Manuals database logo
manualsdatabase
Your AI-powered manual search engine

Novell EDIRECTORY 8.8 SP3 manuals

EDIRECTORY 8.8 SP3 first page preview

EDIRECTORY 8.8 SP3

Brand: Novell | Category: Software
Table of contents
  1. Table Of Contents
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. About This Book
  6. Installing or Upgrading Novell eDirectory on NetWare
  7. Hardware Requirements
  8. Forcing the Backlink Process to Run
  9. Disk Space Check on Upgrading to eDirectory SP3 or later
  10. Installing or Upgrading Novell eDirectory 8.8 on NetWare
  11. Server Health Checks
  12. Installing into a Tree with Dotted Name Containers
  13. Remote Installation or Upgrade
  14. Installing or Upgrading Novell eDirectory on Windows
  15. Prerequisites
  16. Updating the eDirectory Schema for Windows
  17. Installing Novell eDirectory on Windows
  18. Communicating with eDirectory through LDAP
  19. Installing NMAS Server Software
  20. Unattended Install and Upgrade to eDirectory 8.8 SP3 on Windows
  21. Installing or Upgrading Novell eDirectory on Linux
  22. Upgrading eDirectory
  23. Upgrading on Linux Servers Other Than OES
  24. Upgrading Through ZENworks Linux Management on OES Linux SP3
  25. Upgrading eDirectory During OES 1.0 to OES 2.0 Upgrade
  26. Upgrading the Tarball Deployment of eDirectory 8.8
  27. Upgrading Multiple Instances
  28. Installing eDirectory
  29. Installing NICI
  30. Using the nds-install Utility to Install eDirectory Components
  31. Installing Through ZENworks Linux Management on OES Linux SP3
  32. Nonroot User Installing eDirectory 8.8
  33. Using the ndsconfig Utility to Add or Remove the eDirectory Replica Server
  34. Using ndsconfig to Configure Multiple Instances of eDirectory 8.8
  35. Using ndsconfig to Install a Linux Server into a Tree with Dotted Name Containers
  36. Nonroot user SNMP configuration
  37. Installing or Upgrading Novell eDirectory on Solaris
  38. Using SLP with eDirectory
  39. Using the Nmasinst Utility to Configure NMAS
  40. Installing or Upgrading Novell eDirectory on AIX
  41. Using Ndsconfig to Install an AIX Server into a Tree with Dotted Name Containers
  42. Relocating the DIB
  43. NetWare and Windows
  44. Upgrade Requirements of eDirectory 8.8
  45. Reference Changes in 8.8 SP3
  46. Performing a Dry Run before Upgrading eDirectory
  47. Common Problems Encountered during the Upgrade Process
  48. Configuring Novell eDirectory on Linux, Solaris, or AIX Systems
  49. Using the nmasinst Utility to Configure Novell Modular Authentication Service
  50. Security Considerations
  51. Migrating to eDirectory 8.8 SP3
  52. Migrating to eDirectory 8.8 SP3 Without Upgrading the Operating System
  53. Uninstalling Novell eDirectory
  54. Uninstalling eDirectory on Windows
  55. Uninstalling NICI
  56. B eDirectory Health Checks
  57. B.3 Types of Health Checks
  58. B.3.2 Partitions and Replica Health
  59. B.4.3 Critical
  60. B.5 Log Files
  61. C.1 Service Location Protocol
  62. C.2.1 Novell Service Location Providers
  63. C.2.3 Service Agents
EDIRECTORY 8.8 SP3 first page preview

EDIRECTORY 8.8 SP3

Brand: Novell | Category: Software
Table of contents
  1. Table Of Contents
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. Table Of Contents
  6. Table Of Contents
  7. Table Of Contents
  8. Table Of Contents
  9. Table Of Contents
  10. Table Of Contents
  11. Table Of Contents
  12. Table Of Contents
  13. About This Guide
  14. Understanding Novell eDirectory
  15. Ease of Management through Novell iManager
  16. Web-Based Management Utility
  17. Single Login and Authentication
  18. Container Object Classes
  19. Leaf Object Classes
  20. Context and Naming
  21. Distinguished Name
  22. Name Resolution
  23. Trailing Periods
  24. Schema Management
  25. Understanding Mandatory and Optional Attributes
  26. Sample Schema
  27. Partitions
  28. Distributing Replicas for Performance
  29. Replicas
  30. Replica Types
  31. Filtered Replicas
  32. NetWare Bindery Emulation
  33. Access to Resources
  34. Trustee Assignments and Targets
  35. Default Rights for a New Server
  36. Delegated Administration
  37. Administering Rights
  38. Designing Your Novell eDirectory Network
  39. Preparing for eDirectory SP3 Design
  40. Designing the Upper Layers of the Tree
  41. Designing the Lower Layers of the Tree
  42. Guidelines for Partitioning Your Tree
  43. Determining Partitions for the Lower Layers of the Tree
  44. Guidelines for Replicating Your Tree
  45. Determining the Number of Replicas
  46. Meeting Bindery Services Needs for NetWare
  47. Creating Accessibility Guidelines
  48. Understanding the Novell Certificate Server
  49. Ensuring Secure eDirectory Operations on Linux, Solaris, and AIX Systems
  50. Synchronizing Network Time
  51. Synchronizing Time on Windows Servers
  52. Verifying Time Synchronization
  53. Managing Objects
  54. Creating an Object
  55. Moving Objects
  56. Creating and Modifying User Accounts
  57. Setting Up Optional Account Features
  58. Setting Up Login Scripts
  59. Login Time Restrictions for Remote Users
  60. Deleting User Accounts
  61. Defining RBS Roles
  62. Defining Custom RBS Tasks
  63. Synchronization
  64. Features of Synchronization
  65. Normal or Replica Synchronization
  66. Priority Sync
  67. Managing the Schema
  68. Creating a Class
  69. Creating an Attribute
  70. Creating an Auxiliary Class
  71. Modifying an Object's Auxiliary Properties
  72. Viewing Attribute Information
  73. Extending the Schema on Linux, Solaris, or AIX Systems
  74. Schema Flags Added in eDirectory 8.7
  75. Using the eMBox Client to Perform Schema Operations
  76. DSSchema eMTool Options
  77. Managing Partitions and Replicas
  78. Creating a Partition
  79. Moving Partitions
  80. Cancelling Create or Merge Partition Operations
  81. Deleting a Replica
  82. Changing a Replica Type
  83. Setting Up and Managing Filtered Replicas
  84. Defining a Partition Scope
  85. Setting Up a Server Filter
  86. Viewing the Partitions on a Server
  87. Viewing Information about a Replica
  88. Novell eDirectory Management Utilities
  89. Using the Novell iManager Import Convert Export Wizard
  90. Using the Command Line Interface
  91. Conversion Rules
  92. LDAP Bulk Update/Replication Protocol
  93. Migrating the Schema between LDAP Directories
  94. Index Manager
  95. Creating an Index
  96. Taking an Index Offline
  97. Predicate Data
  98. Using the eMBox Client Service Manager eMTool
  99. Using the Service Manager Plug-In to Novell iManager
  100. Offline Bulkload Utility
  101. Multiple Instances
  102. Index
  103. ACL Templates
  104. Caveats
  105. Using Novell iMonitor 2.4
  106. System Requirements
  107. Accessing iMonitor
  108. Modes of Operation
  109. iMonitor Features Available on Every
  110. iMonitor Features
  111. Viewing eDirectory Server Health
  112. Viewing Server Connection Information
  113. Viewing Replica Information
  114. Configuring Trace Settings
  115. Viewing Process Status Information
  116. Viewing Traffic Patterns
  117. Viewing Agent Health Information
  118. Viewing Entries for Synchronization or Purging
  119. Viewing Schema, Class, and Attribute Definitions
  120. Searching for Objects
  121. Clone DIB Set
  122. Ensuring Secure iMonitor Operations
  123. Merging Novell eDirectory Trees
  124. Prerequisites
  125. Merging the Source into the Target Tree
  126. Preparing the Source and Target Trees
  127. Merging Two Trees
  128. Post-Merge Tasks
  129. Grafting a Single Server Tree
  130. Understanding Context Name Changes
  131. Grafting the Source and Target Tree
  132. Using the eMBox Client to Merge Trees
  133. DSMerge eMTool Options
  134. Encrypting Data In eDirectory
  135. Using Encryption Schemes
  136. Managing Encrypted Attributes Policies
  137. Accessing the Encrypted Attributes
  138. Viewing the Encrypted Attributes
  139. Encrypting and Decrypting Backup Data
  140. Migrating to Encrypted Attributes
  141. Enabling Encrypted Replication
  142. Adding a New Replica to a Replica Ring
  143. Synchronization and Encrypted Replication
  144. Achieving Complete Security While Encrypting Data
  145. Encrypting Data in an Existing Setup
  146. Conclusion
  147. Repairing the Novell eDirectory Database
  148. Performing Basic Repair Operations
  149. Performing a Local Database Repair
  150. Checking External References
  151. Viewing and Configuring the Repair Log File
  152. Performing a Repair in Novell iMonitor
  153. Repairing Selected Replicas
  154. Designating This Server As the New Master Replica
  155. Destroying the Selected Replica
  156. Repairing the Selected Replica Ring
  157. Removing This Server from the Replica Ring
  158. Requesting Schema from the Tree
  159. Performing Optional Schema Enhancements
  160. Declaring a New Schema Epoch
  161. Repairing a Server's Network Addresses
  162. Synchronizing the Selected Replica on This Server
  163. Performing a Time Synchronization
  164. Scheduling an Immediate Synchronization
  165. DSRepair Command Line Options
  166. Using Advanced DSRepair Switches
  167. Using the DSRepair eMTool
  168. DSRepair eMTool Options
  169. WAN Traffic Manager
  170. LAN Area Objects
  171. WAN Traffic Policies
  172. Limiting WAN Traffic
  173. Assigning Cost Factors
  174. WAN Traffic Manager Policy Groups
  175. Ipx.wmg
  176. Onospoof.wmg
  177. Opnspoof.wmg
  178. Timecost.wmg
  179. Selector Section
  180. Provider Section
  181. Understanding LDAP Services for Novell eDirectory
  182. Key Terms for LDAP Services
  183. Referrals
  184. Understanding How LDAP Works with eDirectory
  185. Connecting to eDirectory from LDAP
  186. Class and Attribute Mappings
  187. Enabling Nonstandard Schema Output
  188. Syntax Differences
  189. Supported Novell LDAP Controls and Extensions
  190. Using LDAP Tools on Linux, Solaris, or AIX
  191. LDAP Tools
  192. Extensible Match Search Filter
  193. LDAP Transactions
  194. Limitations
  195. Configuring LDAP Services for Novell eDirectory
  196. Verifying That the LDAP Server Is Loaded
  197. Verifying That the LDAP Server Is Running
  198. Verifying That A Device Is Listening
  199. Configuring LDAP Objects
  200. 14.4.1 Configuring LDAP Server and LDAP Group Objects on Linux, Solaris, AIX Systems
  201. Refreshing the LDAP Server
  202. Authentication and Security
  203. Starting and Stopping TLS
  204. Configuring the Client for TLS
  205. Authenticating with a Client Certificate
  206. Using SASL
  207. Using the LDAP Server to Search the Directory
  208. Using Referrals
  209. Searching Filtered Replicas
  210. Configuring for Superior Referrals
  211. Creating a Nonauthoritative Area
  212. Specifying Reference Data
  213. Updating Reference Information through LDAP
  214. Persistent Search: Configuring for eDirectory Events
  215. Controlling Use of the Monitor Events Extended Operation
  216. Auditing LDAP Events
  217. Implementing the Service Location Protocol
  218. Service Agents
  219. Directory Agents
  220. SLP Scopes
  221. How SLP Works
  222. SLP with a User Agent, Service Agent, and Directory Agent
  223. Understanding Local Mode
  224. Central Repository
  225. Scalability and Performance
  226. How SLP Works in Directory Mode
  227. SLP eDirectory Objects
  228. Novell's Implementation of SLP
  229. Novell's User Agents and Service Agents
  230. The Novell Directory Agent
  231. Using the Novell Windows NT Directory Agent
  232. Using the Service Location Protocol Directory Agent
  233. Setting Up SLP on Windows
  234. Setting Up the NetWare Directory Agent Manually
  235. Setting Up SLP on Linux or Solaris
  236. User Agents and Service Agents
  237. Starting and Stopping the Daemon Process
  238. SLP V1- V2 Interoperatibility Issues
  239. Backing Up and Restoring Novell eDirectory
  240. Checklist for Backing Up eDirectory
  241. Understanding Backup and Restore Services
  242. What's Different about Backup and Restore in eDirectory 8.7.3
  243. Overview of How the Backup eMTool Does a Restore
  244. Format of the Backup File Header
  245. Format of the Backup Log File
  246. Using DSMASTER Servers as Part of Disaster Recovery Planning
  247. Transitive Vectors and the Restore Verification Process
  248. Restore Verification Is Backward Compatible Only with eDirectory 8.5 or Later
  249. Using Roll-Forward Logs
  250. Issues to Be Aware of When Turning On Roll-Forward Logging
  251. Location of the Roll-Forward Logs
  252. Backing Up and Removing Roll-Forward Logs
  253. Preparing for a Restore
  254. Locating the Right Backup Files for a Restore
  255. Using Novell iManager for Backup and Restore
  256. Backing Up Manually with iManager
  257. Configuring Roll-Forward Logs with iManager
  258. Restoring from Backup Files with iManager
  259. Using the eMBox Client for Backup and Restore
  260. Doing Unattended Backups, Using a Batch File with the eMBox Client
  261. Configuring Roll-Forward Logs with the eMBox Client
  262. Restoring from Backup Files with the eMBox Client
  263. Backup and Restore Command Line Options
  264. Using DSBK
  265. Using nlm on NetWare
  266. Using dsbk on Windows
  267. Changes to Server-Specific Information Backup (NetWare Only)
  268. Recovering the Database If Restore Verification Fails
  269. Cleaning Up the Replica Ring
  270. Repair the Failed Server and Readd Replicas to the Server
  271. Scenarios for Backup and Restore
  272. Scenario: Losing a Hard Drive Containing eDirectory in a Single-Server NetWork
  273. Scenario: Losing a Hard Drive Containing eDirectory in a Multiserver Environment
  274. Scenario: Losing an Entire Server in a Multiple-Server Environment
  275. Scenario: Losing Some Servers in a Multiple-Server Environment
  276. UNIX
  277. NetWare
  278. SNMP Support for Novell eDirectory
  279. Understanding SNMP Services
  280. eDirectory and SNMP
  281. Installing and Configuring SNMP Services for eDirectory
  282. Subagent Configuration
  283. Setting Up SNMP Services for eDirectory
  284. Monitoring eDirectory Using SNMP
  285. Configuring Traps
  286. Statistics
  287. Troubleshooting
  288. Maintaining Novell eDirectory
  289. Distributing Memory between Entry and Block Caches
  290. Tuning LDAP for eDirectory
  291. Improving eDirectory Performance on Linux, Solaris, and AIX Systems
  292. Optimizing eDirectory Cache
  293. Tuning the Solaris OS for Novell eDirectory
  294. Improving eDirectory Searches and Reads
  295. Advanced Referral Costing
  296. Improving Server-to-Server Connection
  297. Advantages of Referral Costing
  298. Deploying ARC
  299. Enabling Advanced Referral Costing
  300. Monitoring Advanced Referral Costing
  301. Improving Bulkload Performance
  302. LBURP Transaction Size Setting
  303. Increased Number of LDAP Writer Threads
  304. Disabling ACL Templates
  305. Backlinker
  306. Increasing the LBURP Time Out Period
  307. Keeping eDirectory Healthy
  308. Health Check Overview
  309. For More Information
  310. Planned Hardware or Storage Device Upgrade without Replacing the Server
  311. Planned Replacement of a Server
  312. Server IP Address Changes
  313. DHost iConsole Manager
  314. What is DHost
  315. Running DHost iConsole on NetWare
  316. Managing eDirectory Modules
  317. Loading or Unloading Modules on Windows
  318. Viewing the Configuration Parameters
  319. Viewing the Thread Pools Statistics
  320. Setting the SAdmin Password
  321. Setting the SAdmin Password on Linux, Solaris, and AIX
  322. The eDirectory Management Toolbox
  323. Using the eMBox Command Line Client
  324. Running the eMBox Command Line Client in Batch Mode
  325. eMBox Command Line Client Options
  326. Establishing a Secure Connection with the eMBox Client
  327. Finding Out eDirectory Port Numbers
  328. Using the eMBox Logger
  329. Using the eMBox Logger Command Line Client
  330. A.1 Setting Up a Security Container As a Separate Partition
  331. A.2.1 Product-Specific Operations to Perform prior to Tree Merge
  332. A.2.2 Performing the Tree Merge
  333. B.1 General Utilities
  334. B.2 LDAP-Specific Commands
  335. C.1 Service Location Protocol
  336. C.2.1 Novell Service Location Providers
  337. C.2.3 Service Agents
  338. E Configuring GSSAPI with eDirectory
  339. E.1.1 Assumptions on Network Characteristics
  340. E.1.3 Adding Kerberos LDAP Extensions
  341. E.1.4 Exporting the Trusted Root Certificate
  342. E.2.1 Merging eDirectory Trees Configured with SASL-GSSAPI Method
  343. E.3.3 Managing a Service Principal
  344. E.3.4 Editing Foreign Principals
  345. F Security Considerations
  346. F.2 Nessus Scan Results
Related products
EDIRECTORY 8.8 SP5EDIRECTORY 8.8 SP2EDIRECTORY 8.8 SP1EDIRECTORY 8.8 - GUIDEEDIRECTORY 8.8 SP5 - GUIDE 12-2009EDIRECTORY 8.8 SP2 - GUIDE 10-2007EDIRECTORY 8.8 - GUIDE 09-2006SLRS 8 -OPEN ENTERPRISE SERVER 2 SP3CLIENT FOR LINUX 2.0 SP3
Novell categories
More Novell categories
Manuals database logo
manualsdatabase
Your AI-powered manual search engine