See certificate authority (CA).
Public key that has been digitally signed by a trusted authority (the certificate authority) and that is used to ensure that public keys have not been tampered with.
An entity that verifies the validity of public keys that have been created for users in the organization through the issuance of certificates. The CA also issues, revokes, and renews certificates.
Lists published by Certificate Services that name certificates whose authenticity cannot be trusted (revocation list) or can be trusted (trust list).
A file used to keep track of transactions that are committed to an Exchange database from a transaction log. Using checkpoint files ensures that transactions cannot be committed more than once.
A logging technique that involves maintaining only previous log files with uncommitted changes on the server. Fully committed transaction logs are removed to save space.
A special connection agreement implemented as part of the Active Directory Connector that replicates configuration naming partition data from Exchange 5.x sites to administrative groups in Active Directory and vice versa. ConfigCAs work in conjunction with Site Replication Service.
A partition of Active Directory that stores information regarding how an Exchange system is organized. Because this information is replicated to all domain controllers in the forest, the Exchange configuration is also replicated throughout the forest. The configuration information includes the Exchange topology (such as routing group information), connectors, protocols, and service settings. See also domain naming partition and schema naming partition.
The configuration of information to replicate using the Active Directory Connector. Configuration information includes the servers that participate in the replication, the object classes (mailbox, custom recipient, distribution list and user, contact, and group) to replicate, the containers and organizational units to use for object placement, and the activity time schedule.
A nonsecurity principal that represents a user outside of the organization. A contact generally has an e-mail address, facilitating messaging between the local organization and the remote object. A contact is similar to a custom recipient in Exchange Server 5.5.
See certificate revocation list (CRL).
See certificate trust list (CTL).