Skip to content

Glossary of Terms

AppDataFolder property

The full path of the Roaming folder for the current user. The default is C:\Users\username\AppData\Roaming\.

authentication

The process of reliably determining the identity of a communicating party. Identity can be proven by something you know (such as a password), something you have (such as a private key or token), or something intrinsic about you (such as a fingerprint).

Auto Expand

Use the Auto Expand feature to add acronyms or shortcuts for long words, phrases, or complex repeat commands. The shortcut, when typed and followed by the Spacebar, automatically expands to the full word or phrase.

CA (Certificate Authority)

A server, in a trusted organization, which issues digital certificates. The CA manages the issuance of new certificates and revokes certificates that are no longer valid for authentication. A CA may also delegate certificate issuance authority to one or more intermediate CAs creating a chain of trust. The highest level CA certificate is referred to as the trusted root.

cipher

A cipher is an encryption algorithm. The cipher you select determines which mathematical algorithm is used to obscure the data being sent after a successful Secure Shell connection has been established.

CommonAppDataFolder property

The full path to application data for all users. The default is C:\ProgramData.

CRL (Certificate Revocation List)

A digitally signed list of certificates that have been revoked by the Certification Authority. Certificates identified in a CRL are no longer valid.

data integrity

The assurance that data has not been changed from its original source. Methods to preserve data integrity are designed to ensure that data has not been accidentally or maliciously modified, altered or destroyed.

digital certificate

An integral part of a PKI (Public Key Infrastructure). Digital certificates (also called X.509 certificates) are issued by a certificate authority (CA), which ensures the validity of the information in the certificate. Each certificate contains identifying information about the certificate owner, a copy of the certificate owner's public key (used for encrypting and decrypting messages and digital signatures), and a digital signature (generated by the CA based on the certificate contents). The digital signature is used by a recipient to verify that the certificate has not been tampered with and can be trusted.

digital signature

Used to confirm the authenticity and integrity of a transmitted message. Typically, the sender holds the private key of a public/private key pair and the recipient holds the public key. To create the signature, the sender computes a hash from the message, and then encrypts this value with its private key. The recipient decrypts the signature using the sender's public key, and independently computes the hash of the received message. If the decrypted and calculated values match, the recipient trusts that the sender holds the private key, and that the message has not been altered in transit.

encryption

Encryption is the process of scrambling data by use of a secret code or cipher so that it is unreadable except by authorized users. Encrypted data is far more secure than unencrypted data.

Express Logon Feature (ELF)

Also referred to as single sign-on (SSO), express logon is an IBM mainframe feature that lets users log on and connect to the host without entering a user ID and password each time. Express Logon authenticates the user on the mainframe by using her SSL client certificate in lieu of entering a user ID and password.

FCC

Field Control Character. A UTS terminal field attribute.

GSSAPI (Generic Security Services Application Program Interface)

An application programming interface that provides programs with access to security services.

hash

Also called a message digest, a hash or hash value is a fixed-length number generated from variable-length digital data. The hash is substantially smaller than the original data, and is generated by a formula in such a way that it is statistically unlikely that some other data will produce the same hash value.

InfoConnect application data folder

This folder location is configurable using the Data Location tab during installation. The default is C:\Users\Public\Documents\Micro Focus\InfoConnect.

InfoConnect database

The InfoConnect database (ic32.cfg) contains connection settings information for ALC, T27, and UTS terminal sessions. The database contains information about all the InfoConnect packages, path templates and libraries that have been installed, as well the paths that have been created. The InfoConnect packages, path templates and libraries are included based on which product features (emulations and transports) are installed.

InfoConnect global application data folder

Settings here apply to all users of the system. The location is version-specific: \ProgramData\Micro Focus\InfoConnect\Desktop\.

InfoConnect global ssh data folder

InfoConnect stores global Secure Shell information in the Windows common application data folder. The default is \ProgramData\Micro Focus\Reflection.

InfoConnect program folder

The default on English language systems is C:\Program Files (x86)\Micro Focus\InfoConnect on 64-bit systems and C:\Program Files\Micro Focus\InfoConnect on 32-bit systems.

InfoConnect user application data folder

The default is \Users\username\AppData\Roaming\Micro Focus\InfoConnect\Desktop\ .

InfoConnect user data folder

This folder location is configurable using the Data Location tab during installation. The default is C:\Users\username\Documents\Micro Focus\InfoConnect.

InfoConnect user ssh folder

InfoConnect stores Secure Shell information for individual users in the following location in the Windows personal documents folder. The default is \Users\``username\Documents\Micro Focus\InfoConnect\.ssh.

KDC (Key Distribution Center)

The security server that maintains the database of principal information, uses the information in the database to authenticate users, and controls access to kerberized services in a realm.

Kerberos

A protocol that uses a trusted third party to enable secure communications over a TCP/IP network. The protocol uses encrypted tickets rather than plain-text passwords for secure network authentication.

keyboard map

A keyboard map is a configuration file that allows you to use your PC keyboard as a host terminal keyboard. Keyboard maps also include definitions for keyboard shortcuts.

LDAP (Lightweight Directory Access Protocol)

A standard protocol that can be used to store information in a central location and distribute that information to users.

MAC (Message Authentication Code)

Used to verify that data is not changed in transit, a MAC is a hash created using an arbitrary-length packet of data and a shared secret key. The sending and receiving party compute the MAC independently for each packet of transferred data using the shared key and an agreed-upon algorithm. If the message has changed in transit, the hash values are different and the packet is rejected.

OCSP (Online Certificate Status Protocol)

A protocol (using the HTTP transport) that can be used as an alternative to CRL checking to confirm whether a certificate is valid. An OCSP responder responds to certificate status requests with one of three digitally signed responses: "good", "revoked", and "unknown". Using OCSP removes the need for servers and/or clients to retrieve and sort through large CRLs.

package

An InfoConnect package is a collection of components that provide specific communication capabilities. Transport packages typically consist of one or more external interface libraries (EILs) or service libraries (SLs). For example, the InfoConnect TCP/IP Transport package includes the TCP EIL and the TP0 SL. Accessory packages typically consist of the terminal emulator or file transfer application and other related products. For example, the InfoConnect T27 package includes InfoConnect T27, T27 Print Services, and the T27 Print Services Configuration Utility.

passphrase

A passphrase is similar to a password, except it can be a phrase with a series of words, punctuation, numbers, white space, or any string of characters. Passphrases improve security by limiting access to secure objects, such as private keys and/or a key agent.

path

An InfoConnect path is a named collection of configuration settings that allows you to connect to a host. Paths are required for connections to ALC, T27 and UTS terminal sessions, and for PTR router connections. Path configuration data is stored in the InfoConnect database.

path template

InfoConnect path template are used as the basis for configuring paths. Each is combination of one or more libraries required for a particular connection type. If a library in the path template can have library channels, the path template can also indicate which library channel to use.

PCI DSS

PCI DSS (Payment Card Industry Data Security Standard) is a worldwide standard comprising technology requirements and process requirements designed to prevent fraud and is published by PCI Security Standards Council, LLC. All companies who handle credit cards are likely to be subject to this standard.

PersonalFolder property

The full path to the Documents folder for the current user. The default is C:\Users\username\Documents.

PKCS

PKCS (Public Key Cryptography Standards) is a set of standards devised and published by RSA laboratories that enable compatibility among public key cryptography implementations. Different PKCS standards identify specifications for particular cryptographic uses, for example:

  • PKCS#7 can be used to sign and/or encrypt messages. It can also be used to store certificates and to disseminate certificates (for instance as a response to a PKCS#10 message).

  • PKCS#10 is a certification request syntax.

  • PKCS#11 is a programming interface used for cryptographic hardware tokens.

  • PKCS#12 defines the personal information exchange syntax used for storage and transportation of certificates and associated private keys. Files in this format typically use a .pfx or .p12 extension.

port forwarding

A way to redirect unsecured traffic through a secure SSH tunnel. Two types of port forwarding are available: local and remote. Local (also called outgoing) port forwarding sends outgoing data sent from a specified local port through the secure channel to a specified remote port. You can configure a client application to exchange data securely with a server by configuring the client to connect to the redirected port instead of directly to the computer running the associated server. Remote (also called incoming) port forwarding sends incoming data from a specified remote port through the secure channel to a specified local port.

product application data folder

Secure Shell information that is available to all users is stored in \programdata\Micro Focus\<product-name>\.

PTR route

A PTR route configures required information for printing using PTR. It consists of three parts: the host path (configures the communication link between PTR and the host), the host filter (a DLL that initializes the host connection, manipulates the printer data for the selected output device, and sends the data to the output device), and the printer queue path (configures the communication link between PTR and the output device, such as a printer or file).

public key/private key

Public keys and private keys are pairs of cryptographic keys that are used to encrypt or decrypt data. Data encrypted with the public key can only be decrypted with the private key; and data encrypted with the private key can only be decrypted with the public key.

regular expression

Often abbreviated as regex, a regular expression is a string of characters that describes one or more matching strings. Within a regular expression, some characters have a predefined meaning that determines what qualifies as a match. For example, the regular expression "t.*t" matches any word that starts and ends in the letter t, while the regular expression "text" matches only itself.

Screen History

Screen History creates recordings of host screens as you navigate to them. (VT screens are not recorded automatically; they can be recorded using manual capture.) You can view and/or verify the information from those screens, and send multiple host screens to Microsoft Word, PowerPoint, and Outlook (Email Message and Note only), if they are installed on your computer.

Secure Shell

A protocol for securely logging onto a remote computer and executing commands. It provides a secure alternative to Telnet, FTP, rlogin, or rsh. Secure Shell connections require both server and user authentication, and all communications pass between hosts over an encrypted communication channel. You can also use Secure Shell connections to forward X11 sessions or specified TCP/IP ports through the secure tunnel.

Secure Shell .ssh folder

Secure Shell information for individual users is stored in the following location in the Windows personal documents folder: \Users*username*\Documents\Micro Focus\.ssh\. Comparable files are placed in the $HOME directory on UNIX systems.

socket

The combination of a host name (IP address or DNS name) and a port number. This creates a unique identifier that a client application uses as an end point of communications.

T27 print services configuration file

A file use by T27 Print Services to view and manage host printing. Each configuration file contains settings for up to eight print environments. The default configuration file is STDCFG.ATM.

T27 print services environment

A set of configuration options that represents one host connection and determine how printing operates from that host.

trusted host

A trusted host is one for which you hold the public key.

trusted locations

A trusted location is a directory that's designated as a secure source for opening files. By default, InfoConnect allows you to open documents only in directories specified as trusted locations using the Specify Trusted Locations dialog box.

URI (Uniform Resource Identifier)

A string of characters that represents the location or address of a resource. URIs can be used to locate resources on the Internet or on an LDAP server.

UTC (Universal Time, Coordinated)

A high-precision time standard. When describing time zones, UTC refers to the time kept on the Greenwich meridian (longitude zero), also known as Greenwich Mean Time. UTC times are generally given in terms of a 24-hour clock.

Windows common application data folder

The application data folder is hidden by default. The default is \ProgramData\.

Windows personal documents folder

The default on English systems is \Users\username\Documents\.

Windows user profile folder

The user profile folder is configurable by the Windows system administrator. The default is \Users*username*\ .

Workspace Menu

The Workspace menu contains layout options, application and document settings, and a list of recent documents. It is accessed by clicking the File menu (when using the ribbon user interface).