Glossary

This glossary provides terms and definitions for the [product name] software and products.

The following cross-references are used in this glossary:
  • See refers you from a nonpreferred term to the preferred term or from an abbreviation to the spelled-out form.
  • See also refers you to a related or contrasting term.

For other terms and definitions, see the IBM Terminology website (opens in new window).

A

ACL monitor
In Domino, a document created in the Statistics & Events database that causes the Event task on a server to monitor a specific database for ACL changes.
administration process
A Domino server task (Adminp) that automates many administrative tasks. An administrator initiates the tasks, and the administration process completes them. Some of the tasks that the administration process can automate are: recertifying Notes IDs, renaming and deleting references to Notes users and groups, creating replicas of databases, and moving databases.
administration server
The Domino server assigned to apply Administration Process updates to a primary replica.
agent
A program that performs a series of automated tasks according to a set schedule or at the request of a user. An agent consists of three components: the trigger (when it acts), the search (what documents it acts on), and the action (what it does).
agent manager
The background server program that manages and runs agents on a server.
alarm
For Domino administrators, a document generated in the Statistics database indicating that a server statistic has exceeded a specified threshold. For example, an alarm can notify an administrator if disk space on server drive C drops below 10 percent.
anonymous access
A type of access that allows users and servers to access a server without first authenticating with it.
API
See application programming interface.
application programming interface (API)
An interface that allows an application program that is written in a high-level language to use specific data or functions of the operating system or another program.
application proxy
A firewall configuration that examines the destination of a packet and the type of information it contains, checks whether the network allows delivery to that destination, and controls the information flow between internal and external clients and servers.
archive database
A copy of a Notes database created to store information no longer in use.
authentication
In computer security, a process that ensures that the identities of both the sender and the receiver of a network transaction are true.

B

binary tree server topology
A topology that connects servers in a pyramid fashion: the top server connects to two servers below it, each of which connects to two servers below it, and so on. Information travels down the pyramid and then back up.

C

CA
See certificate authority.
CA certificate
See certificate authority certificate.
canonical format
A format for storing hierarchical names that displays the hierarchical attribute of each component of the name. For example, the canonical format for the name Reuben D. Smith/Ottawa/Renovations/CA is: CN=Reuben D. Smith/OU=Ottawa/O=Renovations/C=CA where: CN is the common name, OU is the organizational unit, O is the organization, and C is the region or country code.
central directory architecture
Directory architecture in a Domino domain in which some servers store configuration directories and use primary Domino Directories on remote servers for lookups.
certificate
In computer security, a digital document that binds a public key to the identity of the certificate owner, thereby enabling the certificate owner to be authenticated. A certificate is issued by a certificate authority and is digitally signed by that authority. See also certificate authority.
certificate authority (CA)
A trusted third-party organization or company that issues the digital certificates. The certificate authority typically verifies the identity of the individuals who are granted the unique certificate. See also certificate, Secure Sockets Layer, trusted root.
certificate authority certificate (CA certificate)
In computer security, a digital document that identifies an organization that issues certificates.
certificate revocation list (CRL)
A list of certificates that have been revoked before their scheduled expiration date. Certificate revocation lists are maintained by the certificate authority and used, during a Secure Sockets Layer (SSL) handshake to ensure that the certificates involved have not been revoked.
certification
A process that creates special signed messages called certificates, which state that a particular public key is associated with a particular user or server name.
certifier ID
A file that generates an electronic "stamp" that indicates a trust relationship. It is analogous to the device used to stamp passports--it verifies that a person is trusted by that stamping authority.
character set
A set of binary codes that represent specific text characters.
child document
A document that inherits its values from another document (the parent document).
cluster
A group of two or more Domino servers that provides users with constant access to data, balances the workload among servers, improves server performance, and maintains performance when the size of an enterprise increases.
compact
To compress a database, in order to reclaim space freed by the deletion of documents and attachments.
computed field
On a form, a field whose value is determined by a formula that the application designer writes.
configuration directory
A directory in a central directory architecture that contains only documents related to Domino configuration.
connection document
A document that enables communication between two servers and specifies how and when the information exchange occurs.
connectivity
The capability of a system or device to be attached to other systems or devices without modification.
corporate hierarchy
A set of custom categories created in the Domino Directory to which Person documents are assigned.
CRL
See certificate revocation list.
cross-certificate
A certificate in the Personal Address Book or Domino Directory that indicates trust in an Internet certificate or trust in a certificate from a foreign Domino domain.

D

database (DB)
A collection of interrelated or independent data items that are stored together to serve one or more applications.
database cache
A section of memory on a Domino server where databases are stored for quick access. Administrators can display cache statistics, change the number of databases that a server can hold in its cache, close all databases in the cache, and disable the cache.
database catalog
A database containing information about databases stored on a single Domino server, a group of servers, or all the servers in a domain. Database catalogs are commonly used to let users add the databases in them to the user's desktop.
database header
An internal structure that stores database-wide information such as a time stamp that indicates when a database was first created or when the Fixup task last ran on it.
database ID
See database identifier.
database identifier (database ID)
The time stamp that is located in the Notes database header and that indicates when a Notes database was first created or when the Fixup task last ran on it.
database instance ID (DBIID)
A value that is located in the Notes database header and that associates the database with specific entries in the transaction log.
database manager
A person with Manager access to a Notes database, whose responsibilities include setting up and maintaining access to the database and monitoring database replication, usage, and size.
data connection resource (DCR)
A design element that is used to define a connection between a Notes form and an enterprise database for exchanging data.
DB
See database.
DBIID
See database instance ID.
DCR
See data connection resource.
default value formula
The formula that lets users set an initial value for an editable field.
deletion stub
A truncated document that is left in a Notes database in place of the original document to indicate to the Replication task that the document should, in fact, be deleted from all other replicas.
depositor access
An access level that allows users to create documents but not read any of the documents in the Notes database.
design element
In a Notes database, a field, form, view, public agent, database icon, Using This Database document, or About This Database document.
design pane
In Domino Designer, the workspace area that displays design options, as well as areas to enter design information.
design template
A Notes database design that lets users share design elements among databases and store design elements with a template. The template can be enabled so that when it changes, the change automatically occurs in all databases created with that template.
DIIOP
See Domino Internet Inter-ORB Protocol.
directory assistance
A feature used by servers to extend client authentication, name lookups, and LDAP operations to secondary directories.
directory assistance database
A Notes database created from the DA50.NTF template and used to configure Directory assistance.
directory catalog
An optional directory database that can aggregate entries from multiple Domino Directories into a single database.
directory server
A server that can add, delete, change, or search directory information on behalf of a client.
Distributed Directory Architecture
Directory architecture in a Domino domain in which all servers use a local primary Domino Directory.
DNS
See Domain Name System.
domain
A logical grouping of resources in a network for the purpose of common management and administration.
Domain Name System (DNS)
The distributed database system that maps domain names to IP addresses.
Domino Application Services
Services that enable the Sametime server to function in a Domino environment as part of a Domino domain. The Domino Application Services support IBM Notes access to the Sametime server, the Directory, Replication features, and security for Notes clients. The Web Application Services and Domino Application Services are sometimes collectively referred to as Domino DNA.
Domino Designer
An application development tool for modernizing existing or building new collaborative applications that run on IBM Notes and Domino. Domino Designer includes XPages, which allows developers to use HTML, CSS, and JavaScript skills along with a set of modern web controls, Dojo, and built-in Ajax services to build applications for Notes and Domino desktop, mobile, or web use.
Domino domain
A network of clients and servers whose users, servers, connections, and access control information are described in a Domino directory.
Domino Internet Inter-ORB Protocol (DIIOP)
A server task that runs on the server and works with the Domino Object Request Broker to allow communication between Java applets created with the Notes Java classes and the Domino server. Browser users and Domino servers use IIOP to communicate and to exchange object data.
Domino server
A computer that runs the Domino Server program and stores Notes databases.
Domino server program
The program that supports the connection between clients and the server and also manages a set of server tasks, which are programs that either perform schedule-driven database chores -- such as routing messages to mailboxes and updating user accounts -- or connect various types of clients -- Notes clients, web browsers, CORBA clients -- to the server.
Domino Server setup program
The cross-platform wizard that guides a user through the setup options for a Domino server after the program files are installed on the system.
Domino XML (DXL)
A version of XML that describes Domino-specific data and design elements such as embedded views, forms, and documents.
DXL
See Domino XML.

E

ECL
See execution control list.
editable field
On a form, a field whose value is determined by a formula that application designers write to supply a default value, edit the user's entry, and validate the entry to make sure it meets specific requirements.
effective user
In Notes, the user under whose authority an agent runs. The effective user name will be used for database ACL access rights; rights to create databases, replicas, and templates on the server; and as the mail sender or document author. Effective user rights are not used to determine the operations an agent is permitted to perform; these are based on the agent signer (the agent owner).
electronic signature (ESIG)
A stamp that is added to mail messages, fields, or sections that verifies that the person who originated the message is the author and that no one has tampered with the data.
encryption key
See key.
ESIG
See electronic signature.
event
An occurrence of significance to a task or system. Events can include completion or failure of an operation, a user action, or the change in state of a process.
event script
A script attached to a particular event. Examples in LotusScript are Initialize, Queryopen, and Postopen. When the event occurs, the script runs.
execution control list (ECL)
A security feature that controls which formulas and scripts created by other users can run on a workstation.
extended ACL
A security feature that restricts a user's access to the Domino directory and extended directory catalog.
extended directory catalog
A directory catalog used by Domino servers that, to facilitate quick name lookups, retains the individual documents and the multiple, sorted views available in the Domino Directory.
Extensible Markup Language (XML)
A standard metalanguage for defining markup languages that is based on Standard Generalized Markup Language (SGML).
Extensible Stylesheet Language (XSL)
A language for specifying style sheets for XML documents. Extensible Stylesheet Language Transformation (XSLT) is used with XSL to describe how an XML document is transformed into another document.
extranet
An intranet with extended access, generally behind a firewall. An extranet allows members of the public with valid user names and passwords to gain access to certain parts of an intranet.

F

field
An area into which a particular category of data or control information is entered.
File Transfer Protocol (FTP)
In TCP/IP, an application layer protocol that uses TCP and Telnet services to transfer bulk-data files between machines or hosts.
firewall
A network configuration, typically both hardware and software, that prevents unauthorized traffic into and out of a secure network.
form
A Notes database element that controls how a user edits, displays, and prints documents. A form can contain fields, static text, graphics, and special objects. A Notes database can have any number of forms.
FTP
See File Transfer Protocol.

G

global domain
A group of Domino domains, such as Sales1, Sales2, and Marketing, under a single Internet domain, such as renovations.com. All outbound SMTP mail, whether it originates from the Sales1 or Marketing domains, has the return address acme.com.
group
A named list of users and servers. It can be used in contact lists, access control lists, and so on.

H

hierarchical naming
A system of naming that reflects the relationship of names to the certifiers in an organization. Hierarchical naming helps distinguish users with the same common name for added security and allows for decentralized management of certification. The format of a hierarchical name is: common name/organizational unit/organization/country code -- for example, Pam Tort/Fargo/Renovations/CA.
hop
One segment of a transmission path between adjacent nodes in a routed network.
hotspot
Text or a picture in a rich-text field that a user can click to perform an action, run a formula or script, or follow a link.
hover help
Explanatory text that can be viewed by moving a cursor over a graphical user interface (GUI) item such as an icon, field, or text string. Hover help can contain rich text and links.
hunt group
A group of Domino servers that are assigned one phone number. Clients dial the one phone number and connect to any available server. Hunt groups balance the load on servers.

I

IIOP
See Internet Inter-ORB Protocol.
IMAP
See Internet Message Access Protocol.
input-translation formula
In an editable field, the formula that converts or translates entered information into a specified value or format.
input-validation formula
In an editable field, the formula that verifies that the entered information meets the specified criteria.
Integrated Services Digital Network (ISDN)
An international communications standard for sending voice, video, and data over digital telephone lines.
Internet Inter-ORB Protocol (IIOP)
A protocol used for communication between Common Object Request Broker Architecture (CORBA) object request brokers.
Internet Message Access Protocol (IMAP)
A protocol that allows a client to retrieve and manipulate mail messages that are stored on a server.
Internet server application programming interface (ISAPI)
The Internet server application programming interface supported by IIS. Developers use this interface to create programs, called extensions, that extend the capabilities of IIS.
Internet service provider (ISP)
An organization that provides access to the Internet.
Internet site document
A document that contains configuration settings for an Internet protocol -- HTTP, LDAP, POP3, IMAP, SMTP Inbound, and DIIOP. Service providers use Internet site documents to configure Internet protocols for hosted organizations.
intranet
An organization's internal network that uses the IP protocol.
ISAPI
See Internet server application programming interface.
ISDN
See Integrated Services Digital Network.
ISP
See Internet service provider.
item descriptor
A description of a single note item. An item descriptor is stored in an array of fixed-size structures in a note header. Each structure has information describing the item name, type, value, size, and so on.

K

key
A cryptographic mathematical value that is used to digitally sign, verify, encrypt, or decrypt a message. See also private key, public key.
keyboard shortcut
A key or combination of keys that a user can press to perform an action that is available from a menu.
key ring file
A binary file that is protected by a password and stores one or more certificates on the server hard drives. There are two types of key ring files: server and CA.
keywords field
A multiple-choice field that lets users make selections by clicking, rather than typing, an entry. Keywords fields can display in several formats, including a drop-down list box, a check box, and a radio button.

L

layout region
On a form or subform, a fixed-length design area in which related elements can be dragged and moved easily and can be displayed in ways not possible on regular forms and subforms.
LDAP directory
A type of repository that stores information on people, organizations, and other resources and that is accessed using the LDAP protocol. The entries in the repository are organized into a hierarchical structure, and in some cases the hierarchical structure reflects the structure or geography of an organization.
LDAP service
The LDAP server task that processes LDAP client requests.
library
A Notes database that contains lists of links to other databases. Unlike a catalog, which lists all the Notes databases on a server, a library contains links to selected databases from one or several servers.
LMBCS
See Lotus multibyte character set.
LN:DO
See Lotus Notes:Data Object.
local database
A database that is located on the workstation in use. See also remote database.
location document
A document in a user's Personal Address Book that contains communication and other location-specific settings used when users work with Notes in a specific place. Users can create as many location documents as needed.
log in
To connect to a computer system or network by entering identification and authentication information at the workstation.
Lotus multibyte character set (LMBCS)
The format in which Notes stores all internal text, except file attachments and objects. As a result, any user can edit, forward, and mail documents and work with databases in any language.
Lotus Notes:Data Object (LN:DO)
An LSX-compliant module that allows the use of LotusScript scripts for external data access applications.
LotusObject
Any object that is an instance of a Lotus-product class. LotusObjects can be manipulated using LotusScript. LotusObjects share a common design. Many are implemented either the same way across products, or almost the same way, with slight variations from product to product.
LotusScript
A version of BASIC that offers not only standard capabilities of structured programming languages, but a powerful set of language extensions that enable object-oriented development within and across products. Its interface to Notes is through predefined object classes.
LotusScript Data Object (LS:DO)
The ODBCConnection, ODBCQuery, and ODBCResultSet classes, collectively called the LotusScript Data Object (LS:DO). These classes provide properties and methods for accessing and updating tables in external databases through the ODBC (Open Database Connectivity) Version 2.0 standard.
LS:DO
See LotusScript Data Object.

M

macro
A program that performs a series of automated tasks on behalf of the user. A macro consists of three components: the trigger (when it acts), the search (what documents it acts on), and the action (what it does).
manager access
The highest access level that can be assigned in a Notes database access control list.
message transfer agent (MTA)
A program that accepts mail from user agents, delivers messages to user agents, and forwards messages to other MTAs.
MIME
See Multipurpose Internet Mail Extensions.
mobile directory catalog
A condensed Directory Catalog set up on a Notes client.
MTA
See message transfer agent.
Multipurpose Internet Mail Extensions (MIME)
An Internet standard that allows different forms of data, including video, audio, or binary data, to be attached to email without requiring translation into ASCII text.

N

named-object table
A table that maps names to associated notes and objects; for example, a table that manages per-user unread lists.
negotiated session key
An encryption key that is created at the beginning of the SSL handshake, which determines the key used when encrypting information over an SSL connection. The negotiated session key changes each time a new session is initiated.
Network News Transfer Protocol (NNTP)
A protocol that is used to post messages in, distribute messages to, and retrieve messages from newsgroups and to transfer articles between news servers.
newsfeed
The periodic transfer of newly posted newsgroup articles from one NNTP server to another using the NNTP protocol. Enabling the NNTP protocol on a Domino server allows you to set up a newsfeed to transfer both USENET and private newsgroup articles.
newsgroup
An online discussion group that users with newsreaders can participate in. A Domino NNTP server can store Usenet newsgroups, public newsgroups distributed on the Internet, and private newsgroups.
newsreader
A client application that runs the NNTP protocol and is used to select, view, create, sort, and print Usenet and private newsgroup articles.
NNTP
See Network News Transfer Protocol.
NOS
See Notes object services.
Notes client
Client software that allows users to access Notes databases on a Domino server, send mail, and browse the web.
Notes/Domino authentication
A security mechanism that verifies that the user or Domino server trying to access a particular Domino server has a trusted certificate in common with it. Authentication occurs in both directions: the server authenticates the user; then the user authenticates the server.
Notes named network
A group of Domino servers that run on the same LAN protocol -- for example, servers running on TCP/IP in one of an organization's locations. Servers on the same Notes named network route mail to each other automatically, whereas you need a Connection document to route mail between servers on different Notes named networks.
Notes name service
The name service within IBM Notes and Domino that assists in name-to-address resolution in NRPC (Notes remote procedure call) by making calls to the Domino Directory to resolve Domino common names to their respective protocol names.
Notes network port
A port at which a Notes client or Domino server listens for NRPC (Notes remote procedure call) connections in a given network protocol -- such as, TCP/IP, NetBIOS, or IPX/SPX.
Notes object services (NOS)
A set of portable C/C++ functions that create and access information in databases and files, compile and interpret formulas and scripts, and provide an interface to operating systems in a consistent, portable way.
Notes Remote Procedure Call (NRPC)
The architectural layer of Notes used for all Notes-to-Notes communication. Either the HTTP or the SOCKS proxy can be set up to work with NRPC.
Notes storage facility
Part of the Notes Object Services, the Notes Storage Facility is a library of C functions that implement the most basic database-creation and database-management operations.
NRPC
See Notes Remote Procedure Call.

O

ODBC
See Open Database Connectivity.
ODS
See on-disk structure.
OID
See originator ID.
on-disk structure (ODS)
The common, portable format used to store information in a Notes database. The ODS version of a Notes database is listed on the Info tab of the Database Properties box.
Open Database Connectivity (ODBC)
A standard application programming interface (API) for accessing data in both relational and nonrelational database management systems. Using this API, database applications can access data stored in database management systems on a variety of computers even if each database management system uses a different data storage format and programming interface.
OpenSocial
A standards-based component model, with both containers and APIs, that is used for application development for virtual social applications.
originator ID (OID)
A 28-byte identifier that contains a note's unique universal ID (UNID), which is essential for replication.
outgoing mail database
A file that temporarily stores outgoing mail that users create when not connected to a mail server.

P

pane
A separate area in a split window. A window can be split into two or more panes.
parent document
A document whose values are inherited by another document (the child document).
partitioned server
A single computer configured to run an unlimited number of instances of the Domino server program. Using partitioned servers reduces hardware expenses and minimizes server administration.
pass-through server
An intermediary server that lets a client access a target server to which the client is not connected. A mobile user can access multiple servers through a single phone connection; a LAN client can connect to servers running network protocols different from its own.
PKCS
See Public Key Cryptography Standards.
POP3
See Post Office Protocol Version 3.
Post Office Protocol Version 3 (POP3)
An application protocol that runs over TCP/IP and is used to retrieve electronic mail from a mail server.
primary replica
The replica designated to be the only recipient of updates by the Administration Process. By updating a primary replica and then replicating that database to other replicas on other servers, you avoid creating replication conflicts.
private key
In secure communication, an algorithmic pattern used to encrypt messages that only the corresponding public key can decrypt. The private key is also used to decrypt messages that were encrypted by the corresponding public key. The private key is kept on the user system and is protected by a password. See also key, public key.
proxy server
A server that receives requests intended for another server and that acts on behalf of the client (as the client's proxy) to obtain the requested service. A proxy server is often used when the client and the server are incompatible for direct connection. For example, the client is unable to meet the security authentication requirements of the server but should be permitted some services.
public access
The access privilege in a database access control list (ACL) that includes Depositor access and No Access and that allows reading, writing, and copying public documents.
public key
An encryption key associated with a Notes ID that is used to verify an electronic signature, encrypt a message, or identify an authenticating user. A public key is part of each user ID, and a copy of the key is stored in the Domino Directory. Certificates on IDs ensure that public keys are valid.
public key certificate
A unique electronic stamp stored in a Notes or Domino ID file that associates a name with a public key. Certificates permit users and servers to access specific Domino servers. An ID can have many certificates.
public key cryptography
A cryptography system that uses two keys: a public key known to everyone and a private or secret key known only to the recipient of the message. The public and private keys are related in such a way that only the public key can be used to encrypt messages and only the corresponding private key can be used to decrypt them.
Public Key Cryptography Standards (PKCS)
A set of industry-standard protocols used for secure information exchange on the Internet. Domino Certificate Authority and Server Certificate Administration applications can accept certificates in PKCS format.

R

read access list
A list that restricts a form so that only specified users can read documents created from the form. Use the reader's field to control access on a document-by-document basis.
reader access
An access level with which users can only read documents.
referral
In the Lightweight Directory Access Protocol (LDAP), a pointer from one LDAP directory server to another.
remote database
A shared database that is accessed by a program running on a different computer. The shared database is considered remote with respect to the program accessing it.
remote primary Domino directory
In a central directory architecture, a primary Domino Directory that a server with a Configuration Directory uses remotely.
replica
A special copy of a Notes database that, because it shares a replica ID with the original database, can exchange information with it through replication.
replica ID
A unique number that is generated when a Notes database is first created. The replica ID is stored in the database header and never changes. When you make a replica of the database, the replica inherits the replica ID. For two databases to replicate, they must share the same replica ID.
replication
The process of exchanging modifications between replicas. Through replication, Notes makes all of the replicas essentially identical over time.
replication conflict
A condition that occurs when two or more users edit the same document in different replicas of a Notes database between replications.
replication monitor
A document created in the Statistics and Events database that causes the Event task on a server to monitor a specific database to make sure that it is replicating.
replicator
The part of the workspace where Notes displays all replica databases and lets users manage the replication process.
response document
In Notes, a document created using a Response form, a typical component of a discussion database. In a view, response documents are usually indented underneath the document to which they respond.
ring server topology
A network configuration in which servers are connected one-to-one in a circle with the ends connected. It is similar to chain server topology, which connects servers one-to-one but with the ends unconnected.

S

SAML
See Security Assertion Markup Language.
SASL
See Simple Authentication and Security Layer.
save conflict
A save conflict occurs when two or more Notes users edit the same document in a Notes database on a server at the same time. The document saved first becomes the main document; subsequent users are prompted to save their changes as responses titled '[Replication or Save Conflict].'
SCOS
See single copy object store.
screen reader
A device that renders onscreen text as audible language.
secondary name server
A Domino server that can stand in for a Notes user's home server to ensure that the Notes Name Service is always available over TCP/IP.
section
A defined area on a Notes form that can include fields, objects, layout regions, and text. Sections can be set to display (expand) or hide (collapse).
secure/MIME (S/MIME)
A secure version of the MIME protocol that allows users to send encrypted and electronically signed mail messages, even if users have different mail programs.
Secure Sockets Layer (SSL)
A security protocol that provides communication privacy. With SSL, client/server applications can communicate in a way that is designed to prevent eavesdropping, tampering, and message forgery. See also certificate authority.
Security Assertion Markup Language (SAML)
An authentication standard from OASIS that allows a user to authenticate once with a designated identity provider (IdP) and access any server that is partnered with the IdP. Both Notes client and Web client users can make use of SAML-based authentication, which allows them to log in once and have access to multiple Domino web servers and applications, as well as any third-party applications partnered with the IdP.
Serial Line Internet Protocol (SLIP)
An Internet protocol that connects a computer to the Internet using a serial line.
server-based certificate authority
A certificate authority (CA) that runs under the CA process, a server task. It can be either a Notes or Internet certifier. The CA process can handle any number of Notes and Internet certifiers, and it gives administrators the ability to manage them from the server console, using Tell commands. The CA process also gives Internet certifiers the ability to issue certificate revocation lists (CRLs).
server certificate
An electronic stamp stored in the server's key ring file that contains a public key, a name, an expiration date, and a digital signature. The server certificate uniquely identifies the server.
server command
A command for performing a task, such as shutting down or restarting a server. A server command can be run manually at the console or automatically through the use of Program document.
server connection
A document that is in the Domino Directory or a user's Personal Address Book and that defines a connection to a server. There are four types of server connection documents: dialup, network, passthru, and remote LAN.
server program
A program that automates an administration task, such as compacting all databases on a server. Administrators can schedule server programs to run at a particular time or can run them as the need arises.
server task
A program provided with the Domino server that runs only when specifically loaded. Server tasks serve various purposes; the Administration Process, HTTP Server, and Reporter are just a few examples of server tasks.
shared field
In Notes, a field that is used in more than one form. For example, many forms have a creation date field, so designers can define the field once and reuse it.
shared mail
In Domino, a feature that stores messages addressed to more than one user on a mail server in a central database, called the shared mail database.
shared view
A view that is public to more than one Notes user.
sibling document
In a Notes view or folder, a document at the same level as another document.
sign
To attach a unique electronic signature, derived from the sender's user ID, to a document or field when a document is mailed. Signing mail ensures that if an unauthorized user creates a new copy of a user's ID, the unauthorized user cannot forge signatures with it. In addition, the signature verifies that no one has tampered with the data while the message was in transit.
Simple Authentication and Security Layer (SASL)
An Internet protocol that allows LDAP clients to authenticate with an LDAP server and provides security for the data transmitted with this protocol.
Simple Mail Transfer Protocol (SMTP)
An Internet application protocol for transferring mail among users of the Internet.
single copy object store (SCOS)
The Domino feature that allows mail addressed to multiple users to be stored in a central database, called the shared mail database.
single sign-on (SSO)
An authentication process in which a user can access more than one system or application by entering a single user ID and password.
site certificate
A certificate obtained for an individual site. A site certificate is different from a trusted root certificate in that a site certificate lets you access only a specific site. A trusted root certificate lets you access any servers with certificates issued from that trusted root certificate authority.
SLIP
See Serial Line Internet Protocol.
S/MIME
See secure/MIME.
SMTP
See Simple Mail Transfer Protocol.
Sockets Secure (SOCKS)
A mechanism by which a secure proxy data channel can be established between two computers.
SOCKS
See Sockets Secure.
special text
Text that allows document-placement information from views to be automatically recalculated as a postprocessing step. After the column formulas in a view are calculated, special text is replaced with an integer. For this reason, although special text appears to be a number, it is not.
SSL
See Secure Sockets Layer.
SSO
See single sign-on.
stacked icon
A Notes database icon that represents a database and all of its associated replicas that are currently added to the workspace.
stub
  1. To reduce the space that user mailboxes occupy on email servers.
  2. In email archiving, an email document from which previously archived content has been removed. The stub usually contains links to the archived content, that is, to the attachments and the body text of the email. Clicking these links, users can view, and, in a second step, restore the content to its original location.
  3. A replica or Notes database copy that has not yet been filled with documents. The database is no longer a stub after the first replication takes place.
subform
A form-building shortcut that lets designers store regularly used fields, sections, actions, and other form elements together. Subforms can be placed on a form either permanently or as computed subforms that display on documents as dictated by a formula.
symmetric encryption
A common key and mathematical algorithm used to both encrypt and decrypt a message. For two people to communicate securely with each other, both need to agree on the same mathematical algorithm to use for encrypting and decrypting data. They also need to have a common key: the secret key.

T

TCP
See Transmission Control Protocol.
TCP/IP
See Transmission Control Protocol/Internet Protocol.
template
A model of a new Notes database. If it is a design template, it will update database design elements created from the template.
template file
In Notes, a file with the extension NTF that contains the structure for the database -- that is, forms, folders, and views -- but does not contain documents. Domino Designer comes with a collection of templates that can be used to create system and application databases.
temporary field
A field that is used during calculations. The variable that is used in the temporary field is not stored.
Transmission Control Protocol (TCP)
A communication protocol used in the Internet and in any network that follows the Internet Engineering Task Force (IETF) standards for internetwork protocol. TCP provides a reliable host-to-host protocol in packet-switched communication networks and in interconnected systems of such networks.
Transmission Control Protocol/Internet Protocol (TCP/IP)
An industry-standard, nonproprietary set of communication protocols that provides reliable end-to-end connections between applications over interconnected networks of different types.
trusted root
A certificate authority's certificate merged into the Domino Directory, client's browser, or the server's key ring file, which allows clients and servers to communicate with any client or server that has that certificate authority's certificate marked as trusted.

U

UNID
See universal ID.
UNID table
A table that maps a note's UNID to its note ID, which, in turn, can be mapped through the database's RRV table to the note's position within the database file.
universal ID (UNID)
A unique 16-byte value that is assigned to a note when the note is first created. UNIDs are used when replicating database notes and when replacing or refreshing database design notes.
unread journal log
A log that keeps unread lists synchronized between various replicas of a Notes database and records when a document's status changes from read to unread and vice-versa.
user ID
See user identification.
user identification
  1. A file assigned to every user and server that uniquely identifies them to Notes and Domino.
  2. The name used to associate the user profile with a user when a user signs on to a system.

W

Web-based Distributed Authoring and Versioning (WebDAV)
A set of extensions to the HTTP protocol that allows users to collaboratively edit and manage files on remote web servers.
WebDAV
See Web-based Distributed Authoring and Versioning.
window tab
A button that represents an open window in Notes. Window tabs are convenient for switching back and forth between windows.

X

XML
See Extensible Markup Language.
XPages
An XML-based design element and development technology available from Domino Designer. An XPages application is XML interpreted by a Domino server or Notes client and rendered in a web browser or a Notes client. Users can interact with controls on the page to send requests to the server.
XSL
See Extensible Stylesheet Language.