Red Hat DIRECTORY SERVER 7.1 - DEPLOYMENT manuals
DIRECTORY SERVER 7.1 - DEPLOYMENT
Table of contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- About This Guide
- Conventions Used in This Guide
- What Is a Directory Service
- About Global Directory Services
- About LDAP
- Overview of Directory Server Architecture
- Overview of the Server Front-End
- Directory Server Data Storage
- About Directory Entries
- Distributing Directory Data
- Deploying Your Directory
- Other General Directory Resources
- Introduction to Directory Data
- What Your Directory Might Include
- What Your Directory Should Not Include
- Performing a Site Survey
- Identifying the Applications That Use Your Directory
- Identifying Data Sources
- Determining Level of Service
- Considering a Data Master
- Determining Data Ownership
- Determining Data Access
- Documenting Your Site Survey
- Repeating the Site Survey
- Schema Design Process Overview
- Standard Schema
- Standard Attributes
- Standard Object Classes
- Mapping Your Data to the Default Schema
- Matching Data to Schema Elements
- Customizing the Schema
- When to Extend Your Schema
- Naming Attributes and Object Classes
- Strategies for Defining New Attributes
- Creating Custom Schema Files
- Custom Schema Best Practices
- Maintaining Consistent Schema
- Schema Checking
- Maintaining Consistency in Replicated Schema
- Other Schema Resources
- Introduction to the Directory Tree
- Designing Your Directory Tree
- Suffix Naming Conventions
- Naming Multiple Suffixes
- Branching Your Directory
- Identifying Branch Points
- Replication Considerations
- Access Control Considerations
- Naming Entries
- Naming Person Entries
- Naming Group Entries
- Naming Organization Entries
- Grouping Directory Entries
- Deciding Between Roles and Groups
- About Class of Service
- Directory Tree Design Examples
- Directory Tree for an ISP
- Virtual Directory Information Tree Views
- Overview
- Introduction to Virtual DIT Views
- Advantages of Using Virtual DIT Views
- Example of Virtual DIT Views
- Views and Other Directory Features
- Effects of Virtual Views on Performance
- Other Directory Tree Resources
- designing the directory topology
- Distributing Your Data
- About Using Multiple Databases
- About Suffixes
- About Knowledge References
- Using Referrals
- About Default Referrals
- Smart Referrals
- Tips for Designing Smart Referrals
- Using Chaining
- Deciding Between Referrals and Chaining
- Using Indexes to Improve Database Performance
- Evaluating the Costs of Indexing
- Introduction to Replication
- Replication Concepts
- Unit of Replication
- Changelog
- Data Consistency
- Common Replication Scenarios
- Multi-Master Replication
- Cascading Replication
- Mixed Environments
- Defining a Replication Strategy
- Replication Survey
- Replication Resource Requirements
- Replication across a Wide-Area Network
- Using Replication for High Availability
- Using Replication for Local Availability
- Example of Network Load Balancing
- Example of Load Balancing for Improved Performance
- Example Replication Strategy for a Small Site
- Using Replication with Other Directory Features
- Replication and Database Links
- Schema Replication
- Replication and Synchronization
- Windows Sync Overview
- Designing Windows Sync
- Resource Requirements
- Interaction with a Replicated Environment
- designing a secure directory
- About Security Threats
- Unauthorized Tampering
- Determining Access Rights
- Ensuring Data Privacy and Integrity
- Overview of Security Methods
- Selecting Appropriate Authentication Methods
- Simple Password
- Certificate-Based Authentication
- Simple Password over TLS
- Preventing Authentication by Account Inactivation
- How Password Policy Works
- Password Policy Attributes
- Password Change after Reset
- Password Expiration
- Password Syntax Checking
- Password Storage Scheme
- Designing Access Control
- About the ACI Format
- Targets
- Bind Rules
- Setting Permissions
- When to Deny Access
- Where to Place Access Control Rules
- Viewing ACIs: Get Effective Rights
- Using ACIs: Some Hints and Tricks
- Database Encryption
- Securing Connections with SSL and Start TLS
- other security resources
- An Enterprise
- Data Design
- Directory Tree Design
- Topology Design
- Database Topology
- Replication Design
- Supplier Consumer Architecture
- Security Design
- Tuning and Optimizations
- Schema Design
- Server Topology
- supplier architecture
Related products
DIRECTORY SERVER 7.1DIRECTORY SERVER 7.1 SP7 - SDIRECTORY SERVER 8.0DIRECTORY SERVER 7.1 - ADMINISTRATORDIRECTORY SERVER 8.1 - 11-01-2010DIRECTORY SERVER 7.1 - PLUG-IN PROGRAMMERSDIRECTORY SERVER 7.1 - GATEWAY CUSTOMIZATIONDIRECTORY SERVER 2.0 - GATEWAYDIRECTORY SERVER 8.1 - USING THE ADMIN SERVERDIRECTORY SERVER 8.1 - USING RED HAT CONSOLE 4-28-2008Red Hat categories
More Red Hat categoriesmanualsdatabase
Your AI-powered manual search engine