Skip Headers
Oracle Internet Directory Administrator's Guide
10
g
(10.1.4.0.1)
Part Number B15991-01
Home
Book List
Contents
Index
Master Index
Contact Us
Previous
Next
View PDF
List of Figures
2-1 Oracle Internet Directory Overview
3-1 A Typical Oracle Internet Directory Node
3-2 Oracle Directory Server Instance Architecture
3-3 A Directory Information Tree
3-4 Attributes of the Entry for Anne Smith
3-5 Correct and Incorrect Naming Contexts
3-6 A Replicated Directory
3-7 A Partitioned Directory
3-8 Using Knowledge References to Point to Naming Contexts
3-9 Oracle Identity Management Infrastructure and Other Components
3-10 Placement of Resource Access and Resource Type Information in the DIT
7-1 Directory Entry Hierarchy Showing Multiple Configuration Set Entries
7-2 Alias Entries Example
7-3 Resulting Tree when Creating the My_file.ldif
7-4 A Client Locating a Directory Server by Using DNS
10-1 Example of a Directory Information Tree
11-1 Location of Schema Components in Entries of Type subSchemaSubentry
14-1 Sample Audit Log in DSE
14-2 Architecture of Oracle Internet Directory Server Manageability
16-1 Indirect Authentication
18-1 Structural Access Item: Added Object Filter Tab Page
18-2 Structural Access Item: By Whom Tab Page
18-3 Example: Structural Access Item: Access Rights Tab Page
18-4 Content Access Item: By Whom Tab Page
18-5 Content Access Item: Attribute Tab Page
18-6 Content Access Item: Access Rights Tab Page
18-7 Content Access Item: By Whom Tab Page
18-8 Content Access Item: Attribute Tab Page
18-9 Content Access Item: Access Rights Tab Page
18-10 Content Access Item: By Whom Tab Page
18-11 Content Access Item: Attribute Tab Page
18-12 Content Access Item: Access Rights Tab Page
18-13 Content Access Item: By Whom Tab Page
18-14 Content Access Item: Attribute Tab Page
18-15 Content Access Item: Access Rights Tab Page
19-1 Location of Password Policy Entries
19-2 pwdPolicysubentry Attributes Populated with DN of Password Policy
20-1 Location of the Password Verifier Profile Entry
20-2 Authentication Model
20-3 How Password Verification Works
21-1 Delegation Flow in an Oracle Application Server Environment
23-1 Planning the Directory Information Tree
23-2 Example of an Identity Management Realm
23-3 Enterprise Use Case: Single Identity Management Realm
23-4 Enterprise Use Case: Multiple Identity Management Realms
23-5 Hosted Deployment Use Case
23-6 Default Identity Management Realm
24-1 Usage Analysis of Current E-mail System
26-1 Example: Garbage Collection of Change Log Entries
26-2 Garbage Collection Entries in the DIT
27-1 Using an LDIF File and bulkload
27-2 Using dipassistant Directly
27-3 Using an LDIF File and dipassistant
27-4 Using dipassistant, bulkload, and LDIF Files
27-5 Using the Oracle Directory Integration Server
27-6 Structure of the Intermediate User File
29-1 Example of Partial Replication
29-2 Example of Single-Master Replication
29-3 Example of Multimaster Replication
29-4 Example of Fan-Out Replication
29-5 Example of Multimaster Replication with Fan-Out
29-6 Example: Multimaster Replication and Fan-Out Replication
29-7 Example: Replication Configuration Entries for Node C
29-8 Example: Replication Configuration Entries for Node D
29-9 Advanced Replication Process
29-10 LDAP Replication Process
29-11 Replication Failover Scenario
29-12 Old and New Suppliers in the Same Advanced Replication Group
29-13 Consumer and New Supplier Connected to Old Supplier by LDAP
29-14 Example of a Naming Context Container and Its Objects
29-15 A Sample Naming Context
29-16 Naming Context Object #1
29-17 Naming Context Object #2
29-18 Result of Combining Naming Context Objects #1 and #2
29-19 Naming Context Object #3
29-20 Naming Context Object #4
29-21 Result of Combining Naming Context Objects #3 and #4
29-22 Naming Context Object #5
29-23 Naming Context Object #6
29-24 Naming Context Object #7
30-1 Example of Fan-Out Replication
30-2 Failover Preserving Replica Type
30-3 Compare and Reconcile All Connected Replicas
32-1 Oracle Internet Directory Plug-in Framework