Oracle Internet Directory Application Developer's Guide
Release 3.0.1

Part Number A90152-01
Go To Documentation Library
Home
Go To Product List
Book List
Go To Table Of Contents
Contents

Master Index

Feedback

Go to previous page

Index

A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  R  S  T  U  W 


A

abandoning an operation, 3-43
access control, 2-6, 2-8
and authorization, 2-8
access control information (ACI), 2-9
attributes, 2-8
directives
format, 2-9
Access Control List (ACL), 2-8
access control lists (ACLs), 2-8
ACI. See access control information (ACI)
ACLs. See Access Control List (ACL)
add.log, 5-7
administration tools
ldapadd, 5-5
ldapaddmt, 5-7
ldapbind, 5-9
ldapcompare, 5-10
ldapdelete, 5-11
ldapmoddn, 5-13
ldapmodify, 5-15
ldapmodifymt, 5-20
anonymous authentication, 2-7
applications, building
with PL/SQL LDAP API, 4-13
with the C API, 3-64
attribute options
searching for by using ldapsearch, 5-25
attributes
adding
by using ldapadd, 5-5
concurrently, by using ldapaddmt, 5-7
to existing entries, 5-5
attribute options
searching for by using ldapsearch, 5-25
deleting
by using ldapmodify, 5-18
values, by using ldapmodify, 5-18
in LDIF files, 5-2
types, 2-5
values, 2-5
replacing, by using ldapmodify, 5-18
authentication, 2-6, 2-7
anonymous, 2-7
certificate-based, 2-7
Kerberos, 5-6, 5-8, 5-12
modes, SSL, 3-2
one-way SSL, 2-8
options, 2-7
password-based, 2-7
PKI, 2-9
SSL, 2-7, 2-8, 3-2, 5-6, 5-8, 5-9, 5-16, 5-21
none, 3-2
one-way, 3-2
two-way, 3-2
strong, 2-7
to a directory server
enabling, 2-16
enabling, by using DBMS_LDAP, 2-17
enabling, by using the C API, 2-16
to the directory, 3-17
two-way SSL, 2-8
authorization, 2-6, 2-8
authorization ID, 2-7

B

bulk tools, 1-2

C

C API, 3-1
functions
abandon, 3-43
abandon_ext, 3-43
add, 3-37
add_ext, 3-37
add_ext_s, 3-37
add_s, 3-37
compare, 3-27
compare_ext, 3-27
compare_ext_s, 3-27
compare_s, 3-27
count_entries, 3-52
count_references, 3-52
count_values, 3-56
count_values_len, 3-56
delete, 3-39
delete_ext, 3-39
delete_ext_s, 3-39
delete_s, 3-39
dn2ufn, 3-58
err2string, 3-47
explode_dn, 3-58
explode_rdn, 3-58
extended_operation, 3-41
extended_operation_s, 3-41
first_attribute, 3-54
first_entry, 3-52
first_message, 3-50
first_reference, 3-52
get_dn, 3-58
get_entry_controls, 3-60
get_option, 3-10
get_values, 3-56
get_values_len, 3-56
init, 3-9
init_ssl call, 3-3
modify, 3-30
modify_ext, 3-30
modify_ext_s, 3-30
modify_s, 3-30
msgfree, 3-44
msgid, 3-44
msgtype, 3-44
next_attribute, 3-54
next_entry, 3-52
next_message, 3-50
next_reference, 3-52
open, 3-9
parse_extended_result, 3-47
parse_reference, 3-61
parse_result, 3-47
parse_sasl_bind_result, 3-47
rename, 3-34
rename_s, 3-34
result, 3-44
sasl_bind, 3-17
sasl_bind_s, 3-17
search, 3-21
search_ext, 3-21
search_ext_s, 3-21
search_s, 3-21
search_st, 3-21
set_option, 3-10
simple_bind, 3-17
simple_bind_s, 3-17
unbind, 3-20
unbind_ext, 3-20
unbind_s, 3-20
value_free, 3-56
value_free_len, 3-56
reference, 3-4
sample search tool, 3-64
sample usage, 3-62
summary, 3-4
usage with SSL, 3-62
usage without SSL, 3-63
Catalog Management Tool
syntax, 5-27
catldap.sql, 4-13
certificate authority, 2-7
certificate-based authentication, 2-7
certificates, 2-7
change types, in ldapmodify input files, 5-17
changetype
add, 5-17
delete, 5-18
modify, 5-17
modrdn, 5-18
children of an entry, listing, 3-26
command line tools
ldapadd, 5-5
ldapaddmt, 5-7
ldapbind, 5-9
ldapcompare, 5-10
ldapdelete, 5-11
ldapmoddn, 5-13
ldapmodify, 5-15
ldapmodifymt, 5-20
ldapsearch, 5-22
syntax, 5-4
components
Oracle Internet Directory SDK, 1-2
controls, working with, 3-15

D

data
integrity, 2-7, 2-9
privacy, 2-7, 2-9
data-type summary, 4-19
DBMS_LDAP package, 2-11, 4-14
searching by using, 2-18
deleting values from attributes, 5-18
dependencies and limitations, 3-77, 4-14
C API, 3-77
PL/SQL API, 4-14
DES40 encryption, 2-9
directives, 2-9
directory information tree (DIT), 2-2
distinguished names, 2-2
components of, 2-3
format, 2-3
in LDIF files, 5-2
DNs. see distinguished names.
documentation, related, xiii

E

encryption
DES40, 2-9
levels available in Oracle Internet Directory, 2-9
options for passwords, 2-10
passwords, 2-10
default, 2-10
MD4, 2-10
MD5, 2-10
SHA, 2-10
UNIX crypt, 2-10
RC4_40, 2-9
entries
adding
by using ldapadd, 5-5
by using ldapaddmt, 5-7
concurrently, 5-7
deleting
by using ldapdelete, 5-11
by using ldapmodify, 5-18
distinguished names of, 2-2
locating by using distinguished names, 2-3
modifying
by using ldapmodify, 5-15
concurrently by using ldapmodifymt, 5-20
naming, 2-2
reading, 3-26
errors
handling and parsing results, 3-47
examples of ldapsearch filters, 5-24
exception summary, 4-17

F

filters, 2-23
IETF-compliant, 5-22
ldapsearch, 5-24
formats, of distinguished names, 2-3

G

group entries, creating by using ldapmodify, 5-17

H

header files and libraries, required, 3-64
history of LDAP, 2-2

I

integrity, data, 2-9
interface calls, SSL, 3-3

J

Java, 1-2
JNDI, 1-2
jpeg images, adding with ldapadd, 5-7

K

Kerberos authentication, 5-6, 5-8, 5-12

L

LDAP
data interchange format (LDIF), 5-2
syntax, 5-2
functional model, 2-6
history, 2-2
information model, 2-4
messages, obtaining results and peeking inside, 3-44
naming model, 2-2
operations, performing, 3-21
search filters, IETF-compliant, 5-22
security model, 2-6
session handle options, 3-10
in the C API, 2-16
sessions
initializing, 2-14, 3-9
version 2 C API, 3-2
ldapadd, 5-5
adding entries, 5-5
adding jpeg images, 5-7
syntax, 5-5
ldapaddmt, 5-7
adding entries concurrently, 5-7
log, 5-7
syntax, 5-7
ldapbind, 5-9
syntax, 5-9
ldap-bind operation, 2-7
ldapcompare, 5-10
syntax, 5-10
ldapdelete, 5-11
deleting entries, 5-11
syntax, 5-11
ldapmoddn, 5-13
syntax, 5-13
ldapmodify, 5-15
adding values to multivalued attributes, 5-17
change types, 5-17
creating group entries, 5-17
deleting entries, 5-18
LDIF files in, 5-5, 5-7, 5-15, 5-20
replacing attribute values, 5-18
syntax, 5-15
ldapmodifymt, 5-20
by using, 5-20
multithreaded processing, 5-21
syntax, 5-20
ldapsearch, 3-64
filters, 5-24
syntax, 5-22
LDIF
by using, 5-2
files, in ldapmodify commands, 5-5, 5-7, 5-15, 5-20
formatting notes, 5-3
formatting rules, 5-3
syntax, 5-2

M

MD4, for password encryption, 2-10
MD5, for password encryption, 2-10
multiple threads, 5-21
in ldapaddmt, 5-7
increasing the number of, 5-7
multithreaded command line tools
ldapaddmt, 5-7
ldapmodifymt, 5-21
multivalued attributes, adding values to, 5-17

N

naming entries, 2-2

O

object classes
adding concurrently by using ldapaddmt, 5-7
in LDIF files, 5-2
objects, removing, 5-11, 5-15
one-way SSL authentication, 2-8, 3-2
OpenLDAP Community, xiv
operating systems supported by Oracle Internet Directory, 1-3
operational attributes
ACI, 2-8
Oracle Directory Manager, 1-2
listing attribute types, 5-3
Oracle directory replication server, 1-2
Oracle directory server, 1-2
Oracle extensions to support SSL, 3-2
Oracle Internet Directory, components, 1-2
Oracle SSL call interface, 3-2, 4-2
Oracle SSL extensions, 3-2
Oracle SSL-related libraries, 3-78
Oracle system libraries, 3-78
Oracle wallet, 3-3
Oracle Wallet Manager, 3-3
required for creating wallets, 3-77
Oracle wallet parameter
modifying, 5-6, 5-8, 5-9, 5-11, 5-13, 5-14, 5-16, 5-21, 5-23
Oracle wallets, changing location of, 5-6, 5-8, 5-9, 5-11, 5-13, 5-14, 5-16, 5-21, 5-23
overview of LDAP models, 2-2

P

password-based authentication, 2-7
passwords
encryption, 2-7, 2-10
default, 2-10
MD4, 2-10
MD5, 2-10
SHA, 2-10
UNIX crypt, 2-10
encryption options, 2-10
policies, 2-10
performance
increasing, by using multiple threads, 5-7
permissions, 2-6, 2-8
PKI authentication, 2-9
PL/SQL API, 4-1, 4-2
building applications with, 4-13
contains subset of C API, 2-11
datatype summary, 4-19
dependencies and limitations, 4-14
exception summary, 4-17
functions
add_s, 4-65
ber_free, 4-78
bind_s, 4-24
compare_s, 4-28
count_entries, 4-40
count_values, 4-68
count_values_len, 4-69
create_mod_array, 4-57
dbms_ldap.init, 4-21
delete_s, 4-52
err2string, 4-56
explode_dn, 4-72
first_attribute, 4-42
first_entry, 4-36
get_dn, 4-46
get_values, 4-48
get_values_len, 4-50
init, 4-20
modify_s, 4-63
modrdn2_s, 4-54
msgfree, 4-76
next_attribute, 4-44
next_entry, 4-38
open_ssl, 4-74, 4-76, 4-78
rename_s, 4-70
search_s, 4-30
search_st, 4-33
simple_bind_s, 4-22
unbind_s, 4-26
loading into database, 4-13
procedures
free_mod_array, 4-67
populate_mod_array (binary version), 4-61
populate_mod_array (string version), 4-59
reference, 4-14
sample, 4-2
subprograms, 4-20
summary, 4-14
using for a search, 4-10
using from a database trigger, 4-2
privacy, data, 2-7, 2-9
privileges, 2-6, 2-8
procedures, PL/SQL
free_mod_array, 4-67
populate_mod_array (binary version), 4-61
populate_mod_array (string version), 4-59
public key
infrastructure, 2-9

R

RC4_40 encryption, 2-9
RDNs. see relative distinguished names (RDNs)
related documentation, xiii
relative distinguished names (RDNs), 2-3
modifying by using ldapmodify, 5-18
results, stepping through a list of, 3-50
RFC 1823, 3-79
rules, LDIF, 5-3

S

sample C API usage, 3-62
sample PL/SQL usage, 4-2
sample search tool, building with C API, 3-64
SDK components, 1-2
search
filters
IETF-compliant, 5-22
ldapsearch, 5-24
results
parsing, 3-51
scope, 2-22
search-related operations, flow of, 2-19
security, within Oracle Internet Directory environment, 2-7
sessions
closing, 3-20
enabling termination by using DBMS_LDAP, 2-24
initializing
by using DBMS_LDAP, 2-15
by using the C API, 2-14
session-specific user identity, 2-7
SHA (Secure Hash Algorithm), for password encryption, 2-10
simple authentication, 2-7
Smith, Mark, xiii
SQL*Plus, 4-13
SSL
authentication modes, 3-2
default port, 2-8
enabling, 5-6, 5-8, 5-9, 5-16, 5-21
handshake, 3-3
interface calls, 3-3
modifying orclsslwalleturl parameter, 5-6, 5-8, 5-9, 5-11, 5-13, 5-14, 5-16, 5-21, 5-23
no authentication, 2-8
one-way authentication, 2-8
Oracle extensions, 3-2
provide encryption and decryption, 3-2
strong authentication, 2-9
two-way authentication, 2-8
wallets, 3-3
changing location of, 5-6, 5-8, 5-9, 5-11, 5-13, 5-14, 5-16, 5-21, 5-23
strong authentication, 2-7
syntax
Catalog Management Tool, 5-27
command line tools, 5-4
ldapadd, 5-5
ldapaddmt, 5-7
ldapbind, 5-9
ldapcompare, 5-10
ldapdelete, 5-11
ldapmoddn, 5-13
ldapmodify, 5-15
ldapmodifymt, 5-20
ldapsearch, 5-22
LDIF, 5-2

T

TCP/IP socket library, 3-77
two-way authentication, SSL, 3-2
types of attributes, 2-5

U

UNIX crypt, for password encryption, 2-10

W

wallets
changing location of, 5-6, 5-8, 5-9, 5-11, 5-13, 5-14, 5-16, 5-21, 5-23
SSL, 3-3
support, 3-3

Go to previous page
Oracle
Copyright © 1996-2001, Oracle Corporation.

All Rights Reserved.
Go To Documentation Library
Home
Go To Product List
Book List
Go To Table Of Contents
Contents

Master Index

Feedback