Netscape NETSCAPE DIRECTORY SERVER 6.1 - ADMINISTRATOR manuals
NETSCAPE DIRECTORY SERVER 6.1 - ADMINISTRATOR
Table of contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- List of Tables
- Introduction
- Prerequisite Reading
- Conventions Used in This Book
- Related Information
- Part 1 Administering Netscape Directory Server
- Overview of Directory Server Management
- Copying Entry DNs to the Clipboard
- Configuring the Directory Manager
- Changing Login Identity
- Starting/Stopping the Server From the Console
- Starting/Stopping the Server From the Command Line
- Placing the Entire Directory Server in Read-Only Mode
- Tracking Modifications to Directory Entries
- Starting the Server with SSL Enabled
- Cloning a Directory Server
- Cloning the Directory Configuration
- Using the refer Command
- Managing Entries From the Directory Console
- creating a root entry
- Creating Directory Entries
- Creating an Entry Using a Predefined Template
- Modifying Directory Entries
- Displaying the Property Editor
- Adding an Attribute to an Entry
- Removing an Attribute Value
- Deleting Directory Entries
- Providing Input From the Command Line
- Creating a Root Entry From the Command Line
- Adding Entries Using LDIF
- Adding Entries Using ldapmodify
- Modifying Entries Using ldapmodify
- Deleting Entries Using ldapdelete
- Using Special Characters
- LDIF Update Statements
- Adding an Entry Using LDIF
- Renaming an Entry Using LDIF
- A Note on Renaming Entries
- Modifying an Entry Using LDIF
- Changing an Attribute Value Using LDIF
- Deleting All Values of an Attribute Using LDIF
- Deleting an Entry Using LDIF
- Modifying an Entry in an Internationalized Directory
- Using Referential Integrity with Replication
- Configuring the Supplier Server
- Recording Updates in the Change Log
- From the Directory Server Console
- creating and maintaining suffixes
- creating suffixes
- Figure 3-3 A Sample Directory Tree with a Root Suffix Off Limits to Search Operations
- Creating a New Root Suffix Using the Console
- Creating a New Sub Suffix Using the Console
- Maintaining Suffixes
- Enabling Referrals Only During Update Operations
- Deleting a Suffix
- Creating Databases
- Creating a New Database for an Existing Suffix Using the Console
- Adding Multiple Databases for a Single Suffix
- Adding the Custom Distribution Function to a Suffix
- Maintaining Directory Databases
- Deleting a Database
- Configuring the Chaining Policy
- Chaining LDAP Controls
- Creating a New Database Link
- Creating a New Database Link Using the Console
- Creating a Database Link From the Command Line
- Chaining Using SSL
- Maintaining Database Links
- Database Links and Access Control Evaluation
- Advanced Feature: Tuning Database Link Performance
- Managing Connections to the Remote Server
- Detecting Errors During Normal Processing
- Managing Threaded Operations
- Advanced Feature: Configuring Cascading Chaining
- Configuring Cascading Chaining Defaults Using the Console
- Configuring Cascading Chaining Using the Console
- Configuring Cascading Chaining From the Command Line
- Summary of Cascading Chaining Configuration Attributes
- Configuring Server One
- Configuring Server Two
- Configuring Server Three
- Using Referrals
- Setting a Default Referral From the Command Line
- Creating Smart Referrals Using the Directory Server Console
- Creating Smart Referrals From the Command Line
- Creating Suffix Referrals
- Importing Data
- Performing an Import From the Console
- Initializing a Database From the Console
- Importing From the Command Line
- Importing Using the ldif2db.pl Perl Script
- Importing Using the ldif2ldap Command-Line Script
- Exporting Data
- Exporting Directory Data to LDIF Using the Console
- Exporting a Single Database to LDIF Using the Console
- Exporting to LDIF From the Command Line
- Backing Up and Restoring Data
- Backing Up All Databases From the Server Console
- Backing Up a Single Database
- Restoring All Databases
- Restoring Your Database From the Command Line
- Restoring a Single Database
- Restoring the dse.ldif Configuration File
- Enabling and Disabling Read-Only Mode
- Using Groups
- Managing Static Groups
- Managing Dynamic Groups
- Using Roles
- Managing Roles Using the Console
- Creating a Managed Role
- Creating a Filtered Role
- Viewing and Editing an Entry's Roles
- Modifying a Role Entry
- Deleting a Role
- Examples: Managed Role Definition
- Example: Filtered Role Definition
- Example: Nested Role Definition
- Assigning Class of Service
- About CoS
- About the CoS Template Entry
- How a Pointer CoS Works
- How a Classic CoS Works
- Managing CoS Using the Console
- Editing an Existing CoS
- Managing CoS From the Command Line
- creating the cos template entry from the command line
- Example of a Pointer CoS
- Example of an Indirect CoS
- Example of a Classic CoS
- Creating Role-Based Attributes
- Access Control and CoS
- Access Control Principles
- ACI Placement
- ACI Limitations
- Default ACIs
- The ACI Syntax
- Example ACI
- Targeting a Directory Entry
- Targeting Attributes
- Targeting Both an Entry and Attributes
- Targeting Attribute Values Using LDAP Filters
- Targeting a Single Directory Entry
- Defining Permissions
- Rights Required for LDAP Operations
- Permissions Syntax
- Bind Rule Syntax
- Defining User Access - userdn Keyword
- Self Access (self Keyword)
- Defining Group Access - groupdn Keyword
- Examples
- Defining Access Based on Value Matching
- Using the userattr Keyword With Inheritance
- Figure 6-1 Using Inheritance With the userattr Keyword
- Granting Add Permission Using the userattr Keyword
- Defining Access From a Specific IP Address
- Defining Access at a Specific Time of Day or Day of Week
- Defining Access Based on Authentication Method
- Using Boolean Bind Rules
- Creating ACIs From the Console
- Displaying the Access Control Editor
- Viewing Current ACIs
- Creating a New ACI
- Editing an ACI
- Deleting an ACI
- Granting Anonymous Access
- Granting Write Access to Personal Entries
- restricting access to key roles
- Granting a Group Full Access to a Suffix
- granting rights to add and delete group entries
- Granting Conditional Access to a Group or Role
- Denying Access
- Setting a Target Using Filtering
- Defining Permissions for DNs That Contain a Comma
- Proxied Authorization ACI Example
- Viewing the ACIs for an Entry
- Macro ACI Example
- Macro ACI Syntax
- Macro Matching for ($dn)
- Macro Matching for [$dn]
- Macro Matching for ($attr.attrName)
- Access Control and Replication
- Compatibility with Earlier Releases
- Managing the Password Policy
- Configuring the Password Policy Using the Console
- Configuring the Password Policy Using the Command-Line
- Setting User Passwords
- Configuring the Account Lockout Policy
- Configuring the Account Lockout Policy Using the Command Line
- Managing the Password Policy in a Replicated Environment
- inactivating users and roles
- Inactivating User and Roles Using the Console
- Activating User and Roles Using the Console
- Activating User and Roles Using the Command Line
- Setting Resource Limits Using the Console
- Replication Overview
- Change Log
- Replication Identity
- Replication Agreement
- Replication Scenarios
- Multi-Master Replication
- Cascading Replication
- Summary of Steps for Complex Replication Configurations
- Detailed Replication Tasks
- Configuring Supplier Settings
- Configuring a Read-Write Replica
- Configuring a Read-Only Replica
- Configuring a Hub Supplier
- Creating a Replication Agreement
- Configuring the Read-Only Replica on the Consumer Server
- Configuring Multi-Master Replication
- Configuring the Read-Write Replicas on the Supplier Servers
- Initializing the Replicas for Multi-Master Replication
- Configuring the Read-Only Replica on the Hub Supplier
- Configuring the Read-Write Replica on the Supplier Server
- Initializing the Replicas for Cascading Replication
- Deleting the Change Log
- Moving the Change Log to a New Location
- Online Consumer Initialization Using the Console
- Manual Consumer Initialization Using the Command Line
- Exporting a Replica to LDIF
- Forcing Replication Updates From the Console
- Replication Over SSL
- Configuring Replication Over SSL Using the Replication Wizard
- Replication with Earlier Releases
- Configuring Directory Server as a Consumer of a Legacy Directory Server
- Using the Retro Change Log Plug-In
- Enabling the Retro Change Log Plug-In
- Trimming the Retro Change Log
- Retro Change Log and the Access Control Policy
- Monitoring Replication Status From Administration Express
- Solving Common Replication Conflicts
- Solving Naming Conflicts
- Renaming an Entry with a Single-Valued Naming Attribute
- Solving Orphan Entry Conflicts
- Solving Potential Interoperability Problems
- Troubleshooting Replication-Related Problems
- Overview of Extending Schema
- Managing Attributes
- Creating Attributes
- Editing Attributes
- Deleting Attributes
- Viewing Object Classes
- Creating Object Classes
- Editing Object Classes
- Deleting Object Classes
- About Indexes
- About Index Types
- About Default, System, and Standard Indexes
- Overview of System Indexes
- Overview of Standard Indexes
- Balancing the Benefits of Indexing
- Creating Indexes
- Creating Indexes From the Command Line
- Adding an Index Entry
- Running the db2index.pl Script
- Creating Browsing Indexes From the Server Console
- Creating Browsing Indexes from the Command Line
- Adding a Browsing Index Entry
- Running the vlvindex Script
- Setting Access Control for VLV Information
- Deleting Indexes From the Server Console
- Deleting Indexes From the Command Line
- Deleting Browsing Indexes From the Server Console
- Deleting Browsing Indexes From the Command Line
- Managing Indexes
- Drawbacks of the All IDs Mechanism
- All IDs Threshold Tuning Advice for Single- Enterprise Directories
- All IDs Threshold Tuning Advice for Service Providers and Extranets
- Symptoms of an Inappropriate All IDs Threshold Value
- Changing the All IDs Threshold Value
- Attribute Name Quick Reference Table
- Chapter 11 Managing SSL
- Enabling SSL: Summary of Steps
- Obtaining and Installing Server Certificates
- Step 2: Send the Certificate Request
- Step 3: Install the Certificate
- Step 4: Trust the Certificate Authority
- Step 5: Confirm That Your New Certificates Are Installed
- Setting Security Preferences
- Using Certificate-Based Authentication
- Allowing/Requiring Client Authentication
- Configuring LDAP Clients to Use SSL
- Viewing and Configuring Log Files
- Defining a Log File Rotation Policy
- Access Log
- Configuring the Access Log
- Error Log
- Audit Log
- configuring the audit log
- Manual Log File Rotation
- Viewing the Server Performance Monitor
- Resource Summary
- Connection Status
- Global Database Cache Information
- Monitoring Your Server From the Command Line
- Monitoring Database Activity
- General Information (Database)
- Database Cache Information Table
- Database File-Specific Table
- Monitoring Database Link Activity
- About SNMP
- NMS-Initiated Communication
- Overview of the Directory Server Management Information Base
- Entries Table
- Interaction Table
- Setting Up SNMP
- Configuring the AIX SNMP Daemon
- Starting and Stopping the SNMP Subagent on UNIX
- Configuring SNMP for the Directory Server
- Tuning Server Performance
- Tuning Database Performance
- Optimizing Search Performance
- Tuning Transaction Logging
- Changing the Location of the Database Transaction Log
- Disabling Durable Transactions
- Specifying Transaction Batching
- Part 2 Plug-Ins Reference
- Server Plug-in Functionality Reference
- ACL Plug-In
- ACL Preoperation Plug-In
- Boolean Syntax Plug-In
- Case Ignore String Syntax Plug-In
- Class of Service Plug-In
- Distinguished Name Syntax Plug-In
- Integer Syntax Plug-In
- ldbm Database Plug-In
- Legacy Replication Plug-In
- Octet String Syntax Plug-in
- CRYPT Password Storage Plug-In
- SHA Password Storage Plug-In
- SSHA Password Storage Plug-In
- Presence Plug-In
- Referential Integrity Postoperation Plug-In
- Retro Change Log Plug-In
- Space Insensitive String Syntax Plug-in
- State Change Plug-in
- Telephone Syntax Plug-In
- URI Plug-in
- How Directory Server Uses PTA
- PTA Plug-In Syntax
- Configuring the PTA Plug-In
- Turning the Plug-in On or Off
- Configuring the Servers to Use a Secure Connection
- Specifying the Authenticating Directory Server
- Specifying the Pass-Through Subtree
- PTA Plug-In Syntax Examples
- Specifying One Authenticating Directory Server and Multiple Subtrees
- Overview of the Attribute Uniqueness Plug-In
- Overview of the UID Uniqueness Plug-in
- Creating an Instance of the Attribute Uniqueness Plug-In
- Configuring Attribute Uniqueness Plug-Ins
- Configuring Attribute Uniqueness Plug-Ins from the Command Line
- Using the markerObjectClass and requiredObjectClass Keywords
- Attribute Uniqueness Plug-In Syntax Examples
- specifying one attribute and multiple subtrees
- Replication and the Attribute Uniqueness Plug-In
- Overview of IM Presence Information
- Schema For the Presence Plug-In
- Performance-Related Information
- Setting Resource Limits Based on Bind DN
- Part 3 Appendixes
- LDIF File Format
- Continuing Lines in LDIF
- Specifying Directory Entries Using LDIF
- Specifying Organizational Unit Entries
- Specifying Organizational Person Entries
- Defining Directories Using LDIF
- LDIF File Example
- storing information in multiple languages
- Finding Entries Using the Server Console
- Using ldapsearch
- ldapsearch Command-Line Format
- ldapsearch Examples
- Searching the Schema Entry
- Specifying Search Filters Using a File
- LDAP Search Filters
- Using Attributes in Search Filters
- Using Compound Search Filters
- Search Filter Examples
- Searching an Internationalized Directory
- Matching Rule Filter Syntax
- Using Wildcards in Matching Rule Filters
- International Search Examples
- Less Than or Equal to Example
- Greater Than Example
- Appendix C LDAP URLs
- Escaping Unsafe Characters
- Examples of LDAP URLs
- About Locales
- Identifying Supported Locales
- Supported Language Subtypes
- Glossary
- Index
- Table Of Contents
Related products
NETSCAPE DIRECTORY SERVER 6.2 - ADMINISTRATORNETSCAPE DIRECTORY SERVER 6.02 - ADMINISTRATORNETSCAPE DIRECTORY SERVER 6.01 - ADMINISTRATORNETSCAPE DIRECTORY SERVER 6.0NETSCAPE DIRECTORY SERVER 6.01NETSCAPE DIRECTORY SERVER 6.02NETSCAPE DIRECTORY SERVER 6.1 - PLUG-INNETSCAPE ENTREPRISE SERVER 6.0 - ADMINISTRATORNETSCAPE DIRECTORY SERVER 6.1 - DEPLOYMENTNETSCAPE DIRECTORY SERVER 7.0Netscape categories
More Netscape categoriesmanualsdatabase
Your AI-powered manual search engine