O'Reilly logo

SAS 9.4 Intelligence Platform: Overview, Second Edition, 2nd Edition by

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Glossary
access control template (ACT)
a reusable named authorization pattern that you can apply to multiple resources. An
access control template consists of a list of users and groups and indicates, for each
user or group, whether permissions are granted or denied.
ACT
See access control template.
Application Response Measurement (ARM)
the name of an application programming interface that was developed by an industry
partnership and which is used to monitor the availability and performance of
software applications. ARM monitors the application tasks that are important to a
particular business.
ARM
See Application Response Measurement.
authentication
See client authentication.
authentication provider
a software component that is used for identifying and authenticating users. For
example, an LDAP server or the host operating system can provide authentication.
authorization
the process of determining the permissions that particular users have for particular
resources. Authorization either permits or denies a specific action on a specific
resource, based on the user's identity and on group memberships.
browser
See web browser.
capability
an application feature that is under role-based management. Typically, a capability
corresponds to a menu item or button. For example, a Report Creation capability
might correspond to a New Report menu item in a reporting application. Capabilities
are assigned to roles.
client authentication (authentication)
the process of verifying the identity of a person or process for security purposes.
63
client-side pooling
a configuration in which the client application maintains a collection of reusable
workspace server processes.
credentials
evidence that is submitted to support a claim of identity (for example, a user ID and
password) or privilege (for example, a passphrase or encryption key).
cube
See OLAP cube.
data mart
a subset of the data in a data warehouse. A data mart is optimized for a specific set of
users who need a particular set of queries and reports.
data set
See SAS data set.
data warehouse (warehouse)
a collection of pre-categorized data that is extracted from one or more sources for the
purpose of query, reporting, and analysis. Data warehouses are generally used for
storing large amounts of data that originates in other corporate applications or that is
extracted from external data sources.
database management system (DBMS)
a software application that enables you to create and manipulate data that is stored in
the form of databases. See also relational database management system.
database server
a server that provides relational database services to a client. Oracle, DB/2, and
Teradata are examples of relational databases.
DBMS
See database management system.
encryption
the conversion of data by the use of algorithms or other means into an unintelligible
form in order to secure data (for example, passwords) in transmission and in storage.
foundation services
See SAS Foundation Services.
HTTP (HyperText Transfer protocol)
a protocol for transferring data to the Internet. HTTP provides a way for servers and
web clients to communicate. It is based on the TCP/IP protocol.
HyperText Transfer protocol
See HTTP.
identity
See metadata identity.
information map
a collection of data items and filters that provides a user-friendly view of a data
source. When you use an information map to query data for business needs, you do
64 Glossary
not have to understand the structure of the underlying data source or know how to
program in a query language.
Integrated Object Model (IOM)
the set of distributed object interfaces that make SAS software features available to
client applications when SAS is executed as an object server.
Integrated Object Model server (IOM server)
a SAS object server that is launched in order to fulfill client requests for IOM
services.
Integrated Windows authentication (IWA)
a Microsoft technology that facilitates use of authentication protocols such as
Kerberos. In the SAS implementation, all participating components must be in the
same Windows domain or in domains that trust each other.
internal account
a SAS account that you can create as part of a user definition. Internal accounts are
intended for metadata administrators and some service identities; these accounts are
not intended for regular users.
IOM
See Integrated Object Model.
IOM server
See Integrated Object Model server.
IWA
See Integrated Windows authentication.
LDAP (Lightweight Directory Access Protocol)
a protocol that is used for accessing directories or folders. LDAP is based on the X.
500 standard, but it is simpler and, unlike X.500, it supports TCP/IP.
Lightweight Directory Access Protocol
See LDAP.
load balancing
for IOM bridge connections, a program that runs in the object spawner and that uses
an algorithm to distribute work across object server processes on the same or
separate machines in a cluster.
logical server
the second-level object in the metadata for SAS servers. A logical server specifies
one or more of a particular type of server component, such as one or more SAS
Workspace Servers.
MDDB
See multidimensional database.
metadata
descriptive data about data that is stored and managed in a database, in order to
facilitate access to captured and archived data for further use.
Glossary 65

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required