Sun Java logo     Previous      Contents      Index      Next     

Sun logo
Sun Java(TM) System Administration Server 5.2 2005Q1 Administration Guide 

List of Figures

Figure 1-1    The Sun Java System Server Console Interface       
Figure 1-2    Simple System With Sun Java System Server Console       
Figure 1-3    More Complex System With Sun Java System Server Console       
Figure 2-1    Sun Java System Server Console Login       
Figure 2-2    Secure Sun Java System Server Console Login       
Figure 2-3    Main Sun Java System Server Console Window       
Figure 2-4    Banner, Navigation Tree, and Status       
Figure 2-5    Customized Navigation Tree       
Figure 3-1    Server Management Window       
Figure 3-2    Before Merging Two Configuration Directories       
Figure 3-3    After Merging Two Configuration Directories       
Figure 4-1    Sun Java System Server Console User and Groups Tab       
Figure 4-2    Searching for User and Groups       
Figure 4-3    Entering User Information       
Figure 4-4    Entering Group Information       
Figure 4-5    Change to the Directory Holding the Administrator Subtree       
Figure 4-6    Adding the User to the Administrator Group       
Figure 4-7    Constructing the LDAP URL       
Figure 4-8    The Construct LDAP URL Dialog       
Figure 5-1    Administration Server Management Window       
Figure 5-2    Administration Server Access Log       
Figure 6-1    Configuring Network Settings       
Figure 6-2    Configuring Access Settings       
Figure 6-3    User Directory Settings       
Figure 6-4    User Directory Settings For a Group       
Figure 8-1    Unrestricted View of Resources and Tasks       
Figure 8-2    Restricted View of Resources and Tasks       
Figure 8-3    Default ACI Manager       
Figure 8-4    Visual ACI Editor       
Figure 8-5    Manual ACI Editor       
Figure 10-1    Network Management Station and Host Computer       
Figure 10-2    Using a Proxy Agent With a Native SNMP Agent       
Figure 10-3    The Communities Tab       
Figure 10-4    The Managers Tab       
Figure A-1    Symmetric Key Encryption       
Figure A-2    Public Key Encryption       
Figure A-3    Digital Signing       
Figure A-4    Using a Password to Authenticate a Client       
Figure A-5    Using a Certificate to Authenticate a Client       
Figure A-6    A Hierarchy of Certificate Authorities       
Figure A-7    A Certificate Chain       
Figure A-8    Verifying A Certificate Chain       
Figure A-9    Verifying A Certificate Chain to an Intermediate CA       
Figure A-10    A Certificate Chain that Cannot Be Verified       
Figure B-1    Where SSL Runs       
Figure B-2    Authenticating a Client Certificate       
Figure B-3    Authentication and Verification       


Previous      Contents      Index      Next     


Part No: 817-7612-10.   Copyright 2005 Sun Microsystems, Inc. All rights reserved.