C

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

cache

A store of frequently retrieved objects and URLs located on the cache drive of a Forefront TMG computer. Instead of retrieving an object directly from an Internet Web server, the object is stored and retrieved from the cache instead. Caches improve network performance by reducing the number of objects retrieved from the Internet based on their popularity.

cache drive

A hard disk partition where cached content is stored on a Forefront TMG computer that is configured for caching. Each cache drive is identified by its drive letter (C:, D:, etc.), and each cache drive has a specified amount of space, in megabytes, that can be allocated for caching.

certificate

See digital certificate.

CGI

See Common Gateway Interface (CGI).

chaining

A method to link multiple Forefront TMG computers together for routing requests among them. Communication is in an upstream, hierarchical order.

challenge/response

See Microsoft Challenge Handshake Authentication Protocol (MS-CHAP).

clear text

See Basic authentication.

COM object

A programming structure that includes both data and functionality. A COM object is defined and allocated as a single unit. The only public access to a COM object is through the programming structure's interfaces. At a minimum, a COM object must support the IUnknown interface, which maintains the object's existence while it is being used and provides access to the object's other interfaces.

Common Gateway Interface (CGI)

A standard interface for HTTP server applications. It is used by an application that runs on a server to generate dynamic content based on parameters sent by the requesting Web browser.

completion port

See I/O completion port.

connection object

In application filters, a COM object that implements the IFWXConnection interface and represents a single connection within the Microsoft Firewall service.

credentials

Information that is supplied by a user or system entity to state and prove its identify. Credentials are used in authentication methods for verifying the identity of users and system entities, such as client computers and servers.


Send comments about this topic to Microsoft

Build date: 11/30/2009

© 2008 Microsoft Corporation. All rights reserved.