Exit Print View

Sun OpenDS Standard Edition 2.2 Deployment Planning Guide

Get PDF Book Print View
 

Document Information

Preface

1.  Overview of Sun OpenDS Standard Edition

2.  Overview of the Directory Server

3.  Overview of the Proxy Server

4.  Building Blocks of the Proxy Server

5.  Example Deployments Using the Directory Server

6.  Example Deployments Using the Proxy Server

7.  Simple Proxy Deployments Using the Command Line Interface

8.  Deploying Advanced Proxy Architectures

Preface

This book is intended to provide an overview of some of the deployments possible with the Sun OpenDS Standard Edition 2.2.

Who Should Use This Book

This book is intended for deployment architects and anyone who might be interested in configuring a Sun OpenDS Standard Edition server in a particular architecture. The aim is to present some typical deployment architectures possible with the Sun OpenDS Standard Edition.

For installation information, see the Sun OpenDS Standard Edition 2.2 Installation Guide.

Before You Read This Book

Before you read this book, you should be familiar with the Sun OpenDS Standard Edition 2.2 Release Notes.

Related Books

Related Third-Party Web Site References

Third-party URLs are referenced in this document and provide additional, related information.


Note - Sun is not responsible for the availability of third-party web sites mentioned in this document. Sun does not endorse and is not responsible or liable for any content, advertising, products, or other materials that are available on or through such sites or resources. Sun will not be responsible or liable for any actual or alleged damage or loss caused or alleged to be caused by or in connection with use of or reliance on any such content, goods, or services that are available on or through such sites or resources.


Documentation, Support, and Training

The Sun web site provides information about the following additional resources:

Sun Welcomes Your Comments

Sun is interested in improving its documentation and welcomes your comments and suggestions. To share your comments, go to http://docs.sun.com and click Feedback.

Typographic Conventions

The following table describes the typographic conventions that are used in this book.

Table P-1
Typographic Conventions
Typeface
Meaning
Example
AaBbCc123
The names of commands, files, and directories, and onscreen computer output
Edit your .login file.

Use ls -a to list all files.

machine_name% you have mail.

AaBbCc123
What you type, contrasted with onscreen computer output
machine_name% su

Password:

aabbcc123
Placeholder: replace with a real name or value
The command to remove a file is rm filename.
AaBbCc123
Book titles, new terms, and terms to be emphasized
Read Chapter 6 in the User's Guide.

A cache is a copy that is stored locally.

Do not save the file.

Note: Some emphasized items appear bold online.

Shell Prompts in Command Examples

The following table shows the default UNIX® system prompt and superuser prompt for the C shell, Bourne shell, and Korn shell.

Table P-2
Shell Prompts
Shell
Prompt
C shell
machine_name%
C shell for superuser
machine_name#
Bourne shell and Korn shell
$
Bourne shell and Korn shell for superuser
#