Manuals database logo
manualsdatabase
Your AI-powered manual search engine

Netscape NETSCAPE DIRECTORY SERVER 6.02 manuals

NETSCAPE DIRECTORY SERVER 6.02 first page preview

NETSCAPE DIRECTORY SERVER 6.02

Brand: Netscape | Category: Server
Table of contents
  1. Table Of Contents
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. Table Of Contents
  6. Table Of Contents
  7. Table Of Contents
  8. Table Of Contents
  9. Table Of Contents
  10. Table Of Contents
  11. Table Of Contents
  12. Table Of Contents
  13. Table Of Contents
  14. Table Of Contents
  15. About This Reference Guide
  16. Prerequisite Reading
  17. Conventions Used In This Reference Guide
  18. Chapter 1 Introduction
  19. Directory Server Configuration
  20. Using Directory Server Command-Line Scripts
  21. LDIF Configuration Files - Location
  22. Configuration of Plug-in Functionality
  23. Configuration of Databases
  24. Migration of Pre-Directory Server 6.x Configuration Files to LDIF Format
  25. Changing Configuration Attributes
  26. Modifying Configuration Entries Using LDAP
  27. Restrictions to Modifying Configuration Entries and Attributes
  28. cn=config
  29. nsslapd-accesslog (Access Log)
  30. nsslapd-accesslog-level
  31. nsslapd-accesslog-logexpirationtime (Access Log Expiration Time)
  32. nsslapd-accesslog-logging-enabled (Access Log Enable Logging)
  33. nsslapd-accesslog-logminfreediskspace (Access Log Minimum Free Disk Space)
  34. nsslapd-accesslog-logrotationtimeunit (Access Log Rotation Time Unit)
  35. nsslapd-accesslog-maxlogsperdir (Access Log Maximum Number of Log Files)
  36. nsslapd-auditlog (Audit Log)
  37. nsslapd-auditlog-list
  38. nsslapd-auditlog-logging-enabled (Audit Log Enable Logging)
  39. nsslapd-auditlog-logminfreediskspace (Audit Log Minimum Free Disk Space)
  40. nsslapd-auditlog-logrotationtimeunit (Audit Log Rotation Time Unit)
  41. nsslapd-auditlog-maxlogsperdir (Audit Log Maximum Number of Log Files)
  42. nsslapd-certmap-basedn (Certificate Map Search Base)
  43. nsslapd-enquote-sup-oc (Enable Superior Object Class Enquoting)
  44. nsslapd-errorlog (Error Log)
  45. nsslapd-errorlog-level (Error Log Level)
  46. nsslapd-errorlog-list
  47. nsslapd-errorlog-logging-enabled (Enable Error Logging)
  48. nsslapd-errorlog-logrotationtime (Error Log Rotation Time)
  49. nsslapd-errorlog-maxlogsize (Maximum Error Log Size)
  50. nsslapd-groupevalnestlevel
  51. nsslapd-ioblocktimeout (IO Block Time Out)
  52. nsslapd-listenhost (Listen to IP Address)
  53. nsslapd-maxbersize (Maximum Message Size)
  54. nsslapd-maxthreadsperconn (Maximum Threads Per Connection)
  55. nsslapd-nagle
  56. nsslapd-port (Port Number)
  57. nsslapd-referral (Referral)
  58. nsslapd-referralmode (Referral Mode)
  59. nsslapd-return-exact-case (Return Exact Case)
  60. nsslapd-rootpw (Root Password)
  61. nsslapd-schemacheck (Schema Checking)
  62. nsslapd-securelistenhost
  63. nsslapd-security (Security)
  64. nsslapd-threadnumber (Thread Number)
  65. nsslapd-versionstring
  66. passwordExp (Password Expiration)
  67. passwordInHistory (Number of Passwords to Remember)
  68. passwordLockoutDuration (Lockout Duration)
  69. passwordMaxFailure (Maximum Password Failures)
  70. passwordMustChange (Password Must Change)
  71. passwordStorageScheme (Password Storage Scheme)
  72. passwordWarning (Send Warning)
  73. nsslapd-changelogdir
  74. nsslapd-changelogmaxage (Max Changelog Age)
  75. cn=encryption
  76. nsssl2
  77. cn=features
  78. nsslapd-state
  79. cn=mapping tree,cn=config
  80. nsDS5Flags
  81. nsDS5ReplicaChangeCount
  82. nsDS5ReplicaName
  83. nsDS5ReplicaReferral
  84. nsDS5ReplicaType
  85. description
  86. nsDS5ReplicaBindMethod
  87. nsDS5ReplicaHost
  88. nsDS5ReplicaLastInitStatus
  89. nsDS5ReplicaLastUpdateStart
  90. nsDS5ReplicaRefresh
  91. nsDS5ReplicaTransportInfo
  92. nsDS5ReplicaUpdateSchedule
  93. currentConnections
  94. backendMonitorDN
  95. nssnmporganization
  96. nssnmpdescription
  97. cn=tasks
  98. Overview
  99. Object Classes for Plug-In Configuration
  100. bit check Plug-in
  101. ACL preoperation Plug-in
  102. Boolean Syntax Plug-in
  103. Case Ignore String Syntax Plug-in
  104. Class of Service Plug-in
  105. Distinguished Name Syntax Plug-in
  106. Integer Syntax Plug-in
  107. ldbm database Plug-in
  108. Legacy Replication Plug-in
  109. Octet String Syntax Plug-in
  110. CRYPT Password Storage Plug-in
  111. SHA Password Storage Scheme Plug-in
  112. Postal Address String Syntax Plug-in
  113. Presence Plug-in
  114. Referential Integrity Postoperation Plug-in
  115. Retro Changelog Plug-in
  116. State Change Plug-in
  117. UID Uniqueness Plug-in
  118. URI Syntax Plug-in
  119. List of Attributes Common to All Plug-ins
  120. nsslapd-pluginEnabled
  121. nsslapd-pluginVendor
  122. Attributes Allowed by Certain Plug-ins
  123. Database Plug-in Attributes
  124. nsLookthroughLimit
  125. nsslapd-cache-autosize
  126. nsslapd-db-checkpoint-interval
  127. nsslapd-db-circular-logging
  128. nsslapd-db-durable-transactions
  129. nsslapd-db-idl-divisor
  130. nsslapd-db-logdirectory
  131. nsslapd-db-page-size
  132. nsslapd-db-transaction-logging
  133. nsslapd-db-trickle-percentage
  134. nsslapd-import-cachesize
  135. Database Attributes Under cn=monitor,cn=ldbm database, cn=plugins,cn=config
  136. cn=UserRoot,cn=ldbm database, cn=plugins,cn=config
  137. nsslapd-cachememsize
  138. nsslapd-require-index
  139. Database Attributes Under cn=database,cn=monitor,cn=ldbm database, cn=plugins,cn=config
  140. nsslapd-db-deadlock-rate
  141. nsslapd-db-log-write-rate
  142. cn=plugins,cn=config
  143. nsMatchingRule
  144. dbfilenamenumber
  145. dbfilepageout
  146. Database Link Plug-in Attributes (chaining attributes)
  147. Database Link Attributes Under cn=config,cn=chaining database, cn=plugins,cn=config
  148. nsMaxTestResponseDelay
  149. nsAbandonedSearchCheckInterval
  150. nsBindRetryLimit
  151. nsConcurrentBindLimit
  152. nsOperationConnectionsLimit
  153. nsReferralOnScopedSearch
  154. nsFarmServerURL
  155. nsMultiplexorCredentials
  156. cn=chaining database, cn=plugins,cn=config
  157. nsUnbindCount
  158. Overview of Directory Server Files
  159. configuration files
  160. Backup Files
  161. ldif Files
  162. Lock Files
  163. Access Log Content
  164. Access Logging Levels
  165. Default Access Logging Content
  166. Connection Number
  167. Operation Number
  168. Number of Entries
  169. LDAP Response Type
  170. Change Sequence Number
  171. Abandon Message
  172. Access Log Content for Additional Access Logging Levels
  173. Connection Description
  174. Common Connection Codes
  175. LDAP Result Codes
  176. Migration from 4.x Directory Server to 6.x
  177. Server Attributes
  178. Database Attributes
  179. General Server Configuration Attributes
  180. Database Link Attributes
  181. SNMP Attributes
  182. Finding and Executing Command-Line Utilities
  183. Command-Line Utilities Quick Reference
  184. Using Special Characters
  185. ldapsearch
  186. SSL Options
  187. Additional ldapsearch Options
  188. ldapmodify
  189. ldapmodify Options
  190. Additional ldapmodify Options
  191. ldapdelete
  192. Additional ldapdelete Options
  193. ldif
  194. Options
  195. Finding and Executing Command-Line Scripts
  196. Command-Line Scripts Quick Reference
  197. Shell and Batch Scripts
  198. bak2db (Restore database from backup)
  199. db2bak (Create backup of database)
  200. db2dsml (Export database contents to DSML)
  201. Syntax
  202. getpwenc (Print encrypted password)
  203. ldif2ldap (Perform import operation over LDAP)
  204. monitor (Retrieve monitoring information)
  205. restoreconfig (Restore Administration Server Configuration)
  206. start-slapd (Start the Directory Server)
  207. stop-slapd (Stop the Directory Server)
  208. vlvindex (Create virtual list view (VLV) indexes)
  209. Perl Scripts
  210. db2bak.pl (Create backup of database)
  211. db2ldif.pl (Export database contents to LDIF)
  212. ldif2db.pl (Import)
  213. migrateInstance6 (Migrate to Directory Server 6.x)
  214. ns-accountstatus.pl (Establish account status)
  215. ns-inactivate.pl (Inactivate an entry or group of entries)
  216. Overview of ns-slapd and slapd.exe Commands
  217. ns-slapd (UNIX)
  218. ns-slapd and slapd.exe Command-Line Utilities for Exporting Databases
  219. ns-slapd and slapd.exe Command-Line Utilities for Restoring and Backing up Databases
NETSCAPE DIRECTORY SERVER 6.02 first page preview

NETSCAPE DIRECTORY SERVER 6.02

Brand: Netscape | Category: Server
Table of contents
  1. Table Of Contents
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. Table Of Contents
  6. Table Of Contents
  7. About This Guide
  8. Directory Server Overview
  9. Conventions Used in This Guide
  10. introduction to directory server
  11. About Global Directory Services
  12. About LDAP
  13. Overview of Directory Server Architecture
  14. Overview of the Basic Directory Tree
  15. Directory Server Data Storage
  16. About Directory Entries
  17. Distributing Directory Data
  18. Design Process Outline
  19. Deploying Your Directory
  20. Other General Directory Resources
  21. introduction to directory data
  22. What Your Directory Might Include
  23. What Your Directory Should Not Include
  24. Performing a Site Survey
  25. Identifying the Applications that Use Your Directory
  26. Identifying Data Sources
  27. Characterizing Your Directory Data
  28. Determining Level of Service
  29. Data Mastering for Replication
  30. Determining Data Ownership
  31. Determining Data Access
  32. Documenting Your Site Survey
  33. Repeating the Site Survey
  34. Schema Design Process Overview
  35. Netscape Standard Schema
  36. Standard Attributes
  37. Standard Object Classes
  38. Mapping Your Data to the Default Schema
  39. Matching Data to Schema Elements
  40. Customizing the Schema
  41. When to Extend Your Schema
  42. Naming Attribute and Object Classes
  43. Strategies for Defining New Attributes
  44. Creating Custom Schema Files
  45. Custom Schema Best Practices
  46. Maintaining Consistent Schema
  47. Schema Checking
  48. Maintaining Consistency in Replicated Schema
  49. Other Schema Resources
  50. Introduction to the Directory Tree
  51. Designing Your Directory Tree
  52. Suffix Naming Conventions
  53. Naming Multiple Suffixes
  54. Identifying Branch Points
  55. Replication Considerations
  56. Access Control Considerations
  57. Naming Entries
  58. Naming Group Entries
  59. Naming Other Kinds of Entries
  60. About Roles
  61. Deciding Between Roles and Groups
  62. Directory Tree Design Examples
  63. Directory Tree for an ISP
  64. other directory tree resources
  65. Topology Overview
  66. Distributing Your Data
  67. About Using Multiple Databases
  68. About Suffixes
  69. About Knowledge References
  70. The Structure of an LDAP Referral
  71. About Default Referrals
  72. Tips for Designing Smart Referrals
  73. Using Chaining
  74. Deciding Between Referrals and Chaining
  75. Usage Differences
  76. Using Indexes to Improve Database Performance
  77. Evaluating the Costs of Indexing
  78. Introduction to Replication
  79. Replication Concepts
  80. Unit of Replication
  81. Change Log
  82. Replication Agreement
  83. Common Replication Scenarios
  84. Multi-Master Replication
  85. Cascading Replication
  86. Mixed Environments
  87. Defining a Replication Strategy
  88. Replication Survey
  89. Using Replication for High Availability
  90. Using Replication for Local Availability
  91. Example of Network Load Balancing
  92. Example of Load Balancing for Improved Performance
  93. Example Replication Strategy for a Small Site
  94. Using Replication with other Directory Features
  95. Replication and Database Links
  96. Schema Replication
  97. About Security Threats
  98. Unauthorized Access
  99. Denial of Service
  100. Determining Access Rights
  101. Conducting Regular Audits
  102. Overview of Security Methods
  103. Anonymous Access
  104. Simple Password
  105. Certificate-Based Authentication
  106. Proxy Authentication
  107. Designing a Password Policy
  108. User-Defined Passwords
  109. Expiration Warning
  110. Password Minimum Age
  111. Designing a Password Policy in a Replicated Environment
  112. Designing Access Control
  113. Targets
  114. Permissions
  115. Bind Rules
  116. Setting Permissions
  117. When to Deny Access
  118. Using Filtered Access Control Rules
  119. Securing Connections With SSL
  120. other security resources
  121. An Enterprise
  122. Data Design
  123. Directory Tree Design
  124. Topology Design
  125. Database Topology
  126. Replication Design
  127. Supplier Consumer Architecture
  128. Security Design
  129. Tuning and Optimizations
  130. Schema Design
  131. Server Topology
  132. Supplier Architecture
NETSCAPE DIRECTORY SERVER 6.02 first page preview

NETSCAPE DIRECTORY SERVER 6.02

Brand: Netscape | Category: Server
Table of contents
  1. Table Of Contents
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. Table Of Contents
  6. Table Of Contents
  7. Table Of Contents
  8. Table Of Contents
  9. Prerequisite Reading
  10. Related Information
  11. Chapter 1 About Schema
  12. Object Class Inheritance
  13. Attribute Syntax
  14. Single-Valued and Multi-Valued Attributes
  15. Object Identifiers (OIDs)
  16. Extending Server Schema
  17. Chapter 2 Object Class Reference
  18. account
  19. alias
  20. cosClassicDefinition
  21. cosDefinition
  22. cosIndirectDefinition
  23. cosPointerDefinition
  24. cosSuperDefinition
  25. cosTemplate
  26. country
  27. dcObject
  28. device
  29. document
  30. documentSeries
  31. domain
  32. domainRelatedObject
  33. extensibleObject
  34. friendlyCountry
  35. groupOfCertificates
  36. groupOfNames
  37. groupOfUniqueNames
  38. groupOfURLs
  39. inetOrgPerson
  40. labeledURIObject
  41. locality
  42. newPilotPerson
  43. nsComplexRoleDefinition
  44. nsFilteredRoleDefinition
  45. nsLicenseUser
  46. nsManagedRoleDefinition
  47. nsNestedRoleDefinition
  48. nsRoleDefinition
  49. nsSimpleRoleDefinition
  50. organization
  51. organizationalPerson
  52. organizationalRole
  53. organizationalUnit
  54. person
  55. pilotObject
  56. pilotOrganization
  57. residentialPerson
  58. RFC822LocalPart
  59. room
  60. strongAuthenticationUser
  61. simpleSecurityObject
  62. abstract
  63. associatedDomain
  64. audio
  65. authorSn
  66. businessCategory
  67. cACertificate
  68. certificateRevocationList
  69. co (friendlyCountryName)
  70. cosIndirectSpecifier
  71. cosTargetTree
  72. dc (domainComponent)
  73. departmentNumber
  74. destinationIndicator
  75. dITRedirect
  76. dNSRecord
  77. documentIdentifier
  78. documentPublisher
  79. documentVersion
  80. dSAQuality
  81. employeeType
  82. generationQualifier
  83. homePhone
  84. host
  85. info
  86. janetMailbox
  87. keyWords
  88. labeledURI
  89. lastModifiedTime
  90. mailPreferenceOption
  91. member
  92. memberURL
  93. name
  94. nsLicenseEndTime
  95. o (organizationName)
  96. obsoletesDocument
  97. otherMailbox
  98. pager
  99. personalTitle
  100. physicalDeliveryOfficeName
  101. postalCode
  102. preferredLanguage
  103. protocolInformation
  104. roleOccupant
  105. searchGuide
  106. serialNumber
  107. sn (surname)
  108. street
  109. subtreeMinimumQuality
  110. supportedApplicationContext
  111. telexNumber
  112. title
  113. uid (userID)
  114. uniqueMember
  115. userCertificate
  116. userPassword
  117. userSMIMECertificate
  118. Operational Attributes
  119. altServer
  120. copiedFrom
  121. dITContentRules
  122. ldapSyntaxes
  123. nameForms
  124. nsds5replconflict
  125. numSubordinates
  126. objectClasses
  127. passwordExpWarned
  128. retryCountResetTime
  129. supportedControl
  130. supportedSASLMechanisms
  131. changeLog
  132. changeType
  133. newSuperior
  134. Special Object Classes
  135. passwordObject
  136. subschema
  137. Index
NETSCAPE DIRECTORY SERVER 6.02 first page preview

NETSCAPE DIRECTORY SERVER 6.02

Brand: Netscape | Category: Server
Table of contents
  1. Table Of Contents
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. Table Of Contents
  6. Table Of Contents
  7. Table Of Contents
  8. Table Of Contents
  9. Table Of Contents
  10. Table Of Contents
  11. Table Of Contents
  12. Table Of Contents
  13. Table Of Contents
  14. List of Tables
  15. Introduction
  16. Prerequisite Reading
  17. Conventions Used in This Book
  18. Part 1 Administering Netscape Directory Server
  19. Overview of Directory Server Management
  20. Copying Entry DNs to the Clipboard
  21. Configuring the Directory Manager
  22. Starting and Stopping the Directory Server
  23. Configuring LDAP Parameters
  24. tracking modifications to directory entries
  25. Starting the Server with SSL Enabled
  26. Cloning a Directory Server
  27. Starting the Server in Referral Mode
  28. using the refer command
  29. Managing Entries From the Directory Console
  30. creating a root entry
  31. creating directory entries
  32. creating an entry using a predefined template
  33. modifying directory entries
  34. displaying the property editor
  35. adding an attribute to an entry
  36. removing an attribute value
  37. deleting directory entries
  38. Providing Input From the Command Line
  39. creating a root entry from the command line
  40. Adding and Modifying Entries Using ldapmodify
  41. adding entries using ldapmodify
  42. modifying entries using ldapmodify
  43. deleting entries using ldapdelete
  44. using special characters
  45. LDIF Update Statements
  46. adding an entry using ldif
  47. renaming an entry using ldif
  48. A Note on Renaming Entries
  49. Adding Attributes to Existing Entries Using LDIF
  50. changing an attribute value using ldif
  51. deleting all values of an attribute using ldif
  52. Deleting an Entry Using LDIF
  53. Maintaining Referential Integrity
  54. Using Referential Integrity with Replication
  55. Configuring the Supplier Server
  56. From the Directory Server Console
  57. creating and maintaining suffixes
  58. Creating Suffixes
  59. Figure 3-3 A Sample Directory Tree with a Root Suffix Off Limits to Search Operations
  60. creating a new root suffix using the console
  61. creating a new sub suffix using the console
  62. maintaining suffixes
  63. enabling referrals only during update operations
  64. Creating and Maintaining Databases
  65. Creating Databases
  66. creating a new database for an existing suffix using the console
  67. adding multiple databases for a single suffix
  68. adding the custom distribution function to a suffix
  69. Maintaining Directory Databases
  70. deleting a database
  71. Configuring the Chaining Policy
  72. chaining ldap controls
  73. Creating a New Database Link
  74. creating a new database link using the console
  75. creating a database link from the command line
  76. Chaining Using SSL
  77. Maintaining Database Links
  78. Database Links and Access Control Evaluation
  79. Advanced Feature: Tuning Database Link Performance
  80. managing connections to the remote server
  81. Detecting Errors During Normal Processing
  82. Managing Threaded Operations
  83. Advanced Feature: Configuring Cascading Chaining
  84. configuring cascading chaining defaults using the console
  85. configuring cascading chaining using the console
  86. configuring cascading chaining from the command line
  87. Summary of Cascading Chaining Configuration Attributes
  88. configuring server one
  89. configuring server two
  90. configuring server three
  91. Using Referrals
  92. Creating Smart Referrals
  93. creating smart referrals using the directory server console
  94. creating smart referrals from the command line
  95. Creating Suffix Referrals
  96. Importing Data
  97. performing an import from the console
  98. initializing a database from the console
  99. Importing From the Command Line
  100. Exporting Data
  101. exporting directory data to ldif using the console
  102. exporting a single database to ldif using the console
  103. exporting to ldif from the command line
  104. Backing Up All Databases
  105. backing up all databases from the server console
  106. backing up a single database
  107. Backing Up the dse.ldif Configuration File
  108. restoring your database from the command line
  109. restoring a single database
  110. restoring databases that include replicated entries
  111. Restoring the dse.ldif Configuration File
  112. Using Groups
  113. Managing Static Groups
  114. Managing Dynamic Groups
  115. Using Roles
  116. Managing Roles Using the Console
  117. creating a managed role
  118. creating a filtered role
  119. modifying a role entry
  120. Managing Roles Using the Command Line
  121. Examples: Managed Role Definition
  122. Example: Filtered Role Definition
  123. Example: Nested Role Definition
  124. Assigning Class of Service
  125. About CoS
  126. About the CoS Template Entry
  127. How a Pointer CoS Works
  128. How a Classic CoS Works
  129. Managing CoS Using the Console
  130. editing an existing cos
  131. Managing CoS From the Command Line
  132. creating the cos template entry from the command line
  133. example of a pointer cos
  134. Example of an Indirect CoS
  135. Example of a Classic CoS
  136. Creating Role-Based Attributes
  137. access control and cos
  138. ACI Structure
  139. ACI Placement
  140. ACI Limitations
  141. Default ACIs
  142. Creating ACIs Manually
  143. Example ACI
  144. targeting a directory entry
  145. Targeting Attributes
  146. targeting both an entry and attributes
  147. targeting attribute values using ldap filters
  148. targeting a single directory entry
  149. allowing or denying access
  150. Rights Required for LDAP Operations
  151. Permissions Syntax
  152. Bind Rules
  153. Anonymous Access (anyone Keyword)
  154. General Access (all Keyword)
  155. Wildcards
  156. Examples
  157. defining access based on value matching
  158. using the userattr keyword
  159. using the userattr keyword with inheritance
  160. granting add permission using the userattr keyword
  161. defining access from a specific ip address
  162. defining access from a specific domain
  163. defining access based on authentication method
  164. Creating ACIs From the Console
  165. displaying the access control editor
  166. viewing current acis
  167. Access Control Usage Examples
  168. Granting Anonymous Access
  169. Granting Write Access to Personal Entries
  170. Restricting Access to Key Roles
  171. Granting a Group Full Access to a Suffix
  172. granting rights to add and delete group entries
  173. Granting Conditional Access to a Group or Role
  174. Denying Access
  175. Setting a Target Using Filtering
  176. Defining Permissions for DNs That Contain a Comma
  177. Proxied Authorization ACI Example
  178. Viewing the ACIs for an Entry
  179. Macro ACI Example
  180. Macro ACI Syntax
  181. Macro Matching for ($dn)
  182. Macro Matching for [$dn]
  183. Macro Matching for ($attr.attrName)
  184. Access Control and Replication
  185. Compatibility with Earlier Releases
  186. Managing the Password Policy
  187. Configuring the Password Policy
  188. Configuring the Password Policy Using the Command-Line
  189. Setting User Passwords
  190. Configuring the Account Lockout Policy
  191. Configuring the Account Lockout Policy Using the Command Line
  192. Managing the Password Policy in a Replicated Environment
  193. Inactivating Users and Roles
  194. Inactivating User and Roles Using the Console
  195. Activating User and Roles Using the Console
  196. Activating User and Roles Using the Command Line
  197. Setting Resource Limits Using the Console
  198. Replication Overview
  199. Change Log
  200. Replication Identity
  201. Replication Agreement
  202. Replication Scenarios
  203. Cascading Replication
  204. Summary of Steps for Complex Replication Configurations
  205. Detailed Replication Tasks
  206. Configuring Supplier Settings
  207. Configuring a Read-Write Replica
  208. Configuring a Read-Only Replica
  209. Configuring a Hub Supplier
  210. Creating a Replication Agreement
  211. Configuring Single-Master Replication
  212. Configuring Multi-Master Replication
  213. Configuring the Read-Write Replicas on the Supplier Servers
  214. Initializing the Replicas for Multi-Master Replication
  215. Configuring the Read-Only Replica on the Consumer Server
  216. Configuring the Read-Only Replica on the Hub Supplier
  217. Configuring the Read-Write Replica on the Supplier Server
  218. Initializing the Replicas for Cascading Replication
  219. Deleting the Change Log
  220. Moving the Change Log to a New Location
  221. Online Consumer Initialization Using the Console
  222. Manual Consumer Initialization Using the Command Line
  223. Exporting a Replica to LDIF
  224. Forcing Replication Updates From the Console
  225. Replication Over SSL
  226. Configuring Replication Over SSL Using the Replication Wizard
  227. Replication with Earlier Releases
  228. Configuring Directory Server as a Consumer of a Legacy Directory Server
  229. Using the Retro Change Log Plug-In
  230. Enabling the Retro Change Log Plug-In
  231. Trimming the Retro Change Log
  232. Retro Change Log and the Access Control Policy
  233. Solving Common Replication Conflicts
  234. Solving Naming Conflicts
  235. Solving Orphan Entry Conflicts
  236. Solving Potential Interoperability Problems
  237. Overview of Extending Schema
  238. Managing Attributes
  239. creating attributes
  240. editing attributes
  241. Managing Object Classes
  242. viewing object classes
  243. creating object classes
  244. editing object classes
  245. Turning Schema Checking On and Off
  246. About Indexes
  247. About Index Types
  248. About Default, System, and Standard Indexes
  249. Overview of System Indexes
  250. Overview of Standard Indexes
  251. balancing the benefits of indexing
  252. Creating Indexes
  253. Creating Indexes From the Command Line
  254. Adding an Index Entry
  255. Running the db2index.pl Script
  256. creating browsing indexes from the server console
  257. Creating Browsing Indexes from the Command Line
  258. Running the vlvindex Script
  259. Deleting Indexes
  260. Deleting Indexes From the Server Console
  261. Deleting Indexes From the Command Line
  262. Deleting Browsing Indexes From the Server Console
  263. Deleting Browsing Indexes From the Command Line
  264. Managing Indexes
  265. When All IDs Threshold is Too Low
  266. All IDs Threshold Tuning Advice for Service Providers and Extranets
  267. Changing the All IDs Threshold Value
  268. Attribute Name Quick Reference Table
  269. Chapter 11 Managing SSL
  270. Obtaining and Installing Server Certificates
  271. Activating SSL
  272. Setting Security Preferences
  273. Using Certificate-Based Authentication
  274. Configuring LDAP Clients to Use SSL
  275. Viewing and Configuring Log Files
  276. Defining a Log File Rotation Policy
  277. Access Log
  278. Error Log
  279. Configuring the Error Log
  280. Audit Log
  281. manual log file rotation
  282. Monitoring Server Activity
  283. General Information (Server)
  284. Current Resource Usage
  285. Connection Status
  286. Global Database Cache Information
  287. Monitoring Database Activity
  288. Viewing Database Performance Monitors
  289. Database Cache Information Table
  290. Database File-Specific Table
  291. Monitoring Databases From the Command Line
  292. Monitoring Database Link Activity
  293. About SNMP
  294. NMS-Initiated Communication
  295. Overview of the Directory Server Management Information Base
  296. The Entries Table
  297. Setting Up SNMP
  298. Configuring the AIX SNMP Daemon
  299. Starting and Stopping the SNMP Service on Windows NT
  300. Configuring SNMP for the Directory Server
  301. Tuning Server Performance
  302. Tuning Database Performance
  303. Optimizing Search Performance
  304. Tuning Transaction Logging
  305. Changing the Location of the Database Transaction Log
  306. Disabling Durable Transactions
  307. Specifying Transaction Batching
  308. Avoid Creating Entries Under the cn=config Entry in the dse.ldif File
  309. Part 2 Plug-Ins Reference
  310. bit Check Plug-In
  311. ACL Plug-In
  312. ACL Preoperation Plug-In
  313. Boolean Syntax Plug-In
  314. Case Ignore String Syntax Plug-In
  315. Class of Service Plug-In
  316. Generalized Time Syntax Plug-In
  317. Integer Syntax Plug-In
  318. ldbm Database Plug-In
  319. Legacy Replication Plug-In
  320. Octet String Syntax Plug-in
  321. CRYPT Password Storage Plug-In
  322. SHA Password Storage Plug-In
  323. SSHA Password Storage Plug-In
  324. PTA Plug-In
  325. Retro Change Log Plug-In
  326. Roles Plug-In
  327. Telephone Syntax Plug-In
  328. URI Plug-in
  329. How Directory Server Uses PTA
  330. PTA Plug-In Syntax
  331. Configuring the PTA Plug-In
  332. configuring the servers to use a secure connection
  333. specifying the authenticating directory server
  334. configuring the optional parameters
  335. PTA Plug-In Syntax Examples
  336. Specifying One Authenticating Directory Server and Multiple Subtrees
  337. Overview of the Attribute Uniqueness Plug-In
  338. Overview of the UID Uniqueness Plug-in
  339. Configuring Attribute Uniqueness Plug-Ins
  340. specifying a suffix or subtree
  341. using the markerobjectclass and requiredobjectclass keywords
  342. Attribute Uniqueness Plug-In Syntax Examples
  343. specifying one attribute and multiple subtrees
  344. Replication and the Attribute Uniqueness Plug-In
  345. Overview of IM Presence Information
  346. Schema For the Presence Plug-In
  347. Performance-Related Information
  348. Setting Resource Limits Based on Bind DN
  349. Part 3 Appendixes
  350. LDIF File Format
  351. Continuing Lines in LDIF
  352. Specifying Directory Entries Using LDIF
  353. specifying organizational unit entries
  354. specifying organizational person entries
  355. defining directories using ldif
  356. LDIF File Example
  357. Storing Information in Multiple Languages
  358. Finding Entries Using the Server Console
  359. Using ldapsearch
  360. Commonly Used ldapsearch Options
  361. ldapsearch Examples
  362. Returning All Entries
  363. Using LDAP_BASEDN
  364. Specifying DNs that Contain Commas in Search Filters
  365. Search Filter Syntax
  366. Using Operators in Search Filters
  367. Using Compound Search Filters
  368. Search Filter Examples
  369. Searching an Internationalized Directory
  370. Matching Rule Filter Syntax
  371. Using Wildcards in Matching Rule Filters
  372. International Search Examples
  373. Less Than or Equal to Example
  374. Greater Than Example
  375. Appendix C LDAP URLs
  376. Escaping Unsafe Characters
  377. Examples of LDAP URLs
  378. About Locales
  379. Identifying Supported Locales
  380. Supported Language Subtypes
  381. Glossary
  382. Index
  383. Table Of Contents
NETSCAPE DIRECTORY SERVER 6.02 first page preview

NETSCAPE DIRECTORY SERVER 6.02

Brand: Netscape | Category: Server
Table of contents
  1. Table Of Contents
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. Table Of Contents
  6. Table Of Contents
  7. Table Of Contents
  8. Preface
  9. Document Conventions
  10. Where to Find Directory Server Information
  11. Part 1 Introduction to Directory Server Plug-Ins
  12. What Are Directory Server Plug-Ins
  13. How Directory Server Plug-Ins Work
  14. Calling Directory Server Plug-In Functions
  15. Types of Directory Server Plug-Ins
  16. Including the API Header File
  17. Working with Parameter Blocks
  18. Setting Data in the Parameter Block
  19. Calling Front-End Functions
  20. Writing Plug-in Initialization Functions
  21. Specifying Directory Server Compatibility
  22. Registering Your Plug-In Functions
  23. Returning a Value to the Directory Server
  24. Compiling a Directory Server Plug-In
  25. Creating a Plug-In Configuration File
  26. Plug-In Dependencies
  27. Plug-In Type Dependencies
  28. Summary of Plug-In Directives
  29. Loading the Plug-In Configuration File
  30. Passing Extra Arguments to Plug-Ins
  31. Setting the Log Level of the Server
  32. Writing the Plug-In Example
  33. Compiling the Plug-In Example
  34. Registering the Plug-In Example
  35. Running the Plug-In Example
  36. Part 2 Basic Plug-In Programming Techniques
  37. Logging Messages
  38. Sending Data to the Client
  39. Working with Entries, Attributes, and Values
  40. Creating a New Entry
  41. Getting and Setting the DN of an Entry
  42. Getting the Attributes and Values of an Entry
  43. Working with DNs and RDNs
  44. Working with DN Suffixes
  45. Working with Search Filters
  46. Determining if an Entry Matches a Filter
  47. Getting the Search Criteria
  48. Converting a String to a Filter
  49. How Pre/Post-Operation Plug-Ins Work
  50. Types Pre-Operation and Post-Operation Functions
  51. Types of Post-Operation Functions
  52. Specifying Start and Close Functions
  53. Getting and Setting Parameters for the Bind Operation
  54. Processing an LDAP Search Operation
  55. Getting the List of Candidates
  56. Iterating Through Candidates
  57. Processing an LDAP Compare Operation
  58. Processing an LDAP Modify Operation
  59. Processing an LDAP Modify RDN Operation
  60. Processing an LDAP Delete Operation
  61. Understanding Authentication Methods
  62. How the Directory Server Identifies Clients
  63. Writing Your Own Authentication Plug-in
  64. Defining Your Authentication Function
  65. Getting the Entry and Checking the Credentials
  66. What to Do If Authentication Fails
  67. Registering the SASL Mechanism
  68. Example of a Pre-Operation Bind Plug-In
  69. Example of an Initialization Function
  70. Registering the Plug-In
  71. Using SASL with an LDAP Client
  72. Part 3 Advanced Programming Techniques
  73. How Entry Store/Fetch Plug-Ins Work
  74. Writing Entry Store/Fetch Functions
  75. How Extended Operation Plug-Ins Work
  76. Writing Extended Operation Functions
  77. Registering Extended Operation Functions
  78. Understanding Matching Rules
  79. Extensible Match Filters
  80. Extensible Match Filters in the Directory Server
  81. How Matching Rules Are Identified
  82. How the Server Associates Plug-Ins with OIDs
  83. Finding a Plug-In for Searching
  84. How the Server Uses Parameter Blocks
  85. How the Server Updates the Index
  86. Writing the Indexer Factory Function
  87. Getting and Setting Parameters in Indexer Factory Functions
  88. Writing the Indexer Function
  89. Getting and Setting Parameters in Indexer Functions
  90. How the Server Handles the Filter
  91. Query Operators in Matching Rules
  92. Writing a Filter Factory Function
  93. Getting and Setting Parameters in Filter Factory Functions
  94. Writing a Filter Index Function
  95. Getting and Setting Parameters in Filter Index Functions
  96. Writing a Filter Matching Function
  97. Handling Sorting by Matching Rules
  98. Writing a Destructor Function
  99. About Distributing Flat Namespaces
  100. Creating a Distribution Function
  101. Adding the Distribution Function to Your Directory
  102. Adding Multiple Databases to a Single Suffix
  103. Adding Distribution Logic to a Suffix
  104. Using the Distribution Logic Examples
  105. Custom Distribution Checklist
  106. Part 4 Reference
  107. Summary of Data Types and Structures
  108. Distribution Routines
  109. Functions for Access Control
  110. Functions for Internal Operations and Plug-In Callback
  111. Functions for Setting Internal Operation Flags
  112. Functions for Handling Attributes
  113. Functions for Managing Backend Operations
  114. Functions for Dealing with Controls
  115. Functions for Syntax Plug-In
  116. Functions for Managing Memory
  117. Functions for Managing DNs
  118. Functions for Managing Entries
  119. Functions Related to Entry Flags
  120. Functions for Dealing with Filters
  121. Functions Specific to Extended Operation
  122. Functions Specific to Bind Methods
  123. Functions for Thread-Safe LDAP Connections
  124. Functions for Logging
  125. Functions for Handling Matching Rules
  126. Functions for LDAPMod Manipulation
  127. Functions for Monitoring Operations
  128. Functions for Managing Parameter Block
  129. Functions for Handling Passwords
  130. Functions for Managing RDN
  131. Functions for Managing Roles
  132. Functions for Sending Entries and Results to the Client
  133. Functions Related to UTF-8
  134. Functions for Handling Values
  135. Functions for Handling Valueset
  136. Functions Specific to Virtual Attribute Service
  137. Functions for Managing Locks and Synchronization
  138. functions for manipulating bits
  139. Functions for Registering Object Extensions
  140. Parameters for Registering Plug-In Functions
  141. Post-Operation/Data Notification Plug-Ins
  142. Extended Operation Plug-Ins
  143. Matching Rule Plug-Ins
  144. Information About the Database
  145. Information About the Connection
  146. Information About the Operation
  147. Notes in the Access Log
  148. Information About the Plug-In
  149. Types of Plug-Ins
  150. Parameters for the Configuration Function
  151. Parameters for the Search Function
  152. Parameters for the Add Function
  153. Parameters for the Compare Function
  154. Parameters for the Modify Function
  155. Parameters for the Modify RDN Function
  156. Parameters for the Abandon Function
Netscape categories
Server
Software
Gateway
More Netscape categories
Manuals database logo
manualsdatabase
Your AI-powered manual search engine