Glossary of Terms
.NET
A software platform designed by the Microsoft Corporation. It is an environment
for writing C#, Visual Basic, and C++ programs that can easily and securely
interoperate.
.NET Framework
An environment for building, deploying, and running Web services and other
applications. It consists of three main parts: the Common Language Runtime, the
Framework classes, and ASP.NET.
.NET Framework Software Development Kit (SDK)
A set of documentation, samples, command-line tools, compilers, and the
.NET Framework; that is, everything you need to write, build, test, and
deploy .NET Framework applications.
Accepting Security Provider
A security provider that is responsible for accepting secure requests and usually
also for determining the invoker identity.
See Also: Identity
Access Control
Restrictions of a subject's access to a resource.
See Also: Access Controller, Subject
Access Controller
An application component that is responsible for access control decisions.
See Also: Access Control
accessPoint
A binding template element that indicates where you can find the endpoint of the
Web service that is described by this entity. This may be a URL, an electronic mail
address, or even a telephone number.
See Also: Universal Description, Discovery and Integration
ACL
Access Control List — A list of entities, together with their access
rights, the members of which have authorized access to a resource.
See Also: Subject
Admin Service
The core System Web service, allowing you to manage advanced settings for each
deployed service on a WSO2 SOA Enablement Server. Using this Web service it is possible to manage
settings like security mechanisms, transport interceptors, polymorphism, automatic
Web service authentication, and automatic authorization checks per Web service
method.
Alias
A name that an entity uses in place of its real name.
Apache Containers
A schema for transferring containers proposed by Apache group. This schema is not
compatible with Microsoft .NET.
Application Server-Dependent Deployment Descriptor
When an enterprise application is deployed on the server, it contains a set of
deployment descriptors. They contain application metadata. Format and meaning of
Application Server Dependent Deployment Descriptor is closely related to the
application server and cannot be used in the context of any other application
server.
Application Web services
Web services can be categorized into the three groups: System, Application, and
Utility Web services. Application Services are created for specific tasks by the
developer. To accomplish the task they typically use Utility Web services.
ASP .NET
ASP .NET is a unified Web development platform that provides the services
necessary for developers to build enterprise-class Web applications.
Asynchronous Client Invocation
Client invocation of any Web service in an asynchronous way.
Asynchronous Return Mechanism
A service implementation returning the results of a call to WSO2 SOA Enablement Server in an
asynchronous way.
Asynchronous Transport Coupling
Sending the response from a Web service invocation over a different transport
channel than the one on which the request came.
Authentication
The process of establishing the validity of a claimed identity, it usually
consists of two steps: 1/ identification - presenting identity credentials to the
security system, 2/ verification - generating identity that corroborates the binding
between the identity principals and credentials.
Authorization
The process of determining what types of activities are permitted. Usually,
authorization is in the context of authentication. Once you have authenticated
principals, they may be authorized different types of access or activity.
See Also: Authentication
BEA WebLogic Application Server
An application server provided by BEA Systems, Inc.
Binding Template
For a businessService entry, a list of binding templates that point to
specifications and other technical information about the service is associated. For
example, a binding template might point to a URL that supplies information on how to
invoke the service. The binding template also associates the service with a service
type.
See Also: Universal Description, Discovery and Integration
Borland Application Server
An application server provided by the Borland Software Corporation.
Borland Enterprise Server
An application server provided by Borland Software Corporation.
Business Entity
A representation of information about a business. Each business entity contains a
unique identifier, the business name, a short description of the business, some
basic contact information, a list of categories and identifiers that describe the
business, and a URL pointing to more information about the business.
See Also: Universal Description, Discovery and Integration
Business Policy
A set of requirements, codified in Technical Policies, and their associations with
a set of artifacts in an SOA. A Business Policy should always represent a course of
action that is needed to achieve a particular business objective.
The business policies are covered by the WS-PolicyAttachment specification.
See Also: Technical Policy
Business Service
A structure associated with a businessEntity that consists of a list of
businessService structures offered by the businessEntity. Each businessService entry
contains a business description of the service, a list of categories that describe
the service, and a list of pointers to references and information related to the
service.
See Also: Universal Description, Discovery and Integration
C#
A modern, object-oriented language that enables programmers to build a
applications for the Microsoft .NET platform.
Catalina Servlet Container
A Tomcat 4.0 servlet container. Tomcat is the servlet container that is used in
the official Reference Implementation for the Java Servlet and JavaServer Pages
technologies.
Certificate
An electronic identifier from a certification authority that includes the
certification authority signature made with its private key. The authenticity of the
signature is validated by other users who trust the certification authority public
key.
See Also: Certification Authority
Certificate Chain
A list of Certificates (usually X.509 Certificates), starting with a certificate
for a given subject that is signed by the authority represented by the next
certificate in the list. This list usually ends with the root certification
authority certificate.
See Also: X.509
Certificate Revocation List
A data structure that enumerates digital certificates that have been invalidated
by their issuer prior to when they were scheduled to expire.
See Also: Certificate
Certification Authority
An entity that issues digital certificates (especially X.509 certificates) and
vouches for the binding between the data items in a certificate.
See Also: X.509
Client Package
Client side-specific information needed to invoke a specific Web service. This
usually consists of a deployment descriptor and custom code, such as header
processors, interceptors, serializers.
Clustering
The act of connecting multiple computers and making them act like a single
machine. Corporations often cluster servers to distribute computing-intensive tasks
and risks. If one server in a cluster fails, some operating systems can move its
processes to another server, allowing end users to continue working while the first
server is revived.
Content Based Routing (CBR)
An advanced and easy to use technique for message routing based on message
content.
See Also: XPath
Credentials
Data that is transferred to establish the claimed identity of an entity. According
to RFC2828, a credential is the information one entity presents to another to
authenticate the other's identity.
CRL
See: Certificate Revocation List.
CTS (Common Types System)
A definition of how types work within runtime (their declaration and usage), which
enables types in one language to interoperate with types in another language,
including cross-language exception handling.
See Also: .NET
DMZ (Demilitarized Zone)
An unprotected server on which all parties have access to everything. A web server
may be put in the DMZ while the assets it accesses, such as databases, remain behind
a firewall. It works in conjunction with transport layer security.
See Also: TLS
Deploy Service
A System Web service that is used to deploy packages to a WSO2 SOA Enablement Server.
Deploy Tool
A part of WSO2 SOA Enablement Server that deploys and undeploys deployment packages to
WSO2 SOA Enablement Servers.
Deployment
The process of installing a deployment package to particular WSO2 SOA Enablement Server.
See Also: Deployment Package, Deployment Descriptor
Deployment Descriptor
An XML document describing a package.
See Also: Deployment
Deployment Package
A definition of Web services plus deployment information.
See Also: Deployment
Deserialization
The process of creating Java objects out of a SOAP message.
Deserializer
A class that creates a Java object and fills it with the data from a SOAP
message.
Distinguished Name
A distinguished name (DN) is a set of attribute values that identify the path
leading from the base of the directory information tree to the object that is named.
An X.509 public-key certificate or CRL contains a DN that identifies its issuer, and
an X.509 attribute certificate contains a DN or other form of a name that identifies
its subject.
See Also: Certificate, X.509
Document/Literal
One possible encoding for a SOAP message, indicating that the message must
strictly follow a schema written in the WSDL Document.
DOM
Document Object Model - a tree of objects with interfaces for traversing the tree
and writing an XML version of it, as defined by the W3C specification.
DOM element
A structure representing an XML element as defined by DOM.
Dynamic Call
Constructing and issuing a request whose signature is possibly not known until
runtime.
Dynamic Invocation
Constructing and issuing a request whose signature is possibly not known until
runtime.
EAR File
Applications deployed on an application server are usually delivered as one
compressed file with .ear extension. The file may contain software components, web
applications, and resources.
EJB
Enterprise JavaBean.
Encoded Serialization
Serialization that uses an encoding layer to read/write data.
Endpoint
A referenceable entity (using, for example, a URL or URI).
Entity JavaBean
The kind of EJB that provides an object view of data in the database.
See Also: EJB
Exception (Unhandled Java Exception)
An event during program execution that prevents the program from continuing
normally.
Forte For Java
Sun Microsystems Forte For Java. An IDE for development of Java applications. It
was a branded and commercial version of NetBeans; now it is named Sun ONE Studio
(SOS).
See Also: Sun ONE Studio
GSS-API
Generic Security Services API (GSS-API) is a programming interface that allows two
applications to establish a security context independent of the underlying security
mechanisms. Specified in RFC-2743.
See Also: Security Mechanism
Header
A part of a SOAP message usually carrying some metadata.
Header Processor
A Java class for parsing/creating headers.
HTTP
HyperText Transfer Protocol. The Internet protocol, based on TCP/IP.
HTTPS
HyperText Transfer Protocol layered over the SSL protocol.
See Also: HTTP, Security Mechanism
IBM WebSphere Application Server
An application server provided by the International Business Machines
Corporation.
Identity
Information that is unique within a security domain and that is recognized as
denoting a particular entity within that domain.
IETF
Internet Engineering Task Force (www.ietf.org).
IIS (Internet Information Services)
A secure platform for building and deploying business applications, hosting and
managing Web sites, and publishing and sharing information across a company intranet
or the Internet.
In Parameter
A parameter that is passed from client to server.
In/Out Parameter
A parameter that is passed in both directions. For example, it may contain an
input value for the server and the processed result for the client.
Incoming Message
A message that is sent to WSO2 SOA Enablement Server runtime. On the client side, this is
a response message. On the server side, a request message.
Initiating Security Provider
A security provider that is responsible for initiating and maintaining secure
communication from the client to the server side.
See Also: Security Provider
Interceptor
A class for intercepting (that is, inspecting or modifying) the content of a
message.
J2EE Application Server
An application server that is compliant with the J2EE specification published by
Sun Microsystems Incorporated.
J2EE Specification
The Java 2 Platform, Enterprise Edition specification published by Sun
Microsystems Incorporated.
JAAS
The Java Authentication and Authorization Service (JAAS) is a set of Java packages
that enable services to authenticate and enforce access controls upon users.
See Also: Authentication, Authorization, Access Control
JAR File
A file compressed using the Java Archive (JAR) file format.
Java Collections
A set of collections defined by the Java Platform specification (java.util.Map,
java.util.Set, java.util.List).
Java Security
A set of Java security concepts based on the security framework provided by Java
itself.
See Also: JSSE, JCE, JAAS
Java2WSDL tool
A tool for converting Java classes and/or interfaces into their WSDL
description.
JavaBeans Activation Framework
Standard services used to determine the type of an arbitrary piece of data,
encapsulate access to it, discover the operations available on it, and to
instantiate the appropriate bean to perform said operation(s).
JAX-RPC
A standard created by Sun's Java Community Process (#101) intended as a high-level
API for calling Web services.
JAXM
A standard created by Sun's Java Community Process (#67) intended as a low-level
API for calling Web services.
JBoss Application Server
An open source Application Server available from JBoss.
JCE
The Java Cryptography Extension - a set of packages that provide a framework and
implementations for encryption, key generation and key agreement, and Message
Authentication Code (MAC) algorithms. Support for encryption includes symmetric,
asymmetric, block, and stream ciphers. The software also supports secure streams and
sealed objects.
JDBC
Java DataBase Connectivity (JDBC) Data Access API.
JMS
The Java Message Service API.
JMS Destination
For sending and receiving messages, JMS uses a destination, which may be either
JMS Topic or JMS Queue.
See Also: JMS
JMS Message
A message sent by the Java Message Service.
See Also: JMS
JMS Provider
A provider of JMS administered objects, such as JMS Queue or JMS Queue Connection
Factory.
See Also: JMS
JMS Queue
Used by the Java Message Service in Point-to-Point communications.
See Also: JMS
JMS Queue Connection Factory
Used by the Java Message Service in Point-to-Point communications for creating JMS
Connections.
See Also: JMS
JMS Topic
Used by the Java Message Service in Publish/Subscribe communications.
See Also: JMS
JMS Topic Connection Factory
Used by the Java Message Service in Publish/Subscribe communications for creating
JMS Connections.
See Also: JMS
JMS Transport
A pluggable transport that enables the sending of SOAP messages using the Java
Message Service.
See Also: JMS
JNDI
The Java Naming and Directory Interface; provides support for the common features
of naming services including COS (Common Object Services), DNS (Domain Name System),
LDAP (Lightweight Directory Access Protocol), and NIS (Network Information System).
See Also: LDAP
JNDI Lookup
A lookup based on a unique JNDI name that returns an object bounded in the JNDI
namespace.
See Also: JNDI
JNDI Property
To use a specific implementation of JNDI, JNDI properties might be required to be
set in the environment.
See Also: JNDI
JSSE
The Java Secure Socket Extension - a set of Java packages that enable secure
Internet communications. It implements a Java version of SSL (Secure Sockets Layer)
and TLS (Transport Layer Security) protocols and includes functionality for data
encryption, server authentication, message integrity, and optional client
authentication. Using JSSE, developers can provide for the secure passage of data
between a client and a server running any application protocol (such as HTTP,
Telnet, NNTP, and FTP) over TCP/IP.
JTA
The Java Transaction API.
Kerberos
A system developed at the Massachusetts Institute of Technology that uses
passwords and symmetric cryptography (DES) to implement a ticket-based, peer-entity
authentication service and an access control service distributed in a client-server
network environment.
Key
Short for Cryptographic Key - an input parameter that varies the transformation
performed by a cryptographic algorithm.
Key Entry
An entry in the key store consisting of an alias, a cryptographic key, and a
certificate chain.
See Also: Alias, Key Store, Key, Certificate Chain
Key Store
A WSO2 SOA Enablement Server component responsible for management of key entries.
See Also: Key Entry
LDAP
Lightweight Directory Access Protocol (RFC-1777) - a client-server protocol that
supports basic use of the directory servers, that is, database servers or other
systems that provide information (such as digital certificates or CRL) about an
entity whose name is known.
See Also: Certificate, CRL
Library Package
Java class packages that provide their classes to other deployed packages. Java
classes deployed in WSO2 SOA Enablement Server are normally accessible only inside their own
packages.
Literal Serialization
Serialization driven only by XML Schema-type definitions.
Load-Balancing
Distributing processing and communications activity evenly across a computer
network so that no single device is overwhelmed.
Local Name
A local part (without namespace) of a Qname.
See Also: Qualified Name
Message
Data plus meta-information indicating how it is to be routed and handled. An
example of a message is a SOAP message or transport-level message.
Message Processing
The process through which a message is processed by interceptors, serializers, and
deserializers.
MIME
Multipurpose Internet Mail Extensions - a standard for sending data with
attachments. This standard is set out in RFCs 2045, 2046, 2047, and 2048.
MOM
Message Oriented Middleware. An integration paradigm based on asynchronous
message exchange.
Multipart Content
Content encoded in accordance with the MIME specification.
Namespace
Namespaces are typically established to distinguish between multiple
interpretations of a single token or phrase. For example, a "nut" in the "food"
namespace is something to eat, while in the "hardware" namespace something to fasten
to a bolt (something you would not want to attempt with a "food:nut" and
vice-versa). In XML, it can be thought of as a collection of names, identified by a
URI reference [RFC2396], that are used in XML documents.
NetBeans
An open source platform primarily used for development of Java applications; it
has evolved into a Tools Platform. The commercial and branded version of NetBeans is
a product called Sun ONE Studio (formerly Sun Forte For Java).
See Also: Sun ONE Studio
OASIS
Organization for the Advancement of Structured Information Standards
(http://www.oasis-open.org) - an international, not-for-profit consortium that
designs and develops industry standard specifications for interoperability based on
XML.
Orion Application Server
An Application Server available from IronFlare AB of Sweden.
Out Parameter
A parameter that is sent from the server to the client.
Outgoing Message
A message sent out during WSO2 SOA Enablement Server runtime. On the client side, this
message is called a request; on the server side, it is a response.
Package, Client Package
See: Client Package.
Package, Library Package
See: Library Package.
Package, Server Package
See: Server Package.
Permission
An action that can be performed on a particular resource by a specific principal
or role.
PDP- Policy Decision Point
A logical entity that is responsible for authorizing or denying access to services
and/or resources.
Ping Service
A ping service is a System Web service that can be used as a lightweight method
for determining whether a WSO2 SOA Enablement Server is running.
PKCS
The Public-Key Cryptography Standards are specifications produced by RSA
Laboratories in cooperation with secure systems developers worldwide for the purpose
of accelerating the deployment of public-key cryptography.
PKI
Public-Key Infrastructure - a system of certification authorities (and,
optionally, other supporting servers and agents) that perform some set of
certificate management, archive management, key management, and token management
functions for a community of users in an application of asymmetric cryptography.
See Also: Certification Authority
PEP - Policy Enforcement Point
A logical entity that enforces policy decisions.
POP, POP3
Post Office Protocol - a protocol for retrieval of email messages from mail
servers.
See Also: POP3 server
POP3 server
A mail server that supports the POP3 protocol from retrieval of email messages.
See Also: POP, POP3
Port
A part of WSDL that binds an endpoint address and its interface.
PortType
Part of a WSDL document that describes the interface of a service.
See Also: WSDL
Principal
An entity whose identity can be authenticated. A principal can represent any
entity, such as an in individual, a corporation, or a login id.
Protected Store
A WSO2 SOA Enablement Server component consisting of a user store and key store.
See Also: User Store, Key Store
Proxy Host
The host name of a proxy server.
Proxy Port
Port number of a proxy server.
Proxy, dynamically generated
A Java object that acts as a proxy to a Web service. Invoking methods on this
object results in a SOAP request and response exchange with the Web service.
Public Cloud
A Universal Business Registry where businesses can describe and publish their web
services to the general public.
See Also: UBR
Publisher Assertion
A structure that allows you to emphasize a relationship between two Business
Entities.
See Also: Universal Description, Discovery and Integration
QName
See: Qualified Name.
Qualified Name
A name that consists of a namespace and a unique name from that namespace.
See Also: Namespace
Receiver
A referenceable entity that accepts messages. This can be overseen as a Web
service, an asynchronous endpoint, or a stub/proxy that accepts a response.
Reference
A reference to data that are defined in another part of the message. An example
might be a reference to the next MIME part of a message or a reference to repeated
Java objects.
Reliability
The ability of messages to be delivered regardless of software component, system,
or network failures.
See Also: WS-ReliableMessaging
REST
REpresentational State Transfer is an architectural module used to implement
networked IT systems. The modeling of communication between components is similar to
that used by HTTP. The main distinguishing features of this model relate to
resources.
Return Value
A single value returned from a service.
Role
A category that applies to a set of principals.
RFC
An IETF Request For Comments (see http://www.ietf.org/rfc) - usually a standard or
a recommendation.
RPC
Remote Procedure Call - an extension of a common procedure call used inside one
application to span multiple processes running on multiple hosts.
RPC/Encoded
One possible SOAP message encoding, indicating that the message format is
logically given by the XML schema present in the WSDL. The physical representation
of the message is given by the encoding of the message.
See Also: WSDL
SAML
Security Assertions Markup Language - an XML framework for exchanging security
information over the Internet. SAML enables disparate security services systems to
interoperate. It resides within a system's security mechanisms to enable exchange of
identities and entitlements with other services.
Scalability
How well a system can adapt to increased demands. For example, a scalable network
system would be one that can start with just a few nodes, but easily expand to
thousands of nodes.
Schema Type
Defines the type of a part of XML data.
Security Manager
The component of WSO2 SOA Enablement Server responsible for security management.
Security Mechanism
A mechanism that implements a security function. Some examples of security
mechanisms are authentication exchange, checksum, digital signature, encryption, and
traffic padding.
Security Provider
A provider for particular security mechanism(s).
See Also: Security Mechanism
Sender
An entity that sends messages.
Sequence Owner
A load balancer node that handles all the messages in a WS-RM reliable managing
sequence. The reliable message sequence corresponds to a load balancer session.
See Also: WS-ReliableMessaging
Serialization
The process by which binary objects are written into a structured stream; for
example, when Java objects are written into a SOAP message.
Serializer
A class that writes a Java object into a SOAP message.
Server Package
The package that holds all the service-related files.
See Also: Deployment Package, Deployment
Service Class
The implementation class of the Web service.
Service Endpoint
A single endpoint of a service instance with an associated path and additional
configuration (such as header processors, serializers, etc.).
Service Instance
A service class instance registered in WSO2 SOA Enablement Server for Java.
Service Lookup
See: Web Service Lookup.
Service Manager
A component of WSO2 SOA Enablement Server that is responsible for management of deployed
Web services.
Service State
The current state of a service instance; for example, Offline, Starting, Running,
Stopping, Stopped.
Service, Asynchronous Java Service
A Web service implemented in Java that returns the results of an invocation in an
asynchronous manner.
Service, Java Service
A Web service implemented in Java that handles the messages using Java types
representation of their content.
Service, Raw Service
A Service written in Java that handles the messages using a low-level transport
message API.
Service, XML Service
A Service written in Java that handles the messages using the low-level SOAP
Message API.
Servlet
The basic part of Java Servlet Technology.
Servlet Container
A container application that allows servlets to run.
See Also: Servlet
Single Login
A system of applications, where a principal (user) authenticates with one system
entity (called identity provider) and has that authentication honored by other
system entities (called service providers or partners).
See Also: SSO (Single Sign-On)
SMTP
Simple Mail Transfer Protocol - a protocol for sending email messages between
servers. Most email systems that send mail over the Internet use SMTP to send
messages from one server to another; the messages can then be retrieved with an
email client using either POP or IMAP. In addition, SMTP is generally used to send
messages from a mail client to a mail server.
SMTP Server
A mail server that supports the SMTP protocol for email transfer.
See Also: SMTP
SOAP
Simple Object Access Protocol - a lightweight protocol based on XML for the
exchange of information in a decentralized, distributed environment.
SOAP Body
The part of a SOAP message that contains the actual data.
See Also: SOAP
SOAP Digital Signature
The W3C document SOAP Security Extensions: Digital Signature specifies the syntax
and processing rules for a SOAP header entry to carry digital signature information
within a SOAP 1.1 Envelope.
See Also: SOAP, SOAP Header, SOAP Envelope, XML Signature
SOAP Envelope
The root element of a SOAP message. It contains exactly one body sub-element and
optionally one header sub-element.
See Also: SOAP
SOAP Fault
Used to return errors that occur during the routing/processing of a SOAP message.
See Also: SOAP
SOAP Fault-Actor
Part of a SOAP Fault. It provides information about who/what caused the fault.
See Also: SOAP Fault
SOAP Fault-Code
Part of a SOAP Fault. It provides an numeric identification of the fault.
See Also: SOAP Fault
SOAP Fault-Detail
Part of a SOAP Fault that provides more details about the fault. In WSO2 SOA Enablement Server for Java,
this element usually contains a server stack trace.
See Also: SOAP Fault
SOAP Header
The part of soap message that contains metadata (for example, authentication
information or instance identification) of the message.
See Also: SOAP Body
SOAP Message
A message encoded in accordance with the SOAP specification.
See Also: SOAP
SOAP with Attachments
Binding for a SOAP message to be carried within a MIME multipart/related message
in such a way that the processing rules for the SOAP 1.1 message are preserved.
See Also: SOAP
SOAPSpy
A SOAP message-tracking tool that scans communication between the client and
sever. The communication is visually displayed. You can also manually change and
send the messages.
See Also: SOAP
SOS
See: Sun ONE Studio.
SPKM
Simple Public Key Mechanism - a security mechanism specified by the IETF in
RFC-2025.
SQL Statement
A statement of the Structured Query Language.
SSJ
Abbreviation for WSO2 SOA Enablement Server for Java™.
SSL
The Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols were
designed to help protect the privacy and integrity of data while it is transferred
across a network. The Internet Engineering Task Force (IETF) standard called
Transport Layer Security (TLS) is based on SSL.
See Also: TLS
SSO (Single Sign-On)
A system that enables a user to access multiple computer platforms or application
systems after being authenticated only once.
See Also: SAML, Kerberos
Static Invocation
Constructing a request at compile time. Calling an operation via a proxy
procedure.
Stub
A statically-generated service interface, which in turn dynamically generates the
proxy during runtime.
Subject
A grouping of related information for a single entity, such as a person. Such
information includes the Subject's identities, as well as its security-related
attributes (passwords and cryptographic keys, for example).
See Also: Identity
Sun ONE Studio
Sun ONE Studio (formerly Sun Forte For Java) is an IDE for development of Java
applications. It is a branded and commercial version of NetBeans.
See Also: NetBeans
WSO2 SOA Enablement Server for Java Application Directory
A directory to which the WASP_HOME parameter points.
See Also: Deployment, WASP_HOME
WSO2 SOA Enablement Server for Java Root URL
The URL where WSO2 SOA Enablement Server runs. The Global URL of the Web service running
on WSO2 SOA Enablement Server is <WSO2 SOA Enablement Server for Java Root URL> + <path of the
Service Endpoint>.
System Web Services
Web services can be categorized into three groups: System, Application, and
Utility Web services. System Web services facilitates fundamental functions such as
service deployment, administration and security settings management.
Target Namespace
In WSDL, XML Schema, or a deployment descriptor document, the namespace into which
the content of the document is placed.
Technical Policy
A set of assertions that represent a business requrement. Technical policies are
associated with SOA artifacts to which the requirement applies; a set of technical
policies and associated artifacts forms a Business Policy.
In WS-Policy terms, a technical policy = WS-Policy + name +
documentation.
See Also: Business Policy
TLS
Transport Layer Security protocol. Its primary goal is to provide privacy and data
integrity between two communicating applications. The first version of TLS is
described in RFC-2246.
See Also: SSL
tModel
A structure that takes the form of keyed metadata (data about data). In a general
sense, the purpose of a tModel within the UDDI registry is to provide a reference
system based on abstraction. Among the roles that a tModel plays in UDDI is the
ability to provide and to describe compliance with a specification or concept to a
taxonomy, for example.
Tomcat Servlet Container
The servlet container that is used in the official Reference Implementation for
the Java Servlet and JavaServer Pages technologies.
Transport
A component of WSO2 SOA Enablement Server that is responsible for transferring messages
to a Web service using particular transport protocol.
Transport Message
A message accessible via WSO2 SOA Enablement Server Transport API.
See Also: Message
Transport Repository
A repository of all WSO2 SOA Enablement Server transports.
Trusted Certificate Entry
An entry managed by the key store that represents a trusted certificate or
certificate chain.
See Also: Key Store, Certificate Chain
UBR
Universal Business Registry (also known as Public Cloud) - a set of UDDI
Registries that form a global distributed registry of information about Web
services. Note that UBR nodes (members of the Public Cloud) are run by Microsoft,
IBM, SAP, HP, and NNTP. They replicate the content of Public Cloud.
UDDI
See: Universal Description, Discovery and Integration.
UDDI Green Pages
UDDI accepts and organizes three types of information into three broad categories:
White, Yellow, and Green Pages. Green Pages hold the technical information about
services that are exposed by the business, including references and interfaces to
the services a company can deliver.
UDDI Inquiry Port
Every UDDI Registry implementation provides two ports with which you can interact:
inquiry and publishing. The inquiry port allows you to browse and search information
that is published to a UDDI Registry.
UDDI node
The UDDI node is a collection of Web services, each of which implements the APIs
in a UDDI API set, and that are managed according to a common set of policies.
Typically, a node consists of at least an implementation of the Inquiry, the
Publication, and the Custody and Ownership Transfer API sets; often a node will
implement additional API sets such as Subscription and Replication.
UDDI Operator
A UDDI Operator is a role of a person who sets node policy and runs a node. There
is exactly one operator for a given node.
UDDI Publishing Port
Every UDDI Registry implementation provides two ports with which you can interact
with: inquiry and publishing. The publishing port allows you to publish information
about your Web services.
UDDI Registry
A UDDI Registry is an implementation of the UDDI specification that allows Web
service vendors to register information about the Web services they offer so that
others can find them.
UDDI White Pages
UDDI accepts and organizes three types of information into three broad categories:
White, Yellow, and Green Pages. White Pages include address, contact, and known
identifiers.
UDDI Yellow Pages
UDDI accepts and organizes three types of information into three broad categories:
White, Yellow, and Green Pages. Yellow Pages include industrial categorizations
based on standard taxonomies.
Undeployment
Undeployment is a process of uninstalling deployed packages from WSO2 SOA Enablement
Server.
See Also: Deployment
Universal Description, Discovery and Integration
UDDI is a specification for distributed Web-based information registries of Web
services.
Updatable Policy
A WSO2 SOA Enablement Server component responsible for management of access control lists.
See Also: ACL
URI
Uniform Resource Identifier - the generic term for all types of names and
addresses that refer to objects on the World Wide Web. A URL is one kind of
URI.
URL
Uniform Resource Locator - the global address of documents and other resources on
the World Wide Web. The first part of the address indicates what protocol to use and
the second part specifies the IP address or the domain name where the resource is
located.
User
Any person who interacts directly with a computer system. Note that 'users' do not
typically include 'operators,' 'system programmers,' 'technical control officers,'
'system security officers,' and other system support personnel.
User Group
A named collection of user identifiers.
See Also: User
User Property
In the context of WSO2 SOA Enablement Server for Java, a user attribute that can be stored in the user
store.
See Also: User Store
User Store
A WSO2 SOA Enablement Server component responsible for management of user (security)
properties, such as passwords and certificates.
Utility Web services
Web services can be categorized into three groups: System, Application, and
Utility Web. A Utility Service typically provides commonly required functionality
utilized by any Application Web service. It provides an easy way for developers to
reuse common functions to produce more reliable code and reduce redundancy.
UUID
Universally Unique Identifier as used in
recommendations or drafts.
WAR File
A format for compressing files, similar to a JAR file. Web applications that may
be deployed to an application server are often compressed into WAR files.
See Also: JAR File
WASP, WASP Server for Java
The former name of WSO2 SOA Enablement Server for Java™.
WASP_HOME
The directory where the WSO2 SOA Enablement Server distribution is installed.
WaspPackager Tool
A part of WSO2 SOA Enablement Server for Java that creates deployment packages that can be
deployed to WSO2 SOA Enablement Servers or client packages that are used for Web service
Clients.
See Also: Deployment, Deployment Package, Client Package
Web Service
Loosely coupled software components delivered over Internet standard
technologies.
Web Service Client
An application that uses Web services.
Web Service Lookup
A process through which a remote Web service is bound to a Java interface. The
result of this process is a Java stub for the Web service.
Web Services Description Language Utility (wsdl.exe)
Used to generate code for XML Web service clients and XML Web services using
ASP.NET from WSDL contract files and XSD schemas.
WSDL
An XML-based language that describes an interface of a Web service plus
information on how to call the Web service and where to find it.
WSDL Compiler
The previous name for WSDL2Java, a WSO2 SOA Enablement Server tool that converts a WSDL
document into Java code.
WSDL Compiler tool
See: WSDL Compiler.
WSDL Compiler Web service
Former name of the WSDL2Java Web service, a utility Web service that offers SOAP
access to the WSDL2Java tool used for the generation of Java source files from a
WSDL document.
WSDL Operation
Part of a WSDL Document representing the interface of an operation that can be
invoked on a Web service.
WSDL Port
Part of a WSDL Document that binds the endpoint of a service with an
interface.
WSDL Service
Part of WSDL Document that specifies the set of endpoints that define one logical
service.
WS-Addressing
A protocol that provides transport-neutral mechanisms to address Web services and
messages. Specifically, WS-Addressing defines XML elements to identify Web service
endpoints and to secure end-to-end endpoint identification in messages. It enables
messaging systems to support message transmission through networks that include
processing nodes such as endpoint managers, firewalls, and gateways in a
transport-neutral manner.
For more information, please see the WS-Addressing specification.
WS-Eventing
Specification which describes a protocol that allows Web services to subscribe to or
accept subscriptions for event notification messages.
For more information, please see the WS-Eventing specification.
WS-Policy
The Web Services Policy Framework (WS-Policy) provides a general purpose model and
corresponding syntax to describe and communicate the policies of a Web Service.
WS-Policy defines a base set of constructs that can be used and extended by other
Web Services specifications to describe a broad range of service requirements,
preferences, and capabilities.
For more information, please see the WS-Policy specification.
WS-ReliableMessaging
A protocol that allows messages to be delivered reliably between distributed
applications in the presence of software component, system, or network failures. Is
used in conjunction with other specifications and application-specific protocols
within the SOAP [SOAP] and WSDL [WSDL] extensibility model. The draft version of
this protocol was known as WS-Reliability.
For more information, please see the WS-ReliableMessaging specification.
WS-RM
See: WS-ReliableMessaging.
WS-Security
WS-Security describes enhancements to SOAP messaging to provide quality of
protection through message integrity, message confidentiality, and single message
authentication. It enables the user to encrypt and/or sign individual SOAP messages.
WSO2 SOA Enablement Server for Java provides an implementation of OASIS' working draft 13. It is based on a
modified version of Apache
XML-Security package 1.0.4.
For more information, please see the WS-Security specification.
X.509
Part of the ITU-T X.500 specification that defines a framework to provide and
support data origin authentication and peer entity authentication services,
including formats for X.509 public-key certificates, X.509 attribute certificates,
and X.509 CRLs.
See Also: CRL
XKMS
The XML Key Management Specification - a specification designed to extend the
public key infrastructure (PKI) model by using XML to provide new levels of ease and
interoperability when implementing secure applications.
See Also: PKI, XML
XML
eXtensible Markup Language - a W3C-sponsored format for structured documents and
data, used mostly on the Web.
XML Canonicalization
A method for generating a physical representation, the canonical form, of an XML
document that accounts for permissible changes or variations in syntax. It is a
reduction of a document to a standard minimal form useful, among other things, for
document or structure comparisons. Except for limitations regarding a few unusual
cases, if two documents have the same canonical form, then the two documents are
logically equivalent within the given application context.
XML Encryption
A standard that specifies the process for encrypting data and representing the
result in an XML document. The data may be an XML element, or XML element content,
or any arbitrary data (including an XML document).
See Also: XML, XML Signature
XML protocol
A communication or messaging protocol based on XML.
XML Schema
A means for defining the structure, content and semantics of XML documents through
XML itself. It defines a richer set of data types - such as booleans, numbers, dates
and times, and currencies - than the more traditional DTD. XML Schemas make it
easier to validate documents based on namespaces. It is defined in the W3C's XML
Schema Working Group.
XML Signature
A way of providing integrity, message authentication, and/or signer authentication
services for data of any type, whether located within the XML that includes the
signature or elsewhere.
See Also: XML, XML Encryption
XPath
A language for addressing parts of an XML document. See XPath 1.0 and XPath 2.0.
See Also: XSLT, XQuery, Content Based Routing (CBR)
XQuery
A query language able to express queries across data structured as XML. The result
of an XQuery program is also XML. XQuery can be viewed as a transformation language.
See XQuery 1.0.
See Also: XPath
XSLT
A language for transforming XML documents to other XML documents or more generally
any text output. Its expressive power is greater than XQuery. Hence it is more
universal. See XSLT 1.0 and XSLT 2.0.
See Also: XPath, XQuery