Sun Java System Directory Server Enterprise Edition 6.3 Deployment Planning Guide
|   |   |   |   | 
| A | 
|   | 
|   | access, anonymous (   ) | 
|   | 
|   | access control instruction (ACI) (   ) | 
|   | 
|   | account lockout, global (   ) | 
|   | 
|   | ACI., See access control instruction | 
|   | 
|   | administration | 
|   |   | model (   ) (   ) | 
|   |   | remote (   ) | 
|   | 
|   | administration model (   ) | 
|   | 
|   | application isolation (   ) | 
|   | 
|   | attribute encryption (   ) | 
|   | 
|   | authentication | 
|   |   | certificate-based (   ) | 
|   |   | preventing (   ) | 
|   |   | proxy (   ) | 
|   |   | SASL (   ) | 
|   |   | simple password (   ) | 
|   | 
|   | availability (   ) (   ) (   ) (   ) | 
|   |   | clustering and (   ) | 
|   |   | replication and (   ) | 
|   |   | sample topologies (   ) | 
|   |   |   |   | 
| B | 
|   | 
|   | backup | 
|   |   | binary (   ) | 
|   |   | methods (   ) | 
|   |   | policy (   ) | 
|   |   | to ldif (   ) | 
|   | 
|   | binary backup (   ) | 
|   | 
|   | branch point (   ) | 
|   | 
|   | business requirements (   ) | 
|   |   |   |   | 
| C | 
|   | 
|   | central log directories (   ) | 
|   | 
|   | certificate database, default path (   ) | 
|   | 
|   | change log (   ) | 
|   | 
|   | class of service (   ) | 
|   | 
|   | clustering | 
|   |   | monitoring (   ) | 
|   |   | vs redundancy (   ) | 
|   | 
|   | connection handlers (   ) | 
|   | 
|   | consumer (   ) | 
|   | 
|   | consumer replica (   ) | 
|   | 
|   | CoS, See class of service | 
|   |   |   |   | 
| D | 
|   | 
|   | data | 
|   |   | backing up (   ) (   ) | 
|   |   | consistency (   ) | 
|   |   | ownership (   ) | 
|   |   | sources (   ) | 
|   | 
|   | data administration, Directory Editor (   ) | 
|   | 
|   | db2bak (   ) | 
|   | 
|   | db2ldif (   ) | 
|   | 
|   | default locations (   ) | 
|   | 
|   | Directory Editor (   ) | 
|   | 
|   | directory information tree (   ) | 
|   | 
|   | Directory Server | 
|   |   | deployment considerations (   ) | 
|   |   | tuning tips (   ) | 
|   | 
|   | disaster recovery (   ) | 
|   | 
|   | distribution (   ) | 
|   | 
|   | DIT (   ) | 
|   | 
|   | dpadm (   ) | 
|   | 
|   | dpconf (   ) | 
|   | 
|   | dsadm (   ) | 
|   | 
|   | dsconf (   ) | 
|   |   |   |   | 
| E | 
|   | 
|   | effective rights (   ) | 
|   | 
|   | encryption, attributes (   ) | 
|   |   |   |   | 
| F | 
|   | 
|   | failure, single points of (   ) | 
|   | 
|   | firewalls (   ) | 
|   | 
|   | fractional replication (   ) | 
|   |   |   |   | 
| H | 
|   | 
|   | hardware redundancy (   ) | 
|   | 
|   | hardware sizing | 
|   |   | Directory Proxy Server (   ) | 
|   |   | Directory Server (   ) | 
|   |   | Directory Service Control Center (   ) | 
|   | 
|   | High Encryption Pack (   ) | 
|   | 
|   | hub replica (   ) | 
|   |   |   |   | 
| I | 
|   | 
|   | identity synchronization (   ) | 
|   | 
|   | idsktune (   ) | 
|   | 
|   | indexing (   ) | 
|   | 
|   | install-path (   ) | 
|   | 
|   | instance-path (   ) | 
|   | 
|   | interoperability (   ) | 
|   | 
|   | ISW (   ) | 
|   | 
|   | isw-hostname directory (   ) | 
|   |   |   |   | 
| J | 
|   | 
|   | Java Naming and Directory Interface (   ) | 
|   |   |   |   | 
| L | 
|   | 
|   | latent capacity (   ) | 
|   | 
|   | LDAP, deployment considerations (   ) | 
|   | 
|   | local log directory (   ) | 
|   | 
|   | log files | 
|   |   | access (   ) | 
|   |   | audit (   ) | 
|   |   | creation (   ) | 
|   |   | deletion (   ) | 
|   |   | error (   ) | 
|   |   | permissions (   ) | 
|   |   |   |   | 
| M | 
|   | 
|   | master replica (   ) | 
|   | 
|   | Message Queue (   ) | 
|   | 
|   | migration | 
|   |   | NIS+ to LDAP (   ) | 
|   |   | NIS to LDAP (   ) | 
|   | 
|   | monitoring (   ) | 
|   |   | areas (   ) | 
|   |   | tools (   ) | 
|   |   |   |   | 
| N | 
|   | 
|   | NIS+ to LDAP, migration (   ) | 
|   | 
|   | NIS to LDAP, migration (   ) | 
|   | 
|   | non-root (   ) | 
|   |   |   |   | 
| P | 
|   | 
|   | password policy | 
|   |   | design (   ) | 
|   |   | migration (   ) | 
|   |   | replication and (   ) | 
|   | 
|   | performance requirements (   ) | 
|   | 
|   | port numbers | 
|   |   | DSCC (   ) | 
|   |   | DSML (   ) | 
|   |   | Identity Synchronization for Windows (   ) | 
|   |   | LDAP and LDAPS (   ) | 
|   | 
|   | proxy authentication (   ) | 
|   | 
|   | proxy DN (   ) | 
|   |   |   |   | 
| R | 
|   | 
|   | recovery procedures (   ) | 
|   | 
|   | redundancy | 
|   |   | Directory Proxy Server and (   ) | 
|   |   | hardware (   ) (   ) | 
|   |   | replication and (   ) | 
|   |   | software (   ) | 
|   |   | vs clustering (   ) | 
|   | 
|   | referral (   ) | 
|   | 
|   | replicas (   ) | 
|   |   | consumer (   ) | 
|   |   | hub (   ) | 
|   |   | master (   ) | 
|   |   | promoting and demoting (   ) | 
|   | 
|   | replication | 
|   |   | compression (   ) | 
|   |   | fractional (   ) | 
|   |   | over WAN (   ) | 
|   |   | requirements (   ) | 
|   | 
|   | replication agreement (   ) | 
|   | 
|   | replication latency (   ) | 
|   | 
|   | restoration | 
|   |   | binary (   ) | 
|   |   | from LDIF (   ) | 
|   | 
|   | roles (   ) | 
|   |   | advantages (   ) | 
|   |   | permissions (   ) | 
|   |   |   |   | 
| S | 
|   | 
|   | scalability (   ) (   ) | 
|   | 
|   | schema, design (   ) | 
|   | 
|   | security (   ) (   ) (   ) | 
|   |   | methods (   ) | 
|   |   | threats (   ) | 
|   | 
|   | serverroot directory (   ) | 
|   | 
|   | serviceability (   ) | 
|   | 
|   | sizing, Directory Server (   ) | 
|   | 
|   | SLAMD Distributed Load Generation Engine (   ) (   ) | 
|   | 
|   | solution life cycle (   ) | 
|   | 
|   | SSL (   ) | 
|   |   | enabling (   ) | 
|   | 
|   | supplier (   ) | 
|   |   |   |   | 
| T | 
|   | 
|   | tuning | 
|   |   | file descriptors (   ) | 
|   |   | resource limits (   ) | 
|   |   | system resources (   ) | 
|   |   | TCP (   ) | 
|   |   |   |   | 
| V | 
|   | 
|   | virtual directory (   ) | 
|   | 
|   | virtualization (   ) | 
    - © 2010, Oracle Corporation and/or its affiliates