Novell EDIRECTORY 8.8 SP3 manuals
EDIRECTORY 8.8 SP3
Table of contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- About This Book
- Installing or Upgrading Novell eDirectory on NetWare
- Hardware Requirements
- Forcing the Backlink Process to Run
- Disk Space Check on Upgrading to eDirectory SP3 or later
- Installing or Upgrading Novell eDirectory 8.8 on NetWare
- Server Health Checks
- Installing into a Tree with Dotted Name Containers
- Remote Installation or Upgrade
- Installing or Upgrading Novell eDirectory on Windows
- Prerequisites
- Updating the eDirectory Schema for Windows
- Installing Novell eDirectory on Windows
- Communicating with eDirectory through LDAP
- Installing NMAS Server Software
- Unattended Install and Upgrade to eDirectory 8.8 SP3 on Windows
- Installing or Upgrading Novell eDirectory on Linux
- Upgrading eDirectory
- Upgrading on Linux Servers Other Than OES
- Upgrading Through ZENworks Linux Management on OES Linux SP3
- Upgrading eDirectory During OES 1.0 to OES 2.0 Upgrade
- Upgrading the Tarball Deployment of eDirectory 8.8
- Upgrading Multiple Instances
- Installing eDirectory
- Installing NICI
- Using the nds-install Utility to Install eDirectory Components
- Installing Through ZENworks Linux Management on OES Linux SP3
- Nonroot User Installing eDirectory 8.8
- Using the ndsconfig Utility to Add or Remove the eDirectory Replica Server
- Using ndsconfig to Configure Multiple Instances of eDirectory 8.8
- Using ndsconfig to Install a Linux Server into a Tree with Dotted Name Containers
- Nonroot user SNMP configuration
- Installing or Upgrading Novell eDirectory on Solaris
- Using SLP with eDirectory
- Using the Nmasinst Utility to Configure NMAS
- Installing or Upgrading Novell eDirectory on AIX
- Using Ndsconfig to Install an AIX Server into a Tree with Dotted Name Containers
- Relocating the DIB
- NetWare and Windows
- Upgrade Requirements of eDirectory 8.8
- Reference Changes in 8.8 SP3
- Performing a Dry Run before Upgrading eDirectory
- Common Problems Encountered during the Upgrade Process
- Configuring Novell eDirectory on Linux, Solaris, or AIX Systems
- Using the nmasinst Utility to Configure Novell Modular Authentication Service
- Security Considerations
- Migrating to eDirectory 8.8 SP3
- Migrating to eDirectory 8.8 SP3 Without Upgrading the Operating System
- Uninstalling Novell eDirectory
- Uninstalling eDirectory on Windows
- Uninstalling NICI
- B eDirectory Health Checks
- B.3 Types of Health Checks
- B.3.2 Partitions and Replica Health
- B.4.3 Critical
- B.5 Log Files
- C.1 Service Location Protocol
- C.2.1 Novell Service Location Providers
- C.2.3 Service Agents
EDIRECTORY 8.8 SP3
Table of contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- About This Guide
- Understanding Novell eDirectory
- Ease of Management through Novell iManager
- Web-Based Management Utility
- Single Login and Authentication
- Container Object Classes
- Leaf Object Classes
- Context and Naming
- Distinguished Name
- Name Resolution
- Trailing Periods
- Schema Management
- Understanding Mandatory and Optional Attributes
- Sample Schema
- Partitions
- Distributing Replicas for Performance
- Replicas
- Replica Types
- Filtered Replicas
- NetWare Bindery Emulation
- Access to Resources
- Trustee Assignments and Targets
- Default Rights for a New Server
- Delegated Administration
- Administering Rights
- Designing Your Novell eDirectory Network
- Preparing for eDirectory SP3 Design
- Designing the Upper Layers of the Tree
- Designing the Lower Layers of the Tree
- Guidelines for Partitioning Your Tree
- Determining Partitions for the Lower Layers of the Tree
- Guidelines for Replicating Your Tree
- Determining the Number of Replicas
- Meeting Bindery Services Needs for NetWare
- Creating Accessibility Guidelines
- Understanding the Novell Certificate Server
- Ensuring Secure eDirectory Operations on Linux, Solaris, and AIX Systems
- Synchronizing Network Time
- Synchronizing Time on Windows Servers
- Verifying Time Synchronization
- Managing Objects
- Creating an Object
- Moving Objects
- Creating and Modifying User Accounts
- Setting Up Optional Account Features
- Setting Up Login Scripts
- Login Time Restrictions for Remote Users
- Deleting User Accounts
- Defining RBS Roles
- Defining Custom RBS Tasks
- Synchronization
- Features of Synchronization
- Normal or Replica Synchronization
- Priority Sync
- Managing the Schema
- Creating a Class
- Creating an Attribute
- Creating an Auxiliary Class
- Modifying an Object's Auxiliary Properties
- Viewing Attribute Information
- Extending the Schema on Linux, Solaris, or AIX Systems
- Schema Flags Added in eDirectory 8.7
- Using the eMBox Client to Perform Schema Operations
- DSSchema eMTool Options
- Managing Partitions and Replicas
- Creating a Partition
- Moving Partitions
- Cancelling Create or Merge Partition Operations
- Deleting a Replica
- Changing a Replica Type
- Setting Up and Managing Filtered Replicas
- Defining a Partition Scope
- Setting Up a Server Filter
- Viewing the Partitions on a Server
- Viewing Information about a Replica
- Novell eDirectory Management Utilities
- Using the Novell iManager Import Convert Export Wizard
- Using the Command Line Interface
- Conversion Rules
- LDAP Bulk Update/Replication Protocol
- Migrating the Schema between LDAP Directories
- Index Manager
- Creating an Index
- Taking an Index Offline
- Predicate Data
- Using the eMBox Client Service Manager eMTool
- Using the Service Manager Plug-In to Novell iManager
- Offline Bulkload Utility
- Multiple Instances
- Index
- ACL Templates
- Caveats
- Using Novell iMonitor 2.4
- System Requirements
- Accessing iMonitor
- Modes of Operation
- iMonitor Features Available on Every
- iMonitor Features
- Viewing eDirectory Server Health
- Viewing Server Connection Information
- Viewing Replica Information
- Configuring Trace Settings
- Viewing Process Status Information
- Viewing Traffic Patterns
- Viewing Agent Health Information
- Viewing Entries for Synchronization or Purging
- Viewing Schema, Class, and Attribute Definitions
- Searching for Objects
- Clone DIB Set
- Ensuring Secure iMonitor Operations
- Merging Novell eDirectory Trees
- Prerequisites
- Merging the Source into the Target Tree
- Preparing the Source and Target Trees
- Merging Two Trees
- Post-Merge Tasks
- Grafting a Single Server Tree
- Understanding Context Name Changes
- Grafting the Source and Target Tree
- Using the eMBox Client to Merge Trees
- DSMerge eMTool Options
- Encrypting Data In eDirectory
- Using Encryption Schemes
- Managing Encrypted Attributes Policies
- Accessing the Encrypted Attributes
- Viewing the Encrypted Attributes
- Encrypting and Decrypting Backup Data
- Migrating to Encrypted Attributes
- Enabling Encrypted Replication
- Adding a New Replica to a Replica Ring
- Synchronization and Encrypted Replication
- Achieving Complete Security While Encrypting Data
- Encrypting Data in an Existing Setup
- Conclusion
- Repairing the Novell eDirectory Database
- Performing Basic Repair Operations
- Performing a Local Database Repair
- Checking External References
- Viewing and Configuring the Repair Log File
- Performing a Repair in Novell iMonitor
- Repairing Selected Replicas
- Designating This Server As the New Master Replica
- Destroying the Selected Replica
- Repairing the Selected Replica Ring
- Removing This Server from the Replica Ring
- Requesting Schema from the Tree
- Performing Optional Schema Enhancements
- Declaring a New Schema Epoch
- Repairing a Server's Network Addresses
- Synchronizing the Selected Replica on This Server
- Performing a Time Synchronization
- Scheduling an Immediate Synchronization
- DSRepair Command Line Options
- Using Advanced DSRepair Switches
- Using the DSRepair eMTool
- DSRepair eMTool Options
- WAN Traffic Manager
- LAN Area Objects
- WAN Traffic Policies
- Limiting WAN Traffic
- Assigning Cost Factors
- WAN Traffic Manager Policy Groups
- Ipx.wmg
- Onospoof.wmg
- Opnspoof.wmg
- Timecost.wmg
- Selector Section
- Provider Section
- Understanding LDAP Services for Novell eDirectory
- Key Terms for LDAP Services
- Referrals
- Understanding How LDAP Works with eDirectory
- Connecting to eDirectory from LDAP
- Class and Attribute Mappings
- Enabling Nonstandard Schema Output
- Syntax Differences
- Supported Novell LDAP Controls and Extensions
- Using LDAP Tools on Linux, Solaris, or AIX
- LDAP Tools
- Extensible Match Search Filter
- LDAP Transactions
- Limitations
- Configuring LDAP Services for Novell eDirectory
- Verifying That the LDAP Server Is Loaded
- Verifying That the LDAP Server Is Running
- Verifying That A Device Is Listening
- Configuring LDAP Objects
- 14.4.1 Configuring LDAP Server and LDAP Group Objects on Linux, Solaris, AIX Systems
- Refreshing the LDAP Server
- Authentication and Security
- Starting and Stopping TLS
- Configuring the Client for TLS
- Authenticating with a Client Certificate
- Using SASL
- Using the LDAP Server to Search the Directory
- Using Referrals
- Searching Filtered Replicas
- Configuring for Superior Referrals
- Creating a Nonauthoritative Area
- Specifying Reference Data
- Updating Reference Information through LDAP
- Persistent Search: Configuring for eDirectory Events
- Controlling Use of the Monitor Events Extended Operation
- Auditing LDAP Events
- Implementing the Service Location Protocol
- Service Agents
- Directory Agents
- SLP Scopes
- How SLP Works
- SLP with a User Agent, Service Agent, and Directory Agent
- Understanding Local Mode
- Central Repository
- Scalability and Performance
- How SLP Works in Directory Mode
- SLP eDirectory Objects
- Novell's Implementation of SLP
- Novell's User Agents and Service Agents
- The Novell Directory Agent
- Using the Novell Windows NT Directory Agent
- Using the Service Location Protocol Directory Agent
- Setting Up SLP on Windows
- Setting Up the NetWare Directory Agent Manually
- Setting Up SLP on Linux or Solaris
- User Agents and Service Agents
- Starting and Stopping the Daemon Process
- SLP V1- V2 Interoperatibility Issues
- Backing Up and Restoring Novell eDirectory
- Checklist for Backing Up eDirectory
- Understanding Backup and Restore Services
- What's Different about Backup and Restore in eDirectory 8.7.3
- Overview of How the Backup eMTool Does a Restore
- Format of the Backup File Header
- Format of the Backup Log File
- Using DSMASTER Servers as Part of Disaster Recovery Planning
- Transitive Vectors and the Restore Verification Process
- Restore Verification Is Backward Compatible Only with eDirectory 8.5 or Later
- Using Roll-Forward Logs
- Issues to Be Aware of When Turning On Roll-Forward Logging
- Location of the Roll-Forward Logs
- Backing Up and Removing Roll-Forward Logs
- Preparing for a Restore
- Locating the Right Backup Files for a Restore
- Using Novell iManager for Backup and Restore
- Backing Up Manually with iManager
- Configuring Roll-Forward Logs with iManager
- Restoring from Backup Files with iManager
- Using the eMBox Client for Backup and Restore
- Doing Unattended Backups, Using a Batch File with the eMBox Client
- Configuring Roll-Forward Logs with the eMBox Client
- Restoring from Backup Files with the eMBox Client
- Backup and Restore Command Line Options
- Using DSBK
- Using nlm on NetWare
- Using dsbk on Windows
- Changes to Server-Specific Information Backup (NetWare Only)
- Recovering the Database If Restore Verification Fails
- Cleaning Up the Replica Ring
- Repair the Failed Server and Readd Replicas to the Server
- Scenarios for Backup and Restore
- Scenario: Losing a Hard Drive Containing eDirectory in a Single-Server NetWork
- Scenario: Losing a Hard Drive Containing eDirectory in a Multiserver Environment
- Scenario: Losing an Entire Server in a Multiple-Server Environment
- Scenario: Losing Some Servers in a Multiple-Server Environment
- UNIX
- NetWare
- SNMP Support for Novell eDirectory
- Understanding SNMP Services
- eDirectory and SNMP
- Installing and Configuring SNMP Services for eDirectory
- Subagent Configuration
- Setting Up SNMP Services for eDirectory
- Monitoring eDirectory Using SNMP
- Configuring Traps
- Statistics
- Troubleshooting
- Maintaining Novell eDirectory
- Distributing Memory between Entry and Block Caches
- Tuning LDAP for eDirectory
- Improving eDirectory Performance on Linux, Solaris, and AIX Systems
- Optimizing eDirectory Cache
- Tuning the Solaris OS for Novell eDirectory
- Improving eDirectory Searches and Reads
- Advanced Referral Costing
- Improving Server-to-Server Connection
- Advantages of Referral Costing
- Deploying ARC
- Enabling Advanced Referral Costing
- Monitoring Advanced Referral Costing
- Improving Bulkload Performance
- LBURP Transaction Size Setting
- Increased Number of LDAP Writer Threads
- Disabling ACL Templates
- Backlinker
- Increasing the LBURP Time Out Period
- Keeping eDirectory Healthy
- Health Check Overview
- For More Information
- Planned Hardware or Storage Device Upgrade without Replacing the Server
- Planned Replacement of a Server
- Server IP Address Changes
- DHost iConsole Manager
- What is DHost
- Running DHost iConsole on NetWare
- Managing eDirectory Modules
- Loading or Unloading Modules on Windows
- Viewing the Configuration Parameters
- Viewing the Thread Pools Statistics
- Setting the SAdmin Password
- Setting the SAdmin Password on Linux, Solaris, and AIX
- The eDirectory Management Toolbox
- Using the eMBox Command Line Client
- Running the eMBox Command Line Client in Batch Mode
- eMBox Command Line Client Options
- Establishing a Secure Connection with the eMBox Client
- Finding Out eDirectory Port Numbers
- Using the eMBox Logger
- Using the eMBox Logger Command Line Client
- A.1 Setting Up a Security Container As a Separate Partition
- A.2.1 Product-Specific Operations to Perform prior to Tree Merge
- A.2.2 Performing the Tree Merge
- B.1 General Utilities
- B.2 LDAP-Specific Commands
- C.1 Service Location Protocol
- C.2.1 Novell Service Location Providers
- C.2.3 Service Agents
- E Configuring GSSAPI with eDirectory
- E.1.1 Assumptions on Network Characteristics
- E.1.3 Adding Kerberos LDAP Extensions
- E.1.4 Exporting the Trusted Root Certificate
- E.2.1 Merging eDirectory Trees Configured with SASL-GSSAPI Method
- E.3.3 Managing a Service Principal
- E.3.4 Editing Foreign Principals
- F Security Considerations
- F.2 Nessus Scan Results
manualsdatabase
Your AI-powered manual search engine