Skip Headers
Oracle® Secure Enterprise Search Administrator's Guide
11g Release 2 (11.2.2)

Part Number E23427-01
Go to Documentation Home
Home
Go to Book List
Book List
Go to Table of Contents
Contents
Go to Feedback page
Contact Us

Go to previous page
Previous
PDF · Mobi · ePub

Index

A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  W  X 

Symbols

DR$EQ$DOC_PATH_IDX$I, 10.3.11

A

access URL, 3.1.2
ACLs
defined, 9.1.3.2
policies, 9.1.3.2, 9.1.3.2, 9.2.5
restrictions, 9.1.3.3, 9.1.3.3
Active Directory
activating the plug-in, 9.1.3.4.1
IDM systems, 5.7.1
Administration GUI, 1.3.1
administrative user
SEARCHSYS, 2.1, 9.1.4.1
AJP13 protocol, 5.7.1
from remote hosts, 9.1.1
alternate words, 2.2.2
Apache Axis
license, C.1
Apache log4j
license, C.1
APIs
Authorization Plug-in, 9.1.3.2
Web Services, 11.2
Administration Web Service, 11.2
Query Web Service, 11.2
application identity, 1.4.2, 3.7
Application Server Control Console
overview, 10.9
Applications Control, 3.7
attributes
attribute-based security, 3.3.2
mapping federated, 5.7.3.4
overview, 3.5
retrieving federated, 5.7.3.3
tuning the weights of, 4.2
authentication, 10.3.2
authorization, 10.3.2
ACLs, 9.2.3
query-time filtering, 9.2.5
self service, 9.2.6
authorization plug-in
Fusion, 8.1
WebCenter, 8.2
Authorization Plug-in API, 9.1.3.2

B

boundary control of Web crawling, 3.2
boundary rules, 2.2.3, 3.7.1
defined, 3.2.2
example using regular expression, 3.2.2.3
exclusion rules, 3.2.2.2
inclusion rules, 3.2.2.1
permanent redirect, 10.2.8
tuning, 10.2.3
with dynamic pages, 10.2.4
with file sources, 10.2.3.1
with Portal sources, 5.6.1.2
with symbolic links, 5.3.2.2
buffer cache, 10.3.11

C

character set detection, 3.2.8
Chinese, 1.5, 3.2.8, 3.2.8.2
cluster configuration, 10.3.8
crawler, 3.1
crawling multimedia files, 3.2.2.2
crawling process, 3.5
depth, 3.2.4, 10.2.5
document types
zip files restriction, 3.2.3
log file, 3.7.2, 10.2.11
crawler.dat configuration file, 3.7.2
enabling character set detection, 3.2.8
setting default document titles, 3.2.7, 3.2.7
maintenance crawls, 3.6.2
monitoring the crawling process, 3.7
overview, 3.1
URL status codes, B
crawler configuration, 2.2.3
crawling mode, 3.2.1

D

data files, 10.1
database initialization parameters, 10.3.9
debug mode, 10.4
DICOM, 3.4.3
dicom, 3.4.3
display URL, 3.1.2
document attributes, 3.5
document service, 9.2
document types
zip files restriction, 3.2.3
domain rules, 3.2.2
duplicate documents, 10.2.7
dupMarked, 11.2.4.3.1, 11.2.5.3.4, 11.2.5.3.6, 11.2.5.3.8
dupRemoved, 11.2.4.3.1, 11.2.5.3.4, 11.2.5.3.6, 11.2.5.3.8
hasDuplicate, 11.2.4.3.2
isDuplicate, 11.2.4.3.2
versus near duplicate documents, 10.2.7
dynamic pages, 10.2.4

E

easy connect naming method, 10.5
encryption key, 9.6
Enterprise Manager Applications Control, 3.7
error messages, D
ESSAPP, 3.7

F

faceted navigation, 4.3
failed schedules, 2.2.1, 10.2.1
failover support, 10.5
federated search, 1.5.2
characteristics, 5.7.4.2
example, 5.7.2
limitations, 5.7.4.3
setting up, 5.7
trusted entities, 5.7.1
federation trusted entities, 5.7.1
file sources
crawling file URLs, 5.3.2.3
multibyte environments, 5.3.2.1
tips, 5.3.2.2
URL boundary rules
with file sources, 10.2.3.1
with symbolic links, 5.3.2.2
Fusion Connector, 8.1
FUSION_APPS_SEARCH_APPID, 1.4.2, 3.7

G

gif, 3.4.3
Google Desktop for Enterprise
integrating with, 10.8

H

hit count
approximate count, 9.2.5
exact count, 9.2.5
exact count (adjusted for query-time filtering), 9.2.5
HTML forms, 9.1.2.1
HTTP authentication, 9.1.2.1, 9.1.4
HTTP protocol, 3.1.2, 5.3.2.3, 9.1.1
HTTP proxy server, 5.1
HTTP proxy servers, 10.2.2
HTTP status codes, 3.7.3, 10.2.8, 10.2.8, 10.2.8, 10.6, B
HTTPS protocol, 3.1.2, 5.7.1, 9.1.1, 9.5, 9.5.4

I

identity management systems, 2.2.3, 9.1.1, 9.1.3.1, 9.1.3.4, 9.1.4.1, 9.2.3
identity plug-in, 8.1.1
Fusion, 8.1
identity plug-ins, 2.2.3, 9.1.3.4
ACLs, 9.1.3.2
activating, 9.1.3.4
define, 9.1.1
re-registering, 9.1.3.5
restrictions, 9.1.3.6
user authentication, 9.1.3.1
image format
dicom, 3.4.3
gif, 3.4.3
tiff, 3.4.3
image formats
jpeg, 3.4.3
IMAP server, 9.2.6
mailing list sources, 5.5
index memory size, 10.3.5.2
index optimization, 10.3.4
indexing
stopwords, 3.6.1.3
indexing batch size, 10.3.5.1
indexing parameters, 10.3.5
initialization parameters, 10.3.9

J

Japanese, 1.5, 3.2.8, 3.2.8.2, 3.2.8.2, 7.3.1.3, 8.4.1, 8.5.1
JDBC, 8.4, 9.1.1
jpeg, 3.4.3

K

KEEP pool, 10.3.11
key, master encryption, 9.6
Korean, 1.5, 3.2.8.2, 5.3.2.1

L

list of values (LOV), 3.5.2
log files
crawler log file, 10.2.11

M

mailing list sources
tips, 5.5
master encryption key, 9.6
metadata, 3.5
multimedia files
crawling, 3.2.2.2
MW_HOME, Preface

N

navigation tools, 4.3

O

OAM
See Oracle Access Manager
OC4J server, 11.2.3
open_cursors parameter, 10.3.9
optimizing
index, 10.3.4
Oracle Access Manager, 9.4
Oracle Calendar sources
secure, 7.6
Oracle Content Database sources, 6.3
tips, 6.3.1
Oracle Content Services, 6.3.1
Oracle Enterprise Manager, 3.7
Oracle HTTP Server
channel with Oracle SES, 9.1.4.2
front-ending, 9.1.4.2, 9.3
SSL-protect, 5.7.1
with AJP13 port, 5.7.1
Oracle Internet Directory
identity plug-in, 9.1.4.1
restrictions, 9.1.3.6
IDM systems, 5.7.1
login attribute, 7.6.2
overview, 9.1.4.1
Oracle RAC
failover, 10.5
tuning, 10.3.7
Oracle Secure Enterprise Search
accessing Application Server Control Console, 10.9
Administration GUI, 1.3.1
components, 1.3
crawler, 1.3.2, 3.1
error messages, D
getting started, 2.1
global settings, 2.2.3
integration with Oracle Internet Directory, 9.1.4.1
overview, 1.1
security, 9.1
statistics, 2.2.1
third party licenses
Apache Axis, C.1
Apache log4j, C.1
tuning crawl performance, 10.2
what's new in 10.1.7, Preface
ORACLE_HOME, Preface
OracleAS Portal sources, 9.1.2.1
tips, 5.6.1.2
user privileges, 5.6.1.2
OracleAS Single Sign-On, 9.1.2.1, 9.1.4.2

P

parallel querying, 10.3.3
partitioning, 10.3.3
passwords
temporary, 9.1.2.1
path rules, 3.2.2
physical memory, 10.3.11
processes parameter, 10.3.9
proxy servers, 10.2.2

Q

query application, 9.2
customize results, 4.2
suggested content, 4.1
query configuration, 2.2.3
query-time authorization
comparison with ACLs, 9.1.3.2
configuration, 9.2.5

R

redo log, 10.2.10
relevancy boosting, 2.2.2, 10.3.6.1
limitations, 10.3.6.1
result filter, 6.3.4
ResultFilterPlugin class, 9.2.5
robots META tag, 3.2.5, 10.2.6
robots.txt file, 3.2.5, 10.2.6
robots.txt protocol, 3.2.5, 10.2.6
rollover_key, 9.6
rules
domain, 3.2.2
path, 3.2.2

S

schedules, 2.2.1
failed, 2.2.1
understanding, 10.2.1
search attributes
default, 3.5
search performance, 2.2.2
search results
narrowing, 4.3
search server configuration, 10.3.8
SEARCH_DATA tablespace, 10.1
SEARCH_INDEX tablespace, 10.1
SEARCH_TEMP tablespace, 10.1
searchctl rollover_key, 9.6
SEARCHSYS
administrative user, 2.1, 9.1.4.1
secure search, 1.5.1
identity plug-ins, 2.2.3
security filters, 9.1.3.1, 9.1.3.2, 10.3.2
self service authorization, 9.2.6
sessions parameter, 10.3.9
SOAP, 11.2, 11.2.2, 11.2.2.2
client applications using, 11.2.3.1
development environment, 11.2.4.2
message body, 11.2.3
messages, 11.2.9
source groups, 2.2.2
source hierarchy, 2.2.2
sources
synchronizing, 3.1
types
database, 8.4
e-mail, 1.2
EMC Documentum Content Server, 6.1
EMC Documentum eRoom, 7.1
federated, 5.7
file, 1.2
Lotus Notes, 7.2
mailing list, 1.2
Microsoft Exchange, 7.3
NTFS for UNIX, 7.5
NTFS for Windows, 7.4
Oracle Calendar, 7.6
Oracle Content Database, 6.3
Oracle Mail, 7.7
OracleAS Portal, 1.2
Siebel 7.8, 8.5
Siebel 8, 8.6
table, 1.2
Web, 1.2
spell checking, 2.2.3
SQL*Plus
connecting using, 9.1.1
SSL, 9.1.1, 9.5.1
certificates, 9.5.1
crawling Web site with SSL certificates, 9.5.3
importing certificates, 9.5.3
in Oracle SES, 9.5
JSSE, 9.5
keystore, 9.5.1
statistics, 2.2.1, 10.3.6
stoplist, 3.6.1.3
stopwords, 3.6.1.3
storage areas, 10.3.3.1
stuck threads, 10.3.8
suggested content, 4.1
example with Google OneBox, 4.1.3
security options, 4.1.2
suggested links, 2.2.2, 10.3.1

T

tablespaces, 10.1
temp files, 10.1
temporary passwords, 9.1.2.1
threads, stuck, 10.3.8
tiff, 3.4.3
time outs, 10.3.2
tips
using file sources, 5.3.2
using mailing list sources, 5.5
using Oracle Calendar sources, 7.6
using Oracle Content Database sources, 6.3.1
using OracleAS Portal sources, 5.6.1.2
using user-defined sources, 5.3.2.3
titles, changing, 3.2.7, 3.2.7
trusted entities, 5.7.1

U

undo tablespace, 10.3.10, 10.3.10
UNDO_RETENTION parameter, 10.3.10
updateCred command (WLST), 10.5
URL boundary rules, 2.2.3, 3.7.1
defined, 3.2.2
permanent redirect, 10.2.8
tuning, 10.2.3
with dynamic pages, 10.2.4
with Portal sources, 5.6.1.2
with symbolic links, 5.3.2.2
URL crawler status codes, B
URL looping, 10.2.9
URL queue, 3.1.1
user authentication, 9.1.3.1
user authorization, 9.1.3.2
user-defined sources, 1.2, 2.2.1
tips, 5.3.2.3

W

Web crawling
boundary control, 3.2
Web Services API, 11.1, 11.2
architecture, 11.2.3
concepts, 11.2.2
SOAP, 11.2.2.2
WSDL, 11.2.2.3
data types, 11.2.4
example, 11.2.7
installation, 11.2.1
operations, 11.2.5.1
query syntax, 11.2.6
URL, 11.2.1
WebLogic Server Administration Console, 10.9
WebLogic server configuration, 10.3.8
WSDL specification, 11.2.2.3

X

XML connector framework, 3.3
examples, A
Oracle E-Business Suite, 8.3
schemas, A
Siebel 8, 8.6