Manuals database logo
manualsdatabase
Your AI-powered manual search engine

Netscape NETSCAPE DIRECTORY SERVER 6.1 - ADMINISTRATOR manuals

NETSCAPE DIRECTORY SERVER 6.1 - ADMINISTRATOR first page preview

NETSCAPE DIRECTORY SERVER 6.1 - ADMINISTRATOR

Brand: Netscape | Category: Server
Table of contents
  1. Table Of Contents
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. Table Of Contents
  6. Table Of Contents
  7. Table Of Contents
  8. Table Of Contents
  9. Table Of Contents
  10. Table Of Contents
  11. Table Of Contents
  12. Table Of Contents
  13. Table Of Contents
  14. Table Of Contents
  15. Table Of Contents
  16. Table Of Contents
  17. Table Of Contents
  18. List of Tables
  19. Introduction
  20. Prerequisite Reading
  21. Conventions Used in This Book
  22. Related Information
  23. Part 1 Administering Netscape Directory Server
  24. Overview of Directory Server Management
  25. Copying Entry DNs to the Clipboard
  26. Configuring the Directory Manager
  27. Changing Login Identity
  28. Starting/Stopping the Server From the Console
  29. Starting/Stopping the Server From the Command Line
  30. Placing the Entire Directory Server in Read-Only Mode
  31. Tracking Modifications to Directory Entries
  32. Starting the Server with SSL Enabled
  33. Cloning a Directory Server
  34. Cloning the Directory Configuration
  35. Using the refer Command
  36. Managing Entries From the Directory Console
  37. creating a root entry
  38. Creating Directory Entries
  39. Creating an Entry Using a Predefined Template
  40. Modifying Directory Entries
  41. Displaying the Property Editor
  42. Adding an Attribute to an Entry
  43. Removing an Attribute Value
  44. Deleting Directory Entries
  45. Providing Input From the Command Line
  46. Creating a Root Entry From the Command Line
  47. Adding Entries Using LDIF
  48. Adding Entries Using ldapmodify
  49. Modifying Entries Using ldapmodify
  50. Deleting Entries Using ldapdelete
  51. Using Special Characters
  52. LDIF Update Statements
  53. Adding an Entry Using LDIF
  54. Renaming an Entry Using LDIF
  55. A Note on Renaming Entries
  56. Modifying an Entry Using LDIF
  57. Changing an Attribute Value Using LDIF
  58. Deleting All Values of an Attribute Using LDIF
  59. Deleting an Entry Using LDIF
  60. Modifying an Entry in an Internationalized Directory
  61. Using Referential Integrity with Replication
  62. Configuring the Supplier Server
  63. Recording Updates in the Change Log
  64. From the Directory Server Console
  65. creating and maintaining suffixes
  66. creating suffixes
  67. Figure 3-3 A Sample Directory Tree with a Root Suffix Off Limits to Search Operations
  68. Creating a New Root Suffix Using the Console
  69. Creating a New Sub Suffix Using the Console
  70. Maintaining Suffixes
  71. Enabling Referrals Only During Update Operations
  72. Deleting a Suffix
  73. Creating Databases
  74. Creating a New Database for an Existing Suffix Using the Console
  75. Adding Multiple Databases for a Single Suffix
  76. Adding the Custom Distribution Function to a Suffix
  77. Maintaining Directory Databases
  78. Deleting a Database
  79. Configuring the Chaining Policy
  80. Chaining LDAP Controls
  81. Creating a New Database Link
  82. Creating a New Database Link Using the Console
  83. Creating a Database Link From the Command Line
  84. Chaining Using SSL
  85. Maintaining Database Links
  86. Database Links and Access Control Evaluation
  87. Advanced Feature: Tuning Database Link Performance
  88. Managing Connections to the Remote Server
  89. Detecting Errors During Normal Processing
  90. Managing Threaded Operations
  91. Advanced Feature: Configuring Cascading Chaining
  92. Configuring Cascading Chaining Defaults Using the Console
  93. Configuring Cascading Chaining Using the Console
  94. Configuring Cascading Chaining From the Command Line
  95. Summary of Cascading Chaining Configuration Attributes
  96. Configuring Server One
  97. Configuring Server Two
  98. Configuring Server Three
  99. Using Referrals
  100. Setting a Default Referral From the Command Line
  101. Creating Smart Referrals Using the Directory Server Console
  102. Creating Smart Referrals From the Command Line
  103. Creating Suffix Referrals
  104. Importing Data
  105. Performing an Import From the Console
  106. Initializing a Database From the Console
  107. Importing From the Command Line
  108. Importing Using the ldif2db.pl Perl Script
  109. Importing Using the ldif2ldap Command-Line Script
  110. Exporting Data
  111. Exporting Directory Data to LDIF Using the Console
  112. Exporting a Single Database to LDIF Using the Console
  113. Exporting to LDIF From the Command Line
  114. Backing Up and Restoring Data
  115. Backing Up All Databases From the Server Console
  116. Backing Up a Single Database
  117. Restoring All Databases
  118. Restoring Your Database From the Command Line
  119. Restoring a Single Database
  120. Restoring the dse.ldif Configuration File
  121. Enabling and Disabling Read-Only Mode
  122. Using Groups
  123. Managing Static Groups
  124. Managing Dynamic Groups
  125. Using Roles
  126. Managing Roles Using the Console
  127. Creating a Managed Role
  128. Creating a Filtered Role
  129. Viewing and Editing an Entry's Roles
  130. Modifying a Role Entry
  131. Deleting a Role
  132. Examples: Managed Role Definition
  133. Example: Filtered Role Definition
  134. Example: Nested Role Definition
  135. Assigning Class of Service
  136. About CoS
  137. About the CoS Template Entry
  138. How a Pointer CoS Works
  139. How a Classic CoS Works
  140. Managing CoS Using the Console
  141. Editing an Existing CoS
  142. Managing CoS From the Command Line
  143. creating the cos template entry from the command line
  144. Example of a Pointer CoS
  145. Example of an Indirect CoS
  146. Example of a Classic CoS
  147. Creating Role-Based Attributes
  148. Access Control and CoS
  149. Access Control Principles
  150. ACI Placement
  151. ACI Limitations
  152. Default ACIs
  153. The ACI Syntax
  154. Example ACI
  155. Targeting a Directory Entry
  156. Targeting Attributes
  157. Targeting Both an Entry and Attributes
  158. Targeting Attribute Values Using LDAP Filters
  159. Targeting a Single Directory Entry
  160. Defining Permissions
  161. Rights Required for LDAP Operations
  162. Permissions Syntax
  163. Bind Rule Syntax
  164. Defining User Access - userdn Keyword
  165. Self Access (self Keyword)
  166. Defining Group Access - groupdn Keyword
  167. Examples
  168. Defining Access Based on Value Matching
  169. Using the userattr Keyword With Inheritance
  170. Figure 6-1 Using Inheritance With the userattr Keyword
  171. Granting Add Permission Using the userattr Keyword
  172. Defining Access From a Specific IP Address
  173. Defining Access at a Specific Time of Day or Day of Week
  174. Defining Access Based on Authentication Method
  175. Using Boolean Bind Rules
  176. Creating ACIs From the Console
  177. Displaying the Access Control Editor
  178. Viewing Current ACIs
  179. Creating a New ACI
  180. Editing an ACI
  181. Deleting an ACI
  182. Granting Anonymous Access
  183. Granting Write Access to Personal Entries
  184. restricting access to key roles
  185. Granting a Group Full Access to a Suffix
  186. granting rights to add and delete group entries
  187. Granting Conditional Access to a Group or Role
  188. Denying Access
  189. Setting a Target Using Filtering
  190. Defining Permissions for DNs That Contain a Comma
  191. Proxied Authorization ACI Example
  192. Viewing the ACIs for an Entry
  193. Macro ACI Example
  194. Macro ACI Syntax
  195. Macro Matching for ($dn)
  196. Macro Matching for [$dn]
  197. Macro Matching for ($attr.attrName)
  198. Access Control and Replication
  199. Compatibility with Earlier Releases
  200. Managing the Password Policy
  201. Configuring the Password Policy Using the Console
  202. Configuring the Password Policy Using the Command-Line
  203. Setting User Passwords
  204. Configuring the Account Lockout Policy
  205. Configuring the Account Lockout Policy Using the Command Line
  206. Managing the Password Policy in a Replicated Environment
  207. inactivating users and roles
  208. Inactivating User and Roles Using the Console
  209. Activating User and Roles Using the Console
  210. Activating User and Roles Using the Command Line
  211. Setting Resource Limits Using the Console
  212. Replication Overview
  213. Change Log
  214. Replication Identity
  215. Replication Agreement
  216. Replication Scenarios
  217. Multi-Master Replication
  218. Cascading Replication
  219. Summary of Steps for Complex Replication Configurations
  220. Detailed Replication Tasks
  221. Configuring Supplier Settings
  222. Configuring a Read-Write Replica
  223. Configuring a Read-Only Replica
  224. Configuring a Hub Supplier
  225. Creating a Replication Agreement
  226. Configuring the Read-Only Replica on the Consumer Server
  227. Configuring Multi-Master Replication
  228. Configuring the Read-Write Replicas on the Supplier Servers
  229. Initializing the Replicas for Multi-Master Replication
  230. Configuring the Read-Only Replica on the Hub Supplier
  231. Configuring the Read-Write Replica on the Supplier Server
  232. Initializing the Replicas for Cascading Replication
  233. Deleting the Change Log
  234. Moving the Change Log to a New Location
  235. Online Consumer Initialization Using the Console
  236. Manual Consumer Initialization Using the Command Line
  237. Exporting a Replica to LDIF
  238. Forcing Replication Updates From the Console
  239. Replication Over SSL
  240. Configuring Replication Over SSL Using the Replication Wizard
  241. Replication with Earlier Releases
  242. Configuring Directory Server as a Consumer of a Legacy Directory Server
  243. Using the Retro Change Log Plug-In
  244. Enabling the Retro Change Log Plug-In
  245. Trimming the Retro Change Log
  246. Retro Change Log and the Access Control Policy
  247. Monitoring Replication Status From Administration Express
  248. Solving Common Replication Conflicts
  249. Solving Naming Conflicts
  250. Renaming an Entry with a Single-Valued Naming Attribute
  251. Solving Orphan Entry Conflicts
  252. Solving Potential Interoperability Problems
  253. Troubleshooting Replication-Related Problems
  254. Overview of Extending Schema
  255. Managing Attributes
  256. Creating Attributes
  257. Editing Attributes
  258. Deleting Attributes
  259. Viewing Object Classes
  260. Creating Object Classes
  261. Editing Object Classes
  262. Deleting Object Classes
  263. About Indexes
  264. About Index Types
  265. About Default, System, and Standard Indexes
  266. Overview of System Indexes
  267. Overview of Standard Indexes
  268. Balancing the Benefits of Indexing
  269. Creating Indexes
  270. Creating Indexes From the Command Line
  271. Adding an Index Entry
  272. Running the db2index.pl Script
  273. Creating Browsing Indexes From the Server Console
  274. Creating Browsing Indexes from the Command Line
  275. Adding a Browsing Index Entry
  276. Running the vlvindex Script
  277. Setting Access Control for VLV Information
  278. Deleting Indexes From the Server Console
  279. Deleting Indexes From the Command Line
  280. Deleting Browsing Indexes From the Server Console
  281. Deleting Browsing Indexes From the Command Line
  282. Managing Indexes
  283. Drawbacks of the All IDs Mechanism
  284. All IDs Threshold Tuning Advice for Single- Enterprise Directories
  285. All IDs Threshold Tuning Advice for Service Providers and Extranets
  286. Symptoms of an Inappropriate All IDs Threshold Value
  287. Changing the All IDs Threshold Value
  288. Attribute Name Quick Reference Table
  289. Chapter 11 Managing SSL
  290. Enabling SSL: Summary of Steps
  291. Obtaining and Installing Server Certificates
  292. Step 2: Send the Certificate Request
  293. Step 3: Install the Certificate
  294. Step 4: Trust the Certificate Authority
  295. Step 5: Confirm That Your New Certificates Are Installed
  296. Setting Security Preferences
  297. Using Certificate-Based Authentication
  298. Allowing/Requiring Client Authentication
  299. Configuring LDAP Clients to Use SSL
  300. Viewing and Configuring Log Files
  301. Defining a Log File Rotation Policy
  302. Access Log
  303. Configuring the Access Log
  304. Error Log
  305. Audit Log
  306. configuring the audit log
  307. Manual Log File Rotation
  308. Viewing the Server Performance Monitor
  309. Resource Summary
  310. Connection Status
  311. Global Database Cache Information
  312. Monitoring Your Server From the Command Line
  313. Monitoring Database Activity
  314. General Information (Database)
  315. Database Cache Information Table
  316. Database File-Specific Table
  317. Monitoring Database Link Activity
  318. About SNMP
  319. NMS-Initiated Communication
  320. Overview of the Directory Server Management Information Base
  321. Entries Table
  322. Interaction Table
  323. Setting Up SNMP
  324. Configuring the AIX SNMP Daemon
  325. Starting and Stopping the SNMP Subagent on UNIX
  326. Configuring SNMP for the Directory Server
  327. Tuning Server Performance
  328. Tuning Database Performance
  329. Optimizing Search Performance
  330. Tuning Transaction Logging
  331. Changing the Location of the Database Transaction Log
  332. Disabling Durable Transactions
  333. Specifying Transaction Batching
  334. Part 2 Plug-Ins Reference
  335. Server Plug-in Functionality Reference
  336. ACL Plug-In
  337. ACL Preoperation Plug-In
  338. Boolean Syntax Plug-In
  339. Case Ignore String Syntax Plug-In
  340. Class of Service Plug-In
  341. Distinguished Name Syntax Plug-In
  342. Integer Syntax Plug-In
  343. ldbm Database Plug-In
  344. Legacy Replication Plug-In
  345. Octet String Syntax Plug-in
  346. CRYPT Password Storage Plug-In
  347. SHA Password Storage Plug-In
  348. SSHA Password Storage Plug-In
  349. Presence Plug-In
  350. Referential Integrity Postoperation Plug-In
  351. Retro Change Log Plug-In
  352. Space Insensitive String Syntax Plug-in
  353. State Change Plug-in
  354. Telephone Syntax Plug-In
  355. URI Plug-in
  356. How Directory Server Uses PTA
  357. PTA Plug-In Syntax
  358. Configuring the PTA Plug-In
  359. Turning the Plug-in On or Off
  360. Configuring the Servers to Use a Secure Connection
  361. Specifying the Authenticating Directory Server
  362. Specifying the Pass-Through Subtree
  363. PTA Plug-In Syntax Examples
  364. Specifying One Authenticating Directory Server and Multiple Subtrees
  365. Overview of the Attribute Uniqueness Plug-In
  366. Overview of the UID Uniqueness Plug-in
  367. Creating an Instance of the Attribute Uniqueness Plug-In
  368. Configuring Attribute Uniqueness Plug-Ins
  369. Configuring Attribute Uniqueness Plug-Ins from the Command Line
  370. Using the markerObjectClass and requiredObjectClass Keywords
  371. Attribute Uniqueness Plug-In Syntax Examples
  372. specifying one attribute and multiple subtrees
  373. Replication and the Attribute Uniqueness Plug-In
  374. Overview of IM Presence Information
  375. Schema For the Presence Plug-In
  376. Performance-Related Information
  377. Setting Resource Limits Based on Bind DN
  378. Part 3 Appendixes
  379. LDIF File Format
  380. Continuing Lines in LDIF
  381. Specifying Directory Entries Using LDIF
  382. Specifying Organizational Unit Entries
  383. Specifying Organizational Person Entries
  384. Defining Directories Using LDIF
  385. LDIF File Example
  386. storing information in multiple languages
  387. Finding Entries Using the Server Console
  388. Using ldapsearch
  389. ldapsearch Command-Line Format
  390. ldapsearch Examples
  391. Searching the Schema Entry
  392. Specifying Search Filters Using a File
  393. LDAP Search Filters
  394. Using Attributes in Search Filters
  395. Using Compound Search Filters
  396. Search Filter Examples
  397. Searching an Internationalized Directory
  398. Matching Rule Filter Syntax
  399. Using Wildcards in Matching Rule Filters
  400. International Search Examples
  401. Less Than or Equal to Example
  402. Greater Than Example
  403. Appendix C LDAP URLs
  404. Escaping Unsafe Characters
  405. Examples of LDAP URLs
  406. About Locales
  407. Identifying Supported Locales
  408. Supported Language Subtypes
  409. Glossary
  410. Index
  411. Table Of Contents
Netscape categories
Server
Software
Gateway
More Netscape categories
Manuals database logo
manualsdatabase
Your AI-powered manual search engine