Windows Server 2008 Glossary - C

Applies To: Windows Server 2008

For more Windows Server terms, see either the Windows Server 2008 R2 Glossary or the Windows Server 2003 Glossary.

Glossary - C

# A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

cache

A special memory subsystem in which frequently used data values are duplicated for quick access.

capacity planning

Estimating the space, hardware, software, and connection infrastructure resources that will be needed over some future period of time.

CEIP

A Microsoft program that invites customers to provide Microsoft with more detailed information about how the software is used including the type and frequency of errors, software and hardware performance, and feature usage. This information is anonymous and voluntary, and is used strictly for the purposes of software development.

change log

The log where the quorum resource stores data. This data is maintained by the clustering software.

claim

A statement that a server makes (for example, name, identity, key, group, privilege, or capability) about a client.

claim mapping

The act of mapping, removing or filtering, or passing claims between various claim sets.

claims-aware application

A Microsoft ASP .NET application that performs authorization based on the claims that are present in an Active Directory Federation Services (ADFS) security token.

classic Administrative template

A token-based file used to describe Group Policy setting information.

classic Administrative templates

A collection of .adm files that provides Group Policy setting information for the items that appear in the Classic Administrative Templates folder in the Local Group Policy Editor, and when editing a Group Policy object by using the Group Policy Management Console.

clear key

The key that is stored unencrypted on the disk volume. This key is used to freely access the volume master key, and in turn, the full volume encryption key when BitLocker Drive Encryption protection is disabled but the disk volume remains encrypted.

client

Any computer or program connecting to or requesting the services of another computer or program.

client account partner discovery Web page

The Web page that is used to interact with a user to determine which account partner the user belongs to when Active Directory Federation Services (ADFS) cannot automatically determine which of the account partners should authenticate the user.

client authentication certificate

In AD FS, a certificate that federation server proxies use to authenticate a client to the Federation Service.

client logoff Web page

When Active Directory Federation Services (ADFS) performs a logoff operation, a Web page that is executed to provide visual feedback to the user that the logoff has occurred.

client logon Web page

When AD FS collects client credentials, a Web page that is executed to perform the user interaction.

cluster

A group of independent computers that work together to provide a common set of services and present a single-system image to clients. The use of a cluster enhances the availability of the services and the scalability and manageability of the operating system that provides the services.

cluster log

A trace log of Cluster service events and activities on a node.

Cluster service

The essential software component that controls all aspects of server cluster or failover cluster operation and manages the cluster configuration database.

cluster storage

Storage where one or more attached disks hold data used either by server applications running on the cluster or by applications for managing the cluster. Each disk on the cluster storage is owned by only one node of the cluster. The ownership of disks moves from one node to another when the disk group fails over or moves to the other node.

Cluster.exe

A command-line utility that is used as an alternative to Failover Cluster Management to administer clusters from the command prompt. You can also call Cluster.exe from command scripts to automate many cluster administration tasks.

cluster-aware application

An application that can run on a cluster node and that can be managed as a cluster resource. Cluster-aware applications use the Cluster API to receive status and notification information from the server cluster.

clustered instance

A group of resources in a failover cluster that are handled as a unit of failover. When the resources fail over, they fail over together in a predefined way to another node in the cluster.

cluster-unaware application

An application that can run on a cluster node and be managed as a cluster resource but that does not support the Cluster API.

command-line program

A program that runs from the command line.

command-line tool

A program that runs from the command line.

compliant computer

A computer that meets the NAP health requirements of a network. Only NAP-enabled computers can be compliant.

configuration

Settings or specific properties that enable a software item or hardware item to meet specific functional needs. In a network scenario, this term can also apply to a distributed software application or collection of hardware items.

configuration set

A set of Active Directory Lightweight Directory Services (AD LDS) instances that share and replicate their configuration and schema partitions and that can also be configured to share and replicate application directory partitions.

A dialog box that appears when a user is requested to confirm whether an administrative process should be permitted to start. The user can approve the process by clicking Continue or cancel the process by clicking Cancel.

contiguous namespace

A domain namespace in which all computers use the Active Directory domain name as their primary Domain Name System (DNS) suffix.

See also: disjoint namespace

credential prompt

A dialog box that appears when a user is requested to confirm whether an administrative process should be permitted to start. The user can approve the process by providing a user name and password for an administrator account, or the user can cancel the process by clicking Cancel.

cryptographic algorithm

A mathematical function used for encryption and decryption. Most cryptographic algorithms are based on a substitution cipher, a transposition cipher, or a combination of both.

Customer Experience Improvement Program

A Microsoft program that invites customers to provide Microsoft with more detailed information about how the software is used including the type and frequency of errors, software and hardware performance, and feature usage. This information is anonymous and voluntary, and is used strictly for the purposes of software development.