Glossary
See Icon Explanation for documentation specific symbols.
GPG/Encryption
- 2FA
Two Factor Authentication. Combines two different factors to provide strong authentication:
Something you know.
Something you have.
Something you are.
- Yubikey Manager
Application that will manage Yubikey configuration. There is a GUI Yubikey Manager and a CLI Yubikey Manager.
- Yubikey Password/PINs
- PIN
Password for
user
andadmin
accounts for a Yubikey. Can be up to 127 ASCII characters long.The user password is used whenever GPG material needs to be accessed on the card. Daily usage.
The admin password is used to reset the user password and perform administrative functions on the Yubikey itself. Limited usage.
- Signing Key
Key used to cryptographically sign data. This enables others to verify that data sent by you has not been altered.
- Encryption Key
Key used to encrypt data. Data is typically signed with the Signing Key after encryption.
- Authentication Key
Key used to Authenicate to systems (e.g. SSH). This will allow other systems to load your public GPG key and enable access to systems without needing any information from you.
Mail
- DKIM
Domain Key Identified Mail: DKIM provides a method for validating a domain name identity that is associated with an email message through cryptographic authentication.
- DMARC
Domain-based Message Authentication, Reporting & Conformance:, is an email authentication, policy, and reporting protocol. It builds on the widely deployed SPF and DKIM protocols, adding linkage to the author (“From:”) domain name, published policies for recipient handling of authentication failures, and reporting from receivers to senders, to improve and monitor protection of the domain from fraudulent email.
- MTA
Mail Transport Agent: handles mail server to server (e.g. other domains).
- MDA
Mail Delivery Agent: handles user access to email (e.g. IMAP).
- MUA
Mail User Agent: user client to check email (e.g. thunderbird/outlook).
- SPF
Sender Policy Framework: Email authentication method designed to detect forging sender addresses during the delivery of the email.
Networking
See VLAN 101 for Unifi network specific terms.
Operating Systems
- GPO
Group Policy for Windows. Provides centralized management and configuration of operating systems, applications, and users’ settings
The most restrictive GPO is applied if both machine and user GPO’s are set.
Policies can be manually applied with:
gpupdate /force
- Registry
Hierarchical database that stores low-level settings for Windows and applications that opt to use the registry.
- WSL
Windows Subsystem for Linux. Run linux distros in windows 10. See Windows Subsystem for Linux (WSL).