection by both communicating parties using public key cryptography and asymmetric cryptography.
* * authorization *
The process of granting a user either complete or restricted access to an object, resource, or function.
* * authorization table *
A table that contains the role to user or group mapping information that identifies the permitted access of a client to a particular resource.
* * automatic restart management *
The facilities that detect failures and manage server restarts.
* * AXIS *
An implementation of the Simple Object Access Protocol (SOAP) on which Java Web services can be implemented.
* base edition
A deployed application that has no associated or specific edition information.
* * basic authentication*
An authentication method that uses a user name and a password.
* * bean *
A definition or instance of a JavaBeans component. See also JavaBeans.
* * Bean Scripting Framework *
An architecture for incorporating scripting language functions to Java applications.
* * bean-managed messaging *
A function of asynchronous messaging that gives an enterprise bean complete control over the messaging infrastructure.
* * bean-managed persistence (BMP) *
Pertaining to an entity bean that manages its own persistence. See also container-managed persistence.
* * bean-managed transaction (BMT) *
The capability of the session bean, servlet, or application client component to manage its own transactions directly, instead of through a container.
* * bind *
To establish a connection between software components on a network using an agreed-to protocol. In Web services, the bind operation occurs when the service requestor invokes or initiates an interaction with the service at run time using the binding details in the service description to locate, contact, and invoke the service.
* binding
A temporary association between a client and both an object and a server that exports an interface to the object. A binding is meaningful only to the program that sets it and is represented by a bound handle.
* block decryption
Symmetric algorithms that decrypt a block of data at one time.
* block encryption
Symmetric algorithms that encrypt a block of data at one time.
* BMP
See bean-managed persistence.
* BMT
See bean-managed transaction.
* BOM
See byte order mark.
* bootstrap server
An application server that runs the SIB service.
* * bootstrapping *
The process by which an initial reference of the naming service is obtained. The bootstrap setting and the host name form the initial context for Java Naming and Directory Interface (JNDI) references.
* * bottleneck *
A place in the system where contention for a resource is affecting performance.
* * bridge interface *
A node and a server that run a core group bridge service.
* broker archive
A file that is the unit of deployment to the broker that can contain any number of compiled message flow and message set files and a single deployment descriptor. You need a separate broker archive file for each configuration that you want to deploy.
* brute force collision
A programming style that relies on computing power to try all the possibilities with a known hash until the solution is found.
* * bucket *
One or more fields that accumulate the result of an operation.
* * bulk decryption *
See block decryption.
* * bulk encryption *
See block encryption.
* * bus *
Interconnecting messaging engines that manage bus resources
* * bus member *
The application servers within which the messaging engines run to support the bus.
* business activity
A collection of tasks that are linked so that they have an agreed outcome.
* business activity scope
An attribute of an existing core unit of work that provides the compensation ability in the event of an error in a business activity, when that activity cannot be atomically rolled back.
* * business logic tier *
The set of components that reside between the presentation and database tiers. This logic tier hosts the enterprise bean containers, which run the business logic.
* * business process container *
A process engine that contains process modules.
* byte order mark (BOM)
A character code at the beginning of a data stream that can be used as a signature that defines the byte order and encoding form.
* * CA *
See certificate authority.
* * cache instance resource *
A location where any Java 2 Platform, Enterprise Edition (J2EE) application can store, distribute, and share data.
* * cache replication *
The sharing of cache IDs, cache entries, and cache invalidations with other servers in the same replication domain.
* * callback handler *
A mechanism that uses a Java Authentication and Authorization Service (JAAS) interface to pass a security token to the Web service security runtime for propagation in the Web service security header.
* * capability list *
A list of associated resources and their corresponding privileges per user.
* * CBR *
See content based routing.
* * cell *
1. One or more processes that each host runtime components. Each cell has one or more named core groups. 2. An arbitrary grouping of one or more nodes in a WebSphere Application Server distributed network.
* * cell-scoped binding *
A binding scope where the binding is not specific to, and not associated with any node or server. This type of name binding is created under the persistent root context of a cell.
* * certificate authority (CA) *
An organization that issues certificates. The CA authenticates the certificate owner's identity and the services that the owner is authorized to use, issues new certificates, renews existing certificates, and revokes certificates.
* * certificate revocation list (CRL)*
A list of certificates issued by a certificate authority (CA). The certificates on this list might not be expired, but are no longer trusted by the CA.
* * chain *
The name of a channel framework connection that contains an endpoint definition.
* * channel *
An entry point to the Web services gateway that carries requests and responses between Web services and the gateway.
* * channel framework *
A common model for connection management, thread usage, channel management, and message access within WebSphere Application Server.
* * Channel Information Control System (CICS) *
An IBM licensed program that provides online transaction-processing services and management for business applications.
* * cheat sheet *
An interface that guides users through the wizards and steps required to perform a complex task, and that links to relevant sections of the online help.
* CICS
See Channel Information Control System.
* * cipher *
A cryptographic algorithm used to encrypt data that is unreadable until converted into plain data with a predefined key.
* * cipher suite *
A set of ciphers.
* * class *
In object-oriented design or programming, a model or template that can be used to create objects with a common definition and common properties, operations, and behavior. An object is an instance of a class.
* * class file *
A compiled Java source file.
* * class hierarchy *
The relationships between classes that share a single inheritance. In Java programming, all classes inherit from the Object class.
* * class loader *
Part of the Java virtual machine code that is responsible for finding and loading class files. A class loader affects the packaging of applications and the run-time behavior of packaged applications deployed on application servers.
* * class path *
A list of directories and JAR files that contain resource files or Java classes that a program can load dynamically at run time. See also CLASSPATH.
* * client proxy *
An object on the client side of a network connection that provides a remote procedure call interface to a service on the server side.
* * client type detection *
A process in which a servlet determines the markup language type required by a client and calls the appropriate JavaServer Pages file.
* * client/server *
Pertaining to the model of interaction in distributed data processing in which a program on one computer sends a request to a program on another computer and awaits a response. The requesting program is called a client; the answering program is called a server. See also distributed application.
* * Cloudscape *
An embeddable, all Java, object-relational database management system (ORDBMS).
* * cluster *
A group of application servers that collaborates for the purposes of workload balancing and failover.
* * CMP *
See container-managed persistence.
* * coexistence *
The ability of multiple installations of the WebSphere Application Server to run in the same machine at the same time.
* * collection certificate store *
A collection of intermediate certificates or certificate revocation lists (CRL) that are used by a certificate path to build up a certificate chain for validation.
* * Collector Tool *
A tool that gathers information about a WebSphere Application Server installation and packages this data in a Java archive (JAR) file to assist in problem determination and analysis. This information includes logs, property files, configuration files, operating system data, Java data, and prerequisite software presence and levels.
* Common Criteria
The title of a set of documents that describe a particular set of IT security evaluation criteria.
* * Common Object Request Broker Architecture (CORBA) *
An architecture and a specification for distributed object-oriented computing that separates client and server programs with a formal interface definition. See also Internet Inter-ORB Protocol.
* * Common Secure Interoperability Version 2 (CSIv2)*
An authentication protocol developed by the Object Management Group (OMG) that supports interoperability, authentication delegation, and privileges.
* * compilation unit *
A portion of a computer program sufficiently complete to be compiled correctly.
* * complex type *
In Extensible Markup Language (XML), a type that supports elements in its content and may carry attributes. See also simple type.
* * concurrency control *
The management of contention for data resources.
* * configuration repository *
A storage area of configuration data that is typically located in a subdirectory of the product installation root directory.
* configuration root
The mount point for the configuration file system.
* * configured name binding *
Persistent storage of an object in the name space that is created using either the administrative console or the wsadmin program.
* * connection factory *
A set of configuration values that produces connections that enable a J2EE component to access a resource. Connection factories provide on-demand connections from an application to an enterprise information system (EIS).
* * connection handle *
A representation of a physical connection.
* * connection pooling *
A technique used for establishing a pool of resource connections that applications can share on an application server.
* * connector *
In J2EE, a standard extension mechanism for containers to provide connectivity to enterprise information systems (EISs). A connector consists of a resource adapter and application development tools (Sun). See also container.
* constructor
In object-oriented programming, a special method used to initialize an object.
* consumer
1. An application that attaches to a bus destination and receives messages from the service integration bus. 2. In java Message Service (JMS), an object that is used for receiving messages from a destination.
* * container *
In J2EE, an entity that provides life-cycle management, security, deployment, and run-time services to components. (Sun) Each type of container (EJB, Web, JSP, servlet, applet, and application client) also provides component-specific services. See also resource adapter, connector.
* * container transaction *
See container-managed transaction.
* * container-managed persistence (CMP) *
In Java 2 Platform, Enterprise Edition (J2EE) technology, data transfer between the variables of an entity bean and a resource manager administered by the entity bean container. See also bean-managed persistence.
* * container-managed transaction *
A transaction whose boundaries are defined by an EJB container. An entity bean must use container-managed transactions. (Sun)
* * content based routing (CBR) *
An optional feature of the caching proxy that provides intelligent routing to back-end application servers. This routing is based on HTTP session affinity and a weighted round-robin algorithm.
* * context parameter *
A definition of the server view of the Web application within which the servlet is running and supports servlet access to available resources.
* * control region *
A virtual storage area that provides the control, scheduling, and work management mechanisms necessary to coordinate shared resources.
* controller
A regulating mechanism that controls the scheduling and work management coordination for shared resources.
* * CORBA *
See Common Object Request Broker Architecture.
* * core group *
A group of processes that is directly accessible to each other and is connected using a local area network (LAN).
* * core group access point *
A definition of a set of servers that provides access to the core group.
* * core group bridge *
The means by which core groups communicate.
* * core group member *
A server included in the cluster of a core group.
* * create method *
In enterprise beans, a method defined in the home interface and invoked by a client to create an enterprise bean. (Sun)
* * credential *
In the Java Authentication and Authorization Service (JAAS) framework, a subject class that owns security-related attributes. These attributes can contain information used to authenticate the subject to new services.
* CRL
See certificate revocation list.
* * cryptographic token *
A logical view of a hardware device that performs cryptographic functions and stores cryptographic keys, certificates, and user data.
* CSIv2
See Common Secure Interoperability Version 2.
* * custom service *
A configurable service that plugs in to a WebSphere Application Server and defines a hook point that runs when the server starts and shuts down when the server stops.
* * custom user registry *
A customer-implemented user registry that implements the UserRegistry Java interface. This registry type can support virtually any kind of accounts repository from a relational database and can provide flexibility in adapting product security to various environments.
* * daemon *
A program that runs unattended to perform continuous or periodic functions, such as network control.
* * data access bean *
A class library that provides a rich set of features and functions, while hiding the complexity associated with accessing relational databases.
* * data definition language (DDL) *
A language for describing data and its relationships in a database. See also data manipulation language.
* data graph
A collection of tree-structured or graph-structured data objects.
* data replication service (DRS)
A service that transfers data, objects, or events among application servers.
* * data source *
1. In Java Database Connectivity (JDBC), an interface that provides a logical representation of a pool of connections to a physical data source. Data source objects provide application portability by making it unnecessary to supply information specific to a particular database driver. 2. A repository of data to which a federated server can connect and then retrieve data by using wrappers. A data source can contain relational databases, Extensible Markup Language (XML) files, search algorithms, table-structured files, or other objects. In a federated system, data sources display as a single collective database.
* data store
1. A place (such as a database system, file, or directory) where data is stored. 2. In Java Message Service (JMS), an administered object that encapsulates the identity of a message destination. See bus destination.
* * datagram *
A form of asynchronous messaging in which an application sends a message, but does not require a response.
* * DB2 *
A family of IBM licensed programs for relational database management.
* * DDL *
See data definition language.
* * debugger *
A tool used to detect and trace errors in computer programs.
* * declarative security *
The security configuration of an application during assembly stage that is defined in the deployment descriptors and enforced by the security run time.
* * delegation *
The process of propagating a security identity from a caller to a called object. According to the Java 2 Platform, Enterprise Edition (J2EE) specification, a servlet and an enterprise bean can propagate either the client identity when invoking enterprise beans, or can use another specified identity as indicated in the corresponding deployment descriptor.
* demarshal
The conversion of a data stream into an object.
* * demilitarized zone (DMZ) *
A configuration including multiple firewalls to add layers of protection between a corporate intranet and a public network, like the Internet.
* * deploy *
To place files or install software into an operational environment. In J2EE, this involves creating a deployment descriptor suitable to the type of application that is being deployed.
* deployer
A person who installs modules and Java 2 Platform, Enterprise Edition (J2EE) applications into an operational environment.
* * deployment descriptor *
An XML file that describes how to deploy a module or application by specifying configuration and container options. For example, an EJB deployment descriptor passes information to an EJB container about how to manage and control an enterprise bean.
* * deployment manager *
A special type of server that manages operations for a cell.
* * deprecated *
Pertaining to an entity, such as a programming element or feature, that is supported but no longer recommended, and that might become obsolete.
* deserializer
A method for converting a serialized variable into object data.
* destination
In Java Message Service, an administered object that encapsulates the identity of a message destination. See bus destination.
* destination routing path
A sequence of intermediary bus destinations that messages must pass through to reach a target bus destination.
* * digest code *
A number that is the result of a message digest function or a secure hash algorithm distilling a document.
* * digital certificate *
An electronic document used to identify an individual, server, company, or some other entity, and to associate a public key with the entity. A digital certificate is issued by a certification authority and is digitally signed by that authority.
* digital signature
The encrypted digest code that is appended to a document. In an authentication system that uses public-key encryption, digital signatures are used to sign certificates.
* * directive *
A first-failure data capture (FFDC) construct that may be contained in a WebSphere Application Server symptom database in order to provide information and suggested actions to assist a diagnostic module in customizing the data that is logged.
* * discover *
In UDDI, to browse the business registry to locate existing Web services for integration.
* discovery protocol
Pertaining to the protocol that is followed to retrieve information from a network.
* * distinguished name (DN)*
A set of name-value pairs (such as CN=person's name and C=country or region) that uniquely identify an entity in a digital certificate.
* * distributed application *
An application made up of distinct components that are physically located on different computer systems, connected by a network. See also client/server.
* * DMZ *
See demilitarized zone.
* * Document Object Model (DOM) *
A system in which a structured document, for example an Extensible Markup Language (XML) file, is viewed as a tree of objects that can be programmatically accessed and updated.
* document type definition (DTD)
The rules that specify the structure for a particular class of Standard Generalized Markup Language (SGML) or Extensible Markup Language (XML) documents.
* * DOM *
See Document Object Model.
* * domain *
An object, icon, or container that contains other objects representing the resources of a domain. The domain object can be used to manage those resources.
* * drop-down *
Pertaining to a list or menu that opens when clicked and stays open until the user selects a menu or list item or clicks elsewhere in the user interface.
* DRS
See data replication service.
* DTD
See document type definition.
* durable subscription
A subscription that can accumulate messages, even when no consumers are attached.
* * dynamic cache *
A consolidation of several caching activities, including servlets, Web services, and WebSphere commands into one service where these activities work together to improve performance and share configuration parameters.
* * dynamic cluster *
A server cluster that uses weights to balance the workloads of its cluster members dynamically, based on performance information collected from cluster members.
* dynamic operations
Operations that monitor the server environment and make recommendations that are based on data observation.
* * dynamic policy *
A template of permissions for a particular type of resource.
* * dynamic reloading *
The ability to change an existing component without restarting the server for the changes to become effective.
* * EAR *
See enterprise archive.
* ECSA
See extended common system area.
* Edge Side Include (ESI)
A technology supporting cacheable and noncacheable Web page components that can be gathered and assembled at the edge of a network.
* edition
A successive deployment generation of a particular set of versioned artifacts.
* * EIS *
See enterprise information system.
* EJB
See Enterprise JavaBeans.
* EJB container
A container that implements the EJB component contract of the J2EE architecture. This contract specifies a run-time environment for enterprise beans that includes security, concurrency, life-cycle management, transactions, deployment, and other services. An EJB container is provided by an EJB or J2EE server. (Sun)
* EJB context
In enterprise beans, an object that allows an enterprise bean to invoke services provided by the container and to obtain information about the caller of a client-invoked method. (Sun)
* EJB inheritance
A form of inheritance in which an enterprise bean inherits properties, methods, and method-level control descriptor attributes from another enterprise bean that resides in the same group.
* EJB module
A software unit that consists of one or more enterprise beans and an EJB deployment descriptor. (Sun)
* EJB object
In enterprise beans, an object whose class implements the enterprise bean remote interface (Sun).
* EJB query
A string that contains an optional SELECT clause that specifies the Enterprise JavaBeans (EJB) objects to return, a FROM clause that names the bean collections, an optional WHERE clause that contains search predicates over the collections, an optional ORDER BY clause that specifies the ordering of the result collection; and input parameters that correspond to the argument of the finder method.
* EJB reference
A logical name that is used by an application to locate the home interface of an enterprise bean in the target operational environment.
* EJB server
Software that provides services to an EJB container. An EJB server may host one or more EJB containers (Sun).
* * element *
In markup languages such as Standard Generalized Markup Language (SGML), Extensible Markup Language (XML), and Hypertext Markup Language (HTML), a basic unit consisting of a start tag, end tag, associated attributes and their values, and any text that is contained between the two.
* enclave
A construct that represents a business transaction or unit of work on the OS/390 workload manager.
* endian
A data type that is longer than a byte and that is stored in computer memory with the most significant byte first or last.
* * endpoint *
The system that is the origin or destination of a session.
* * endpoint listener *
The point or address at which incoming messages for a Web service are received by a service integration bus.
* endpoint reference
The combination of the address of a Web service that implements the manageability interface for a managed resource type and the properties that allow that Web service to identify the managed resource.
* * enterprise application *
An application that conforms to the Java 2 Platform Enterprise Edition specification.
* * enterprise archive (EAR) *
A specialized type of Java archive (JAR) file, defined by the Java 2 Platform, Enterprise Edition (J2EE) standard, used to deploy J2EE applications to J2EE application servers. An EAR file contains enterprise bean components, a deployment descriptor, and Web archive (WAR) files for individual Web applications. See also Web archive.
* * enterprise bean *
A component that implements a business task or business entity and resides in an EJB container. Entity beans, session beans, and message-driven beans are all enterprise beans. (Sun)
* * enterprise information system (EIS) *
The applications that comprise the existing system of an enterprise for handling company-wide information. Examples of enterprise information systems include: an enterprise resource planning (ERP) system, a mainframe transaction processing system, and a legacy database system. (Sun) See also resource adapter.
* Enterprise JavaBeans (EJB)
A component architecture defined by Sun Microsystems for the development and deployment of object-oriented, distributed, enterprise-level applications.
* enterprise workload manager
Part of the dynamic operations environment that manages subgoals and resources for the larger enterprise environment.
* * entity *
In markup languages such as Extensible Markup Language (XML), a collection of characters that can be referenced as a unit, for example to incorporate often repeated text or special characters within a document.
* * entity bean *
In EJB programming, an enterprise bean that represents persistent data maintained in a database. Each entity bean carries its own identity. (Sun) There are two types of entity beans: container-managed persistence (CMP) entity beans and bean-managed persistence (BMP) entity beans. See also session bean.
* * environment variable *
A variable that specifies how an operating system or another program runs, or the devices that the operating system recognizes.
* * error *
A discrepancy between a computed, observed, or measured value or condition and the true, specified, or theoretically correct value or condition.
* * error log stream *
A continuous flow of error information that is transmitted using a predefined format.
* * ESI *
See Edge Side Include.
* * ESI processor *
A feature in the WebSphere Web server plug-in that supports fragment caching and fragment assembly into full pages.
* * event *
The encapsulated data that is sent as a result of an occurrence, or situation in the system.
* event factory
An object that returns new instances of either the CommonBaseEvent element or of the specialized classes representing complex property data types.
* * event listener *
A type of asynchronous bean that serves as a notification mechanism and through which Java 2 Platform, Enterprise Edition (J2EE) components within a single application can notify each other about various asynchronous events.
* * event source *
An object that supports an asynchronous notification server within a single Java virtual machine. Using an event source, the event listener object can be registered and used to implement any interface.
* exception
An event during program execution that prevents the program from continuing normally.
* * exception handler *
A block of code that reacts to a specific type of exception.
* express nonpersistent
A delivery option that specifies that messages are discarded when a messaging engine stops or fails. Messages can also be discarded if a connection that is used to send them becomes unavailable. See also best effort nonpersistent, reliable nonpersistent, reliable persistent, and assured persistent.
* expression
An SQL operand or a collection of operators and operands that yields a single value.
* *extended common system area (ECSA) *
A major element of MVS/ESA virtual storage above the 16 MB line. This area contains pageable system data areas that are addressable by all active virtual storage address spaces. It duplicates the common system area (CSA), which exists below the 16 MB line.
* extended manageability
Offers simpler and improved management of complex system operations with real-time advanced, meaningful visualization tools and gradual, controlled implementation of autonomic capabilities, helping reduce the cost of managing IT resources.
* * extended messaging *
A function of asynchronous messaging where the application server manages the messaging infrastructure and extra standard types of messaging beans are provided to add functionality to that provided by message-driven beans.
* Extensible Markup Language (XML)
A standard metalanguage for defining markup languages that is based on Standard Generalized Markup Language (SGML).
* * extension *
A class of objects designated by a specific term or concept; denotation.
* *factory *
In object-oriented programming, a class that is used to create instances of another class. A factory is used to isolate the creation of objects of a particular class into one place so that new functions can be provided without widespread code changes.
* * failover *
A cluster event where the primary database server or application server switches over to a backup system due to the failure of the primary server.
* FAP
See Formats and Protocols.
* * fast response cache accelerator (FRCA) *
A cache that resides in the kernel on AIX and Windows platforms that provides support for caching on multiple Web servers and on servers with multiple IP addresses.
* * fault message *
An object that contains status information and details about a problem with a message.
* Federal Information Processing Standard (FIPS)
A standard produced by the National Institute of Standards and Technology when national and international standards are nonexistent or inadequate to satisfy the U.S. government requirements.
* * federation *
The process of combining naming systems so that the aggregate system can process composite names that span the naming systems.
* FFDC
See first-failure data capture.
* * file serving *
A function that supports the serving of static files by Web applications.
* file store
A type of message store that directly uses files in a file system through the operating system.
* * filter *
A device or program that separates data, signals, or material in accordance with specified criteria.
* finder method
In enterprise beans, a method defined in the home interface and invoked by a client to locate an entity bean. (Sun)
* * fingerprint *
See digest code.
* FIPS
See Federal Information Processing Standard.
* * firewall *
A network configuration, usually both hardware and software, that prevents unauthorized traffic into and out of a secure network.
* first-failure data capture
A problem diagnosis aid that identifies errors, gathers and logs information about these errors, and returns control to the affected run-time software.
* * fix pack *
A cumulative collection of fixes that does not contain new functions. A fix pack can contain fixes that have not been shipped previously. Full regression testing is performed on fix packs. See also program temporary fix, test fix, interim fix, refresh pack.
* * folder *
A container used to organize objects.
* foreign bus
One of the other service integration buses with which a particular service integration bus can exchange messages.
* foreign destination
A destination that identifies a destination on a foreign bus.
* Formats and Protocols (FAP)
In message queuing, a definition of how queue managers communicate with each other, and of how clients communicate with server queue managers.
* * form logout *
A mechanism to log out without having to close all Web browser sessions.
* * form-based login *
An authentication process where a user ID and a password are retrieved using an Hypertext Markup Language (HTML) form, and sent to the server over the Hypertext Transfer Protocol (HTTP) or hypertext Transfer Protocol Secure (HTTPS) protocol.
* forward routing path
A set of bus destinations to which a message is routed and held as a stack property within the message. When a message is created, the forward routing path is added to the message. When the message reaches a destination, that destination is removed from the forward routing path in the message.
* * forwardable credentials *
A mechanism-specific security credential ( that is issued to access a resource, which is used to obtain another credential for access to a different resource.
* * FRCA *
See fast response cache accelerator.
* * garbage collection *
A routine that searches memory to reclaim space from program segments or inactive data.
* * gateway *
A middleware component that bridges Internet and intranet environments during Web service invocations.
* gateway destination
A type of service destination that receives messages for gateway services. Gateway destinations are divided into those that are used for request processing and those that are used for reply processing.
* gateway queue manager
The queue manager to which the connection is made in a WebSphere MQ link.
* gateway service
A Web service that is made available through the Web services gateway.
* General Inter-ORB Protocol (GIOP)
A protocol that Common Object Request Broker Architecture (CORBA) uses to define the format of messages.
* * generic server *
A server that is managed in, but not supplied by WebSphere Application Server. Any server or process that is necessary to support the Application Server environment, including a Java server, a C or C++ server or process, a CORBA server, or a Remote Method Invocation (RMI) server.
* * generic server cluster *
A group of remote servers that need routing by the proxy server.
* * getter method *
A method whose purpose is to get the value of an instance or class variable. This allows another object to find out the value of one of its variables. See also setter method.
* * GIOP *
See General Inter-ORB Protocol.
* * global security *
Pertains to all applications running in the environment and determines whether security is used, the type of registry used for authentication, and other values, many of which act as defaults.
* * grammar *
A document type definition (DTD) or schema providing a structured format used for successful processing by the trace service.
* grid job
A set of managed background activities.
* * group *
A collection of users who can share access authorities for protected resources.
* HA
See high availability.
* * HA group *
A collection of one or more members. A common group name relates the members together
* * HA policy *
A set of rules that is defined for a high availability (HA) group that dictate whether zero (0), or more members are activated. The policy is associated with a specific HA group by matching the policy match criteria with the group name.
* * handle *
In the J2EE specification, an object that identifies an enterprise bean. A client may serialize the handle, and then later deserialize it to obtain a reference to the enterprise bean. (Sun)
* * handler *
In Web services, a mechanism for processing service content and extending the function of a Java API for XML-based RPC (JAX-RPC) run-time system.
* * handshake *
The exchange of messages at the start of a Secure Sockets Layer session that allows the client to authenticate the server using public key techniques (and, optionally, for the server to authenticate the client), then allows the client and server to cooperate in creating symmetric keys for encryption, decryption, and detection of tampering.
* * hash *
In computer security, a number generated from a string of text that is used to ensure that transmitted messages arrived intact.
* hash map
A data structure that associates keys with values.
* * hierarchical *
Pertaining to data that is organized on computer systems using a hierarchy of containers, often called folders (directories) and files. In this scheme, folders can contain other folders and files. The successive containment of folders within folders creates the levels of organization, which is the hierarchy.
* * high availability *
Pertaining to a clustered system that is reconfigured when node or daemon failures occur, so that workloads can be redistributed to the remaining nodes in the cluster.
* * high availability file system *
A cluster file system that can be used for component redundancy to provide continued operations during failures.
* * high availability manager *
A framework within which core group membership is determined and status is communicated between core group members.
* high performance computing
The ability to support quality of service initiatives for business-critical applications to provide near-linear scalability of high-end transaction processing.
* * HMAC *
See Keyed-Hashing Message Authentication Code.
* * home interface *
In enterprise beans, an interface that defines zero or more create and remove methods for a session bean or zero or more create, finder, and remove methods for an entity bean. See also remote interface.
* * home method *
A method in the home interface that is used by a client to create, locate, and remove instances of enterprise beans.
* * horizontal scaling *
A topology in which more than one application server running on multiple computing nodes is used to run a single application.
* * host *
1. A computer that is connected to a network and provides an access point to that network. The host can be a client, a server, or both a client and server simultaneously. 2. In performance profiling, a machine or a machine starting partition on which an application under test resides. The host owns the processes that are profiled.
* * host name *
The network name for a network adaptor on a physical machine in which the node is installed.
* * hot deployment *
The process of adding new components to a running server without stopping and restarting the application server or application.
* * hot servant region *
A servant region that had a request dispatched to it previously and now has available threads.
* * hover help *
A form of online help that can be viewed by moving a mouse or other pointing device over a GUI item such as an icon or field.
* * HTTP *
See Hypertext Transfer Protocol.
* * HTTP channel *
A type of channel within a transport chain that provides client applications with persistent HTTP connections to remote hosts that are either blocked by firewalls or require an HTTP proxy server. An HTTP channel is used to exchange application data in the body of an HTTP request and an HTTP response that are sent to and received from a remote server.
* * HTTPS *
See Hypertext Transfer Protocol Secure.
* * Hypertext Transfer Protocol (HTTP) *
In the Internet suite of protocols, the protocol that is used to transfer and display hypertext and Extensible Markup Language (XML) documents on the Web.
* * Hypertext Transfer Protocol Secure (HTTPS) *
An Internet protocol that is used by Web servers and Web browsers to transfer and display hypermedia documents securely across the Internet.
* * IDE *
See integrated development environment.
* * identifier *
The name of an item in a program written in the Java language.
* * identity *
The data that represents a person and that is stored in one or more repositories.
* * identity assertion *
The invocation credential that is asserted to the downstream server. This credential can be set as the originating client identity, the server identity, or another specified identity, depending on the RunAs mode for the enterprise bean.
* * identity token *
A token that contains the invocation credential identity, which with the client authentication token are required by the receiving server to accept the asserted identity.
* * IDL *
See Interface Definition Language.
* IETF
See Internet Engineering Task Force.
* * IIOP *
See Internet Inter-ORB Protocol.
* * inbound authentication *
The configuration that determines the type of accepted authentication for inbound requests.
* * inbound port *
A type of port that takes a message that is received at an endpoint listener and passes it to the service integration bus for forwarding to the appropriate inbound service.
* * inbound service *
The external interface for a service that is provided by your own organization and hosted in a location that is directly available through the service destination.
* * inbound transport *
Network ports in which a server listens for incoming requests.
* indirect link
A link from a service integration bus to a foreign bus that is made through one or more intermediate foreign buses. The intermediate foreign buses can be service integration buses or WebSphere MQ systems.
* information center
A collection of information that provides support for users of one or more products, can be launched separately from the product, and includes a list of topics for navigation and a search engine.
* * inheritance *
An object-oriented programming technique that allows the use of existing classes as a basis for creating other classes.
* * initial context *
Starting point in a namespace.
* * initial reference *
A well-known reference that is associated with an identifier.
* * INS *
See Interoperable Naming Service.
* instance
In object-oriented programming, an object of a particular class.
* * integrated development environment (IDE) *
A set of software development tools such as source editors, compilers, and debuggers, that are accessible from a single user interface. In Eclipse, the IDE is called the workbench.
* Interactive System Productivity Facility (ISPF)
An IBM licensed program that serves as a full-screen editor and dialog manager. Used for writing application programs, it provides a means of generating standard screen panels and interactive dialogs between the application programmer and terminal user.
* Interface Definition Language (IDL)
In Common Object Request Broker Architecture (CORBA), a declarative language that is used to describe object interfaces, without regard to object implementation.
* internationalized
An application that is coded such that it can present information to users in different locales or languages, and accept input data from users in multiple locales.
* Internet Engineering Task Force (IETF)
The task force of the Internet Architecture Board (IAB) that is responsible for solving the short-term engineering needs of the Internet. The IETF consists of numerous working groups, each focused on a particular problem. Internet standards are typically developed or reviewed by individual working groups before they can become standards.
* Internet Inter-ORB Protocol (IIOP)
A protocol used for communication between Common Object Request Broker Architecture (CORBA) Object Request Brokers.
* * interoperability *
The capability to communicate, run programs, or transfer data among various functional units in a way that requires the user to have little or no knowledge of the unique characteristics of those units.
* * Interoperable Naming Service (INS) *
A program that supports the configuration of the Object Request Broker (ORB) administratively to return object references.
* * interoperable object reference (IOR) *
An object reference with which an application can make a remote method call on a CORBA object. This reference contains all the information needed to route a message directly to the appropriate server.
* * invocation *
The activation of a program or procedure.
* * invocation credential *
An identity with which to invoke a downstream method. The receiving server requires this identity with the sending server identity to accept the asserted identity.
* * invoker attribute *
An assembly property for a Web module that is used by the servlet that implements the invocation behavior.
* * IOR *
See interoperable object reference.
* IP sprayer
A device that is located between inbound requests from the users and the application server nodes that reroutes requests across nodes.
* * ISPF *
See Interactive System Productivity Facility.
* * J2EE *
See Java 2 Platform, Enterprise Edition.
* * J2EE application *
Any deployable unit of J2EE functionality. This unit can be a single module or a group of modules packaged into an enterprise archive (EAR) file with a J2EE application deployment descriptor. (Sun)
* * J2EE Connector architecture (JCA) *
A standard architecture for connecting the Java 2 Platform, Enterprise Edition (J2EE) platform to heterogeneous enterprise information systems (EIS).
* * J2EE server *
A run-time environment that provides EJB or Web containers.
* * JAAS *
See Java Authentication and Authorization Service.
* * Jacl *
See Java Command Language.
* * JAF *
See JavaBeans Activation Framework.
* * Java *
An object-oriented programming language for portable interpretive code that supports interaction among remote objects. Java was developed and specified by Sun Microsystems, Incorporated.
* * Java 2 Connector security *
An architecture designed to extend the end-to-end security model for J2EE-based applications to include enterprise information systems (EIS)
* * Java 2 Platform, Enterprise Edition (J2EE) *
An environment for developing and deploying enterprise applications, defined by Sun Microsystems Inc. The J2EE platform consists of a set of services, application programming interfaces (APIs), and protocols that provide the functionality for developing multitiered, Web-based applications. (Sun) See also Java 2 Platform Standard Edition.
* * Java API for XML (JAX) *
A set of Java-based APIs for handling various operations involving data defined through Extensible Markup Language (XML).
* * Java API for XML-based RPC (JAX-RPC) *
A specification that describes application programming interfaces (APIs) and conventions for building Web services and Web service clients that use remote procedure calls (RPC) and Extensible Markup Language (XML). JAX-RPC is also known as JSR 101.
* * Java Authentication and Authorization Service (JAAS) *
In Java 2 Platform, Enterprise Edition (J2EE) technology, a standard API for performing security-based operations. Through JAAS, services can authenticate and authorize users while enabling the applications to remain independent from underlying technologies.
* * Java Command Language (Jacl) *
A scripting language for the Java 2 environment that is used to create Web content and to control Java applications.
* * Java Database Connectivity (JDBC) *
An industry standard for database-independent connectivity between the Java platform and a wide range of databases. The JDBC interface provides a call-level API for SQL-based database access.
* Java Generic Security Services (JGSS)
A specification that provides Java programs access to the services that include the signing and sealing of messages and a generic authentication mechanism.
* * Java Management Extensions (JMX) *
A means of doing management of and through Java technology. JMX was developed through the Java Community ProcessSM program, by Sun Microsystems, Inc. and some leading companies in the management field. JMX is a universal, open extension of the Java programming language for management that can be deployed across all industries, wherever management is needed.
* * Java Message Service (JMS) *
An application programming interface (API) that provides Java language functions for handling messages. See also Application Messaging Interface, Message Queue Interface.
* * Java Naming and Directory Interface (JNDI) *
An extension to the Java platform that provides a standard interface for heterogeneous naming and directory services.
* * Java platform *
A collective term for the Java language for writing programs; a set of APIs, class libraries, and other programs used in developing, compiling, and error-checking programs; and a Java virtual machine which loads and executes the class files. (Sun)
* * Java Runtime Environment (JRE) *
A subset of the Sun Microsystems Java Development Kit (JDK) that contains the core executable programs and files that constitute the standard Java platform. The JRE includes the Java virtual machine (JVM), core classes, and supporting files.
* * Java Secure Socket Extension (JSSE) *
A Java package that enables secure Internet communications. It implements a Java version of the Secure Sockets Layer (SSL) and Transport Layer Security (TSL) protocols and supports data encryption, server authentication, message integrity, and optionally client authentication.
* * Java virtual machine (JVM) *
A software implementation of a central processing unit that runs compiled Java code (applets and applications).
* * Java Virtual Machine Profiler Interface (JVMPI) *
A profiling tool that supports the collection of information, such as data about garbage collection and the Java virtual machine (JVM) application programming interface (API) that runs the application server.
* Java Widget Library (JWL)
An extended widget set that is usable by portal and portlet programmers that adds JavaScript client-side processing to JavaServer Faces.
* * JavaBeans *
As defined for Java by Sun Microsystems, a portable, platform-independent, reusable component model. See also bean.
* * JavaBeans Activation Framework (JAF) *
A standard extension to the Java platform that determines arbitrary data types and available operations and can instantiate a bean to run pertinent services.
* * JavaMail API *
A platform and protocol-independent framework for building Java-based mail client applications.
* JavaServer Faces (JCF)
A Java framework that is used for developing Web applications.
* * JavaServer Pages (JSP) *
A server-side scripting technology that enables Java code to be dynamically embedded within Web pages (HTML files) and executed when the page is served, in order to return dynamic content to a client. See also JSP file, JSP page.
* JavaServer Pages (JSP) file
Application building blocks coded to the Sun Microsystems JavaServer Pages (JSP) specification. JSP files enable the separation of the Hypertext Markup Language (HTML) code from the business logic in Web pages so that HTML programmers and Java programmers can collaborate when creating and maintaining pages.
* * JAX *
See Java API for XML.
* * JAX-RPC *
See Java API for XML-based RPC.
* * JAX-RPC handler *
A Java class that performs a range of handling tasks, including logging messages, transforming message content, or terminating an incoming request.
* * JCA *
See J2EE Connector architecture.
* JCF
See JavaServer Faces.
* * JDBC *
See Java Database Connectivity.
* JGSS
See Java Generic Security Services.
* * JMS *
See Java Message Service.
* JMS provider
The software that implements the Java Message Service (JMS) specification for a messaging product.
* JMS Topic
In Java Message Service (JMS), a JMS-managed object that manages the message flow from publishers to subscribers.
* * JMX *
See Java Management Extensions.
* * JNDI *
See Java Naming and Directory Interface.
* * JRas *
A toolkit that consists of a set of Java packages that enable developers to incorporate message logging and trace facilities into Java applications.
* job class
A type of class that establishes a policy for resource consumption by a set of compute grid jobs. Each job is assigned to a job class.
* job log
A record of requests submitted to the system by a job, the messages related to the requests, and the actions performed by the system on the job. The job log is maintained by the system program.
* job management console
A stand-alone Web interface that can be used to perform job operations. Through the console, jobs can be submitted, monitored, viewed, and managed.
* job scheduler
A Compute Grid component that provides all job management functions. It maintains a history of all jobs, and maintains usage data for jobs that have run. The job scheduler is hosted in a WebSphere Application Server (or cluster) in a WebSphere Network Deployment environment.
* * JRE *
See Java Runtime Environment.
* * JSP *
See JavaServer Pages.
* * JSP file *
A scripted HTML file that has a .jsp extension and allows for the inclusion of dynamic content in Web pages. A JSP file can be directly requested as a URL, called by a servlet, or called from within an HTML page. See also JavaServer Pages, JSP page.
* * JSP page *
A text-based document using fixed template data and JSP elements that describes how to process a request to create a response. (Sun) See also JavaServer Pages, JSP file.
* * JSSE *
See Java Secure Socket Extension.
* * junction *
A logical connection created to establish a path from one server to another.
* * JVM *
See Java virtual machine.
* JVMPI
See Java Virtual Machine Profiler Interface.
* JWL
See Java Widget Library.
* kernel
The part of an operating system that performs basic functions such as allocating hardware resources.
* key
A cryptographic mathematical value that is used to digitally sign, verify, encrypt, or decrypt a message.
* key database file
A synonym for a key ring.
* key file
A synonym for key ring. The file that stores the keys used during the authentication of a message.
* key locator
A mechanism that retrieves the key for Extensible Markup Language (XML) signing, XML digital signature verification, XML encryption, and XML decryption.
* * key ring *
In computer security, a file that contains public keys, private keys, trusted roots, and certificates.
* Keyed-Hashing Message Authentication Code (HMAC)
A mechanism for message authentication that uses cryptographic hash functions.
* * keystore file *
A key database file that contains both public keys stored as signer certificates and private keys stored in personal certificates.
* * keystring *
Additional specification of the entry within a naming service.
* * launchpad *
A graphical interface for launching the product installation.
* * lazy authentication *
The process whereby the security run time obtains the required authentication data when the Java client accesses a protected enterprise bean for the first time.
* * LDAP *
See Lightweight Directory Access Protocol.
* Lightweight Directory Access Protocol (LDAP)
An open protocol that uses TCP/IP to provide access to information directories that support an X.500 model and that does not incur the resource requirements of the more complex X.500 Directory Access Protocol (DAP). For example, LDAP can be used to locate people, organizations, and other resources in an Internet or intranet directory.
* * Lightweight Third Party Authentication (LTPA) *
A protocol that uses cryptography to support security in a distributed environment.
* * link name *
A name defined in the deployment descriptor of the encompassing application.
* * link pack area (LPA) *
A major element of MVS/ESA virtual storage below the 16MB line. The storage areas that make up the LPA contain all the common reentrant modules shared by the system. The LPA provides economy of real storage by sharing one copy of the modules, protection because LPA code cannot be overwritten even by key 0 programs, and reduced pathlength because the modules can be branched to. See the CICS Transaction Server Performance Guide for more information.
* * listener *
A program that detects incoming requests and starts the associated channel.
* * listener port *
An object that defines the association between a connection factory, a destination, and a deployed message-driven bean. Listener ports simplify the administration of the associations between these resources.
* * load balancing *
The monitoring of application servers and management of the workload on servers. If one server exceeds its workload, requests are forwarded to another server with more capacity.
* * local *
Pertaining to a device, file, or system that is accessed directly from a user's system, without the use of a communication line. See also remote.
* * local transaction containment (LTC) *
A bounded scope that is managed by the container to define the application server behavior in an unspecified transaction context.
* * location service daemon *
A component of the Remote Method Invocation and Internet Inter-ORB Protocol (RMI/IIOP) communication function that works with workload management to distribute RMI requests among application servers in a cell.
* * log handler *
A class that uses loggers, levels, and filters to direct whether events are processed or suppressed.
* * logger *
A named and stateful object with which the user code interacts and that logs messages for a specific system or application component.
* * logging *
The recording of data about specific events on the system, such as errors.
* * logging level *
A value that controls which events are processed by Java logging.
* * login binding *
A definition of the implementation to provide login information per authentication methods.
* * login mapping *
A Java Authentication and Authorization Service (JAAS) login configuration that is used to authenticate a security token in a Web service security header.
* * long name *
The property that specifies the logical name for the server on the z/OS platform in WebSphere Application Server.
* LPA
See link pack area.
* LTC
See local transaction containment.
* LTPA
See Lightweight Third Party Authentication.
* * mail session *
A resource collection of protocol providers that authenticate users and control user access to messaging systems.
* Managed Bean (MBean)
In the Java Management Extensions (JMX) specification, the Java objects that implement resources and their instrumentation. MBeans must follow the design patterns and interfaces defined in the instrumentation level of the JMX specification. This ensures that all MBeans provide the instrumentation of managed resources in a standardized way. MBeans are manageable by any JMX agent, but they can also be managed by non-compliant agents that support the MBean concept.
* * managed node *
A node with an application server and a node agent that belongs to a cell.
* * managed resource *
An entity that exists in the run-time environment of an IT system and that can be managed.
* marooned message
A message that cannot be delivered due to the unavailability of a component that is necessary to its processing.
* marshal
To convert an object into a data stream for transmission over a network.
* MBean
See Managed Bean.
* MBean provider
A library containing an implementation of a Java Management Extensions (JMX) MBean and its MBean Extensible Markup Language (XML) descriptor file.
* * MD5 *
A type of message algorithm that converts a message of arbitrary length into a 128-bit message digest. This algorithm is used for digital signature applications where a large message must be compressed in a secure manner.
* mediation
1. The handling of inflight messages between the production of a message by one application, and the consumption of a message by another application. Mediation processing includes:
o Message transformation from one representation to another.
o Message routing to one or more targets that were not specified by the sending application.
o Message augmentation by adding data from a data source. 2. Administered object that defines the information that is needed by a messaging engine to mediate associated destinations.
* mediation handler
A unit of mediation function that performs specific message processing at run time. You can deploy a mediation handler as a simple Java bean or as a stateless session enterprise bean.
* mediation point
A location in a messaging engine at which messages are mediated.
* memory leak
The effect of a program that maintains references to objects that are no longer required and therefore need to be reclaimed.
* memory-to-memory replication
The session replication of one instance of WebSphere Application Server to another.
* message consumer
See consumer.
* * message digest *
A hash value or a string of bits resulting from the conversion of processing data to a number.
* message point
A location in a messaging engine at which messages are held before being processed. See queue point, publication point, and mediation point.
* message producer
See producer.
* message reliability
See reliability attribute.
* message selector
See selector.
* * message-driven bean *
An enterprise bean that provides asynchronous message support and clearly separates message and business processing.
* messaging bus
The role of a service integration bus when providing the messaging system for Java Message Service (JMS) applications using the default messaging provider.
* messaging engine
A component of a service integration bus that provides messaging function and a connection point to which applications connect to the bus. A messaging engine runs within a server and uses an instance of a Java Database Connectivity (JDBC) data source to interact with the database that contains the data store for that messaging engine.
* * metadata *
Data that describes the characteristics of stored data; descriptive data. For example, the metadata for a database table might include the name of the table, the name of the database that contains the table, the names of the columns in the table, and the column descriptions, either in technical terms or business terms. Database catalogs and information catalogs contain metadata.
* * method *
In object-oriented design or programming, the software that implements the behavior specified by an operation.
* * method extension *
An IBM extension to the standard deployment descriptors for enterprise beans that define transaction isolation methods and control the delegation of credentials.
* method permission
A mapping between one or more security roles and one or more methods that a member of a role can call.
* MIME
See Multipurpose Internet Mail Extensions.
* module
In J2EE, a software unit that consists of one or more components of the same container type and one deployment descriptor of that type. Examples include EJB, Web, and application client modules. Modules can be deployed as stand-alone units or assembled into an application. (Sun).
* * monitor *
In performance profiling, to collect data about an application from the running agents that are associated with that application.
* mount point
A logical drive through which volumes are accessed in a sequential access device class. For removable media device types, such as cartridges, a mount point is a logical drive associated with a physical drive. For the file device type, a mount point is a logical drive associated with an I/O stream.
* * MPMT *
See multiprocess multithread.
* multicast
Transmission of the same data to a selected group of destinations.
* * multiple configuration instance *
More than one instance of a product running in the same machine at the same time.
* * multiprocess multithread (MPMT) *
A process architecture of the IBM HTTP Server that supports multiple processes as well as multiple threads per process.
* Multipurpose Internet Mail Extensions (MIME)
An Internet standard that allows different forms of data including video, audio, or binary data to be attached to e-mail without requiring translation into ASCII text.
* * namespace *
A space that is reserved by a file system to contain the names of its objects.
* * naming *
An operation that is used by clients of WebSphere Application Server applications to obtain references to objects related to those applications.
* * naming context *
A logical namespace that contains name and object bindings.
* * naming federation *
The process of binding naming systems so that the aggregate system can process composite names that span the naming systems.
* * naming service *
An implementation of the Java Naming and Directory Interface (JNDI) standard.
* * NAT *
See network address translation.
* * native *
Pertaining to the relationship between a transport user and a transport provider that are both based on the same transport protocol.
* native execution endpoint
A server platform on which native execution jobs can run as part of a grid job.
* native execution job
A program that can be run as a background command on UNIX-type or Windows systems. Native execution jobs are unconstrained by programming and component models. Native applications can be implemented in Java, native-compiled languages, such as C++ and COBOL, and scripts.
* native start endpoint
A server platform on which native start jobs can run as part of a grid job. See also native start job and grid job.
* native start job
A program that can run as a background command on UNIX or Windows systems. Native start jobs can run across multiple programming and component models. Native applications can be implemented in Java, native-compiled languages, such as C++ and COBOL, and scripts.
* * network address translation (NAT) *
The conversion of a network address that is assigned to a logical unit in one network into an address in an adjacent network. See also static network address translation.
* network file system (NFS)
A base element of z/OS that allows remote access to z/OS host-processor data from workstations, personal computers, or any other system on a Transmission Control Protocol/Internet Protocol (TCP/IP) network that is using client software for the Network File System (NFS) protocol.
* * network protocol stack *
A set of network protocol layers and software that work together to process the protocols.
* NFS
See network file system.
* * node *
A logical grouping of managed servers.
* * node agent *
An administrative agent that manages all application servers on a node and represents the node in the managed cell.
* * node federation *
The process of combining the managed resources of one node into a distributed network such that the central manager application can access and administer the resources on the node.
* * node group *
Grouping of nodes based on a common characteristic or property to create a pool of common resources.
* * node name *
The machine name or host name; an arbitrary WebSphere Application Server-specific name that must be unique.
* * nonce *
A unique cryptographic number that is embedded in a message to help detect a replay attack.
* nondurable subscription
A subscription that only exists for the lifetime of a consumer connection to a service integration bus.
* * nonrepudiation *
In business-to-business communication the ability of the recipient to prove who sent a message based on the contents of the message. This can derive from the use of a digital signature on the message, which links the sender to the message.
* * notification *
A message that contains the event descriptions that are sent to managed resources, autonomic managers, and other resources.
* * object *
In object-oriented design or programming, a concrete realization (instance) of a class that consists of data and the operations associated with that data. An object contains the instance data that is defined by the class, but the class owns the operations that are associated with the data. In object-oriented design or programming, an instance of a class that consists of data and the operations associated with that data.
* * object adapter *
A Common Object Request Broker Architecture (CORBA) term that denotes the primary interface that a server implementation uses to access Object Request Broker (ORB) functions.
* * Object Request Broker (ORB) *
In object-oriented programming, software that serves as an intermediary by transparently enabling objects to exchange requests and responses.
* ODC
See on demand configuration
* ODR
See on demand router
* * one-way hash *
An algorithm that converts processing data into a string of bits; known as a hash value or a message digest.
* * Open Servlet Engine (OSE) *
A lightweight communications protocol that was developed by IBM for interprocess communication.
* * ORB *
See Object Request Broker.
* * OSE *
See Open Servlet Engine.
* * outbound authentication *
The configuration that determines the type of accepted authentication for outbound requests.
* * outbound port *
The mechanism through which an outbound service communicates with the externally-hosted Web service. Messages pass between the outbound service and the external service through the appropriate port.
* * outbound service *
The service that provides access through one or more outbound ports to a Web service that is hosted externally.
* PAA
See portal application archive.
* * package *
1. In Java programming, a group of types. Packages are declared with the package keyword. (Sun) 2. In Java 2 Platform, Enterprise Edition (J2EE) technology, to assemble components into modules and modules into enterprise applications.
* * page list *
An assembly property that specifies the location to forward a request, but automatically tailors that location, depending on the Multipurpose Internet Mail Extensions (MIME) type of the servlet.
* * parallel garbage collection *
A type of garbage collection that uses several threads simultaneously.
* * part reference *
An object that is used by a configuration to reference other related configuration objects.
* partitioned destination
A bus destination that is assigned to a cluster bus member. Each messaging engine in the server cluster has a separate queue point for the destination. Messages that are sent to a partitioned destination are routed to one of the queue points based on workload management (WLM) algorithms.
* passivation
In enterprise beans, the process of transferring an enterprise bean from memory to secondary storage. (Sun)
* PassTicket
In Resource Access Control Facility (RACF) secured signon, a dynamically generated, random, one-time-use, password substitute that a workstation or other client can use to sign on to the host rather than sending a RACF password across the network.
* * payload *
The body of the message that holds the content.
* * peer access point *
A means by which core groups can communicate with other cells.
* Performance Monitoring Infrastructure (PMI)
A set of packages and libraries that are assigned to gather, deliver, process, and display performance data.
* permanent destination
A bus destination for which a runtime instance is created automatically when the messaging engine starts. Permanent destinations remain until they are explicitly deleted by an administrative action. See temporary destination.
* * permission *
Authorization to perform activities, such as reading and writing local files, creating network connections, and loading native code.
* * persist *
To be maintained across session boundaries, usually in nonvolatile storage such as a database system or a directory.
* * persistence *
1. A characteristic of data that is maintained across session boundaries. An object that continues to exist after the start of the program or process that created it, usually in nonvolatile storage such as a database system. 2. In J2EE, the protocol for transferring the state of an entity bean between its instance variables and an underlying database. (Sun)
* perspective
A group of views that show various aspects of the resources in the workbench. The workbench user can switch perspectives, depending on the task, and customize the layout of views and editors within the perspective.
* plain old Java object (POJO)
Another name for a simple or regular java object and not an enterprise bean.
* * plug-in *
A software module that is often written by a third party, that adds function to an existing program or application such as a Web browser.
* * PME *
See programming model extension.
* * PMI *
See Performance Monitoring Infrastructure.
* * point-to-point *
A style of messaging application in which the sending application knows the destination of the message.
* poisoned message
A message that is badly formatted and which, when it arrives on a queue, causes the receiving application to back out the receipt of the message.
* POJO
See plain old Java object.
* * policy *
A set of considerations that influence the behavior of a managed resource or a user.
* * port *
As defined in a WSDL document, a single endpoint defined as a combination of a binding and a network address.
* * port destination *
The specialization of a bus destination that is used to pass messages to an external Web service. You can configure one or more port destinations for each type of message protocol and transport mechanism (for example, SOAP over Hypertext Transfer Protocol (HTTP) or Simple Object Access Protocol (SOAP) over Java Message Service (JMS)) through which service requests and responses can pass to the external service.
* * port number *
In the Internet suite of protocols, the identifier for a logical connector between an application entity and the transport service.
* portal
A single, secure point of access to diverse information, applications, and people that you can customize and personalize.
* portal application archive (PAA)
A portlet application that is packaged as a Web or enterprise archive with two additional Extensible Markup Language (XML) descriptors that define access control, page layout, and navigation as well as any other resources in the package (for example, themes, wires, or Java 2 Platform, Enterprise Edition (J2EE) artifacts).
* portlet
A reusable Web module that runs on a portal server. Portlets have predefined roles, such as retrieving news headlines, searching a database, or displaying a calendar.
* * presumed trust *
A type of identity assertion where trust is presumed and additional trust validation is not performed. Use this mode only in an environment where trust is established with some other mechanism.
* * primary key *
1. An object that uniquely identifies an entity bean within a home. (Sun) 2. In Java programming, a category of data type that describes a variable that contains a single value of the appropriate size and format for its type: a number, a character, or a Boolean value. Examples of primitive types include byte, short, int, long, float, double, char, boolean.
* primitive key
In Java programming, a type of data that describes a variable containing a single value of the appropriate size and format for its type: a number, a character, or a Boolean value. Examples of primitive types include byte, short, int, long, float, double, char, boolean.
* * principal *
An entity that can communicate securely with another entity. In Kerberos, principals are represented as entries in the Kerberos registry database and include users, servers, computers, and others.
* * private key *
In secure communication, an algorithmic pattern used to encrypt messages that only the corresponding public key can decrypt. The private key is also used to decrypt messages that were encrypted by the corresponding public key. The private key is kept on the user's system and is protected by a password. See also key, public key.
* * process definition *
A specification of the runtime characteristics for an application server process.
* * process module *
A program unit that contains a set of process templates that support administrative tasks.
* producer
1. An application that attaches to a destination and produces messages that are put onto the service integration bus. 2. In Java Message Service (JMS), an object that is used for sending messages to a destination.
* * profile *
Data that describes the characteristics of a user, group, program, device, or remote location.
* profile root
The home directory for a particular instantiated profile.
* programmatic login
A type of form login that supports application presentation site-specific login forms for the purpose of authentication.
* * programmatic security *
A collection of methods that are used by applications when declarative security is not sufficient to express the security model of the application.
* * programming model extension (PME) *
The programming model capabilities that ship with WebSphere Application Server Enterprise Edition. These capabilities are also known as enterprise services.
* * property *
A characteristic or attribute that describes a unit of information.
* * proxy cluster *
A group of proxy servers that distributes HTTP requests across the cluster.
* * proxy peer access point *
A means of identifying the communication settings for a peer access point that cannot be accessed directly.
* * proxy server *
A server that acts as an intermediary for HTTP Web requests that are hosted by an application or a Web server. A proxy server acts as a surrogate for the content servers in the enterprise.
* public
In the Java programming language, pertains to a method or variable that can be accessed by elements residing in other classes. (Sun)
* public key
In secure communication, an algorithmic pattern that is used to decrypt messages that were encrypted by the corresponding private key. You can use a public key to encrypt messages that are decrypted by the corresponding private key only. Users broadcast their public keys to everyone with whom they must exchange encrypted messages.
* public-key algorithm
An algorithm that is designed so that the key used for encryption is different from the key that is used for decryption. The decryption key cannot be derived, at least not in any reasonable amount of time, from the encryption key.
* publication point
A message point that is associated with a topic space destination. When you define a topic space, a publication point is created in each messaging engine within the bus. Messages are held at the publication point until they are consumed by all of the local subscribers.
* * publish *
1. To make a Web site public, for example by putting files in a path known to the HTTP server. 2. In Universal Description, Discovery, and Integration (UDDI), to advertise a Web service so that other businesses can find it and bind with it. Service providers publish the availability of their services through a registry.
* publish/subscribe
A style of messaging application in which the providers of information or publishers, are decoupled from the consumers of that information, subscribers, using a broker.
* publish/subscribe bridge
The component of a WebSphere MQ link that enables publish/subscribe messaging between the service integration bus and WebSphere MQ.
* QoS
See quality of service.
* quality of service (QoS)
A set of communication characteristics that is required by an application. QoS defines a specific transmission priority, level of route reliability, and security level.
* * queue *
A WebSphere MQ object to which message queuing applications can put messages, and from which they can get messages. Local queues can contain a list of messages that are waiting to be processed. Queues of other types cannot contain messages: they point to other queues, or can be used as models for dynamic queues.
* queue destination
A bus destination that is used for point-to-point messaging.
* queue point
A messaging point at which messages are held in a queue until they are consumed. When you define a queue destination and assign it to a bus member, a queue point is created for each messaging engine in the assigned bus member.
* * queuing network *
A group of interconnected components.
* * RACF *
See Resource Access Control Facility.
* rapid deployment tools
Tools to rapidly develop and deploy Java 2 Platform, Enterprise Edition (J2EE) artifacts on the server and package the J2EE artifacts into the deployed enterprise archive (EAR) file.
* * RAR *
See resource adapter archive.
* RDBMS
See relational database management system.
* * realm *
A collection of resource managers that honor a common set of user credentials and authorizations.
* * realm name *
The machine name of a user registry.
* * reentrance *
A situation where a thread of control attempts to enter a bean instance again.
* * reference *
A logical name that is defined in the application deployment descriptor and used to locate external resources for enterprise applications. At deployment, the references are bound to the physical location of the resource in the target operational environment.
* * referential integrity *
In Extensible Markup Language (XML) tools, the condition that exists when all of the references to items in the XML schema editor or DTD editor are automatically cleaned up when the schema is detected or renamed.
* referral
In the Lightweight Directory Access Protocol (LDAP), a pointer from one LDAP directory server to another.
* refresh pack
A fix pack, which is a cumulative collection of fixes, that also contains new functions. Full regression testing is performed on refresh packs.
* * region *
A contiguous area of virtual storage that have common characteristics and that can be shared between processes.
* * registry *
A repository that contains access and configuration information for users, systems, and software.
* relational database management system (RDBMS)
A collection of hardware and software that organizes and provides access to a relational database.
* reliability attribute
A quality of service attribute for messages that specifies the reliability of message delivery options.
* reliable nonpersistent
A delivery option that specifies that messages are discarded when a messaging engine stops or fails.
* reliable persistent
A delivery option that specifies that messages can be discarded when a messaging engine fails.
* remote
Pertaining to a system, program, or device that is accessed through a communications line.
* * remote home interface *
In enterprise beans, an interface that specifies the methods that are used by remote clients for locating, creating, and removing instances of enterprise bean classes. See also local home interface.
* remote interface
In enterprise beans, an interface that defines the business methods that can be called by a client.
* remote mediation point
The representation of a remote proxy for a mediation point that exists at a remote messaging engine. The remote mediation poinht manages an outbound message stream to the mediation point at the remote messaging engine.
* remote message point
A message point that a messaging engine creates dynamically for the purpose of sending and receiving messages to and from a message point on another messaging engine in the service.
* remote method
A business method in the remote interface that is callable by a client.
* Remote Method Invocation (RMI)
A protocol that is used to communicate method invocations over a network. Java Remote Method Invocation is a distributed object model in which the methods of remote objects that are written in the Java programming language can be invoked from other Java virtual machines, possibly on different hosts.
* Remote Method Invocation over Internet Inter-ORB Protocol (RMI/IIOP)
Part of the Java 2 Platform, Standard Edition (J2SE) model that developers can use to program in the Java language to work with RMI interfaces, but use IIOP as the underlying transport.
* Remote OSE
The use of the Open Servlet Engine (OSE) protocol as a transport mechanism to communicate between two separate machines in the WebSphere Application Server environment.
* * remote *
Pertaining to a system, program, or device that is accessed through a communications line.
* remote procedure call (RPC)
A protocol that allows a program on a client computer to run a program on a server.
* remote publication point
A representation of a remote proxy for a publication point that exists at a remote messaging engine. The remote publication point manages an outbound message stream to the publication point at the remote messaging engine.
* remote queue point
The representation of a remote proxy for a queue point that exists on a remote messaging engine. The remote queue point manages an outbound message stream to the queue point on the remote messaging engine, and an inbound message retrieval request stream for messages received from the queue point.
* * remove method *
In enterprise beans, a method defined in the home interface and invoked by a client to destroy an enterprise bean.
* * repertoire *
Configuration information that contains the necessary details for building a Secure Sockets Layer (SSL) connection.
* * replication *
The process of copying objects from one node in a cluster to one or more other nodes in the cluster, which makes the objects on all the systems identical.
* * replication entry *
A run-time component that handles the transfer of internal WebSphere Application Server data.
* * repository *
A persistent storage area for source code and other application resources. In a team programming environment, a shared repository enables multi-user access to application resources.
* * request consumer binding *
A definition of the security requests for the request message that is received by a Web service.
* * request generator binding *
A definition of the security requests for the request message that is sent to a Web service.
* * request metrics *
A mechanism to monitor and troubleshoot performance bottlenecks in the system at an individual request level.
* * request receiver binding *
A definition of the security requirements for the request message that is received from a request to a Web service.
* * request sender binding *
A definition of the security requirements for the request message that is sent to a Web service.
* * Resource Access Control Facility (RACF) *
An IBM licensed program that provides access control by identifying users to the system; verifying users of the system; authorizing access to protected resources; logging detected, unauthorized attempts to enter the system; and logging detected accesses to protected resources.
* * resource adapter *
A system-level software driver that is used by an EJB container or an application client to connect to an enterprise information system (EIS). A resource adapter plugs in to a container; the application components deployed on the container then use the client API (exposed by adapter) or tool-generated, high-level abstractions to access the underlying EIS. (Sun) See also container, enterprise information system.
* resource adapter archive (RAR)
A Java archive (JAR) file that is used to package a resource adapter for the Java 2 Connector (J2C) architecture.
* * resource environment reference *
A reference that maps a logical name that is used by the client application to the physical name of an object.
* * resource manager local transaction (RMLT) *
A resource manager view of a local transaction that represents a unit of recovery on a single connection that is managed by the resource manager.
* * resource property *
A property for a Java Database Connectivity (JDBC) data source in a server configuration, for example the server name, user ID, or password.
* Resource Recovery Services (RRS)
A z/OS facility that provides two-phase synchronization point support across participating resource managers.
* response consumer binding
A definition of the security requests for the response message that is received by a Web service
* * response generator binding *
A definition of the security requests for the response message that is sent to a Web service.
* * response receiver binding *
A definition of the security requirements for the response message that is received from a request to a Web service.
* response sender binding
A definition of the security requirements for the response message that is sent to a Web service.
* reverse proxy
An application proxy for servers using Hypertext Transfer Protocol (HTTP).
* reverse routing path
A stack of bus destinations within a request message through which a message is routed back to its origin. When the message is created, the reverse routing path is empty. As the message passes through each destination, the destination is pushed onto the stack. When the message reaches the final destination, the reverse routing path is copied to the forward routing path and the message is routed back through all the appropriate destinations.
* ripplestart
An action where the system waits for each member in a cluster to start before starting the next member of the cluster.
* RMI
See Remote Method Invocation.
* RMI/IIOP
See Remote Method Invocation over Internet Inter-ORB Protocol.
* RMLT
See resource manager local transaction.
* * role *
A logical group of principals that provide a set of permissions. Access to operations is controlled by granting access to a role.
* * role mapping *
The process of associating groups and principals that is recognized by the container to security roles that are specified in the deployment descriptor.
* * role-based authorization *
The use of authorization information to determine whether a caller has the necessary privilege to request a service.
* * routing policy *
A set of rules that determine how the server routes incoming requests.
* * RPC *
See remote procedure call.
* * RRS *
See Resource Recovery Services.
* rule set
A file that contains one or more rules.
* rule
An element that represents a statement in non-elemental form.
* * run time *
The time period during which a computer program runs.
* * RunAs role *
A role that is used by a servlet or an enterprise bean component to invoke and delegate a role to another enterprise bean.
* SAAJ
See SOAP with attachments API for Java.
* SAF
See System Authorization Facility.
* SAML
See Security Assertion Markup Language.
* SAR
See store archive.
* SAS
See Secure Association Service.
* SASL
See Simple Authentication and Security Layer.
* SCA
See Service Component Architecture.
* * scalability *
The ability of hardware, software, or a distributed system to continue to function well as it is changed in size or volume. For example, the ability to retain performance levels when you add processors, memory, and storage.
* scheduler
A service that provides time-dependent services.
* * schema *
1. A collection of database objects such as tables, views, indexes, or triggers that define a database. A database schema provides a logical classification of database objects. 2. In Extensible Markup Language (XML), a mechanism for describing and constraining the content of XML files by indicating which elements are allowed and in which combinations. XML schemas are an alternative to the document type definition (DTD) that you can use to extend functionality in the areas of data typing, inheritance, and presentation.
* * scope *
A specification for the boundary within which you can use system resources.
* * script *
A series of commands, combined in a file, that carry out a particular function when the file runs. Scripts are interpreted as they run.
* * scripting *
A style of programming that reuses existing components as a base for building applications.
* * SDO *
See Service Data Objects.
* SDO repository
A database that the service integration bus for Web services enablement uses for storing and serving Web Services Description Language (WSDL) definitions
* Secure Association Service (SAS)
An authentication protocol that the client principal uses to communicate, by establishing a secure association between the client and server.
* Secure Sockets Layer (SSL)
A security protocol that provides transport layer security, which consists of authenticity, integrity, and confidentiality, for a secure connection between a client and a server. The protocol runs above TCP/IP and below application protocols.
* Security Assertion Markup Language (SAML)
An XML framework for exchanging authentication and authorization information.
* security attribute propagation
The transportation of security attributes from one server to another server in a WebSphere Application Server configuration.
* * security constraint *
A declaration of how to protect Web content, and how to protect data that is communicated between the client and the server.
* * security domain *
The set of all the servers that are configured with the same realm name for the user registry or repository.
* * security permission *
Authorization granted to access a system resource.
* * security policy *
A written document that defines the security controls that you institute for your computer systems. A security policy describes the risks that you intend these controls to minimize and the actions to take if someone breaches your security controls.
* * security role reference *
A role that defines the access levels that users have and the specific resources that they can modify at those levels.
* * security token *
A representation of a set of claims that are made by a client that can include a name, password, identity, key, certificate, group, privilege, and so on.
* selector
A filter that is applied, when a consumer attaches to a bus destination, to indicate which messages the consumer is prepared to accept.
* * sequence grouping *
The specification of the order in which entity beans update relational database tables.
* serial access
An option that prevents the concurrent access and modification of a session in a given server instance.
* * servant region *
A contiguous area of virtual storage that is dynamically started as load increases and automatically stopped as load decreases.
* * server *
In a network, hardware or software that provides facilities to other stations. For example, a file server, a printer server, or a mail server. The station making the request of the server is usually called the client. See also host, client.
* * server cluster *
A group of servers that are typically on different physical machines and have the same applications configured within them, but operate as a single logical server.
* * server implementation object *
Enterprise beans that client applications require to access and implement the services that support those objects.
* * server-side include (SSI) *
A facility for including dynamic information in documents that are sent to clients, such as current date, the last modification date of a file, and the size or last modification of other files.
* service access point
A logical address that allows a system to route data between a remote device and the appropriate communications support.
* * service class *
A subset of a workload that has the same service goals or performance objectives, resource requirements, or availability requirements. For workload management, you assign a service goal to a service class.
* Service Component Architecture (SCA)
An architecture in which all elements of a business transaction, such as access to Web services, enterprise information system (EIS) service assets, business rules, workflows, databases and so on, are represented in a service-oriented way.
* * service context *
Part of a General InterORB Protocol (GIOP) message that is identified with an ID and contains data used in specific interactions, such as security actions, character codeset conversion, and Object Request Broker (ORB) version information.
* * Service Data Object (SDO) *
An open standard for enabling applications to handle data from heterogeneous data sources in a uniform way. SDO incorporates Java 2 Platform, Enterprise Edition (J2EE) patterns, but simplifies the J2EE data programming model.
* * service description *
The description of a Web service, which can be defined in any format such as Web Services Description Language (WSDL), Universal Discovery Description and Integration (UDDI), or Hypertext Markup Language (HTML).
* * service destination *
A specialization of a service integration bus destination. Each service destination can directly represent the Web service implementation or can indirectly represent the service through a Web Services Description Language (WSDL) document.
* * service integration bus *
A managed communication mechanism that supports service integration through synchronous and asynchronous messaging. A bus consists of interconnecting messaging engines that manage bus resources.
* service integration bus link
A link between messaging engines on different service integration buses.
* * service integration bus Web services enablement *
A software component that enables Web services to use IBM service integration technologies. This capability provides a quality of service choice and message distribution options for Web services, with mediations that support message rerouting or modification.
* service oriented architecture (SOA)
A conceptual description of the structure of a software system in terms of its components and the services they provide, without regard for the underlying implementation of these components, services, and connections between components.
* service principal name (SPN)
The name that uniquely identifies a service instance to a client.
* * service type definition *
In Universal Discovery Description and Integration (UDDI), a description of specifications for services or taxonomies.
* * servlet *
A Java program that runs on a Web server and extends the server's functionality by generating dynamic content in response to Web client requests. Servlets are commonly used to connect databases to the Web.
* * servlet filtering *
The process of transforming a request or modifying a response without exposing the resource that is used by the servlet engine.
* * servlet mapping *
A correspondence between a client request and a servlet that defines their association.
* * session *
A series of requests to a servlet that originates from the same user at the same browser.
* * session affinity *
A method of configuring applications in which a client is always connected to the same server. These configurations disable workload management after an initial connection by forcing a client request to always go to the same server.
* * session bean *
An enterprise bean that is created by a client and that usually exists only for the duration of a single client/server session. (Sun) See also entity bean.
* Session Initiation Protocol (SIP)
A protocol that initiates, modifies, and terminates interactive user sessions that involve multimedia. it works with other protocols and is involved specifically in the signaling portion of a communication session.
* * setter method *
A method whose purpose is to set the value of an instance or class variable. This capability allows another object to set the value of one of its variables. See also getter method.
* setup
The physical and logical arrangement of hardware and software that make up a data processing system.
* SGML
See Standard Generalized Markup Language.
* SHA-1
A Secure Hash Algorithm for computing a condensed representation of a message or data file.
* * shared library file *
A file that consists of a symbolic name, a Java class path and a native path for loading Java Native Interface (JNI) libraries. Applications that are deployed on the same node as this file can access this information.
* * short name *
In personal communications, the one-letter name (A through Z) of the presentation space or emulation session.
* Show Me
A link that launches an animated demonstration of the task that is being described in the documentation of the product.
* SIB service
In an application server, the service that provides service integration functions.
* * signer certificate *
The trusted certificate entry that is usually in a truststore file.
* silent installation
An installation that does not send messages to the console, but instead stores messages and errors in log files. A silent installation can use response files for data input.
* Simple and Protected Negotiation Mechanism (SPNEGO)
A protocol by which clients and servers determine an authentication mechanism.
* Simple Authentication and Security layer (SASL)
An Internet protocol that allows Lightweight Directory Access Protocol (LDAP) server and provides security for the data that is transmitted with this protocol.
* * Simple Object Access Protocol (SOAP) *
A lightweight, Extensible Markup Language (XML)-based protocol for exchanging information in a decentralized, distributed environment. You can use SOAP to query and return information and invoke services across the Internet.
* * simple type *
In the XML Schema language (XSL), a type that cannot have element content and cannot carry attributes. Elements that contain numbers, strings, dates, and so on, but do not contain any sub-elements. See also complex type.
* * single signon (SSO) *
An authentication process in a client/server relationship in which the user can enter one name and password and have access to more than one application.
* SIP
See Simple Object Access Protocol.
* * smart card *
An intelligent token that is embedded with an integrated circuit chip that provides memory capacity and computational capabilities
* * SOAP *
See Simple Object Access Protocol.
* * SOAP with attachments API for Java (SAAJ) *
An application programming interface (API) that is used to send XML documents over the Internet from a Java base.
* * socket *
A method of communication between two processes. A socket is an identifier that the application uses to uniquely identify an end point of communications. The user associates a protocol address with the socket by associating a socket address with the socket.
* * Sockets Secure (SOCKS) *
A client/server architecture that transports TCP/IP traffic through a secure gateway. A SOCKS server and a proxy server perform many of the same services.
* * SOCKS *
See Sockets Secure.
* software development kit
A set of tools, application programming interfaces (APIs), and documentation to assist with the development of software in a specific computer language or for a particular operating environment.
* special-subject
A generalization of a particular class of users; a product-defined entity that is independent of the user registry.
* SPN
See service principal name.
* SPNEGO
See Simple and Protected Negotiation Mechanism.
* SQL
See Structured Query Language.
* SQLJ
See Structured Query Language for Java.
* SSI
See server-side include.
* SSL
See Secure Sockets Layer.
* SSL channel
A type of channel within a transport chain that associates a Secure Sockets Layer (SSL) configuration repertoire with the transport chain.
* SSO
See single signon.
* stack
An area in memory that stores temporary register information, parameters, and return addresses of subroutines.
* Standard Generalized Markup Language (SGML)
A standard metalanguage for defining markup languages that is based on the ISO 8879 standard. SGML focuses on structuring information rather than presenting information; it separates the structure and content from the presentation. It also facilitates the interchange of documents across an electronic medium.
* stateful session bean
A session enterprise bean that acts on behalf of a single client and maintains client-specific session information, which is called conversational state, across multiple method calls and transactions.
* * stateless session bean *
A session bean that is a collection of operations. The server can optimize resources by reusing bean instances on every method call.
* statement
An instruction in a program or procedure.
* * static *
A Java programming language keyword that is used to define a variable as a class variable.
* store archive (SAR)
A platform-independent file format that aggregates many files into one.
* * stored procedure *
A block of procedural constructs and embedded Structured Query Language (SQL) statements that is stored in a database and that you can call by name. Stored procedures allow an application program to run in two parts, one on the client and the other on the server, so that one call can produce several accesses to the database.
* * stream decryption *
A symmetric algorithm that decrypts data one bit or byte of data at a time.
* * stream encryption *
A symmetric algorithm that encrypts data one bit or byte of data at a time.
* * string *
In programming languages, the form of data used for storing and manipulating text.
* * Structured Query Language (SQL) *
A standardized language for defining and manipulating data in a relational database. See also data manipulation language.
* * Structured Query Language for Java (SQLJ) *
A standard for embedding SQL in Java programs, defining and calling Java stored procedures and user-defined functions, and using database structured types in Java.
* * Struts *
An open source framework for building Java Web applications.
* * Struts module *
A Struts configuration file and a set of corresponding actions, form beans, and Web pages. A Struts application comprises at least one Struts module.
* * stub *
A small program routine that substitutes for a longer, possibly remote, program. For example, a stub might be a program module that transfers remote procedure calls (RPCs) and responses between a client and a server. In Web services, a stub is an implementation of a Java interface that is generated from a Web Services Description Language (WSDL) document.
* subscription point
A message point that represents a durable subscription and is associated with a publication point.
* * symmetric algorithm *
An algorithm where the encryption key can be calculated from the decryption key and vice versa. In most symmetric algorithms, the encryption key and the decryption key are the same.
* * syntax *
The rules for the construction of a command or statement. See also semantics.
* * sysplex *
See system complex.
* * System Authorization Facility (SAF) *
An interface defined by MVS that enables programs to use system authorization services in order to protect access to resources such as data sets and MVS commands. The IBM Resource Access Control Facility (RACF) is a product that uses the SAF interface.
* * system complex (sysplex) *
A set of MVS or OS/390 systems that communicate and cooperate with each other through certain multisystem hardware components and software services to process customer workloads.
* * system logger *
A central logging facility that system and subsystem components can use.
* * tag library *
In JSP technology, a collection of tags identifying custom actions described using a taglib descriptor and Java classes. A JSP tag library can be imported into any JSP file and used with various scripting languages. (Sun)
* * TAI *
See trust association interceptor.
* target
The destination for an action or operation.
* * target service *
A service that exists outside of the gateway.
* * TCP channel *
A type of channel within a transport chain that provides client applications with persistent connections within a local area network (LAN).
* temporary destination
A bus destination that is created by an application from a model destination that an administrator pre-configured. The application can delete temporary destinations automatically when the application disconnects.
* * temporary file system (TFS)*
A temporary, in-memory physical file system that supports in-storage mountable file systems. Normally, a TFS runs in the kernel address space, but it can be run in a logical file system (LFS) colony address space.
* TFS
See temporary file system.
* * thin application client *
A lightweight, downloadable Java application run time that is capable of interacting with enterprise beans.
* * thin client *
A client that has little or no installed software but has access to software that is managed and delivered by network servers that are attached to it. A thin client is an alternative to a full-function client such as a workstation.
* * thread *
A stream of computer instructions that is in control of a process. A multithread process begins with one stream of instructions, one thread, and might later create other instruction streams to perform tasks.
* * throughput *
The measure of the amount of work that is performed by a device, such as a computer or printer, over a period of time, for example, the number of jobs per day.
* * Time Sharing Option (TSO) *
An option of the MVS operating system that provides interactive time sharing from remote terminals.
* * Tivoli Performance Viewer *
A Java client that retrieves the Performance Monitoring Infrastructure (PMI) data from an application server and displays it in various formats.
* * TLS *
See Transport Layer Security.
* * token *
A particular message or bit pattern that signifies permission or temporary control to transmit on a network. See also token-ring network.
* topic
A character string that describes the nature of the data that is being published in a publish/subscribe system.
* topic space
1. A hierarchical collection of named topics. 2. A bus destination that is used in publish/subscribe messaging.
* topology
The physical or logical arrangement of nodes in a network, especially the relationship among nodes and the links between them.
* * transaction *
A specific set of input data that runs a specific process or job; a message that is destined for an application program.
* transaction class module
A transaction class and Web module pair.
* * transform algorithm *
A procedure that is used to transform the message for Web services security message processing, such as the C14N (canonicalization) transform that is used for Extensible Markup Language (XML) digital signatures.
* * transport *
The request queue between a WebSphere Application Server plug-in for Web servers and a Web container in which the Web modules of an application reside. When a user at a Web browser requests an application, the request is passed to the Web server, and then along the transport to the Web container.
* * transport chain *
A representation of a network protocol stack that is operating within an application server.
* * transport channel chain *
A specification of the transport channels that are used by a server for receiving information. Transport channel chains contain endpoints
* * Transport Layer Security (TLS) *
An Internet Engineering Task Force (IETF)-defined security protocol that is based on Secure Sockets Layer (SSL) and is specified in RFC 2246.
* * trust anchor *
A trusted keystore file that contains a trusted certificate or a trusted root certificate that is used to assert the trust of a certificate.
* * trust association *
An integrated configuration between the security server of the product and third-party security servers. A reverse proxy server acts as a front-end authentication server, while the product applies its own authorization policy onto the resulting credentials passed by the proxy server.
* trust association interceptor (TAI)
The mechanism by which trust is validated in the product environment for every request received by the proxy server. The method of validation is agreed upon by the proxy server and the interceptor.
* * trust file *
A file that contains signer certificates.
* * trust relationship *
An established and trusted communication path through which a computer in one domain can communicate with a computer in the other domain. Users in a trusted domain can access resources in the trusting domain.
* * trusted identity (ID) evaluator *
A mechanism that is used by a server to determine whether to trust a user identity during identity assertion.
* * truststore file *
A key database file that contains the public keys for that target server.
* * TSO *
See Time Sharing Option.
* type
1. In Java programming, a class or interface. 2. In a Web Services Description Language (WSDL) document, a container for data type definitions using some type system, such as W3C XML Schema (XSD).
* * type hierarchy *
The complete context for a Java class or interface including its superclasses and subclasses.
* UDDI
See Universal Discovery Description and Integration.
* UDDI node
A set of Web services that supports at least one of the Universal Description, Discovery, and Integration (UDDI) APIs. A UDDI node consists of one or more instances of a UDDI application running on an application server or a cluster of application servers with an instance of the UDDI database.
* UDDI node initialization
The process by which values are set in the Universal Description, Discovery, and Integration (UDDI) database and the behavior of the UDDI node is established.
* UDDI node state
A description of the current status for the Universal Description, Discovery, and Integration (UDDI) node.
* UDDI policy
A statement of the required and expected behavior for a Universal Description, Discovery, and Integration (UDDI) registry that is specified through policy values that are defined in the UDDI specification.
* UDDI property
A characteristic or attribute that controls the behavior of a Universal Description, Discovery, and Integration (UDDI) node.
* UDP
See User Datagram Protocol.
* * UML *
See Unified Modeling Language.
* * Unified Modeling Language (UML) *
A standard notation for the modeling of real-world objects as a first step in developing an object-oriented design methodology. UML is defined by the Object Management Group (OMG).
* * Uniform Resource Identifier (URI) *
A compact string of characters that identifies an abstract or physical resource.
* * Uniform Resource Locator (URL) *
The unique address of a file that is accessible in a network such as the Internet. The URL includes the abbreviated name of the protocol that is used to access the information resource and the information used by the protocol to locate the information resource.
* * Universal Discovery Description and Integration (UDDI) *
A distributed registry of businesses and their service descriptions that adhere to the Universal Description, Discovery, and Integration (UDDI) standard for managing the discovery of Web services. UDDI registries come in two forms, public and private, both of which are implemented in a common Extensible Markup Language (XML) format.
* * universally unique identifier (UUID) *
The 128-bit numerical identifier that is used to ensure that two components do not have the same identifier. The identifier is unique for all space and time.
* * unmanaged node *
A node that is defined in the cell topology. This node does not have a node agent that manages the process. An unmanaged node is typically used to manage Web servers.
* UOW
See unit of work.
* * URI *
See Uniform Resource Identifier.
* * URL *
See Uniform Resource Locator.
* * URL scheme *
A format that contains another object reference.
* User Datagram Protocol (UDP)
an Internet protocol that provides unreliable, connectionless datagram service. It enables an application program on one machine or process to send a datagram to an application program on another machine or process.
* * user name token *
A type of token that is represented by a user name and optionally, by a password.
* * user registry *
A database of known users and user-provided information that is used for authentication purposes.
* * UUID *
See universally unique identifier.
* * validation *
The checking of data or code for correctness or for compliance with applicable standards, rules, and conventions.
* * variable *
A configuration property that provides a parameter for any value in the system. It has a name and a value to use in place of that name wherever the variable name is located within the configuration files.
* version
A separately licensed program that usually has significant new code or new function.
* * vertical scaling *
Setting up multiple application servers on one machine, usually by creating cluster members.
* view
In Eclipse-based user interfaces, any pane in the workbench that is outside the editor area and can stack (drag and drop) on top of other views. Views provide different ways to work with the resources in the workbench.
* * view synchronous high-availability manager group *
A special class of high availability (HA) group that you can create for components to use that require a certain virtual synchrony (VS) quality of service (QoS) for group communication.
* View Synchrony Protocol
A multipoint communication protocol that provides synchronous message delivery and group membership; also known as Virtual Synchrony.
* * virtual host *
A configuration that enables a single host machine to resemble multiple host machines. Resources that are associated with one virtual host cannot share data with resources that are associated with another virtual host, even if the virtual hosts share the same physical machine.
* * virtual machine *
An abstract specification for a computing device that can be implemented in different ways in software and hardware.
* * virtual private network (VPN) *
An extension of a company's intranet over the existing framework of either a public or private network. A VPN ensures that the data that is sent between the two endpoints of its connection remains secure.
* * virtual synchrony (VS) *
A property of group communication that guarantees how messages are delivered when the view changes, for example, when existing members fail or new members join.
* * VPN *
See virtual private network.
* * VS *
See virtual synchrony.
* * W3C *
See World Wide Web Consortium.
* W3C XML Schema (XSD)
A library that provides an application programming interface (API) for manipulating the components of an XML Schema, as described by the W3C XML Schema specifications.
* * waiter *
A thread waiting for a connection.
* * WAR *
See Web archive.
* * WCCM *
See WebSphere Common Configuration Model.
* * Web application *
An application that consists of one or more related servlets, JavaServer Pages technology, and HyperText Markup Language (HTML) files that are managed as a unit.
* * Web archive (WAR) *
A compressed file format that is defined by the Java 2 Platform, Enterprise Edition (J2EE) standard, for storing all the resources that are required to install and run a Web application in a single file. See also enterprise archive.
* * Web browser *
A client program that initiates requests to a Web server and displays the information that the server returns.
* * Web component *
A servlet, JavaServer Page (JSP) file, or a HyperText Markup Language (HTML) file. One or more Web components make up a Web module.
* * Web container *
A container that implements the Web component contract of the J2EE architecture. (Sun)
* * Web container channel *
A type of channel within a transport chain that creates a bridge in the transport chain between an HTTP inbound channel and a servlet or JavaServer Pages (JSP) engine.
* * Web module *
A unit that consists of one or more Web components and a Web deployment descriptor. (Sun)
* * Web property extension (WPX)*
IBM extensions to the standard deployment descriptors for Web applications. These extensions include Multipurpose Internet Mail Extensions (MIME) filtering and servlet caching.
* * Web resource *
Any one of the resources that are created during the development of a Web application, for example Web projects, HTML pages, JSP files, servlets, custom tag libraries, and archive files.
* * Web resource collection *
A list of URL patterns and HTTP methods that describe a set of resources to be protected. (Sun)
* Web server
A software program that is capable of servicing Hypertext Transfer Protocol (HTTP) requests.
* * Web server plug-in *
A software module that supports the Web server in communicating requests for dynamic content, such as servlets, to the application server.
* * Web server separation *
A topology where the Web server is physically separated from the application server.
* * Web service *
A software system that is designed to support interoperable machine-to-machine interaction over a network. It has an interface described in a machine-processable format (specifically Web Services Description Language (WSDL)).
* * Web Services Description Language (WSDL) *
An XML-based specification for describing networked services as a set of endpoints that operate on messages containing either document-oriented or procedure-oriented information.
* * Web Services Invocation Framework (WSIF) *
A Java application programming interface (API) that supports dynamic invoking of Web services, regardless of the format in which the service is implemented or the access mechanism.
* * WebSphere Common Configuration Model (WCCM) *
A model for programmatic access to configuration data that is used by the WebSphere Application Server tooling, run time, and administrative console.
* WebSphere
An IBM brand name that encompasses tools for developing e-business applications and middleware for running Web applications.
* WebSphere MQ client link
An optional component of a messaging engine that presents the messaging engine, and thereby the bus, as a WebSphere MQ queue manager to which WebSphere MQ clients can attach.
* WebSphere MQ link
An optional component of a messaging engine that defines the connection information necessary to establish a connection to a remote WebSphere MQ queue manager.
* * wizard *
An active form of help that guides users through each step of a particular task.
* * work manager *
A thread pool for Java 2 Platform, Enterprise Edition (J2EE) applications.
* * work object *
A type of asynchronous bean that applications implement to run code blocks asynchronously
* * workflow *
The sequence of activities that is performed in accordance with the business processes of an enterprise.
* * workload management *
The optimization of the distribution of incoming work requests to the application servers, enterprise beans, servlets and other objects that can effectively process the request.
* * workspace *
A temporary repository of configuration information that administrative clients use.
* * World Wide Web Consortium (W3C) *
An international industry consortium that develops common protocols to promote evolution and interoperability of the World Wide Web.
* * WPX *
See Web property extensions.
* * wrapper *
An alternate and supported interface that hides unsupported data types that are required by a server object behind a thin intermediate server object.
* * WSDL *
See Web Services Description Language.
* * WSIF *
See Web Services Invocation Framework.
* WS-Security
A Web services security standard that provides secure transmission of Simple Object Access Protocol (SOAP) messages.
* * X.509 certificate *
A certificate that contains information that is defined by the X.509 standard.
* X/Open XA
The X/Open Distributed Transaction Processing XA interface. A proposed standard for distributed transaction communication. The standard specifies a bidirectional interface between resource managers that provide access to shared resources within transactions, and between a transaction service that monitors and resolves transactions.
* XML
See Extensible Markup Language.
* * XML digital signature *
A specification that defines the XML syntax and the processing rules to sign and verify the digital signatures for the digital content.
* * XML encryption *
A specification that defines how to encrypt the content of an XML element.
* * XML parser *
A program that interprets the contents of an XML file and determines what to do with the input.
* * XML token *
A security token that is in an XML format, such as a Security Assertion Markup Language (SAML) token.
* XSD
See W3C XML Schema.
* * zip *
One or more files that are compressed and stored in a single file with a name ending in .zip.


ref: http://www.ibm.com/developerworks/wikis/display/xdcomputegrid/Glossary