Manuals database logo
manualsdatabase
Your AI-powered manual search engine

Netscape NETSCAPE DIRECTORY SERVER 7.0 - DEPLOYMENT manuals

NETSCAPE DIRECTORY SERVER 7.0 - DEPLOYMENT first page preview

NETSCAPE DIRECTORY SERVER 7.0 - DEPLOYMENT

Brand: Netscape | Category: Server
Table of contents
  1. Table Of Contents
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. Table Of Contents
  6. Table Of Contents
  7. About This Guide
  8. Conventions Used in This Guide
  9. What Is a Directory Service
  10. About Global Directory Services
  11. About LDAP
  12. Overview of Directory Server Architecture
  13. Overview of the Server Front-End
  14. Overview of the Basic Directory Tree
  15. Directory Server Data Storage
  16. About Directory Entries
  17. Distributing Directory Data
  18. Design Process Outline
  19. Deploying Your Directory
  20. Other General Directory Resources
  21. Introduction to Directory Data
  22. What Your Directory Might Include
  23. What Your Directory Should Not Include
  24. Performing a Site Survey
  25. Identifying the Applications That Use Your Directory
  26. Identifying Data Sources
  27. Characterizing Your Directory Data
  28. Determining Level of Service
  29. Data Mastering for Replication
  30. Determining Data Ownership
  31. Determining Data Access
  32. Documenting Your Site Survey
  33. Repeating the Site Survey
  34. Schema Design Process Overview
  35. Netscape Standard Schema
  36. Standard Attributes
  37. Standard Object Classes
  38. Mapping Your Data to the Default Schema
  39. Matching Data to Schema Elements
  40. Customizing the Schema
  41. When to Extend Your Schema
  42. Naming Attribute and Object Classes
  43. Strategies for Defining New Attributes
  44. Creating Custom Schema Files
  45. Custom Schema Best Practices
  46. Maintaining Consistent Schema
  47. Schema Checking
  48. Maintaining Consistency in Replicated Schema
  49. Other Schema Resources
  50. Introduction to the Directory Tree
  51. Designing Your Directory Tree
  52. Suffix Naming Conventions
  53. Naming Multiple Suffixes
  54. Branching Your Directory
  55. Identifying Branch Points
  56. Replication Considerations
  57. Access Control Considerations
  58. Naming Entries
  59. Naming Person Entries
  60. Naming Group Entries
  61. Naming Organization Entries
  62. Grouping Directory Entries
  63. Deciding Between Roles and Groups
  64. About Class of Service
  65. Directory Tree Design Examples
  66. Directory Tree for an ISP
  67. Virtual Directory Information Tree Views
  68. Overview
  69. Introduction to Virtual DIT Views
  70. Advantages of Using Virtual DIT Views
  71. Example of Virtual DIT Views
  72. Views and Other Directory Features
  73. Effects of Virtual Views on Performance
  74. Other Directory Tree Resources
  75. Topology Overview
  76. distributing your data
  77. About Using Multiple Databases
  78. About Suffixes
  79. About Knowledge References
  80. Using Referrals
  81. About Default Referrals
  82. Smart Referrals
  83. Tips for Designing Smart Referrals
  84. Using Chaining
  85. Deciding Between Referrals and Chaining
  86. Using Indexes to Improve Database Performance
  87. Evaluating the Costs of Indexing
  88. designing the replication process
  89. Replication Concepts
  90. Unit of Replication
  91. Change Log
  92. Data Consistency
  93. Common Replication Scenarios
  94. Multi-Master Replication
  95. Cascading Replication
  96. Mixed Environments
  97. Defining a Replication Strategy
  98. Replication Survey
  99. Using Replication for High Availability
  100. Using Replication for Local Availability
  101. Example of Network Load Balancing
  102. Example of Load Balancing for Improved Performance
  103. Example Replication Strategy for a Small Site
  104. Using Replication with Other Directory Features
  105. Replication and Database Links
  106. Schema Replication
  107. designing a secure directory
  108. About Security Threats
  109. Unauthorized Tampering
  110. Determining Access Rights
  111. Ensuring Data Privacy and Integrity
  112. Overview of Security Methods
  113. Selecting Appropriate Authentication Methods
  114. Simple Password
  115. Certificate-Based Authentication
  116. Simple Password over TLS
  117. Preventing Authentication by Account Inactivation
  118. How Password Policy Works
  119. Password Policy Attributes
  120. Password Change after Reset
  121. Password Expiration
  122. Password Length
  123. Designing a Password Policy in a Replicated Environment
  124. Designing an Account Lockout Policy
  125. About the ACI Format
  126. Targets
  127. Bind Rules
  128. Setting Permissions
  129. When to Deny Access
  130. Where to Place Access Control Rules
  131. Using ACIs: Some Hints and Tricks
  132. Database Encryption
  133. Securing Connections with SSL
  134. other security resources
  135. An Enterprise
  136. Data Design
  137. Directory Tree Design
  138. Topology Design
  139. Database Topology
  140. Replication Design
  141. Supplier Consumer Architecture
  142. Security Design
  143. Tuning and Optimizations
  144. Schema Design
  145. Server Topology
  146. Supplier Architecture
Netscape categories
Server
Software
Gateway
More Netscape categories
Manuals database logo
manualsdatabase
Your AI-powered manual search engine