Previous     Contents     DocHome    
iPlanet Directory Server Deployment Guide


 SymbolsABCDEFGHIJKLMNOPQRSTUVWXYZ 
Index



A

access
anonymous, 1
determining general types of, 1
precedence rule, 1
access control
password protection and, 1
access control information (ACI), 1
bind rules, 1, 2, 3
filtered rules, 1
format, 1, 2
permission, 1
target, 1
usage advice, 1
where to place, 1
access rights
granting, 1
account inactivation, 1
account lockout, 1
ACI instruction
password protection and, 1
ACI. See access control information 1
allow permissions, 1
anonymous access, 1
for read, 1
overview, 1
applications, 1
approximate index, 1
attribute
defining in schema, 1
operational, 1
required and allowed, 1
values, 1
attribute-data pair, 1, 2
audits, for security, 1
authentication methods, 1
anonymous access, 1
certificate-based, 1
proxy authentication, 1
simple password, 1
over TLS, 1

B

bind rules, 1, 2, 3
branch point
DN attributes, 1, 2
for international trees, 1
for replication and referrals, 1
network names, 1
browsing index, 1

C

c attribute, 1
cascading replication, 1
certificate-based authentication, 1
chaining, 1, 2
compared to referrals, 1
database links, 1
change log, 1
checking password syntax, 1
class of service (CoS), 1
classic, 1
definition entry, 1
indirect, 1
pointer, 1
target entry, 1
template entry, 1
classic CoS, 1
clients
bind algorithm, 1
cn attribute, 1, 2, 3
commonName attribute, 1, 2, 3, 4
consumer server, 1
consumer-initiated replication
overview, 1
conventions, in this book, 1
CoS. See class of service. 1
country attribute, 1, 2
custom schema files, 1

D

data access, 1
data management
replication example, 1
data master, 1
for replication, 1
data ownership, 1
data privacy, 1
database, 1
chaining, 1
LDBM, 1
multiple, 1
database link, 1
default permissions, 1
default referrals, 1
definition entry, 1
deleting schema, 1
deleting schema elements, 1
deny permissions, 1
directory applications, 1
browsers, 1
email, 1
directory data
access, 1
examples of, 1
mastering, 1
ownership, 1
planning, 1
representation, 1
directory design
overview, 1, 2
directory service, 1, 2
global, 1
iPlanet solution, 1
LDAP, 1
directory tree
access control considerations, 1
branch point
DN attributes, 1, 2
for international trees, 1
for replication and referrals, 1
network names, 1
branching, 1
creating structure, 1
default, 1
design
choosing a suffix, 1
creating structure, 1
naming entries, 1
examples
international enterprise, 1
ISP, 1
replication considerations, 1
distinguished name
name collision, 1
DIT. See directory tree 1
DNS, 1

E

email applications, 1
encryption
password, 1
Salted SHA, 1
SHA, 1
enterprise deployment example, 1
entries, 1
naming, 1
group entries, 1
non-person, 1
organization, 1
person, 1
entry distribution, 1
multiple databases, 1
suffixes, 1
equality index, 1
example
deployment
extranet, 1
examples
deployment
enterprise, 1
multinational enterprise, 1
replication
large sites, 1
load balancing server traffic, 1
local data management, 1
small sites, 1
expiration of passwords
overview, 1
warning message, 1
extending the schema, 1

F

filtered access control rules, 1
filtered roles, 1
fonts, in this book, 1

G

global directory services, 1
group attribute, 1

H

high availability, 1, 2
hub supplier, 1

I

illegal strings, passwords, 1
index
approximate, 1
browsing, 1
equality, 1
international, 1
presence, 1
substring, 1
indirect CoS, 1
inetOrgPerson attribute, 1
international index, 1
iPlanet Directory Server, 1
architecture, 1, 2
database, 1

K

knowledge references, 1
chaining, 1
referrals, 1

L

LDAP, See Lightweight Directory Access Protocol 1
LDAP referrals, 1
LDAPv3 schema, 1
LDBM database, 1
length, password, 1
Lightweight Directory Access Protocol (LDAP), 1
directory services, 1
load balancing
the network, 1

M

mail attribute, 1
managed roles, 1
minimum length of passwords, 1
multi-master replication, 1, 2
multinational enterprise deployment, 1
multiple databases, 1

N

name collision, 1
naming entries, 1
group entries, 1
organization, 1
people, 1
nested roles, 1
network names, branching to reflect, 1
network, load balancing, 1

O

object class
defining in schema, 1
standard, 1
object identifier. See also OID. 1
OID
getting and assigning, 1
organization attribute, 1
organizationalPerson object class, 1
organizationalUnit attribute, 1

P

password
simple
over TLS, 1
password policies
attributes, 1
change after reset, 1
design, 1
expiration warning, 1
overview, 1
password expiration, 1
password history, 1
password length, 1
password storage scheme, 1
overview, 1
replication of, 1
syntax checking, 1
user defined passwords, 1
password storage scheme
configuring, 1
passwords
changing after reset, 1
encryption of, 1
expiration, 1
expiration warning, 1
history, 1
illegal strings, 1
minimum length, 1
reusing, 1
simple, 1
syntax checking, 1
user defined, 1
permissions, 1
allow, 1
bind rules, 1, 2, 3
default, 1
deny, 1
on ACIs, 1
precedence rule, 1
person entries, 1
pointer CoS, 1
precedence rule, 1
presence index, 1
proxy authentication, 1

R

referrals, 1, 2
branching to support, 1
compared to chaining, 1
default, 1
LDAP, 1
smart referrals, 1
replication, 1, 2
access control, 1
branching to support, 1
cascading, 1
change log, 1
consumer server, 1
consumer-initiated, 1
data consistency, 1
data master, 1
database links, 1
examples
large sites, 1
load balancing server traffic, 1
local data management, 1
small sites, 1
high availability, 1
hub server, 1
load balancing
the network, 1
local availability, 1
overview, 1
password policies, 1
resource requirements, 1
schema, 1
server plug-ins, 1
single-master, 1
site survey, 1
strategy, 1
supplier server, 1, 2
reusing passwords, 1
roles, 1, 2
compared to groups, 1
filtered, 1
managed, 1
nested, 1
root suffix, 1

S

Salted SHA encryption, 1
schema, 1, 2
adding new attributes, 1
assigning OIDs, 1
best practices, 1
checking, 1
consistency, 1, 2
custom files, 1
deleting elements, 1
extending, 1
iPlanet standard, 1, 2
LDAPv3, 1
naming attributes, 1
naming elements, 1
naming object classes, 1
object class strategies, 1
schema replication, 1
secure sockets layer, 1
security
conducting audits, 1
security methods
overview, 1
security policy, 1
security threats, 1
denial of service, 1
unauthorized access, 1
unauthorized tampering, 1
server database, 1
SHA encryption, 1
simple password, 1
single-master replication
defined, 1
site survey, 1
characterizing data, 1
identifying applications, 1
identifying data sources, 1
network capabilities, 1
smart referral, 1
sn attribute, 1
standard object classes, 1
standard schema, 1, 2
Start TLS, 1
streetAddress attribute, 1
styles, in this book, 1
sub suffix, 1
substring index, 1
suffix
naming conventions, 1
root suffix, 1
sub suffix, 1
supplier server, 1
supplier servers, 1
surname attribute, 1
syntax
password, 1

T

target entry, 1
telephoneNumber attribute, 1
template entry, 1
terms, in this book, 1
topology
overview, 1
trivial words, 1

U

uid attribute, 1, 2
user authentication, 1
user defined passwords, 1
userPassword attribute, 1

V

virtual list view index, 1

W

warning, password expiration, 1

Previous     Contents     DocHome    
Copyright © 2001 Sun Microsystems, Inc. Some preexisting portions Copyright © 2001 Netscape Communications Corp. All rights reserved.

Last Updated March 15, 2001