Previous Contents DocHome |
iPlanet Directory Server Deployment Guide |
  | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z |   |
Index
- access
- anonymous, 1
- determining general types of, 1
- precedence rule, 1
- access control
- password protection and, 1
- access control information (ACI), 1
- bind rules, 1, 2, 3
- filtered rules, 1
- format, 1, 2
- permission, 1
- target, 1
- usage advice, 1
- where to place, 1
- access rights
- granting, 1
- account inactivation, 1
- account lockout, 1
- ACI instruction
- password protection and, 1
- ACI. See access control information 1
- allow permissions, 1
- anonymous access, 1
- for read, 1
- overview, 1
- applications, 1
- approximate index, 1
- attribute
- defining in schema, 1
- operational, 1
- required and allowed, 1
- values, 1
- attribute-data pair, 1, 2
- audits, for security, 1
- authentication methods, 1
- anonymous access, 1
- certificate-based, 1
- proxy authentication, 1
- simple password, 1
- over TLS, 1
- bind rules, 1, 2, 3
- branch point
- DN attributes, 1, 2
- for international trees, 1
- for replication and referrals, 1
- network names, 1
- browsing index, 1
- c attribute, 1
- cascading replication, 1
- certificate-based authentication, 1
- chaining, 1, 2
- compared to referrals, 1
- database links, 1
- change log, 1
- checking password syntax, 1
- class of service (CoS), 1
- classic, 1
- definition entry, 1
- indirect, 1
- pointer, 1
- target entry, 1
- template entry, 1
- classic CoS, 1
- clients
- bind algorithm, 1
- cn attribute, 1, 2, 3
- commonName attribute, 1, 2, 3, 4
- consumer server, 1
- consumer-initiated replication
- overview, 1
- conventions, in this book, 1
- CoS. See class of service. 1
- country attribute, 1, 2
- custom schema files, 1
- data access, 1
- data management
- replication example, 1
- data master, 1
- for replication, 1
- data ownership, 1
- data privacy, 1
- database, 1
- chaining, 1
- LDBM, 1
- multiple, 1
- database link, 1
- default permissions, 1
- default referrals, 1
- definition entry, 1
- deleting schema, 1
- deleting schema elements, 1
- deny permissions, 1
- directory applications, 1
- browsers, 1
- email, 1
- directory data
- access, 1
- examples of, 1
- mastering, 1
- ownership, 1
- planning, 1
- representation, 1
- directory design
- overview, 1, 2
- directory service, 1, 2
- global, 1
- iPlanet solution, 1
- LDAP, 1
- directory tree
- access control considerations, 1
- branch point
- DN attributes, 1, 2
- for international trees, 1
- for replication and referrals, 1
- network names, 1
- branching, 1
- creating structure, 1
- default, 1
- design
- choosing a suffix, 1
- creating structure, 1
- naming entries, 1
- examples
- international enterprise, 1
- ISP, 1
- replication considerations, 1
- distinguished name
- name collision, 1
- DIT. See directory tree 1
- DNS, 1
- email applications, 1
- encryption
- password, 1
- Salted SHA, 1
- SHA, 1
- enterprise deployment example, 1
- entries, 1
- naming, 1
- group entries, 1
- non-person, 1
- organization, 1
- person, 1
- entry distribution, 1
- multiple databases, 1
- suffixes, 1
- equality index, 1
- example
- deployment
- extranet, 1
- examples
- deployment
- enterprise, 1
- multinational enterprise, 1
- replication
- large sites, 1
- load balancing server traffic, 1
- local data management, 1
- small sites, 1
- expiration of passwords
- overview, 1
- warning message, 1
- extending the schema, 1
- filtered access control rules, 1
- filtered roles, 1
- fonts, in this book, 1
- global directory services, 1
- group attribute, 1
- high availability, 1, 2
- hub supplier, 1
- illegal strings, passwords, 1
- index
- approximate, 1
- browsing, 1
- equality, 1
- international, 1
- presence, 1
- substring, 1
- indirect CoS, 1
- inetOrgPerson attribute, 1
- international index, 1
- iPlanet Directory Server, 1
- architecture, 1, 2
- database, 1
- knowledge references, 1
- chaining, 1
- referrals, 1
- LDAP, See Lightweight Directory Access Protocol 1
- LDAP referrals, 1
- LDAPv3 schema, 1
- LDBM database, 1
- length, password, 1
- Lightweight Directory Access Protocol (LDAP), 1
- directory services, 1
- load balancing
- the network, 1
- mail attribute, 1
- managed roles, 1
- minimum length of passwords, 1
- multi-master replication, 1, 2
- multinational enterprise deployment, 1
- multiple databases, 1
- name collision, 1
- naming entries, 1
- group entries, 1
- organization, 1
- people, 1
- nested roles, 1
- network names, branching to reflect, 1
- network, load balancing, 1
- object class
- defining in schema, 1
- standard, 1
- object identifier. See also OID. 1
- OID
- getting and assigning, 1
- organization attribute, 1
- organizationalPerson object class, 1
- organizationalUnit attribute, 1
- password
- simple
- over TLS, 1
- password policies
- attributes, 1
- change after reset, 1
- design, 1
- expiration warning, 1
- overview, 1
- password expiration, 1
- password history, 1
- password length, 1
- password storage scheme, 1
- overview, 1
- replication of, 1
- syntax checking, 1
- user defined passwords, 1
- password storage scheme
- configuring, 1
- passwords
- changing after reset, 1
- encryption of, 1
- expiration, 1
- expiration warning, 1
- history, 1
- illegal strings, 1
- minimum length, 1
- reusing, 1
- simple, 1
- syntax checking, 1
- user defined, 1
- permissions, 1
- allow, 1
- bind rules, 1, 2, 3
- default, 1
- deny, 1
- on ACIs, 1
- precedence rule, 1
- person entries, 1
- pointer CoS, 1
- precedence rule, 1
- presence index, 1
- proxy authentication, 1
- referrals, 1, 2
- branching to support, 1
- compared to chaining, 1
- default, 1
- LDAP, 1
- smart referrals, 1
- replication, 1, 2
- access control, 1
- branching to support, 1
- cascading, 1
- change log, 1
- consumer server, 1
- consumer-initiated, 1
- data consistency, 1
- data master, 1
- database links, 1
- examples
- large sites, 1
- load balancing server traffic, 1
- local data management, 1
- small sites, 1
- high availability, 1
- hub server, 1
- load balancing
- the network, 1
- local availability, 1
- overview, 1
- password policies, 1
- resource requirements, 1
- schema, 1
- server plug-ins, 1
- single-master, 1
- site survey, 1
- strategy, 1
- supplier server, 1, 2
- reusing passwords, 1
- roles, 1, 2
- compared to groups, 1
- filtered, 1
- managed, 1
- nested, 1
- root suffix, 1
- Salted SHA encryption, 1
- schema, 1, 2
- adding new attributes, 1
- assigning OIDs, 1
- best practices, 1
- checking, 1
- consistency, 1, 2
- custom files, 1
- deleting elements, 1
- extending, 1
- iPlanet standard, 1, 2
- LDAPv3, 1
- naming attributes, 1
- naming elements, 1
- naming object classes, 1
- object class strategies, 1
- schema replication, 1
- secure sockets layer, 1
- security
- conducting audits, 1
- security methods
- overview, 1
- security policy, 1
- security threats, 1
- denial of service, 1
- unauthorized access, 1
- unauthorized tampering, 1
- server database, 1
- SHA encryption, 1
- simple password, 1
- single-master replication
- defined, 1
- site survey, 1
- characterizing data, 1
- identifying applications, 1
- identifying data sources, 1
- network capabilities, 1
- smart referral, 1
- sn attribute, 1
- standard object classes, 1
- standard schema, 1, 2
- Start TLS, 1
- streetAddress attribute, 1
- styles, in this book, 1
- sub suffix, 1
- substring index, 1
- suffix
- naming conventions, 1
- root suffix, 1
- sub suffix, 1
- supplier server, 1
- supplier servers, 1
- surname attribute, 1
- syntax
- password, 1
- target entry, 1
- telephoneNumber attribute, 1
- template entry, 1
- terms, in this book, 1
- topology
- overview, 1
- trivial words, 1
- uid attribute, 1, 2
- user authentication, 1
- user defined passwords, 1
- userPassword attribute, 1
- virtual list view index, 1
- warning, password expiration, 1
Previous Contents DocHome
Copyright © 2001 Sun Microsystems, Inc. Some preexisting portions Copyright © 2001 Netscape Communications Corp. All rights reserved.
Last Updated March 15, 2001