Microsoft Internet Security and Acceleration Server 2004 SDK

C

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

cache
A store of frequently retrieved objects and URLs located on the cache drive of an ISA Server computer. Instead of retrieving an object directly from an Internet Web server, the object is stored and retrieved from the cache instead. Caches improve network performance by reducing the number of objects retrieved from the Internet based on their popularity.
cache drive
A cache drive is a hard disk partition where cached content is stored on an ISA Server computer that is configured for caching. Each cache drive is identified by its drive letter (C:, D:, etc.), and each cache drive has a limited amount of space, in megabytes, that can be allocated for caching.
certificate
See digital certificate.
CGI
See Common Gateway Interface (CGI).
chaining
A method to link multiple ISA Server computers together for routing requests among them. Communication is in an upstream, hierarchical order.
challenge/response
See Microsoft Challenge Handshake Authentication Protocol (MS-CHAP).
clear text
See Basic authentication.
COM object
A programming structure that includes both data and functionality. A COM object is defined and allocated as a single unit. The only public access to a COM object is through the programming structure's interfaces. At a minimum, a COM object must support the IUnknown interface, which maintains the object's existence while it is being used and provides access to the object's other interfaces.
Common Gateway Interface (CGI)
A standard interface for HTTP server applications. It is used by an application that runs on a server to generate dynamic content based on parameters sent by the requesting Web browser.
completion port
See I/O completion port.
connection object
In application filters, a COM object that implements the IFWXConnection interface and represents a single connection within the Microsoft Firewall service.
credentials
An authentication method used to validate client-to-server and server-to-server communication. Credentials include a user name and a password that is used to validate requests from client computers or from other computers in an array or chain.