Sun Java logo     Previous      Contents

Sun logo
Sun Java(TM) System Directory Server 5 2004Q2 Technical Overview 

A - B - C - D - E - F - G - H - I - J - K - L - M - N - O - P - Q - R - S - T - U - V - W - X - Y - Z

Index

A

access control  1

administering and debugging  1

instruction  1

LDAP search filters  1

list  1

target  1

access control permission  1

account inactivation  1

ACI  1

macro  1

ACL  1

anonymous access  1

approximate index  1

attributes  1, 2

encryption of  1

multi-valued  1

operational  1

scalable management of  1

standard  1

authentication  1

anonymous access  1

certificate based client authentication  1

proxy authorization  1

SASL-Based Client Authentication  1

simple password  1

simple password over a secure connection  1

B

backing up data  1

bak2db  1, 2

base DN, ldapsearch and  1

binary restore  1

C

cascading replication  1

certificate-based client authentication  1

chaining  1

Class of Service  1

cn=config  1

conflict resolution  1

consumer  1

initialization  1

consumer replica  1

CoS  1

Crypto Accelerator 1000 Board  1

D

data

backing up and restoring  1, 2

distributing  1

exporting  1

importing  1

indexing  1

integrity of  1

restoring  1

database

adding dynamically  1

configuring independently  1

viewing independently  1

datastore

optimized for reads  1

db2bak  1

db2bak-task  1

db2ldif  1, 2

db2ldif-task  1

dedicated consumer  1

denial of service attacks  1

dictionary style attack to security  1

directory information tree  1

Directory Proxy Server  1

Directory Server Console  1

directory service  1

distributed naming context  1

distributing data  1

DIT  1

DNS  1

documentation  1

domain component  1

dse.ldif configuration file  1

DSML  1

front end  1

DSRK  1

E

e-business directory  1

effective rights

LDAP control  1

management of  1

requesting  1

encrypting attributes  1

enterprise directory  1

enterprise-wide directory service  1

entries  1

entrycmp replication monitoring tool  1

equality index  1

extensible schema  1

online  1

F

failover  1

fault tolerance  1

filtered role  1

four-way MMR  1

fractional replication  1

front ends  1

fully connected replication topology  1

G

Generic Security Services API  1

grouping mechanisms  1

groups  1

dynamic  1

static  1

GSSAPI  1

H

hierarchical naming model  1

high availability  1, 2

hub  1, 2

hub replica  1

I

incremental update  1

indexes  1, 2

approximate  1

browsing  1

equality  1

international  1

presence  1

substring  1

virtual list view  1

indexing data  1

insync replication monitoring tool  1

international index  1

J

JNDI  1

L

LDAP  1

front end  1

version 3  1

LDAP access router  1

LDAP SDK

for C  1

for Java  1

ldapsubentry  1

LDIF  1

ldif2db  1, 2, 3

ldif2db-task  1

ldif2ldap  1

load balancing  1, 2

local data management  1

localizing data  1

logging  1

M

Macro ACIs  1

managed role  1

master replica  1

MMR  1

MMR over WAN  1

monitoring  1

command-line tools  1

console  1

logs  1

replication discovery and monitoring tools  1, 2

entrycmp  1

insync  1

repldisc  1

multi-master replication  1

multiple database design  1, 2

N

nested role  1

NOS  1

O

o=NetscapeRoot  1

o=UserRoot  1

object class  1

online replica promotion and demotion  1

operational attributes  1

organizational unit  1

P

password

change  1

expiration  1

expiration warning  1

history  1

length  1

minimum age  1

resetting  1

storage scheme  1

syntax checking  1

user defined  1

password policy

global  1

multiple policies  1

overview  1

plug-ins  1

directory server extensibility  1

presence index  1

proxy authorization  1

R

read-only replica  1

read-write replica  1

repldisc replication monitoring tool  1

replica

consumer  1

hub replica  1

master  1

read-only  1

read-write  1

replica demotion  1

replica promotion  1

replication

cascading  1

concepts  1

data consistency  1

fractional  1

monitoring  1

multi-master  1

single master  1

replication agreement  1

disable  1, 2

enable  1, 2

replication examples

international sites  1

large sites  1

small sites  1

restore

binary  1

restoring data  1

roles  1

filtered  1

managed  1

nested  1

root suffix  1

S

SASL  1

SASL-based client authentication  1

schema  1

checking  1

format  1

search capabilities  1

secure connections  1

secure data storage  1

Secure Sockets Layer  1

security overview  1

shared network access  1

Simple Authentication and Security Layer  1

simple password authentication  1

simple password over a secure connection  1

single master replication  1

SNMP  1, 2

SSL  1, 2

over TLS  1

Start TLS  1

Start Transport Layer Security  1

substring index  1

subtree  1

Sun Cluster Agent Support  1, 2

Sun Crypto Accelerator 1000 Board  1

supplier  1

T

total update  1

U

user id  1

V

virtual list view index  1

vlv index  1

X

X-ORIGIN field  1




Previous      Contents


Copyright 2004 Sun Microsystems, Inc. All rights reserved.