JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Oracle Fusion Middleware Glossary for Oracle Unified Directory 11g Release 1 (11.1.1)
search filter icon
search icon

Document Information

1.  Glossary

A

abandon operation

abstract object class

Abstract Syntax Notation One

access control

access control instruction (ACI)

access control rule

access log

account expiration

account lockout

account status notification

account usability control

ACID

add operation

alias

AND search filter

anonymous bind

ANONYMOUS SASL mechanism

approximate index

approximate search filter

ASN.1

assertion value

attribute

attribute description

attribute option

attribute syntax

attribute type

attribute usage

attribute value

attribute value assertion

audit log

authentication

authentication ID

authentication password syntax

authorization

authorization ID

authorization identity control

auxiliary object class

AVA

B

back end

backup

base64 encoding

Basic Encoding Rules

Basic Encoding Rules Overview

The BER Type

The BER Length

The BER Value

BER Encoding Examples

BER

Berkeley DB Java Edition

binary copy

bind operation

C

cancel extended operation

CDDL

certificate

certificate mapper

chaining

changelog

cn=Directory Manager

collective attribute

Common Development and Distribution License

compare operation

connection handler

connection ID

control

CRAM-MD5 SASL mechanism

crypt algorithm

D

database

database cache

debug log

delete operation

deprecated password storage scheme

dereference policy

DIGEST-MD5 SASL mechanism

directory information tree

directory manager

directory server

directory server agent

Directory Services Markup Language

distinguished name

distribution

DIT

DIT content rule

DIT structure rule

DN

DSA

DSA-specific entry

DSE

DSML

DSML gateway

duration

dynamic group

E

entry

entry cache

entry change notification control

entryDN

entry ID

entryUUID

equality index

equality search filter

error log

export

extended operation

extensible match index

extensible match search filter

EXTERNAL SASL mechanism

F

failover algorithm

false filter

G

generalized time

get effective rights control

global index

global index catalog

greater than or equal to search filter

group

GSSAPI SASL mechanism

I

ID list

id2entry database

identity mapper

idle account lockout

in-core restart

index

index entry limit

intermediate response

Internet Draft

J

Java Management Extensions

JMX

K

key manager provider

L

last login time

lastmod plug-in

LDAP assertion control

ldapcompare command

LDAP Data Interchange Format

ldapdelete command

LDAP false filter

LDAP intermediate response

LDAP message

LDAP modify DN operation

LDAP modify operation

ldapmodify command

LDAP no-op control

LDAP post-read control

LDAP pre-read control

LDAP result

LDAPS

LDAP search filter

ldapsearch command

LDAP true filter

LDAP Subentry

LDAP URL

LDIF export

LDIF import

leaf entry

less than or equal to search filter

lexico algorithm

Lightweight Directory Access Protocol

load balancing

lookthrough limit

M

MakeLDIF command

manage DSA IT control

matched DN

matched values control

matching rule

matching rule use

MD5

message

message ID

modification

modification type

modify DN operation

modify operation

monitor entry

N

name form

naming context

network group

non-leaf entry

normalized value

notice of disconnection unsolicited notification

NOT search filter

numeric algorithm

O

object class

object class type

object identifier

operation ID

operational attribute

ordering index

OR search filter

P

partition

password

password expiration

password generator

Password Modify extended operation

password policy

password policy control

password reset

password storage scheme

password validator

persistent search control

PLAIN SASL mechanism

plug-in

presence index

presence search filter

privilege

proportional algorithm

protocol data unit

protocol op

proxied authorization control

Q

quality of protection

R

real attributes only control

referential integrity

referral

relative distinguished name

replica

replication

replication repair control

request for comments

restore

result

result code

root DN

root DSE

route

S

salt

saturation algorithm

saturation alert

saturation threshold

schema

schema checking

search attributes

search base DN

search filter

search operation

search result done

search result entry

search result reference

search scope

Secure Hash Algorithm

Secure Sockets Layer

server-side sort control

simple authentication

Simple Authentication and Security Layer

simple paged results control

size limit

smart referral

StartTLS extended operation

static group

structural object class

subentry

subschema subentry

substring assertion

substring index

substring search filter

subtree

subtree delete control

supported control

supported extension

supported feature

synchronization

T

task

time limit

transaction

Transport Security Layer

true filter

trust manager provider

typesOnly flag

U

unbind operation

unindexed search

UNIX crypt algorithm

unsolicited notification

URL

user attribute

V

virtual attribute

virtual attributes only control

virtual directory

virtual list view control

virtual static group

VLV index

W

"Who Am I?" extended operation

work queue

worker thread

workflow

workflow element

writability mode

R

 

real attributes only control

The real attributes only control is a control that may be used to request that the server only include real attributes in matching entries. That is, virtual attributes are excluded from search result entry.

The real attributes only control has a request OID of 2.16.840.1.113730.3.4.17 and no value.

In the following search, the numsubordinates virtual attribute is requested and returned:

$ ldapsearch -D "cn=directory manager" -w password -b "ou=people,dc=example,dc=com" \
  -s base "objectclass=*" numsubordinates
version: 1 
dn: ou=People,dc=example,dc=com
numSubordinates: 50 

In the following search, the numsubordinates virtual attribute is requested but is not returned because the real attributes only control is used:

$ ldapsearch -D "cn=directory manager" -w password -J "2.16.840.1.113730.3.4.17" \
  -b "ou=people,dc=example,dc=com" -s base "objectclass=*" numsubordinates
version: 1
dn: ou=People,dc=example,dc=com

referential integrity

Referential integrity is a mechanism for ensuring that any references to an entry are updated whenever that entry is removed or altered. Historically, referential integrity is primarily used to ensure that attributes with a distinguished name syntax (especially group membership attributes like member and uniqueMember) are properly maintained in the event of delete operation and modify DN operation operations. For a delete operation, any references to the target entry will be removed. For modify DN operations, any references to the target entry will be renamed accordingly.

The directory server provides a configurable referential integrity plug-in that you can install using the dsconfig command.

referral

A referral provides a reference to an alternate location in which an operation may be processed. A referral may be included in an LDAP result object with a result code of 10 and an appropriate set of LDAP URLs. It may also be returned to clients in a search result reference.

relative distinguished name

A relative distinguished name, or RDN, is a single component within a distinguished name. It comprises one or more name-value pairs, in which the name and the value are separated by an equal sign (for example, for an RDN of uid=ann, the name is uid and the value is ann), and if there are multiple name-value pairs then they should be separated by plus signs (for example, for an RDN of cn=Jon Doe+employeeNumber=12345, the name-value pairs are cn=John Doe and employeeNumber=12345). In practice, RDNs containing multiple name-value pairs (called “multivalued RDNs”) are rare, but they can be useful at times when either there is no unique attribute in the entry or you want to ensure that the entry's DN contains some useful identifying information.

Even though a DN may be composed of multiple RDN components, the leftmost component is typically referred to as the entry's RDN. For example, in a DN of uid=john.doe,ou=People,dc=example,dc=com, the RDN would be uid=john.doe. The attribute values specified in an entry's RDN must be contained in that entry, so the entry uid=john.doe,ou=People,dc=example,dc=com must have a uid value of john.doe.

replica

A replica is a Directory Server instance that participates in replication.

replication

Replication is a form of data synchronization that is used to ensure that changes in the directory environment are reflected in each instance of the server. That is, whenever a change is made in one Directory Server instance, that same change is also made in every other instance.

replication repair control

The replication repair control is a control that can be used to resolve replication inconsistencies on a single server in a topology.

The replication repair control has a request OID of 1.3.6.1.4.1.26027.1.5.2 and no value.

For an example of using the replication repair control, see Detecting and Resolving Replication Inconsistencies in Oracle Fusion Middleware Administration Guide for Oracle Unified Directory.

request for comments

A request for comments (RFC) is an IETF specification that has been promoted from an Internet Draft and may be considered significantly more stable than drafts.

restore

A restore operation provides a mechanism for replacing the contents of a Directory Server back end with information taken from a previous backup. It can serve as a disaster recovery mechanism, and in some cases can be used for binary copy initialization of a replica.

result

See LDAP result.

result code

A result code is an integer value that provides general information about the result of the operation. Defined result codes include:

Value
Name
Description
0
Success
This is used to indicate that the associated operation completed successfully.
1
Operations Error
This is used to indicate that the associated request was out of sequence with another operation in progress (for example, a non-bind request in the middle of a multi-stage SASL bind).
2
Protocol Error
This is used to indicate that the client sent data to the server that did not comprise a valid LDAP request.
3
Time Limit Exceeded
This is used to indicate that processing on the associated request was terminated because it took too long to complete. For a search operation, it is possible that some of the matching entries had been returned when the time limit was reached.
4
Size Limit Exceeded
This is used to indicate that there were more entries matching the criteria contained in a search operation than were allowed to be returned by the size limit configuration.
5
Compare False
This is used to indicate that a compare operation completed successfully, but the provided attribute value assertion did not match the target entry.
6
Compare True
This is used to indicate that a compare operation completed successfully, and the provided attribute value assertion matched the target entry.
7
Auth Method Not Supported
This is used to indicate that the Directory Server does not support the requested authentication method.
8
Strong Auth Required
This is used to indicate that the Directory Server requires that the client use a strong authentication mechanism.
10
Referral
This is used to indicate that the requested operation could not be processed in the target server but may be attempted in elsewhere.
11
Admin Limit Exceeded
This is used to indicate that processing on the requested operation could not be completed because an administrative limit was reached. For a search operation, it is possible that some of the matching entries had been returned when the administrative limit was reached.
12
Unavailable Critical Extension
This is used to indicate that the request included a critical control that could not be processed by the server.
13
Confidentiality Required
This is used to indicate that the requested operation requires a secure communication channel between the client and the server.
14
SASL Bind In Progress
This is used to indicate that a SASL bind operation requires multiple stages and the response containing this result code is one of the intermediate stages.
16
No Such Attribute
This is used to indicate that the associated request targeted an attribute or attribute value that does not exist in the specified entry.
17
Undefined Attribute Type
This is used to indicate that the associated request included an attribute type that is not defined in the server schema.
18
Inappropriate Matching
This is used to indicate that the associated search request included a filter with a component targeting an attribute type for which no appropriate matching rule is defined.
19
Constraint Violation
This is used to indicate that the requested operation could not be completed because it would have violated some constraint defined in the server (for example, it would have duplicated a value for a unique attribute).
20
Attribute or Value Exists
This is used to indicate that an operation attempted to create an attribute value in an entry that already existed in the entry, or that it attempted to create an additional value for a single-valued attribute.
21
Invalid Attribute Syntax
This is used to indicate that requested operation attempted to specify a value that violated the syntax for the associated attribute type.
32
No Such Object
This is used to indicate that the requested operation targeted an entry that does not exist in the server.
33
Alias Problem
This is used to indicate that an operation targeted an alias entry and that operation is not allowed on alias entries.
34
Invalid DN Syntax
This is used to indicate that the requested operation included an entry DN that was malformed.
35
Is Leaf
This is used to indicate that the requested operation targeted a leaf entry but the operation requires a non-leaf entry.
36
Alias Dereferencing Problem
This is used to indicate that the associated search operation encountered an alias that could not be properly dereferenced.
48
Inappropriate Authentication
This is used to indicate that the client attempted to bind in a manner that is inappropriate for the target user (for example, the user attempted simple authentication but does not have a password).
49
Invalid Credentials
This is used to indicate that the client attempted to authenticate with invalid credentials (for example, the target DN or password was incorrect).
50
Insufficient Access Rights
This is used to indicate that the client was not allowed to perform the requested operation.
51
Busy
This is used to indicate that the server is too busy to process the requested operation.
52
Unavailable
This is used to indicate that the server is unavailable for processing operations.
53
Unwilling to Perform
This is used to indicate that the server is unwilling to perform the requested operation for some reason.
54
Loop Detect
This is used to indicate that the server encountered a loop of some type (for example, a chaining loop or an alias loop).
60
Sort Control Missing
This is used to indicate that the client requested a search operation containing the virtual list view control that did not also include the server-side sort control.
61
Offset Range Error
This is used to indicate that the request included a virtual list view control that specified an invalid offset (for example, one that was beyond the end of the result set).
64
Naming Violation
This is used to indicate that the operation attempted to create an entry with a DN that violated a naming constraint (for example, using an RDN attribute that is not allowed by the associated name form).
65
Object Class Violation
This is used to indicate that the operation attempted to create or modify an entry so that the set of attributes it contained were in violation of the associated object class definitions (for example, it included an attribute that was not allowed or was missing a required attribute).
66
Not Allowed On Nonleaf
This is used to indicate that the associated operation was not allowed on non-leaf entries (for example, an attempt to delete an entry that has one or more subordinate entries).
67
Not Allowed On RDN
This is used to indicate that the associated operation is not allowed on the RDN attribute for an entry.
68
Entry Already Exists
This is used to indicate that the add or modify DN operation would have resulted in an entry with a DN that already exists in the server.
69
Object Class Mods Prohibited
This is used to indicate that the requested operation attempted to alter the structural object class for the entry in a manner that was not allowed.
71
Affects Multiple DSAs
This is used to indicate that the requested operation would have impacted multiple servers (for example, a modify DN operation would have moved an entry from one server to another through a chained back end).
76
Virtual List View Error
This is used to indicate that the associated search operation could not be completed successfully because a problem occurred while processing the virtual list view request.
80
Other
This indicates that the operation failed for some reason that is not more appropriately classified by any other defined result code.
81
Server Down
This is a client-side result code that is used to indicate that the client detected that an established connection was no longer available.
82
Local Error
This is a client-side result code that is used to indicate that some client-side problem occurred that prevented it from completing the associated processing successfully.
83
Encoding Error
This is a client-side result code that is used to indicate that an error occurred while attempting to encode the request to send to the server.
84
Decoding Error
This is a client-side result code that is used to indicate that an error occurred while attempting to decode the response received from the server.
85
Timeout
This is a client-side result code that is used to indicate that the client did not receive a response in an acceptable length of time.
86
Authentication Type Unknown
This is a client-side result code that is used to indicate that the client does not support the requested authentication method.
87
Filter Error
This is a client-side result code that is used to indicate that a provided filter string could not be parsed as a valid filter.
88
User Canceled
This is a client-side result code that is used to indicate that the client canceled the request.
89
Parameter Error
This is a client-side result code that is used to indicate that there was a problem with a parameter provided for a request element.
90
No Memory
This is a client-side result code that is used to indicate that the client ran out of memory while attempting to process the requested operation (for example, while queueing the search result entries).
91
Connect Error
This is a client-side result code that is used to indicate that the client could not establish a connection to the target server.
92
Not Supported
This is a client-side result code that is used to indicate that the requested operation is not supported by the client.
93
Control Not Found
This is a client-side result code that is used to indicate that a response did not include an expected control.
94
No Results Returned
This is a client-side result code that is used to indicate that the server did not return any results for a search request when at least one was expected.
95
More Results to Return
This is a client-side result code that is used to indicate that there are more results to return than those that have already been retrieved.
96
Client Loop
This is a client-side result code that is used to indicate that the client detected a referral loop.
97
Referral Limit Exceeded
This is a client-side result code that is used to indicate that the client received too many referrals in the course of processing a request.
100
Invalid Response
This is a client-side result code that is used to indicate that the result received for the associated operation is invalid.
101
Ambiguous Response
This is a client-side result code that is used to indicate that the result received from the server was ambiguous (for example, there was more than one response received fro the associated operation).
112
TLS Not Supported
This is used to indicate that the server does not support the StartTLS extended operation.
113
Intermediate Response
This result code is used for intermediate response messages sent by the server in the course of processing the request.
114
Unknown Type
This is used to indicate that the server received a request with an invalid or unknown protocol op type.
118
Canceled
This is used to indicate that the server canceled processing on the request at the request of the client.
119
No Such Operation
This is used to indicate that the client attempted to cancel a request that was unknown to the server (for example, because it had already completed processing).
120
Too Late
This is used to indicate that the client attempted to cancel a request that had already been processed beyond a point at which it could no longer be canceled.
121
Cannot Cancel
This is used to indicate that the client attempted to cancel an operation that could not be canceled (for example, a bind, unbind, abandon, cancel, or StartTLS request).
122
Assertion Failed
This is used to indicate that the associated operation was not processed because the request included an LDAP assertion control with an assertion filter that did not match the target entry.
123
Authorization Denied
This is used to indicate that the associated operation was not processed because the request included a proxied authorization control but the client was not allowed to use that control.

root DN

A root DN (or root user) is a type of account that exists in the Directory Server which is generally given full access to all data in the server, much like the root user in UNIX systems. Root users by default will be allowed to bypass access control evaluation, will have full access to the server configuration, and perform most other types of operations.

The directory server is different from most other servers with regard to root users in two key ways:

For more information on root users and the privilege subsystem, see the Chapter 6, Directory Server Root Users and the Privilege Subsystem, in Oracle Fusion Middleware Architecture Reference for Oracle Unified Directory document.

root DSE

The root DSE is a special entry that provides information about the contents and capabilities of the server. The distinguished name is a zero-length string with no RDN components, also called the null DN.

The attribute contained in the root DSE include:

namingContexts

Lists the naming context for the server

supportedAuthPasswordSchemes

Lists the OID of the supported password storage schemes using the authentication password syntax

supportedControl

Lists the OIDs of the supported controls in the server

supportedExtension

Lists the OIDs of the supported extended operations in the server

supportedFeatures

Lists the OIDs of the supported features in the server

supportedSASLMechanisms

Lists the OIDs of the supported SASL mechanisms in the server

vendorName

Provides the name of the vendor for the server

vendorVersion

Provides a product version string

The following example demonstrates how to use the ldapsearch command to read the root DSE. In this example the file /tmp/pwd.txt contains the Directory Manager password. The server is listening for LDAP requests on port 1389.

$ ldapsearch -D "cn=Directory Manager" -j /tmp/pwd.txt -p 1389 -b "" \
  -s base "(objectclass=*)" +
dn:
supportedLDAPVersion: 2
supportedLDAPVersion: 3
supportedExtension: 1.3.6.1.4.1.4203.1.11.3
supportedExtension: 1.3.6.1.4.1.4203.1.11.1
supportedExtension: 1.3.6.1.4.1.26027.1.6.1
supportedExtension: 1.3.6.1.4.1.26027.1.6.3
supportedExtension: 1.3.6.1.4.1.26027.1.6.2
supportedExtension: 1.3.6.1.1.8
supportedExtension: 1.3.6.1.4.1.1466.20037
vendorName: Oracle Corporation
entryDN:
ds-private-naming-contexts: cn=admin data
ds-private-naming-contexts: cn=ads-truststore
ds-private-naming-contexts: cn=backups
ds-private-naming-contexts: cn=config
ds-private-naming-contexts: cn=monitor
ds-private-naming-contexts: cn=schema
ds-private-naming-contexts: cn=tasks
supportedControl: 1.2.826.0.1.3344810.2.3
supportedControl: 1.2.840.113556.1.4.319
supportedControl: 1.2.840.113556.1.4.473
supportedControl: 1.2.840.113556.1.4.805
supportedControl: 1.3.6.1.1.12
supportedControl: 1.3.6.1.1.13.1
supportedControl: 1.3.6.1.1.13.2
supportedControl: 1.3.6.1.4.1.26027.1.5.2
supportedControl: 1.3.6.1.4.1.42.2.27.8.5.1
supportedControl: 1.3.6.1.4.1.42.2.27.9.5.2
supportedControl: 1.3.6.1.4.1.42.2.27.9.5.8
supportedControl: 1.3.6.1.4.1.4203.1.10.2
supportedControl: 1.3.6.1.4.1.7628.5.101.1
supportedControl: 2.16.840.1.113730.3.4.12
supportedControl: 2.16.840.1.113730.3.4.16
supportedControl: 2.16.840.1.113730.3.4.17
supportedControl: 2.16.840.1.113730.3.4.18
supportedControl: 2.16.840.1.113730.3.4.19
supportedControl: 2.16.840.1.113730.3.4.2
supportedControl: 2.16.840.1.113730.3.4.3
supportedControl: 2.16.840.1.113730.3.4.9
supportedSASLMechanisms: PLAIN
supportedSASLMechanisms: EXTERNAL
supportedSASLMechanisms: CRAM-MD5
supportedSASLMechanisms: DIGEST-MD5
supportedFeatures: 1.3.6.1.1.14
supportedFeatures: 1.3.6.1.4.1.4203.1.5.1
supportedFeatures: 1.3.6.1.4.1.4203.1.5.2
supportedFeatures: 1.3.6.1.4.1.4203.1.5.3
subschemaSubentry: cn=schema
hasSubordinates: true
entryUUID: d41d8cd9-8f00-3204-a980-0998ecf8427e
numSubordinates: 1
namingContexts: dc=example,dc=com
vendorVersion: Oracle Unified Directory 11.1.1.5.0
supportedAuthPasswordSchemes: MD5
supportedAuthPasswordSchemes: SHA1
supportedAuthPasswordSchemes: SHA256
supportedAuthPasswordSchemes: SHA384
supportedAuthPasswordSchemes: SHA512

For more information on how to search the root DSE entry, see Using Advanced Search Features in Oracle Fusion Middleware Administration Guide for Oracle Unified Directory.

route

In proxy mode, the path on which requests are sent to the remote LDAP server when using a load balancing algorithm.