Sun ONE logo     Previous      Contents     
Sun ONE Directory Server 5.2 Deployment Guide


 SymbolsABCDEFGHIJKLMNOPQRSTUVWXYZ 
Index

A

access
anonymous   1, 2
determining general types of   1
precedence rule   1
access control
ACI attribute   1
password protection and   1
roles   1
access control information (ACI)   1
bind rules   1, 2, 3
filtered rules   1
format   1, 2
permission   1
target   1, 2
where to place   1
access rights
granting   1
account inactivation   1
account lockout   1
ACI attribute   1
ACI instruction
password protection and   1
ACI. See access control information 1
Administration Server
master agents and   1
agents
subagent   1
anonymous access   1, 2
for read   1
overview   1
applications   1
attribute
ACI   1
defining in schema   1
required and allowed   1
values   1
attribute-data pair   1
attributes
naming   1
audits, for security   1
authentication methods   1
anonymous access   1
proxy authorization   1
simple password   1

B

backup
binary   1
methods   1
planning   1
to ldif   1
bak2db   1
binary backup   1
binary restore   1
bind rules   1, 2, 3
branch point
DN attributes   1
for international trees   1
for replication and referrals   1
network names   1

C

c attribute   1
cascading replication   1
chained suffixes   1
chaining   1, 2
and referrals   1
roles limitation   1
change log   1
checking password syntax   1
class of service (CoS)
access control   1
cache   1
classic   1
filtered role limitation   1
indirect   1
limitations   1
pointer   1
template entry   1
classic CoS   1
clients
bind algorithm   1
cn attribute. See commonName attribute 1
commonName attribute   1, 2, 3
consumer replica   1
consumer server   1
role   1
CoS template entry   1
country attribute   1, 2
custom schema files   1

D

data
accessing   1, 2
backing up   1, 2
consistency   1
examples of   1
management   1
ownership   1
planning   1
privacy   1
restoring   1
data master   1
across multiple applications   1
for replication   1
database
chaining   1
LDBM   1
multiple   1
db2bak   1
db2ldif   1
default referrals   1
default schema
customizing   1
extending   1
mapping data to   1
viewing   1
deleting schema   1
design process   1
directory applications   1
browsers   1
directory data
accessing   1, 2
examples of   1
mastering   1
ownership   1
planning   1
directory design
overview   1, 2
directory server
piloting   1
directory tree
access control considerations   1
branch point
DN attributes   1
for international trees   1
for replication and referrals   1
network names   1
branching   1
creating structure   1
design
choosing a suffix   1
examples
international enterprise   1
ISP   1
replication considerations   1
disaster recovery   1
distinguished name
collisions   1
DIT. See directory tree 1
DN name collisions   1
DSML   1
DSRK tools, downloading   1
dynamic groups   1

E

encryption
password   1
Salted SHA   1
SHA   1
entries
naming   1
non-person   1
organization   1
person   1
entry distribution   1
multiple databases   1
suffixes   1
expiration of passwords
overview   1
warning message   1
extending the schema   1

F

failure   1
filtered access control rules   1

G

group attribute   1
groups
dynamic   1
static   1

H

high availability   1, 2
hub replica   1
hub supplier   1

I

indirect CoS   1
inetOrgPerson attribute   1
installation location   1

L

LDAP referrals   1
load balancing   1

M

mail attribute   1
managed devices   1
managed object   1
master agent   1
master replica   1
multi-master replication   1, 2
multiple databases   1

N

naming entries   1
organization   1
people   1
network management station (NMS)   1
network names, branching to reflect   1
network, load balancing   1

O

object classes
defining in schema   1
naming   1
standard   1
object identifiers. See OIDs 1
OID registry   1
OIDs
obtaining and assigning   1
organization attribute   1
organizationalPerson object class   1
organizationalUnit attribute   1

P

password policies   1
change after reset   1
design   1
expiration warning   1
password expiration   1
password history   1
password length   1
password storage scheme   1
replication of   1
syntax checking   1
password storage scheme
configuring   1
passwords
changing after reset   1
encryption of   1
expiration   1
expiration warning   1
history   1
minimum length   1
reusing   1
simple   1
syntax checking   1
PDUs   1
performance
replication and   1
permissions
allowing   1
bind rules   1, 2, 3
denying   1
on ACIs   1
precedence rule   1
person entries   1
pointer CoS   1
precedence rule   1
protocol data units. See PDUs 1
proxy authentication   1
proxy authorization   1
proxy DN   1

R

referrals   1, 2
and chaining   1
branching to support   1
default   1
LDAP   1
smart referrals   1
replicas   1
consumer   1
hub   1
master   1
replication   1, 2
access control   1
branching to support   1
cascading   1
change log   1
consumer server   1
consumer-initiated   1
data consistency   1
data master   1
database links   1
disaster recovery   1
high availability   1
hub server   1
load balancing   1
local availability   1
local data management and   1
maintaining schema consistency in   1
overview   1
password policies   1
performance   1
replication manager   1
resource requirements   1
schema   1
server plug-ins   1
single-master   1
site survey   1
strategy   1
supplier bind DN   1
supplier-initiated   1
replication examples
large sites   1
load balancing   1
small sites   1
replication manager   1
replication topologies   1, 2
five data centers   1
one data center   1
three data centers   1
two data centers   1
using retro changelog   1
restore
binary   1
restoring data   1
reusing passwords   1
roles   1, 2
access control   1
chaining limitation   1
compared to groups   1
CoS limitation   1
limitations   1
root suffix   1

S

Salted SHA encryption   1
schema
adding new attributes   1
assigning OIDs   1
checking   1
consistency   1, 2
custom files   1
customizing   1
deleting elements   1
designing   1
extending   1
mapping date to   1
matching data to   1
naming attributes   1
naming elements   1
naming object classes   1
object class strategies   1
standard   1
viewing default   1
schema replication   1
security
conducting audits   1
security methods   1
security policy   1
security threats   1
denial of service   1
unauthorized access   1
unauthorized tampering   1
serverRoot   1
SHA encryption   1
Simple Network Management Protocol. See SNMP 1
simple password   1
single-master replication   1
site survey   1
availability requirements   1
characterizing data   1
documenting   1
identifying access methods   1
identifying applications   1
identifying data sources   1
network capabilities   1
smart referrals   1
sn attribute   1
SNMP
agents   1
managed devices   1
managed objects   1
master agent   1
NMS-initiated communication   1
overview   1
subagent   1
standard object classes   1
standard schema   1
static groups   1
streetAddress attribute   1
sub suffix   1
subagents   1
suffix
naming conventions   1
root suffix   1
sub suffix   1
supplier bind DN   1
surname attribute   1
syntax
password   1

T

telephoneNumber attribute   1
template entry. See CoS template entry. 1
topology
overview   1

U

uid attribute   1, 2
user authentication   1
userPassword attribute   1

W

warning, password expiration   1

Previous      Contents     
Copyright 2003 Sun Microsystems, Inc. All rights reserved.