Sun ONE Directory Server 5.2 Deployment Guide |
  | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z |   |
IndexA
- access
- anonymous 1, 2
- determining general types of 1
- precedence rule 1
- access control
- ACI attribute 1
- password protection and 1
- roles 1
- access control information (ACI) 1
- bind rules 1, 2, 3
- filtered rules 1
- format 1, 2
- permission 1
- target 1, 2
- where to place 1
- access rights
- granting 1
- account inactivation 1
- account lockout 1
- ACI attribute 1
- ACI instruction
- password protection and 1
- ACI. See access control information 1
- Administration Server
- master agents and 1
- agents
- subagent 1
- anonymous access 1, 2
- for read 1
- overview 1
- applications 1
- attribute
- ACI 1
- defining in schema 1
- required and allowed 1
- values 1
- attribute-data pair 1
- attributes
- naming 1
- audits, for security 1
- authentication methods 1
- anonymous access 1
- proxy authorization 1
- simple password 1
B
- backup
- binary 1
- methods 1
- planning 1
- to ldif 1
- bak2db 1
- binary backup 1
- binary restore 1
- bind rules 1, 2, 3
- branch point
- DN attributes 1
- for international trees 1
- for replication and referrals 1
- network names 1
C
- c attribute 1
- cascading replication 1
- chained suffixes 1
- chaining 1, 2
- and referrals 1
- roles limitation 1
- change log 1
- checking password syntax 1
- class of service (CoS)
- access control 1
- cache 1
- classic 1
- filtered role limitation 1
- indirect 1
- limitations 1
- pointer 1
- template entry 1
- classic CoS 1
- clients
- bind algorithm 1
- cn attribute. See commonName attribute 1
- commonName attribute 1, 2, 3
- consumer replica 1
- consumer server 1
- role 1
- CoS template entry 1
- country attribute 1, 2
- custom schema files 1
D
- data
- accessing 1, 2
- backing up 1, 2
- consistency 1
- examples of 1
- management 1
- ownership 1
- planning 1
- privacy 1
- restoring 1
- data master 1
- across multiple applications 1
- for replication 1
- database
- chaining 1
- LDBM 1
- multiple 1
- db2bak 1
- db2ldif 1
- default referrals 1
- default schema
- customizing 1
- extending 1
- mapping data to 1
- viewing 1
- deleting schema 1
- design process 1
- directory applications 1
- browsers 1
- directory data
- accessing 1, 2
- examples of 1
- mastering 1
- ownership 1
- planning 1
- directory design
- overview 1, 2
- directory server
- piloting 1
- directory tree
- access control considerations 1
- branch point
- DN attributes 1
- for international trees 1
- for replication and referrals 1
- network names 1
- branching 1
- creating structure 1
- design
- choosing a suffix 1
- examples
- international enterprise 1
- ISP 1
- replication considerations 1
- disaster recovery 1
- distinguished name
- collisions 1
- DIT. See directory tree 1
- DN name collisions 1
- DSML 1
- DSRK tools, downloading 1
- dynamic groups 1
E
- encryption
- password 1
- Salted SHA 1
- SHA 1
- entries
- naming 1
- non-person 1
- organization 1
- person 1
- entry distribution 1
- multiple databases 1
- suffixes 1
- expiration of passwords
- overview 1
- warning message 1
- extending the schema 1
F
- failure 1
- filtered access control rules 1
G
- group attribute 1
- groups
- dynamic 1
- static 1
H
- high availability 1, 2
- hub replica 1
- hub supplier 1
I
- indirect CoS 1
- inetOrgPerson attribute 1
- installation location 1
L
- LDAP referrals 1
- load balancing 1
M
- mail attribute 1
- managed devices 1
- managed object 1
- master agent 1
- master replica 1
- multi-master replication 1, 2
- multiple databases 1
N
- naming entries 1
- organization 1
- people 1
- network management station (NMS) 1
- network names, branching to reflect 1
- network, load balancing 1
O
- object classes
- defining in schema 1
- naming 1
- standard 1
- object identifiers. See OIDs 1
- OID registry 1
- OIDs
- obtaining and assigning 1
- organization attribute 1
- organizationalPerson object class 1
- organizationalUnit attribute 1
P
- password policies 1
- change after reset 1
- design 1
- expiration warning 1
- password expiration 1
- password history 1
- password length 1
- password storage scheme 1
- replication of 1
- syntax checking 1
- password storage scheme
- configuring 1
- passwords
- changing after reset 1
- encryption of 1
- expiration 1
- expiration warning 1
- history 1
- minimum length 1
- reusing 1
- simple 1
- syntax checking 1
- PDUs 1
- performance
- replication and 1
- permissions
- allowing 1
- bind rules 1, 2, 3
- denying 1
- on ACIs 1
- precedence rule 1
- person entries 1
- pointer CoS 1
- precedence rule 1
- protocol data units. See PDUs 1
- proxy authentication 1
- proxy authorization 1
- proxy DN 1
R
- referrals 1, 2
- and chaining 1
- branching to support 1
- default 1
- LDAP 1
- smart referrals 1
- replicas 1
- consumer 1
- hub 1
- master 1
- replication 1, 2
- access control 1
- branching to support 1
- cascading 1
- change log 1
- consumer server 1
- consumer-initiated 1
- data consistency 1
- data master 1
- database links 1
- disaster recovery 1
- high availability 1
- hub server 1
- load balancing 1
- local availability 1
- local data management and 1
- maintaining schema consistency in 1
- overview 1
- password policies 1
- performance 1
- replication manager 1
- resource requirements 1
- schema 1
- server plug-ins 1
- single-master 1
- site survey 1
- strategy 1
- supplier bind DN 1
- supplier-initiated 1
- replication examples
- large sites 1
- load balancing 1
- small sites 1
- replication manager 1
- replication topologies 1, 2
- five data centers 1
- one data center 1
- three data centers 1
- two data centers 1
- using retro changelog 1
- restore
- binary 1
- restoring data 1
- reusing passwords 1
- roles 1, 2
- access control 1
- chaining limitation 1
- compared to groups 1
- CoS limitation 1
- limitations 1
- root suffix 1
S
- Salted SHA encryption 1
- schema
- adding new attributes 1
- assigning OIDs 1
- checking 1
- consistency 1, 2
- custom files 1
- customizing 1
- deleting elements 1
- designing 1
- extending 1
- mapping date to 1
- matching data to 1
- naming attributes 1
- naming elements 1
- naming object classes 1
- object class strategies 1
- standard 1
- viewing default 1
- schema replication 1
- security
- conducting audits 1
- security methods 1
- security policy 1
- security threats 1
- denial of service 1
- unauthorized access 1
- unauthorized tampering 1
- serverRoot 1
- SHA encryption 1
- Simple Network Management Protocol. See SNMP 1
- simple password 1
- single-master replication 1
- site survey 1
- availability requirements 1
- characterizing data 1
- documenting 1
- identifying access methods 1
- identifying applications 1
- identifying data sources 1
- network capabilities 1
- smart referrals 1
- sn attribute 1
- SNMP
- agents 1
- managed devices 1
- managed objects 1
- master agent 1
- NMS-initiated communication 1
- overview 1
- subagent 1
- standard object classes 1
- standard schema 1
- static groups 1
- streetAddress attribute 1
- sub suffix 1
- subagents 1
- suffix
- naming conventions 1
- root suffix 1
- sub suffix 1
- supplier bind DN 1
- surname attribute 1
- syntax
- password 1
T
- telephoneNumber attribute 1
- template entry. See CoS template entry. 1
- topology
- overview 1
U
- uid attribute 1, 2
- user authentication 1
- userPassword attribute 1
W
- warning, password expiration 1