Previous     Contents     DocHome    
iPlanet Directory Server 5.1 Administrator's Guide


 SymbolsABCDEFGHIJKLMNOPQRSTUVWXYZ 
Index



A

access control
ACI attribute 1
ACI syntax 1
allowing or denying access 1
and replication 1
and schema checking 1
anonymous access 1, 2, 3
bind rules 1
access at specific time or day 1
access based on value matching 1
general access 1
user and group access 1
Boolean bind rules 1
compatibility with earlier versions 1
creating from console 1
dynamic targets 1
from specific domain 1
from specific IP address 1
logging information 1
overview 1, 2
permissions 1
placement of ACIs 1
rights 1
roles 1
SASL authentication 1
simple authentication 1
SSL authentication 1
structure of ACIs 1
target DN containing comma 1
target DN containing comma and 1
targeting 1
targeting attribute values 1
targeting attributes 1
targeting entries 1
targeting using filters 1
using the Access Control Editor 1
value matching 1
Access Control Editor
displaying 1
viewing current ACIs 1
access control instruction (ACI). See ACI 1
access log
configuring 1
manually rotating 1
turning off 1
turning on 1
viewing 1
account inactivation 1
from command line 1
from console 1
account lockout 1
configuration
attributes 1
configuring 1
using command line 1
using console 1
disabling 1
enabling 1
lockout duration 1
password failure counter 1
ACI
assessment 1
attribute 1
authmethod keyword 1
bind rules 1, 2
cascading chaining 1
creating from console 1
dayofweek keyword 1
deleting from console 1
dns keyword 1
editing from console 1
evaluation 1
examples of use 1
groupdn keyword 1
inheritance 1
ip keyword 1
local evaluation
cascading chaining 1
name 1
permissions 1, 2
precedence rule 1
proxy rights example 1
replication 1
rights 1
roledn keyword 1
structure 1
syntax 1
targattrfilters keyword 1
target 1
target DN containing comma 1
target DN containing comma and 1
target keywords 1
target overview 1
targetattr keyword 1
targetfilter keyword 1
userattr and parent 1
userattr keyword 1
using macro ACIs 1
value-based 1
viewing current 1, 2
wildcard in target 1
wildcards 1
ACI attribute
default index for 1
overview 1
ACI placement 1
ACL. See ACI 1
activating accounts
from command line 1
from console 1
add right 1
adding directory entries 1
adding to directory 1
Administration Server
master agents and 1
agents
master agent 1
Unix 1
subagent 1
configuring 1
enabling 1
starting and stopping 1
algorithm
search 1
algorithms
metaphone phonetic algorithm 1
all keyword 1
allowed attributes
creating 1
deleting 1, 2
editing in object class 1
allowing access 1
anonymous access 1
example 1, 2
overview 1
anyone keyword 1
approximate index 1
query string codes 1
approximate search 1
attribute
ACI 1, 2
adding 1, 2
adding multiple values 1
adding to entry 1
creating 1
defining 1
deleting 1, 2
deleting from object class 1, 2
deleting using LDIF update statements 1
multi-valued 1
nsLookthroughLimit 1
nsSizeLimit 1
nsslapd-allidsthreshold 1
nsslapd-schemacheck 1
nsTimeLimit 1
OID 1, 2
passwordChange 1
passwordExp 1
passwordInHistory 1
passwordMustChange 1
passwordStorageScheme 1
ref 1
removing a value 1
roles 1
searching for 1
standard 1, 2
syntax 1
targeting 1
user-defined 1
attribute subtypes 1
adding 1
binary 1
language 1
pronunciation 1
attribute type field (LDIF) 1
attribute uniqueness plug-in. See unique attribute plug-in 1
attribute value field (LDIF) 1
attribute values
adding 1, 2
deleting 1
modifying 1
replacing 1
syntax 1
attributes
schema definition 1
attributes values
targeting 1
audit log
configuring 1
disabling 1
enabling 1
viewing 1
authentication
access control and 1
bind DN 1
certificate-based 1
LDAP URLs and 1
over SSL 1
authentication methods
proxy authorization 1
authmethod keyword 1

B

backing up data 1
all 1
db2bak 1
dse.ldif 1
bak2db-task 1
base 64 encoding 1
binary data, LDIF and 1
binary subtype 1
bind credentials
for database links 1
bind DN
accessing the server 1
resource limits based on 1
viewing current 1
bind rules
access at specific time or day 1
access based on authentication method 1
LDIF example 1
access based on value matching
overview 1
ACI syntax 1
all keyword 1
anonymous access 1
example 1, 2
LDIF example 1
anyone keyword 1
authmethod keyword 1
Boolean 1
dayofweek keyword 1
dns keyword 1
general access 1
example 1
group access 1
group access example 1
groupdn keyword 1
ip keyword 1
LDAP URLs 1
LDIF keywords 1
overview 1
parent keyword 1
role access 1
roledn keyword 1
self keyword 1
timeofday keyword 1
user access
LDIF example 1
parent 1
self 1
user access example 1
userattr keyword 1
userdn keyword 1
Boolean bind rules
example 1
overview 1
Boolean operators, in search filters 1

C

cache hit ratio 1
cascading chaining
client ACIs 1
configuration attributes 1
configuring defaults 1
configuring from command line 1
configuring from console 1
example 1
local ACI evaluation 1
loop detection 1
overview 1
proxy admin user ACI 1
proxy authorization 1
cascading replication
initializing the replicas 1
introduction 1
setting up 1
certificate
mapping to a DN 1
password 1
certificate database
password 1
certificate-based authentication 1
setting up 1
chaining
cascading 1
component operations, from console 1
component operations,from command line 1
overview 1
roles limitation 1
using SSL 1
change log 1
deleting 1
using with referential integrity 1
change operations 1
add 1
delete 1
replace 1
change type
add 1
delete 1
LDIF 1
modify 1
character type 1
ciphers 1
DES 1
FIPS DES 1
FIPS Triple DES 1
list of 1
none-MD5 1
overview 1
RC2 1
RC4 1
selecting 1
class of service (CoS)
access control 1
cache 1
classic
example 1
overview 1
cosPriority attribute 1
creating 1
definition entry 1
editing 1
filtered role limitation 1
indirect
example 1
overview 1
limitations 1
pointer
example 1
overview 1
template entry
creating 1
overview 1
classic CoS
example 1
overview 1
client
using to find entries 1
client authentication
over SSL 1
code page 1
collation order
international indexing 1
overview 1
search filters and 1
command line
providing input from 1
command-line utilities
certificate-based authentication and 1
db2bak 1
ldapdelete 1
ldapmodify 1
ldapsearch 1
ldif 1
start 1
stop 1
commas, in DNs 1, 2
ACI targets and 1, 2
specifying LDIF entries with 1, 2
specifying suffix with 1, 2
using ldapsearch with 1
compare right 1
compatibility
ACIs 1
replication 1
compound search filters 1
configuration attributes
account lockout 1
cascading chaining 1
password policy 1
suffix 1
connections
monitoring 1, 2, 3
viewing number of 1
console
starting 1
consumer initialization
manual consumer creation 1
online consumer creation 1
consumer replica
configuration 1
consumer server 1
continued lines
in LDIF 1
in LDIF update statements 1
CoS definition entry
attributes 1
CoS template entry 1
creating 1
cosPriority attribute 1
counter, password failures 1
country code 1
creating a database
from the command line 1
from the console 1
creating the directory 1
custom distribution function
adding to suffix 1
custom distribution logic
adding databases 1
adding to suffix 1

D

dash, in change operation 1
data consistency
using referential integrity 1
database
and associated suffix 1
backing up
db2bak 1
backup 1
backup files 1
backup from console 1
creating from command line 1
creating from console 1
creating multiple 1
creating using LDIF 1
deleting 1
export 1
db2ldif 1
export from console 1
import 1
ldif2db 1
ldif2db-task 1
ldif2ldap 1
initialization 1
making read-only 1
monitoring from command-line 1
monitoring from server console 1
overview 1
read-only mode 1
replication 1
restore 1
restoring 1
bak2db 1
bak2db-task 1
restoring from console 1
selecting for monitoring 1
viewing backend information 1
database link
cascading
configuring defaults 1
configuring from command line 1
configuring from console 1
overview 1
chaining with SSL 1
configuration 1
configuration attributes 1
configuration example 1, 2
configuring bind credentials 1
configuring failover servers 1
configuring LDAP URL 1
configuring suffix 1
creating from command line 1
creating from console 1
deleting 1
maintaining remote server info 1
overview 1
database server parameters
read-only 1
database transaction logging
described 1
durable transactions 1
log file location 1
databases
in directory server 1
date format 1
dayofweek keyword 1
db2bak utility 1
db2ldif utility 1
default referrals
setting 1
setting from console 1
settings from command line 1
defining
access control policy 1
attributes 1
object classes 1
definition entry. See CoS definition entry. 1
delete right 1
deleting
ACI 1
attribute values 1
attributes 1, 2
attributes from an object class 1, 2
database link 1
entries 1
multiple attributes 1
object classes 1
deleting directory entries 1
denying access 1
precedence rule 1
DES cipher 1, 2
directory creation 1
directory entries
adding using LDIF 1
creating 1, 2
deleting 1, 2
managing 1
managing from command line 1
managing from console 1
modifying 1, 2
moving 1
renaming 1
Directory Manager
configuring 1
privileges 1
directory server 1
basic administration 1
binding to 1
changing bind DN 1
configuration 1
controlling access 1
creating a root entry 1, 2
creating content 1
creating entries 1, 2
data 1
databases 1
deleting entries 1, 2
importing data 1
international character sets 1
login 1
MIB 1
modifying entries 1, 2
monitoring 1, 2
monitoring from command line 1
monitoring with SNMP 1
overview 1
performance counters 1, 2
plug-ins 1
SNMP traps 1
starting and stopping 1
starting the console 1
suffixes 1
supported languages 1
directory server console 1
directory trees
finding entries in 1
disabling suffixes 1
disk space
access log and 1
log files and 1
distribution function 1, 2
dn field (LDIF) 1
dn.db2 file 1
dn2id.db2 file 1
dns keyword 1
dse.ldif
PTA plugin 1
dse.ldif file
backing up 1
PTA syntax 1
restoring 1
durable transactions 1
dynamic groups
see groups 1

E

end of file marker 1
entries
adding an object class 1
adding attributes 1
adding using LDIF 1
adding using LDIF update statements 1
cache hit ratio 1
creating 1, 2
using LDIF 1
deleting 1, 2
using ldapdelete 1
deleting using LDIF update statements 1
distribution 1
finding 1
managing from command line 1
managing from console 1
modifying 1, 2, 3
using ldapmodify 1
using LDIF update statements 1
moving 1
order of creation 1
order of deletion 1, 2
removing an object class 1
renaming 1
root 1
targeting 1
entry cache hit ratio 1
entry distribution 1
entry management 1
EOF marker 1
equality index 1
equality search 1
example 1
international example 1
error log
access control information 1
configuring 1
manually rotating 1
turning off 1
turning on 1
viewing 1
example
cascading chaining 1
exporting data 1
db2ldif 1
using console 1
extending the directory schema 1

F

failover servers
for database links 1
files
access log 1
database backup 1
dn.db2 1
dn2id.db2 1
EOF marker 1
error log 1
id2children.db2 1
id2entry.db2 1
filtered role
creating 1
example 1
finding
attributes 1
entries 1
FIPS DES cipher 1
FIPS Triple DES cipher 1
format, LDIF 1

G

general access
example 1
overview 1
greater than or equal to search
international example 1, 2
overview 1
groupdn keyword 1
LDIF examples 1
groupdnattr keyword 1
groups 1
access control 1
access control example 1
access to directory 1
creating
dynamic group 1
static group 1
dynamic 1
modifying group definition 1
removing a group definition 1
static 1

H

hub supplier 1
configuration 1

I

id field (LDIF) 1
id2children.db2 file 1
id2entry.db2 file 1
images
adding to directory 1
importing data 1
from console 1
ldif2ldap 1
using ldif2db 1
using ldif2db-task 1
inactivating accounts 1
inactivating roles 1
index types 1
approximate index 1
equality index 1
presence index 1
indexes
creating dynamically 1
dynamic changes to 1
presence 1
indexing 1
creating indexes from console 1
system indexes 1
indirect CoS
example 1
overview 1
initializing databases 1
initializing replicas
cascading replication 1
multi-master replication 1
international character sets 1
international indexing
collation order 1
international searches 1
equality 1
examples 1
greater than 1
greater than or equal to 1
less than 1
less than or equal to 1
matching rule filter syntax 1
substring 1
using OIDs 1
internationalization
character type 1
collation order 1
country code 1
date format 1
language tag 1
locales and 1
location of files 1
matching rule filters 1
modifying entries 1
monetary format 1
object identifiers and 1
of LDIF files 1
search filters and 1
supported locales 1
time format 1
ip keyword 1

J

jpeg images 1

L

language code
in LDIF entries 1
list of supported 1
language subtype 1
language support
language tag 1
searching and 1
specifying using locales 1
language tags
described 1
in international searches 1
in LDIF update statements 1
LDAP clients
authentication over SSL 1
certificate-based authentication and 1
monitoring database with 1
monitoring server with 1
schema and 1
using to find entries 1
LDAP Data Interchange Format, see LDIF 1
LDAP search filters
DNs with commas and 1
in targets 1
example 1
examples 1
LDAP URLs
components of 1
examples 1
for database links 1
in access control 1
security and 1
syntax 1
ldapdelete utility 1
deleting entries 1
DNs with commas and 1
example 1
ldapmodify utility 1
attributes with language tags 1
creating a root entry 1
creating entries 1
DNs with commas and 1
example 1, 2
example of use 1, 2
modifying entries 1, 2
schema checking and 1
vs. ldapdelete 1
ldapsearch utility
commonly used options 1
DNs with commas and 1, 2
example of use 1
format 1
limiting attributes returned 1
search filters 1
specifying files 1
using 1
LDIF
access control keywords
groupdnattr 1
userattr 1
adding entries 1
binary data 1
change type 1
entry format 1
organization 1
organizational person 1
organizational unit 1
example 1
internationalization and 1
line continuation 1
Server Console and 1
specifying entries
organization 1
organizational person 1
organizational unit 1
update statements 1
using to create directory 1
LDIF entries
binary data in 1
commas in 1, 2, 3
creating 1
organizational person 1
organizational units 1
organizations 1
internationalization and 1
LDIF files
continued lines 1
creating directory using 1
creating multiple entries 1
example 1
importing from Server Console 1
internationalization and 1
LDIF format 1
LDIF update statements 1
adding attributes 1
adding entries 1
continued lines 1
deleting attribute values 1
deleting attributes 1
deleting entries 1
modifying attribute values 1
modifying entries 1
syntax 1
ldif utility
converting binary data to LDIF 1
ldif2db utility 1
ldif2ldap utility 1
legacy consumer
configuration 1
legacy replication plug-in
overview 1
less than or equal to search
international example 1
syntax 1
less than search
international example 1
syntax 1
locales
defined 1
location of files 1
supported 1
locked accounts 1
lockout duration 1
log files 1
access log 1
audit log 1
database transaction 1
deletion policy 1
error log 1
location of 1
manual rotation 1
manually rotating 1
rotation policy 1
login identity
changing 1
viewing 1
loop detection
cascading chaining 1

M

macro ACIs
example 1
overview 1
syntax 1
managed device
managed device-initiated communication 1
overview 1
managed object 1
managed role
creating 1
example 1
manually rotating log files 1
markerObjectClass keyword 1
master agent
overview 1
Unix 1
matchingRule format 1
using language tag 1
using language tag and suffix 1
using OID 1
using OID and suffix 1
MD5 message authentication 1
metaphone phonetic algorithm 1
MIB
directory server 1
netscape-ldap.mib 1
entries table 1
operations table 1
modifying
attribute values 1
entries 1
international entries 1
modifying directory entries 1
monetary format 1
monitoring
database from command-line 1
database from server console 1
directory server 1
from console 1
log files 1
replication status 1
threads 1
with SNMP 1
monitoring from console 1
moving entries 1
multi-master replication
initializing replicas 1
introduction 1
multiple search filters 1

N

naming conflicts
in replication 1
nested role
creating 1
example 1
netscape-ldap.mib 1
entries table 1
operations table 1
network management station (NMS)
NMS-initiated communication 1
nsLookthroughLimit attribute
role in searching algorithm 1
nsSizeLimit attribute
role in searching algorithm 1
nsslapd-allidsthreshold attribute 1
nsslapd-schemacheck attribute 1
nsTimeLimit attribute
role in searching algorithm 1

O

object class
adding to an entry 1
creating 1
deleting 1
editing 1
name 1
OID 1
parent object 1
referral 1
removing from an entry 1
roles 1
standard 1, 2
user-defined 1
viewing 1
object identifier (OID) 1
attribute 1, 2
in matchingRule 1
object class 1
objectClass field (LDIF) 1
OID, See object identifier 1
operations table 1
operations, defined 1
operators
Boolean 1
international searches and 1
search filters and 1
suffix 1
optional attributes
creating 1
deleting 1, 2
editing 1
editing in object class 1
organization, specifying entries for 1
organizational person, specifying entries for 1
organizational unit, specifying entries for 1

P

parent access 1
parent keyword 1
parent object 1
pass-through authentication (PTA). See PTA plug-in 1
password file
SSL certificate 1
password policy
account lockout 1
attributes 1
configuring 1
using command line 1
using console 1
lockout duration 1
managing 1
password failure counter 1
replication 1
passwordChange attribute 1
passwordExp attribute 1
passwordInHistory attribute 1
passwordMustChange attribute 1
passwords
account lockout 1
certificate 1
failure counter 1
lockout duration 1
setting 1
passwordStorageScheme attribute 1
PDUs 1
performance
replication 1
performance counters 1
monitoring the server with 1
performance tuning
database 1
server 1
permissions
ACI syntax 1
allowing or denying access 1
assigning rights 1
overview 1
precedence rule 1
plug-in functions 1
plug-ins
7-bit check plug-in 1
ACL plug-in 1
ACL preoperation plug-in 1
binary syntax plug-in 1
Boolean syntax plug-in 1
case exact string syntax plug-in 1
case ignore string syntax plug-in 1
chaining database plug-in 1
Class of Service plug-in 1
CLEAR password storage plug-in 1
country String Syntax Plug-In 1
CRYPT password storage plug-in 1
disabling 1
distinguished name syntax plug-in 1
enabling 1
generalized time syntax plug-in 1
integer syntax plug-in 1
internationalization plug-in 1
ldbm database plug-in 1
legacy replication plug-in 1
multimaster replication plug-in 1
NS-MTA-MD5 password storage plug-in 1
octet string syntax plug-in 1
postal address string syntax plug-in 1
PTA plug-in 1
reference 1
referential integrity plug-in 1
retro change log plug-in 1
roles plug-in 1
SHA password storage plug-in 1
SSHA password storage plug-in 1
telephone syntax plug-in 1
uid uniqueness plug-in 1
URI plug-in 1
pointer CoS
example 1
overview 1
port number
directory server configuration 1
for SSL communications 1
precedence rule
ACI 1
preferences
security 1
presence index 1
defaults 1
presence search
example 1
syntax 1
pronunciation subtype 1
Property Editor
displaying 1
protocol data units. See PDUs 1
proxy authorization 1
ACI example 1
with cascading chaining 1
proxy DN 1
proxy right 1
PTA plug-in
configuring 1
examples 1
syntax 1
use in directory server 1

Q

quotation marks, in parameter values 1, 2

R

RC2 cipher 1
RC4 cipher 1, 2
read right 1
read-only mode 1
database 1
read-only replica 1
read-write replica 1
ref attribute 1
referential integrity
attributes 1
disabling 1
enabling 1
log file 1
modifying attributes 1
overview 1
using replication change log 1
with replication 1, 2
referral object class 1
referrals
creating smart referrals 1
creating suffix 1
on update 1
setting default 1
suffix 1
renaming entries
restrictions 1
replacing attribute values 1
replica
exporting to LDIF 1
read-only 1
read-write 1
replica ID
for a read-write replica 1, 2, 3, 4
replication
and access control 1
and password policy 1
and referential integrity 1, 2
and SSL 1
cascading 1
change log 1
compatibility with earlier versions 1, 2
configuration tips 1
configuring a consumer replica 1
configuring a hub supplier 1
configuring a supplier replica 1
configuring legacy replication 1
configuring SSL 1
configuring supplier settings 1
consumer server 1
consumer-initiated 1
creating the supplier bind DN 1
forcing synchronization 1
hub supplier 1
managing 1
monitoring status 1
of ACIs 1
overview 1
performance 1
replica ID 1, 2, 3, 4
single-master 1
solving conflicts 1
supplier server 1
supplier-initiated 1
unit of 1
replication agreement 1
creating 1
replication manager 1
replication retry 1
required attributes
creating 1
deleting 1, 2
editing 1
requiredObjectClass keyword 1
resource limits 1
setting
using command line 1
using console 1
Resource Summary
viewing 1
resource use
connections 1
monitoring 1
restoring data 1
bak2db 1
bak2db-task 1
dse.ldif 1
from console 1
replicated entries 1
restoring the database 1
retro change log
and access control 1
attributes 1
object class 1
searching 1
trimming 1
retro change log plug-in
enabling 1
overview 1, 2
retry
replication 1
rights
list of 1
roledn keyword 1
roles 1
access control 1
access to directory 1
activating 1
attributes 1
chaining limitation 1
CoS limitation 1
creating
filtered role 1
managed role 1
nested role 1
editing 1
filtered
creating 1
example 1
inactivating 1
inactivation 1
limitations 1
managed
creating 1
example 1
nested
creating 1
example 1
object classes 1
overview 1
root DN, see Directory Manager 1
root DSE 1
root entry creation 1
root suffix
creating from command line 1
creating from console 1

S

SASL authentication 1
schema
checking 1
creating new attributes 1
creating new object classes 1
deleting attributes 1
deleting object classes 1
editing object classes 1
extending 1
nsslapd-schemacheck attribute 1
standard 1
viewing attributes 1
viewing object classes 1
schema checking
and access control 1
ldapmodify and 1
overview 1
turning on or off 1
search filters 1
Boolean operators 1
contained in file 1
examples 1, 2
matching rule 1
operators in 1
specifying attributes 1
syntax 1
using compound 1
using multiple 1
search right 1
search types, list of 1, 2
searches
approximate 1
equality 1, 2, 3
example 1
greater than or equal to 1, 2, 3
international 1
international examples 1
less than 1
less than or equal to 1, 2
of directory tree 1
presence 1, 2
restricting scope of one-level 1
restricting scope of subtree 1
specifying scope 1
substring 1, 2
searching algorithm
overview 1
Secure Sockets Layer, see SSL 1
security
certificate-based authentication 1
LDAP URLs and 1
setting preferences 1
self access 1
LDIF example 1
self keyword 1
selfwrite right 1
example 1
server parameters
database
read-only 1
setting access controls 1
setting passwords 1
simple authentication 1
Simple Authentication and Security Layer (SASL). See SASL authentication 1
Simple Network Management Protocol. See SNMP 1
Simple Sockets Layer. See SSL 1
single-master replication
introduction 1
setting up 1
smart referrals
creating 1
creating from command line 1
creating from console 1
SNMP
agents 1
configuring 1
managed device 1, 2
managed objects 1
master agent
overview 1
Unix 1
MIB
entries table 1
operations table 1
monitoring the directory server 1
NMS-initiated communication 1
overview 1
subagent
configuring 1
configuring contact 1
configuring description 1
configuring location 1
configuring master host 1
configuring master port 1
configuring organization 1
enabling 1
overview 1
starting and stopping 1
traps 1
SSL
and replication 1
certificate password 1
chaining with 1
client authentication 1
configuring clients to use 1
enabling 1
port number 1
setting preferences 1
starting the server with 1
SSL authentication 384 1, 2
standard
attributes 1, 2
index files 1
object classes 1, 2
standard schema 1
starting the directory server 1
with SSL 1
static groups
see groups 1
stopping the directory server 1
sub suffix
creating from command line 1
creating from console 1
subagent
configuring 1
enabling 1
overview 1
starting and stopping 1
substring search 1
international example 1
subtypes
of attributes 1
suffix
and associated database 1
configuration attributes 1
creating 1, 2
creating from command line 1
creating root suffix 1
creating sub suffix 1
custom distribution function 1
custom distribution logic 1
disabling 1
in directory server 1
using referrals 1
on update only 1
with multiple databases 1
suffix referrals
creating 1
creating from command line 1
creating from console 1
supplier replica
configuration 1
supplier server 1
symbols
-, in change operation 1
::, in LDIF statements 1
"", in ldapmodify commands 1
'', in ldapsearch 1
syntax
ACI statements 1
attribute value 1
LDAP URLs 1
ldapsearch 1
LDIF update statements 1
matching rule filter 1
search filter 1
system connections
monitoring 1
system indexes 1
system resources
monitoring 1

T

targattrfilters keyword 1
target
ACI syntax 1
attribute values 1
attributes 1
DNs containing commas 1, 2
keywords in ACIs 1
overview 1
using LDAP search filters 1
using LDAP URLs 1
target keyword 1
targetattr keyword 1
targetfilter keyword 1
targeting
directory entries 1
template entry. See CoS template entry. 1
thread
monitoring 1, 2
time format 1
timeofday keyword 1
traps 1
triple DES 1
Triple DES cipher 1, 2
tuning performance
database 1
server 1

U

unique attribute plug-in 1
configuring 1
creating an instance of 1
disabling 1
enabling 1
examples 1
markerObjectClass 1
requiredObjectClass 1
syntax 1
Unix
master agent 1
user access 1
example 1
LDIF example 1
to child entries 1
to own entry 1
LDIF example 1
user and group management
referential integrity 1
user passwords 1
userattr keyword 1
restriction on add 1
user-defined attributes 1
user-defined object classes 1
userdn keyword 1
users
activating 1
inactivating 1
UTF-8 1

V

value-based ACI 1

W

wildcard
in LDAP URL 1
in target 1
wildcards
in international searches 1
in matching rule filters 1
write right 1

Previous     Contents     DocHome    
Copyright © 2002 Sun Microsystems, Inc. Some preexisting portions Copyright © 2001 Netscape Communications Corp. All rights reserved.

Last Updated February 26, 2002