Manuals database logo
manualsdatabase
Your AI-powered manual search engine

Red Hat DIRECTORY SERVER 7.1 manuals

DIRECTORY SERVER 7.1 first page preview

DIRECTORY SERVER 7.1

Brand: Red Hat | Category: Server
Table of contents
  1. Table Of Contents
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. Table Of Contents
  6. Table Of Contents
  7. Table Of Contents
  8. Table Of Contents
  9. Table Of Contents
  10. Preface
  11. Conventions Used in This Book
  12. Chapter 1 Introduction
  13. Gateways Installed with Directory Server
  14. Directory Express
  15. Default Gateway (dsgw.conf)
  16. Specifying Gateway Configuration to Gateway CGIs
  17. Anonymous and Non-Anonymous Searching
  18. Gateway Installation Planning
  19. Gateway Cloning
  20. Protecting Bind DN and Password
  21. Running the Gateway in High-Usage Networks
  22. Name Translation Mapping
  23. Creating a New Gateway Instance
  24. Gateway .conf File Configuration
  25. Configuring the Directory Manager DN
  26. Authenticating as Directory Manager
  27. Configuring the Gateway to Use SSL
  28. Language Support for HTTP Clients
  29. Customizing Communicator's LDAP Settings
  30. How the Gateway Selects a Character Set
  31. HTTP Clients that Do Not Request UTF-8
  32. Gateway Locales
  33. dsgw-l10n.conf
  34. Files Controlling Gateway Functionality
  35. pb.conf
  36. Object Class Templates
  37. Chapter 4 File Controlling Gateway Functionality
  38. Banner Files
  39. Parameters Controlling Entry Types
  40. template
  41. Considerations for Adding New Entry Types
  42. Setting Up Organizational Units
  43. UID-Based DN
  44. Default Gateway Object Classes
  45. Adding Attributes to Object Classes
  46. extending object classes
  47. Creating a New Parent Object Class
  48. changing search scope
  49. Standard and Advanced Searches
  50. specifying search attributes for person
  51. directory express search support for user id
  52. adding search support for a new object
  53. Creating a New Search Object
  54. modifying default search filters
  55. Search Filters for User Data Patterns
  56. Search Result Tables
  57. modifying search result templates
  58. removing information from search results
  59. appearance of gateway forms
  60. Updating the Banner Image (title.gif)
  61. Updating Button Images
  62. Files Controlling Colors on Gateway Forms
  63. changing colors using body tag
  64. Specifying Color Names and Color Codes
  65. Chapter 7 Customizing Graphics and Color
  66. Appendix A Parameters Defined in the .conf File
  67. Example
  68. Format
  69. Structure of an HTML Template
  70. Arguments
  71. Arguments for IF and ELIF
  72. Examples
  73. doauth
  74. csearch
  75. List of Tables
DIRECTORY SERVER 7.1 first page preview

DIRECTORY SERVER 7.1

Brand: Red Hat | Category: Server
Table of contents
  1. Table Of Contents
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. Table Of Contents
  6. Table Of Contents
  7. About This Guide
  8. Conventions Used in This Guide
  9. What Is a Directory Service
  10. About Global Directory Services
  11. About LDAP
  12. Overview of Directory Server Architecture
  13. Overview of the Server Front-End
  14. Directory Server Data Storage
  15. About Directory Entries
  16. Distributing Directory Data
  17. Deploying Your Directory
  18. Other General Directory Resources
  19. Introduction to Directory Data
  20. What Your Directory Might Include
  21. What Your Directory Should Not Include
  22. Performing a Site Survey
  23. Identifying the Applications That Use Your Directory
  24. Identifying Data Sources
  25. Determining Level of Service
  26. Considering a Data Master
  27. Determining Data Ownership
  28. Determining Data Access
  29. Documenting Your Site Survey
  30. Repeating the Site Survey
  31. Schema Design Process Overview
  32. Standard Schema
  33. Standard Attributes
  34. Standard Object Classes
  35. Mapping Your Data to the Default Schema
  36. Matching Data to Schema Elements
  37. Customizing the Schema
  38. When to Extend Your Schema
  39. Naming Attributes and Object Classes
  40. Strategies for Defining New Attributes
  41. Creating Custom Schema Files
  42. Custom Schema Best Practices
  43. Maintaining Consistent Schema
  44. Schema Checking
  45. Maintaining Consistency in Replicated Schema
  46. Other Schema Resources
  47. Introduction to the Directory Tree
  48. Designing Your Directory Tree
  49. Suffix Naming Conventions
  50. Naming Multiple Suffixes
  51. Branching Your Directory
  52. Identifying Branch Points
  53. Replication Considerations
  54. Access Control Considerations
  55. Naming Entries
  56. Naming Person Entries
  57. Naming Group Entries
  58. Naming Organization Entries
  59. Grouping Directory Entries
  60. Deciding Between Roles and Groups
  61. About Class of Service
  62. Directory Tree Design Examples
  63. Directory Tree for an ISP
  64. Virtual Directory Information Tree Views
  65. Overview
  66. Introduction to Virtual DIT Views
  67. Advantages of Using Virtual DIT Views
  68. Example of Virtual DIT Views
  69. Views and Other Directory Features
  70. Effects of Virtual Views on Performance
  71. Other Directory Tree Resources
  72. designing the directory topology
  73. Distributing Your Data
  74. About Using Multiple Databases
  75. About Suffixes
  76. About Knowledge References
  77. Using Referrals
  78. About Default Referrals
  79. Smart Referrals
  80. Tips for Designing Smart Referrals
  81. Using Chaining
  82. Deciding Between Referrals and Chaining
  83. Using Indexes to Improve Database Performance
  84. Evaluating the Costs of Indexing
  85. Introduction to Replication
  86. Replication Concepts
  87. Unit of Replication
  88. Changelog
  89. Data Consistency
  90. Common Replication Scenarios
  91. Multi-Master Replication
  92. Cascading Replication
  93. Mixed Environments
  94. Defining a Replication Strategy
  95. Replication Survey
  96. Replication Resource Requirements
  97. Replication across a Wide-Area Network
  98. Using Replication for High Availability
  99. Using Replication for Local Availability
  100. Example of Network Load Balancing
  101. Example of Load Balancing for Improved Performance
  102. Example Replication Strategy for a Small Site
  103. Using Replication with Other Directory Features
  104. Replication and Database Links
  105. Schema Replication
  106. Replication and Synchronization
  107. Windows Sync Overview
  108. Designing Windows Sync
  109. Resource Requirements
  110. Interaction with a Replicated Environment
  111. designing a secure directory
  112. About Security Threats
  113. Unauthorized Tampering
  114. Determining Access Rights
  115. Ensuring Data Privacy and Integrity
  116. Overview of Security Methods
  117. Selecting Appropriate Authentication Methods
  118. Simple Password
  119. Certificate-Based Authentication
  120. Simple Password over TLS
  121. Preventing Authentication by Account Inactivation
  122. How Password Policy Works
  123. Password Policy Attributes
  124. Password Change after Reset
  125. Password Expiration
  126. Password Syntax Checking
  127. Password Storage Scheme
  128. Designing Access Control
  129. About the ACI Format
  130. Targets
  131. Bind Rules
  132. Setting Permissions
  133. When to Deny Access
  134. Where to Place Access Control Rules
  135. Viewing ACIs: Get Effective Rights
  136. Using ACIs: Some Hints and Tricks
  137. Database Encryption
  138. Securing Connections with SSL and Start TLS
  139. other security resources
  140. An Enterprise
  141. Data Design
  142. Directory Tree Design
  143. Topology Design
  144. Database Topology
  145. Replication Design
  146. Supplier Consumer Architecture
  147. Security Design
  148. Tuning and Optimizations
  149. Schema Design
  150. Server Topology
  151. supplier architecture
DIRECTORY SERVER 7.1 first page preview

DIRECTORY SERVER 7.1

Brand: Red Hat | Category: Server
Table of contents
  1. Table Of Contents
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. Table Of Contents
  6. Table Of Contents
  7. Table Of Contents
  8. Table Of Contents
  9. Table Of Contents
  10. Table Of Contents
  11. Table Of Contents
  12. Table Of Contents
  13. Table Of Contents
  14. Table Of Contents
  15. Table Of Contents
  16. About This Reference Guide
  17. Prerequisite Reading
  18. Conventions Used in This Reference Guide
  19. Chapter 1 Introduction
  20. Directory Server Configuration
  21. Using Directory Server Command-Line Utilities
  22. Chapter 2 Core Server Configuration Reference
  23. Server Configuration - Overview
  24. LDIF Configuration Files - Location
  25. Configuration of Plug-in Functionality
  26. Configuration of Databases
  27. Accessing and Modifying Server Configuration
  28. Changing Configuration Attributes
  29. Restrictions to Modifying Configuration Entries and Attributes
  30. Configuration Changes Requiring Server Restart
  31. cn=config
  32. nsslapd-accesslog (Access Log)
  33. nsslapd-accesslog-level
  34. nsslapd-accesslog-logbuffering (Log Buffering)
  35. nsslapd-accesslog-logging-enabled (Access Log Enable Logging)
  36. nsslapd-accesslog-logminfreediskspace (Access Log Minimum Free Disk Space)
  37. nsslapd-accesslog-logrotationsynchour (Access Log Rotation Sync Hour)
  38. nsslapd-accesslog-logrotationtime (Access Log Rotation Time)
  39. nsslapd-accesslog-maxlogsize (Access Log Maximum Log Size)
  40. nsslapd-accesslog-mode (Access Log File Permission)
  41. nsslapd-attribute-name-exceptions
  42. nsslapd-auditlog-list
  43. nsslapd-auditlog-logexpirationtimeunit (Audit Log Expiration Time Unit)
  44. nsslapd-auditlog-logmaxdiskspace (Audit Log Maximum Disk Space)
  45. nsslapd-auditlog-logrotationsync-enabled (Audit Log Rotation Sync Enabled)
  46. nsslapd-auditlog-logrotationsyncmin (Audit Log Rotation Sync Minute)
  47. nsslapd-auditlog-logrotationtimeunit (Audit Log Rotation Time Unit)
  48. nsslapd-auditlog-maxlogsperdir (Audit Log Maximum Number of Log Files)
  49. nsslapd-certmap-basedn (Certificate Map Search Base)
  50. nsslapd-conntablesize
  51. nsslapd-enquote-sup-oc (Enable Superior Object Class Enquoting)
  52. nsslapd-errorlog (Error Log)
  53. nsslapd-errorlog-level (Error Log Level)
  54. nsslapd-errorlog-list
  55. nsslapd-errorlog-logging-enabled (Enable Error Logging)
  56. nsslapd-errorlog-logrotationsync-enabled (Error Log Rotation Sync Enabled)
  57. nsslapd-errorlog-logrotationsyncmin (Error Log Rotation Sync Minute)
  58. nsslapd-errorlog-logrotationtimeunit (Error Log Rotation Time Unit)
  59. nsslapd-errorlog-maxlogsperdir (Maximum Number of Error Log Files)
  60. nsslapd-groupevalnestlevel
  61. nsslapd-instancedir (Instance Directory)
  62. nsslapd-listenhost (Listen to IP Address)
  63. nsslapd-localuser (Local User)
  64. nsslapd-maxdescriptors (Maximum File Descriptors)
  65. nsslapd-maxthreadsperconn (Maximum Threads per Connection)
  66. nsslapd-plug-in
  67. nsslapd-pwpolicy-local (Enable Subtree- and User-Level Password Policy)
  68. nsslapd-referral (Referral)
  69. nsslapd-reservedescriptors (Reserved File Descriptors)
  70. nsslapd-return-exact-case (Return Exact Case)
  71. nsslapd-rootdn (Manager DN)
  72. nsslapd-rootpwstoragescheme (Root Password Storage Scheme)
  73. nsslapd-schema-ignore-trailing-spaces (Ignore Trailing Spaces in Object Class Names)
  74. nsslapd-schemareplace
  75. nsslapd-securelistenhost
  76. nsslapd-sizelimit (Size Limit)
  77. nsslapd-ssl-check-hostname (Verify Hostname for Outbound Connections)
  78. nsslapd-timelimit (Time Limit)
  79. passwordChange (Password Change)
  80. passwordExp (Password Expiration)
  81. passwordInHistory (Number of Passwords to Remember)
  82. passwordLockoutDuration (Lockout Duration)
  83. passwordMinAge (Password Minimum Age)
  84. passwordMustChange (Password Must Change)
  85. passwordStorageScheme (Password Storage Scheme)
  86. passwordWarning (Send Warning)
  87. nsslapd-changelogdir
  88. nsslapd-changelogmaxage (Max Changelog Age)
  89. nsslapd-changelogmaxentries (Max Changelog Records)
  90. nssslclientauth
  91. nsssl3ciphers
  92. cn=features
  93. nsslapd-state
  94. nsslapd-backend
  95. nsDS5ReplicaBindDN
  96. nsDS5ReplicaId
  97. nsDS5ReplicaPurgeDelay
  98. nsDS5ReplicaTombstonePurgeInterval
  99. nsds5replconflict
  100. nsDS5ReplicaBindMethod
  101. nsDS5ReplicaBusyWaitTime
  102. nsDS5ReplicaCredentials
  103. nsDS5ReplicaLastInitStart
  104. nsDS5ReplicaLastUpdateEnd
  105. nsDS5ReplicaPort
  106. nsDS5ReplicaRoot
  107. nsDS5ReplicatedAttributeList
  108. nsDS5ReplicaTimeout
  109. nsDS5ReplicaUpdateInProgress
  110. nsDS50ruv
  111. nsds7DirectoryReplicaSubtree
  112. nsds7NewWinUserSyncEnabled
  113. cn=monitor
  114. opsInitiated
  115. cn=replication
  116. nssnmplocation
  117. nssnmpmasterhost
  118. nsstate
  119. Chapter 3 Plug-in Implemented Server Functionality Reference
  120. Object Classes for Plug-in Configuration
  121. bit Check Plug-in
  122. ACL Preoperation Plug-in
  123. Boolean Syntax Plug-in
  124. Case Exact String Syntax Plug-in
  125. Chaining Database Plug-in
  126. Country String Syntax Plug-in
  127. Distinguished Name Syntax Plug-in
  128. HTTP Client Plug-in
  129. Internationalization Plug-in
  130. JPEG Syntax Plug-in
  131. Legacy Replication Plug-in
  132. Multi-master Replication Plug-in
  133. OID Syntax Plug-in
  134. CRYPT Password Storage Plug-in
  135. NS-MTA-MD5 Password Storage Scheme Plug-in
  136. SSHA Password Storage Scheme Plug-in
  137. PTA Plug-in
  138. Referential Integrity Postoperation Plug-in
  139. Retro Changelog Plug-in
  140. Space Insensitive String Syntax Plug-in
  141. State Change Plug-in
  142. UID Uniqueness Plug-in
  143. URI Syntax Plug-in
  144. List of Attributes Common to All Plug-ins
  145. nsslapd-pluginEnabled
  146. nsslapd-pluginVendor
  147. Attributes Allowed by Certain Plug-ins
  148. nsslapd-plugin-depends-on-named
  149. Database Attributes under cn=config,cn=ldbm database,cn=plugins,cn=config
  150. nsslapd-idlistscanlimit
  151. nsslapd-cache-autosize-split
  152. nsslapd-dbcachesize
  153. nsslapd-db-circular-logging
  154. nsslapd-db-debug
  155. nsslapd-db-home-directory
  156. nsslapd-db-idl-divisor
  157. nsslapd-db-logbuf-size
  158. nsslapd-db-logfile-size
  159. nsslapd-db-spin-count
  160. nsslapd-db-transaction-logging
  161. nsslapd-db-verbose
  162. nsslapd-import-cachesize
  163. nsslapd-import-cache-autosize
  164. nsslapd-mode
  165. dbcachetries
  166. nsslapd-cachesize
  167. nsslapd-directory
  168. nsslapd-suffix
  169. nsslapd-db-cache-hit
  170. nsslapd-db-lock-conflicts
  171. nsslapd-db-page-rw-evict-rate
  172. nsIndexType
  173. description
  174. dbfilenamenumber
  175. cn=ldbm database, cn=plugins, cn=config
  176. nsEncryptionAlgorithm
  177. Database Link Plug-in Attributes (chaining attributes)
  178. nsActiveChainingComponents
  179. nsMaxTestResponseDelay
  180. database,cn=plugins,cn=config
  181. nsBindTimeout
  182. nsConcurrentBindLimit
  183. nsOperationConnectionsLimit
  184. nsslapd-sizelimit
  185. cn=plugins,cn=config
  186. nsMultiplexorCredentials
  187. nsAddCount
  188. nsUnbindCount
  189. Chapter 4 Server Instance File Reference
  190. Backup Files
  191. ldif Files
  192. Log Files
  193. Chapter 5 Access Log and Connection Code Reference
  194. Access Logging Levels
  195. Default Access Logging Content
  196. Connection Number
  197. Slot Number
  198. Number of Entries
  199. LDAP Response Type
  200. Search Scope
  201. Extended Operation OID
  202. Abandon Message
  203. Access Log Content for Additional Access Logging Levels
  204. Connection Description
  205. Common Connection Codes
  206. Chapter 6 Migration from Earlier Versions
  207. Database Attributes
  208. Database Link Attributes
  209. SNMP Attributes
  210. Chapter 7 Command-Line Utilities
  211. Command-Line Utilities Quick Reference
  212. Using Special Characters
  213. ldapsearch
  214. SSL Options
  215. Additional ldapsearch Options
  216. ldapmodify
  217. Additional ldapmodify Options
  218. ldapdelete
  219. Additional ldapdelete Options
  220. Syntax
  221. Options
  222. Chapter 8 Command-Line Scripts
  223. Command-Line Scripts Quick Reference
  224. Shell Scripts
  225. bak2db (Restore database from backup)
  226. db2bak (Create backup of database)
  227. db2dsml (Export database contents to DSML)
  228. db2index (Reindex database index files)
  229. dsml2db (Import DSML document contents into database)
  230. getpwenc (Print encrypted password)
  231. ldif2ldap (Perform import operation over LDAP)
  232. monitor (Retrieve monitoring information)
  233. Exit Status
  234. saveconfig (Save Administration Server Configuration)
  235. stop-slapd (Stop the Directory Server)
  236. vlvindex (Create virtual list view indexes)
  237. Perl Scripts
  238. db2bak.pl (Create backup of database)
  239. db2index.pl (Create and generate indexes)
  240. db2ldif.pl (Export database contents to LDIF)
  241. ldif2db.pl (Import)
  242. logconv.pl (Log converter)
  243. migrateInstance7 (Migrate to Directory Server 7.x)
  244. ns-accountstatus.pl (Establish account status)
  245. ns-activate.pl (Activate an entry or group of entries)
  246. ns-inactivate.pl (Inactivate an entry or group of entries)
  247. ns-newpwpolicy.pl (Add attributes for fine-grained password policy)
  248. template-cl-dump.pl (Dump and decode changelog)
  249. template-repl-monitor.pl (Monitor replication status)
  250. Configuration File Format
  251. Command-Line Utilities
  252. ns-slapd
  253. ns-slapd Command-Line Utilities for Restoring and Backing up Databases
  254. archive2db
  255. db2archive
DIRECTORY SERVER 7.1 first page preview

DIRECTORY SERVER 7.1

Brand: Red Hat | Category: Server
Table of contents
  1. Table Of Contents
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. Table Of Contents
  6. Table Of Contents
  7. Table Of Contents
  8. About This Reference Guide
  9. Contents of This Guide
  10. Conventions Used in This Book
  11. Chapter 1 About Schema
  12. Object Classes
  13. Attributes
  14. Single-Valued and Multi-Valued Attributes
  15. Object Identifiers (OIDs)
  16. Extending Server Schema
  17. Chapter 2 Object Class Reference
  18. alias
  19. cosClassicDefinition
  20. cosDefinition
  21. cosIndirectDefinition
  22. cosSuperDefinition
  23. cosTemplate
  24. country
  25. device
  26. document
  27. documentSeries
  28. domain
  29. domainRelatedObject
  30. extensibleObject
  31. groupOfCertificates
  32. groupOfNames
  33. groupOfUniqueNames
  34. groupOfURLs
  35. inetOrgPerson
  36. labeledURIObject
  37. locality
  38. mailGroup
  39. newPilotPerson
  40. nsComplexRoleDefinition
  41. nsFilteredRoleDefinition
  42. nsLicenseUser
  43. nsNestedRoleDefinition
  44. nsRoleDefinition
  45. ntGroup
  46. ntUser
  47. organization
  48. organizationalPerson
  49. organizationalRole
  50. organizationalUnit
  51. person
  52. pilotObject
  53. pilotOrganization
  54. residentialPerson
  55. RFC822LocalPart
  56. room
  57. strongAuthenticationUser
  58. Chapter 3 Attribute Reference
  59. aliasedObjectName
  60. associatedName
  61. authorSn
  62. buildingName
  63. c (countryName)
  64. carLicense
  65. co (friendlyCountryName)
  66. cosAttribute
  67. cosSpecifier
  68. cosTemplateDn
  69. deltaRevocationList
  70. description
  71. displayName
  72. dmdName
  73. documentAuthor
  74. documentLocation
  75. documentStore
  76. drink (favoriteDrink)
  77. employeeNumber
  78. enhancedSearchGuide
  79. generationQualifier
  80. homePostalAddress
  81. host
  82. initials
  83. janetMailbox
  84. keyWords
  85. labeledURI
  86. lastModifiedTime
  87. mailAlternateAddress
  88. mailPreferenceOption
  89. member
  90. memberURL
  91. mobile
  92. nsLicensedFor
  93. nsLicenseStartTime
  94. ntGroupDeleteGroup
  95. ntUniqueId
  96. ntUserAcctExpires
  97. ntUserDeleteAccount
  98. ntUserHomeDir
  99. ntUserLogonHours
  100. ntUserParms
  101. ntUserWorkstations
  102. objectClass
  103. obsoletesDocument
  104. ou (organizationalUnitName)
  105. pager
  106. personalTitle
  107. postalAddress
  108. postOfficeBox
  109. preferredLanguage
  110. protocolInformation
  111. roleOccupant
  112. searchGuide
  113. seeAlso
  114. sn (surname)
  115. street
  116. subtreeMaximumQuality
  117. supportedApplicationContext
  118. teletexTerminalIdentifier
  119. textEncodedORAddress
  120. ttl (timeToLive)
  121. uniqueIdentifier
  122. updatedByDocument
  123. userClass
  124. userPKCS12
  125. x500UniqueIdentifier
  126. Operational Attributes
  127. altServer
  128. copyingFrom
  129. dITStructureRules
  130. matchingRuleUse
  131. namingContexts
  132. numSubordinates
  133. objectClasses
  134. passwordChange (pwdAllowUserChange)
  135. passwordExpirationTime
  136. passwordGraceLimit
  137. passwordInHistory (pwdInHistory)
  138. passwordLockoutDuration (pwdLockoutDuration)
  139. passwordMinAge (pwdMinAge)
  140. passwordMustChange (pwdMustChange)
  141. passwordRetryCount
  142. passwordUnlock
  143. retryCountResetTime
  144. supportedControl
  145. supportedSASLMechanisms
  146. changeLog
  147. changeType
  148. newRdn
  149. nsSaslMapBaseDNTemplate
  150. targetDn
  151. nsAttributeEncryption
  152. nsDS5Replica
  153. nsDS5ReplicationAgreement
  154. nsDSWindowsReplicationAgreement
  155. nsSaslMapping
DIRECTORY SERVER 7.1 first page preview

DIRECTORY SERVER 7.1

Brand: Red Hat | Category: Server
Table of contents
  1. Table Of Contents
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. Table Of Contents
  6. Table Of Contents
  7. Table Of Contents
  8. Table Of Contents
  9. Table Of Contents
  10. Table Of Contents
  11. Table Of Contents
  12. Table Of Contents
  13. Table Of Contents
  14. Table Of Contents
  15. Table Of Contents
  16. Table Of Contents
  17. Table Of Contents
  18. Introduction to This Reference Guide
  19. Prerequisite Reading
  20. Conventions Used in This Book
  21. Related Information
  22. Part 1 Administering Red Hat Directory Server
  23. Overview of Directory Server Management
  24. Using the Directory Server Console
  25. Copying Entry DNs to the Clipboard
  26. Binding to the Directory from Red Hat Console
  27. Viewing the Current Bind DN from the Console
  28. Starting and Stopping the Server from the Command-Line
  29. Placing the Entire Directory Server in Read-Only Mode
  30. Tracking Modifications to Directory Entries
  31. Cloning a Directory Server
  32. Cloning the Directory Configuration
  33. Using the refer Command
  34. Managing Entries from the Directory Console
  35. Creating a Root Entry
  36. Creating Directory Entries
  37. Creating an Entry Using a Predefined Template
  38. Modifying Directory Entries
  39. Displaying the Property Editor
  40. Adding an Attribute to an Entry
  41. Adding Very Large Attributes
  42. Removing an Attribute Value
  43. Deleting Directory Entries
  44. Providing Input from the Command-Line
  45. Creating a Root Entry from the Command-Line
  46. Adding and Modifying Entries Using ldapmodify
  47. Adding Entries Using ldapmodify
  48. Modifying Entries Using ldapmodify
  49. Deleting Entries Using ldapdelete
  50. Using Special Characters
  51. LDIF Update Statements
  52. Adding an Entry Using LDIF
  53. Renaming an Entry Using LDIF
  54. A Note on Renaming Entries
  55. Adding Attributes to Existing Entries Using LDIF
  56. Changing an Attribute Value Using LDIF
  57. Deleting All Values of an Attribute Using LDIF
  58. Deleting a Specific Attribute Value Using LDIF
  59. Modifying an Entry in an Internationalized Directory
  60. How Referential Integrity Works
  61. Configuring the Supplier Server
  62. Recording Updates in the Changelog
  63. Modifying the Update Interval
  64. Modifying the Attribute List
  65. Creating and Maintaining Suffixes
  66. Creating Suffixes
  67. Creating a New Root Suffix Using the Console
  68. Creating a New Sub Suffix Using the Console
  69. Creating Root and Sub Suffixes from the Command-Line
  70. Maintaining Suffixes
  71. Disabling a Suffix
  72. Creating and Maintaining Databases
  73. Creating a New Database for an Existing Suffix Using the Console
  74. Creating a New Database for a Single Suffix from the Command-Line
  75. Adding Multiple Databases for a Single Suffix
  76. Maintaining Directory Databases
  77. Placing a Database in Read-Only Mode
  78. Deleting a Database
  79. Database Encryption
  80. Encryption Keys
  81. Encrypting Pre-existing Data
  82. Configuring Database Encryption from the Console
  83. Exporting and Importing an Encrypted Database
  84. Creating and Maintaining Database Links
  85. Chaining LDAP Controls
  86. Creating a New Database Link
  87. Creating a Database Link from the Command-Line
  88. Chaining Using SSL
  89. Maintaining Database Links
  90. Database Links and Access Control Evaluation
  91. Advanced Feature: Tuning Database Link Performance
  92. Managing Connections to the Remote Server
  93. Detecting Errors During Normal Processing
  94. Managing Threaded Operations
  95. Advanced Feature: Configuring Cascading Chaining
  96. Configuring Cascading Chaining Defaults Using the Console
  97. Configuring Cascading Chaining Using the Console
  98. Configuring Cascading Chaining from the Command-Line
  99. Summary of Cascading Chaining Configuration Attributes
  100. Configuring Server One
  101. Configuring Server Two
  102. Configuring Server Three
  103. Using Referrals
  104. Setting a Default Referral from the Command-Line
  105. Creating Smart Referrals Using the Directory Server Console
  106. Creating Smart Referrals from the Command-Line
  107. Creating Suffix Referrals
  108. Creating Suffix Referrals from the Command-Line
  109. Importing Data
  110. Importing a Database from the Console
  111. Initializing a Database from the Console
  112. Importing from the Command-Line
  113. Importing Using the ldif2db.pl Perl Script
  114. Importing Using the ldif2ldap Command-Line Script
  115. Exporting Data
  116. Exporting Directory Data to LDIF Using the Console
  117. Exporting a Single Database to LDIF Using the Console
  118. Exporting to LDIF from the Command-Line
  119. Backing Up All Databases
  120. Backing Up All Databases from the Command-Line
  121. Backing Up the dse.ldif Configuration File
  122. Restoring Your Database from the Command-Line
  123. Restoring a Single Database
  124. Restoring the dse.ldif Configuration File
  125. Enabling and Disabling Read-Only Mode
  126. Using Groups
  127. Managing Static Groups
  128. Modifying a Static Group
  129. Modifying a Dynamic Group
  130. About Roles
  131. Managing Roles Using the Console
  132. Creating a Managed Role
  133. Creating a Filtered Role
  134. Viewing and Editing an Entry's Roles
  135. Modifying a Role Entry
  136. Deleting a Role
  137. Examples: Managed Role Definition
  138. Example: Filtered Role Definition
  139. Example: Nested Role Definition
  140. Assigning Class of Service
  141. About the CoS Definition Entry
  142. How a Pointer CoS Works
  143. How a Classic CoS Works
  144. Managing CoS Using the Console
  145. Creating the CoS Template Entry
  146. Editing an Existing CoS
  147. Creating the CoS Definition Entry from the Command-Line
  148. Creating the CoS Template Entry from the Command-Line
  149. Example of a Pointer CoS
  150. Example of an Indirect CoS
  151. Example of a Classic CoS
  152. Creating Role-Based Attributes
  153. Access Control and CoS
  154. Access Control Principles
  155. ACI Placement
  156. ACI Limitations
  157. Default ACIs
  158. Creating ACIs Manually
  159. Example ACI
  160. Targeting a Directory Entry
  161. Targeting Attributes
  162. Targeting Both an Entry and Attributes
  163. Targeting Attribute Values Using LDAP Filters
  164. Targeting a Single Directory Entry
  165. Defining Permissions
  166. Rights Required for LDAP Operations
  167. Permissions Syntax
  168. Access Control and the modrdn Operation
  169. Bind Rule Syntax
  170. Defining User Access - userdn Keyword
  171. Anonymous Access (anyone Keyword)
  172. Wildcards
  173. Defining Group Access - groupdn Keyword
  174. Defining Role Access - roledn Keyword
  175. Using the userattr Keyword
  176. Using the userattr Keyword with Inheritance
  177. Granting Add Permission Using the userattr Keyword
  178. Defining Access from a Specific IP Address
  179. Defining Access from a Specific Domain
  180. Defining Access at a Specific Time of Day or Day of Week
  181. Defining Access Based on Authentication Method
  182. Examples
  183. Creating ACIs from the Console
  184. Displaying the Access Control Editor
  185. Viewing Current ACIs
  186. Editing an ACI
  187. Deleting an ACI
  188. Granting Anonymous Access
  189. Granting Write Access to Personal Entries
  190. Restricting Access to Key Roles
  191. Granting a Group Full Access to a Suffix
  192. Granting Rights to Add and Delete Group Entries
  193. Granting Conditional Access to a Group or Role
  194. Denying Access
  195. Setting a Target Using Filtering
  196. Defining Permissions for DNs That Contain a Comma
  197. Proxied Authorization ACI Example
  198. Viewing the ACIs for an Entry
  199. Using Get Effective Rights from the Command-Line
  200. Using Get Effective Rights from the Console
  201. Get Effective Rights Return Codes
  202. Macro ACI Example
  203. Macro ACI Syntax
  204. Macro Matching for ($dn)
  205. Macro Matching for [$dn]
  206. Macro Matching for ($attr.attrName)
  207. Access Control and Replication
  208. Compatibility with Earlier Releases
  209. Managing the Password Policy
  210. Configuring the Password Policy
  211. Configuring a Global Password Policy Using the Console
  212. Configuring a Subtree/User Password Policy Using the Console
  213. Configuring a Global Password Policy Using the Command-Line
  214. Configuring Subtree/User Password Policy Using the Command-Line
  215. Setting User Passwords
  216. Configuring the Account Lockout Policy
  217. Managing the Password Policy in a Replicated Environment
  218. Sycnhronizing Passwords
  219. Inactivating Users and Roles
  220. Inactivating User and Roles Using the Command-Line
  221. Activating User and Roles Using the Command-Line
  222. Setting Resource Limits Based on the Bind DN
  223. Setting Resource Limits Using the Command-Line
  224. Read-Write Replica/Read-Only Replica
  225. Supplier/Consumer
  226. Unit of Replication
  227. Replication Agreement
  228. Replication Scenarios
  229. Multi-Master Replication
  230. Cascading Replication
  231. Handling Complex Replication Configurations
  232. Creating the Supplier Bind DN Entry
  233. Configuring Supplier Settings
  234. Configuring a Read-Only Replica
  235. Configuring a Hub Supplier
  236. Creating a Replication Agreement
  237. Configuring Single-Master Replication
  238. Configuring the Read-Only Replica on the Consumer Server
  239. Configuring the Read-Write Replica on the Supplier Server
  240. Initializing the Replicas for Single-Master Replication
  241. Configuring 2-Way Multi-Master Replication
  242. Configuring the Read-Write Replicas on the Supplier Servers
  243. Initializing the Replicas for Multi-Master Replication
  244. Preventing Monopolization of the Consumer in Multi-Master Replication
  245. Configuring Cascading Replication
  246. Configuring the Read-Only Replica on the Hub Supplier
  247. Initializing the Replicas for Cascading Replication
  248. Removing the Changelog
  249. Initializing Consumers
  250. Online Consumer Initialization Using the Console
  251. Manual Consumer Initialization Using the Command-Line
  252. Importing the LDIF File to the Consumer Server
  253. Initializing the Consumer Replica from the Backup Files
  254. Forcing Replication Updates
  255. Forcing Replication Updates from the Console
  256. Replication over SSL
  257. Configuring Replication over SSL Using the Replication Agreement Wizard
  258. Configuring Directory Server as a Consumer of a Legacy Directory Server
  259. Using the Retro Changelog Plug-in
  260. Enabling the Retro Changelog Plug-in
  261. Trimming the Retro Changelog
  262. Retro Changelog and the Access Control Policy
  263. Monitoring Replication Status from Administration Express
  264. Solving Common Replication Conflicts
  265. Renaming an Entry with a Multi-Valued Naming Attribute
  266. Renaming an Entry with a Single-Valued Naming Attribute
  267. Solving Orphan Entry Conflicts
  268. Solving Potential Interoperability Problems
  269. Interpreting Error Messages and Symptoms
  270. Useful Tools
  271. Overview of Extending Schema
  272. Managing Attributes
  273. Creating Attributes
  274. Editing Attributes
  275. Deleting Attributes
  276. Viewing Object Classes
  277. Creating Object Classes
  278. Editing Object Classes
  279. Deleting Object Classes
  280. Chapter 10 Managing Indexes
  281. About Indexes and Indexing Performance
  282. Index Types
  283. About Default, System, and Standard Indexes
  284. Overview of System Indexes
  285. Overview of the Searching Algorithm
  286. idlistscanlimit
  287. Phonetic Searches
  288. Balancing the Benefits of Indexing
  289. Creating Indexes
  290. Creating Indexes from the Command-Line
  291. Adding an Index Entry
  292. Running the db2index.pl Script
  293. Creating VLV Indexes from the Server Console
  294. Creating VLV Indexes from the Command-Line
  295. Adding a Browsing Index Entry
  296. Running the vlvindex Script
  297. Setting Access Control for VLV Information
  298. Deleting Indexes from the Server Console
  299. Deleting Indexes from the Command-Line
  300. Deleting Browsing and VLV Indexes from the Server Console
  301. Deleting Browsing and VLV Indexes from the Command-Line
  302. Deleting a Browsing Index Entry
  303. attribute name quick reference table
  304. Introduction to SSL in the Directory Server
  305. Command-Line Functions for Start TLS
  306. Obtaining and Installing Server Certificates
  307. Step 1: Generate a Certificate Request
  308. Step 2: Send the Certificate Request
  309. Step 3: Install the Certificate
  310. Step 4: Trust the Certificate Authority
  311. Step 5: Confirm That Your New Certificates Are Installed
  312. Starting the Server with SSL Enabled
  313. Enabling SSL Only in the Directory Server
  314. Enabling SSL in the Directory Server, Admin Server, and Console
  315. Creating a Password File
  316. Using Certificate-Based Authentication
  317. Setting up Certificate-Based Authentication
  318. Allowing/Requiring Client Authentication
  319. Introduction to SASL
  320. Authentication Mechanisms
  321. SASL Identity Mapping
  322. Legacy Identity Mapping
  323. Configuring SASL Identity Mapping from the Command-Line
  324. Realms
  325. Viewing and Configuring Log Files
  326. Defining a Log File Rotation Policy
  327. Defining a Log File Deletion Policy
  328. Access Log
  329. Error Log
  330. Viewing the Error Log
  331. Audit Log
  332. Configuring the Audit Log
  333. Manual Log File Rotation
  334. Overview of Server Performance Monitor Information
  335. Resource Summary
  336. Connection Status
  337. Global Database Cache Information
  338. Monitoring Your Server from the Command-Line
  339. Monitoring Database Activity
  340. Monitoring Database Activity from the Server Console
  341. Summary Information Table
  342. Database Cache Information Table
  343. Monitoring Databases from the Command-Line
  344. Monitoring Database Link Activity
  345. About SNMP
  346. Configuring the Subagent
  347. server
  348. Configuring the Directory Server for SNMP
  349. operations table
  350. Entries Table
  351. Interaction Table
  352. Tuning Server Performance
  353. Tuning Database Performance
  354. Optimizing Search Performance
  355. Tuning Transaction Logging
  356. Changing the Location of the Database Transaction Log
  357. Disabling Durable Transactions
  358. Miscellaneous Tuning Tips
  359. Part 2 Plug-ins Reference
  360. Server Plug-in Functionality Reference
  361. ACL Plug-in
  362. ACL Preoperation Plug-in
  363. Boolean Syntax Plug-in
  364. Case Ignore String Syntax Plug-in
  365. Chaining Database Plug-in
  366. Country String Syntax Plug-in
  367. Generalized Time Syntax Plug-in
  368. Integer Syntax Plug-in
  369. Internationalization Plug-in
  370. Legacy Replication Plug-in
  371. Multi-Master Replication Plug-in
  372. CLEAR Password Storage Plug-in
  373. NS-MTA-MD5 Password Storage Plug-in
  374. SHA Password Storage Plug-in
  375. Postal Address String Syntax Plug-in
  376. PTA Plug-in
  377. Retro Changelog Plug-in
  378. Roles Plug-in
  379. Space Insensitive String Syntax Plug-in
  380. State Change Plug-in
  381. UID Uniqueness Plug-in
  382. URI Plug-in
  383. Enabling and Disabling Plug-ins from the Server Console
  384. How Directory Server Uses PTA
  385. PTA Plug-in Syntax
  386. Configuring the PTA Plug-in
  387. Configuring the Servers to Use a Secure Connection
  388. Specifying the Authenticating Directory Server
  389. Specifying the Pass-through Subtree
  390. Configuring the Optional Parameters
  391. PTA Plug-in Syntax Examples
  392. Specifying Multiple Authenticating Directory Servers
  393. Specifying One Authenticating Directory Server and Multiple Subtrees
  394. Servers
  395. Overview of the Attribute Uniqueness Plug-in
  396. Overview of the UID Uniqueness Plug-in
  397. Creating an Instance of the Attribute Uniqueness Plug-in
  398. Configuring Attribute Uniqueness Plug-ins
  399. Configuring Attribute Uniqueness Plug-ins from the Directory Server Console
  400. Configuring Attribute Uniqueness Plug-ins from the Command-Line
  401. Using the markerObjectClass and requiredObjectClass Keywords
  402. Attribute Uniqueness Plug-in Syntax Examples
  403. Specifying One Attribute and One Subtree
  404. Replication and the Attribute Uniqueness Plug-in
  405. Multi-Master Replication Scenario
  406. Chapter 18 Windows Sync
  407. How Windows Sync Works
  408. Installing Sync Services
  409. Installing and Configuring the Password Sync Service
  410. Reconfiguring the Password Sync Service
  411. Installing and Configuring the NT4 LDAP Service
  412. Uninstalling the Sync Services
  413. Using Windows Sync
  414. Synchronized Entries
  415. Groups
  416. Manually Initiating Synchronization
  417. The Need for Resynchronization
  418. Active Directory Schema Compatibility
  419. NT4-Specific Limitations
  420. Troubleshooting
  421. Part 3 Appendixes
  422. LDIF File Format
  423. Continuing Lines in LDIF
  424. Specifying Directory Entries Using LDIF
  425. Specifying Organizational Unit Entries
  426. Specifying Organizational Person Entries
  427. Defining Directories Using LDIF
  428. LDIF File Example
  429. Storing Information in Multiple Languages
  430. Finding Entries Using the Server Console
  431. Using ldapsearch
  432. ldapsearch Command-Line Format
  433. ldapsearch Examples
  434. Searching the Schema Entry
  435. Specifying Search Filters Using a File
  436. LDAP Search Filters
  437. Using Attributes in Search Filters
  438. Using Compound Search Filters
  439. Search Filter Examples
  440. Searching an Internationalized Directory
  441. Matching Rule Formats
  442. Using Wildcards in Matching Rule Filters
  443. International Search Examples
  444. Less-Than or Equal-to Example
  445. Greater-Than Example
  446. Appendix C LDAP URLs
  447. About Locales
  448. identifying supported locales
  449. supported language subtypes
  450. Table Of Contents
DIRECTORY SERVER 7.1 first page preview

DIRECTORY SERVER 7.1

Brand: Red Hat | Category: Server
Table of contents
  1. Table Of Contents
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. Table Of Contents
  6. Table Of Contents
  7. Table Of Contents
  8. Table Of Contents
  9. Table Of Contents
  10. Table Of Contents
  11. Table Of Contents
  12. Table Of Contents
  13. Table Of Contents
  14. Table Of Contents
  15. Table Of Contents
  16. Table Of Contents
  17. Table Of Contents
  18. Table Of Contents
  19. What You Should Already Know
  20. document conventions
  21. where to find directory server information
  22. Where to Find Directory Server Information
  23. Part 1 Introduction to Directory Server Plug-ins
  24. Calling Directory Server Plug-in Functions
  25. How Directory Server Plug-ins Work
  26. Types of Directory Server Plug-ins
  27. Including the API Header File
  28. Working with Parameter Blocks
  29. Plug-in Return Values
  30. specifying directory server compatibility
  31. Returning a Value to the Directory Server
  32. Plug-in Dependencies
  33. Plug-in Type Dependencies
  34. Summary of Plug-in Directives
  35. Loading the Plug-in Configuration File
  36. Setting the Log Level of the Server
  37. Writing the Plug-in Example
  38. Compiling the Plug-in Example
  39. Registering the Plug-in Example
  40. Part 2 Basic Plug-in Programming Techniques
  41. logging messages
  42. adding notes to access log entries
  43. sending data to the client
  44. Creating a New Entry
  45. Getting and Setting the DN of an Entry
  46. Finding a Specific Attribute in an Entry
  47. Determining If a DN Is the Root DN
  48. Working with Search Filters
  49. Determining If an Entry Matches a Filter
  50. Getting the Search Criteria
  51. Converting a String to a Filter
  52. checking passwords
  53. How Pre/Post-Operation Plug-ins Work
  54. Types of Pre-Operation and Post-Operation Functions
  55. Types of Post-Operation Functions
  56. Registering Pre/Post-Operation Functions
  57. Specifying Start and Close Functions
  58. Processing an LDAP Bind Operation
  59. Getting and Setting Parameters for the Bind Operation
  60. Processing an LDAP Search Operation
  61. Iterating through Candidates
  62. Chapter 7 Defining Functions for LDAP Operations
  63. Processing an LDAP Add Operation
  64. Processing an LDAP Modify Operation
  65. Processing an LDAP Modify RDN Operation
  66. Processing an LDAP Delete Operation
  67. Processing an LDAP Abandon Operation
  68. Understanding Authentication Methods
  69. How the Directory Server Identifies Clients
  70. Writing Your Own Authentication Plug-in
  71. Defining Your Authentication Function
  72. Getting the Entry and Checking the Credentials
  73. What to Do If Authentication Fails
  74. Registering the SASL Mechanism
  75. Example of a Pre-Operation Bind Plug-in
  76. Example of an Initialization Function
  77. Registering the Plug-in
  78. Part 3 Advanced Programming Techniques
  79. How Entry Store/Fetch Plug-ins Work
  80. Writing Entry Store/Fetch Functions
  81. Registering Entry Store/Fetch Functions
  82. How Extended Operation Plug-ins Work
  83. Writing Extended Operation Functions
  84. Registering Extended Operation Functions
  85. Chapter 10 Writing Extended Operation Plug-ins
  86. Understanding Matching Rules
  87. Extensible Match Filters
  88. Extensible Match Filters in the Directory Server
  89. How Matching Rules Are Identified
  90. How the Server Associates Plug-ins with OIDs
  91. Finding a Plug-in for Searching
  92. How the Server Uses Parameter Blocks
  93. How the Server Updates the Index
  94. Writing the Indexer Factory Function
  95. Getting and Setting Parameters in Indexer Factory Functions
  96. Writing the Indexer Function
  97. Getting and Setting Parameters in Indexer Functions
  98. How the Server Handles the Filter
  99. Query Operators in Matching Rules
  100. Writing a Filter Factory Function
  101. Getting and Setting Parameters in Filter Factory Functions
  102. Writing a Filter Index Function
  103. Getting and Setting Parameters in Filter Index Functions
  104. Writing a Filter Matching Function
  105. Handling Sorting by Matching Rules
  106. Writing a Destructor Function
  107. About Distributing Flat Namespaces
  108. Creating a Distribution Function
  109. Adding the Distribution Function to Your Directory
  110. Using the Console
  111. Adding Distribution Logic to a Suffix
  112. Custom Distribution Checklist
  113. Installing Directory Server
  114. Installing Two Instances of Directory Server
  115. Enabling the DIOP Feature in Directory Server
  116. Using the DIOP Feature
  117. Sample DIOP Plug-in
  118. Debugging the Plug-in
  119. Bypassing Access Control Checks
  120. Part 4 Reference
  121. Summary of Data Types and Structures
  122. berval
  123. computed_attr_context
  124. LDAPMod
  125. mrFilterMatchFn
  126. plugin_referral_entry_callback
  127. plugin_result_callback
  128. plugin_search_entry_callback
  129. send_ldap_result_fn_ptr_t
  130. send_ldap_search_entry_fn_ptr_t
  131. Slapi_Attr
  132. Slapi_Backend
  133. slapi_backend_state_change_fnptr
  134. Slapi_ComponentID
  135. slapi_compute_output_t
  136. Slapi_Connection
  137. Slapi_DN
  138. Slapi_Entry
  139. Slapi_Filter
  140. Slapi_MatchingRuleEntry
  141. Slapi_Mod
  142. Slapi_Mods
  143. Slapi_Mutex
  144. Slapi_Operation
  145. Slapi_PluginDesc
  146. Slapi_RDN
  147. Slapi_UniqueID
  148. Slapi_ValueSet
  149. see also
  150. Distribution Routines
  151. distribution_plugin_entry_point()
  152. Functions for Access Control
  153. slapi_acl_check_mods()
  154. slapi_acl_verify_aci_syntax()
  155. Functions for Internal Operations and Plug-in Callback
  156. slapi_delete_internal_pb()
  157. slapi_free_search_results_internal()
  158. slapi_modify_internal_pb()
  159. slapi_modrdn_internal_pb()
  160. slapi_search_internal_get_entry()
  161. slapi_search_internal_pb()
  162. Functions for Setting Internal Operation Flags
  163. slapi_add_entry_internal_set_pb()
  164. slapi_add_internal_set_pb()
  165. slapi_delete_internal_set_pb()
  166. slapi_modify_internal_set_pb()
  167. slapi_rename_internal_set_pb()
  168. slapi_search_internal_set_pb()
  169. slapi_seq_internal_callback_pb()
  170. slapi_seq_internal_set_pb()
  171. functions for handling attributes
  172. slapi_attr_add_value()
  173. slapi_attr_basetype()
  174. slapi_attr_dup()
  175. slapi_attr_flag_is_set()
  176. slapi_attr_get_bervals_copy()
  177. slapi_attr_get_flags()
  178. slapi_attr_get_numvalues()
  179. slapi_attr_get_type()
  180. slapi_attr_get_valueset()
  181. slapi_attr_init()
  182. slapi_attr_next_value()
  183. slapi_attr_set_valueset()
  184. slapi_attr_syntax_normalize()
  185. slapi_attr_type_cmp()
  186. slapi_attr_types_equivalent()
  187. slapi_attr_value_cmp()
  188. slapi_attr_value_find()
  189. slapi_valueset_set_from_smod()
  190. slapi_be_addsuffix()
  191. slapi_be_exist()
  192. slapi_be_get_instance_info()
  193. slapi_be_get_readonly()
  194. slapi_be_getsuffix()
  195. slapi_be_is_flag_set()
  196. slapi_be_logchanges()
  197. slapi_be_new()
  198. slapi_be_select()
  199. slapi_be_select_by_instance_name()
  200. slapi_be_set_instance_info()
  201. slapi_be_setentrypoint()
  202. slapi_get_first_suffix()
  203. slapi_get_next_backend()
  204. slapi_get_next_suffix()
  205. slapi_is_root_suffix()
  206. slapi_register_backend_state_change()
  207. Functions for Dealing with Controls
  208. slapi_build_control()
  209. slapi_build_control_from_berval()
  210. slapi_control_present()
  211. slapi_dup_control()
  212. slapi_get_supported_controls_copy()
  213. slapi_register_supported_control()
  214. Functions for Syntax Plug-in
  215. slapi_call_syntax_assertion2keys_sub_sv()
  216. slapi_call_syntax_values2keys_sv()
  217. Functions for Managing Memory
  218. slapi_ch_array_free()
  219. slapi_ch_bvecdup()
  220. slapi_ch_calloc()
  221. slapi_ch_free()
  222. slapi_ch_malloc()
  223. slapi_ch_realloc()
  224. slapi_ch_smprintf()
  225. Functions for Managing DNs
  226. slapi_add_auth_response_control()
  227. slapi_dn_beparent()
  228. slapi_dn_isbesuffix()
  229. slapi_dn_isparent()
  230. slapi_dn_issuffix()
  231. slapi_dn_normalize()
  232. slapi_dn_normalize_case()
  233. slapi_dn_parent()
  234. slapi_dn_plus_rdn()
  235. Functions for Managing Entries
  236. slapi_entry2str()
  237. slapi_entry2str_with_options()
  238. slapi_entry_add_rdn_values()
  239. slapi_entry_add_string()
  240. slapi_entry_add_values_sv()
  241. slapi_entry_add_valueset()
  242. slapi_entry_alloc()
  243. slapi_entry_attr_delete()
  244. slapi_entry_attr_get_bool()
  245. slapi_entry_attr_get_charptr()
  246. slapi_entry_attr_get_int()
  247. slapi_entry_attr_get_long()
  248. slapi_entry_attr_get_uint()
  249. slapi_entry_attr_has_syntax_value()
  250. slapi_entry_attr_merge_sv()
  251. slapi_entry_attr_replace_sv()
  252. slapi_entry_attr_set_int()
  253. slapi_entry_attr_set_long()
  254. slapi_entry_attr_set_ulong()
  255. slapi_entry_delete_values_sv()
  256. slapi_entry_dup()
  257. slapi_entry_first_attr()
  258. slapi_entry_free()
  259. slapi_entry_get_dn_const()
  260. slapi_entry_get_ndn()
  261. slapi_entry_get_sdn_const()
  262. slapi_entry_get_uniqueid()
  263. slapi_entry_init()
  264. slapi_entry_merge_values_sv()
  265. slapi_entry_next_attr()
  266. slapi_entry_rdn_values_present()
  267. slapi_entry_schema_check()
  268. slapi_entry_set_sdn()
  269. slapi_entry_set_uniqueid()
  270. slapi_entry_size()
  271. slapi_is_rootdse()
  272. Functions Related to Entry Flags
  273. slapi_entry_flag_is_set()
  274. Functions for Dealing with Filters
  275. slapi_filter_apply()
  276. slapi_filter_compare()
  277. slapi_filter_dup()
  278. slapi_filter_get_attribute_type()
  279. slapi_filter_get_ava()
  280. slapi_filter_get_choice()
  281. slapi_filter_get_subfilt()
  282. slapi_filter_get_type()
  283. slapi_filter_join()
  284. slapi_filter_join_ex()
  285. slapi_filter_list_first()
  286. slapi_filter_list_next()
  287. slapi_filter_test()
  288. slapi_filter_test_ext()
  289. slapi_filter_test_simple()
  290. slapi_find_matching_paren()
  291. slapi_vattr_filter_test()
  292. Functions Specific to Extended Operation
  293. Functions Specific to Bind Methods
  294. slapi_register_supported_saslmechanism()
  295. slapi_ldap_init()
  296. slapi_ldap_unbind()
  297. slapi_log_error()
  298. slapi_is_loglevel_set()
  299. Functions for Handling Matching Rules
  300. slapi_berval_cmp()
  301. slapi_matchingrule_get()
  302. slapi_matchingrule_new()
  303. slapi_matchingrule_register()
  304. slapi_matchingrule_unregister()
  305. slapi_mr_indexer_create()
  306. Functions for LDAPMod Manipulation
  307. slapi_entry2mods()
  308. slapi_mod_add_value()
  309. slapi_mod_done()
  310. slapi_mod_free()
  311. slapi_mod_get_first_value()
  312. slapi_mod_get_ldapmod_passout()
  313. slapi_mod_get_next_value()
  314. slapi_mod_get_operation()
  315. slapi_mod_init()
  316. slapi_mod_init_byref()
  317. slapi_mod_init_passin()
  318. slapi_mod_new()
  319. slapi_mod_remove_value()
  320. slapi_mod_set_type()
  321. slapi_mods_add()
  322. slapi_mods_add_ldapmod()
  323. slapi_mods_add_mod_values()
  324. slapi_mods_add_smod()
  325. slapi_mods_add_modbvps()
  326. slapi_mods_done()
  327. slapi_mods_dump()
  328. slapi_mods_free()
  329. slapi_mods_get_first_smod()
  330. slapi_mods_get_ldapmods_byref()
  331. slapi_mods_get_next_mod()
  332. slapi_mods_get_next_smod()
  333. slapi_mods_get_num_mods()
  334. slapi_mods_init_byref()
  335. slapi_mods_insert_after()
  336. slapi_mods_insert_at()
  337. slapi_mods_insert_before()
  338. slapi_mods_insert_smod_before()
  339. slapi_mods_iterator_backbone()
  340. slapi_mods_new()
  341. Functions for Monitoring Operations
  342. slapi_op_get_type()
  343. Functions for Managing Parameter Block
  344. slapi_pblock_get()
  345. slapi_pblock_new()
  346. Functions for Handling Passwords
  347. slapi_is_encoded()
  348. slapi_add_pwd_control()
  349. slapi_pwpolicy_make_response_control()
  350. Functions for Managing RDN
  351. slapi_rdn_add()
  352. slapi_rdn_compare()
  353. slapi_rdn_contains()
  354. slapi_rdn_contains_attr()
  355. slapi_rdn_done()
  356. slapi_rdn_get_first()
  357. slapi_rdn_get_index()
  358. slapi_rdn_get_next()
  359. slapi_rdn_get_num_components()
  360. slapi_rdn_get_rdn()
  361. slapi_rdn_init()
  362. slapi_rdn_init_rdn()
  363. slapi_rdn_init_sdn()
  364. slapi_rdn_new()
  365. slapi_rdn_new_dn()
  366. slapi_rdn_new_sdn()
  367. slapi_rdn_remove()
  368. slapi_rdn_remove_attr()
  369. slapi_rdn_remove_index()
  370. slapi_rdn_set_rdn()
  371. slapi_rdn_set_sdn()
  372. slapi_role_check()
  373. slapi_moddn_get_newdn()
  374. slapi_sdn_add_rdn()
  375. slapi_sdn_copy()
  376. slapi_sdn_done()
  377. slapi_sdn_free()
  378. slapi_sdn_get_backend_parent()
  379. slapi_sdn_get_ndn()
  380. slapi_sdn_get_ndn_len()
  381. slapi_sdn_get_rdn()
  382. slapi_sdn_is_rdn_component()
  383. slapi_sdn_isgrandparent()
  384. slapi_sdn_isparent()
  385. slapi_sdn_issuffix()
  386. slapi_sdn_new_dn_byref()
  387. slapi_sdn_new_dn_byval()
  388. slapi_sdn_new_ndn_byref()
  389. slapi_sdn_new_ndn_byval()
  390. slapi_sdn_scope_test()
  391. slapi_sdn_set_dn_byref()
  392. slapi_sdn_set_dn_byval()
  393. slapi_sdn_set_ndn_byref()
  394. slapi_sdn_set_ndn_byval()
  395. slapi_sdn_set_parent()
  396. Functions for Sending Entries and Results to the Client
  397. slapi_send_ldap_referral()
  398. slapi_send_ldap_result()
  399. slapi_send_ldap_search_entry()
  400. Functions Related to UTF-8
  401. slapi_has8thBit()
  402. slapi_utf8casecmp()
  403. slapi_utf8ncasecmp()
  404. slapi_utf8isLower()
  405. slapi_utf8isUpper()
  406. slapi_utf8StrToLower()
  407. slapi_utf8StrToUpper()
  408. slapi_utf8ToLower()
  409. slapi_utf8ToUpper()
  410. Functions for Handling Values
  411. slapi_value_compare()
  412. slapi_value_dup()
  413. slapi_value_get_berval()
  414. slapi_value_get_int()
  415. slapi_value_get_long()
  416. slapi_value_get_string()
  417. slapi_value_get_uint()
  418. slapi_value_init()
  419. slapi_value_init_berval()
  420. slapi_value_init_string_passin()
  421. slapi_value_new()
  422. slapi_value_new_string()
  423. slapi_value_new_string_passin()
  424. slapi_value_new_value()
  425. slapi_value_set()
  426. slapi_value_set_berval()
  427. slapi_value_set_int()
  428. slapi_value_set_string()
  429. slapi_value_set_string_passin()
  430. slapi_value_set_value()
  431. Functions for Handling Valueset
  432. slapi_valueset_add_value_ext()
  433. slapi_valueset_count()
  434. slapi_valueset_done()
  435. slapi_valueset_first_value()
  436. slapi_valueset_free()
  437. slapi_valueset_new()
  438. slapi_valueset_next_value()
  439. slapi_valueset_set_valueset()
  440. slapi_vattr_list_attrs()
  441. slapi_vattr_attrs_free()
  442. slapi_vattr_schema_check_type()
  443. slapi_vattr_values_free()
  444. slapi_vattr_values_get()
  445. slapi_vattr_values_get_ex()
  446. slapi_vattr_values_type_thang_get()
  447. Functions for Managing Locks and Synchronization
  448. slapi_destroy_mutex()
  449. slapi_new_condvar()
  450. slapi_new_mutex()
  451. slapi_unlock_mutex()
  452. Functions for Managing Computed Attributes
  453. slapi_compute_add_evaluator()
  454. compute_rewrite_search_filter()
  455. Functions for Manipulating Bits
  456. slapi_isbitset_uchar()
  457. slapi_setbit_int()
  458. slapi_unsetbit_int()
  459. slapi_unsetbit_uchar()
  460. slapi_get_object_extension()
  461. slapi_register_object_extension()
  462. slapi_set_object_extension()
  463. slapi_op_reserved()
  464. slapi_operation_set_flag()
  465. slapi_operation_clear_flag()
  466. Functions for Registering Additional Plug-ins
  467. slapi_register_plugin()
  468. Parameters for Registering Plug-in Functions
  469. Post-Operation/Data Notification Plug-ins
  470. Matching Rule Plug-ins
  471. Entry Plug-ins
  472. Information about the Database
  473. Information about the Connection
  474. Information about the Operation
  475. Information about Extended Operations
  476. Information about Access Control Lists
  477. Information about the Plug-in
  478. Types of Plug-ins
  479. Version Information
  480. Attribute Names
  481. Attribute Comparisons
  482. Parameters for the Bind Function
  483. Parameters Passed to the Search Function
  484. Parameters for Executing the Search
  485. Parameters that Convert Strings to Entries
  486. Parameters for the Add Function
  487. Parameters for the Compare Function
  488. Parameters for the Delete Function
  489. Parameters for the Modify RDN Function
  490. Parameters for the Abandon Function
  491. Query Operators in Extensible Match Filters
  492. Pre-Operation Plug-ins
  493. Information about Operations
  494. Information about Backend State Change
  495. Parameters for LDAP Operations
  496. Parameters for Generating LDIF Strings
  497. Parameters for Filters
  498. Parameters for Password Storage
  499. Parameter for Binder-Based Resource Limits
  500. status codes for resource limits
Red Hat categories
More Red Hat categories
Manuals database logo
manualsdatabase
Your AI-powered manual search engine