Sun Java logo     Previous      Contents

Sun logo
Sun Java(TM) System Directory Server 5 2004Q2 Deployment Planning Guide 

A - B - C - D - E - F - G - H - I - J - K - L - M - N - O - P - Q - R - S - T - U - V - W - X - Y - Z

Index

A

access

anonymous 1, 2

determining general types of 1

precedence rule 1

access control

ACI attribute 1

roles 1

access control information (ACI)

filtered rules 1

where to place 1

access control instruction (ACI) 1

access rights

granting 1

account inactivation 1

1

ACI attribute 1

1

Administration Server

master agents and 1

agents

subagent 1

anonymous access 1, 2

overview 1

attribute

ACI 1

required and allowed 1

attributes

defined 1

naming 1

syntax 1

audits

security 1

authentication methods 1

anonymous access 1

proxy authorization 1

simple password 1

B

backup

binary 1

methods 1

planning 1

to ldif 1

bak2db 1

binary backup 1

binary restore 1

bind rules 1

branch point

DN attributes 1

for international trees 1

for replication and referrals 1

network names 1

C

c attribute 1

c, RDN keyword 1

cascading replication 1

chained suffixes 1

chaining 1, 2

and referrals 1

roles limitation 1

change log 1

checking password syntax 1

class of service (CoS)

access control 1

cache 1

classic 1

filtered role limitation 1

indirect 1

limitations 1

pointer 1

template entry 1

classic CoS 1

clients

bind algorithm 1

cn, RDN keyword 1

commonName attribute 1, 2

consumer replica 1

consumer server 1

role 1

core files

sizing for 1

CoS template entry 1

country attribute 1, 2

custom schema files 1

D

data

backing up 1, 2

consistency 1

management 1

privacy 1

restoring 1

database

chaining 1

LDBM 1

multiple 1

db2bak 1

db2ldif 1

dc, RDN keyword 1

default referrals 1

Directory Server

attributes 1

common attributes in 1

DN and attribute syntax 1

directory tree

access control considerations 1

branch point

DN attributes 1

for international trees 1

for replication and referrals 1

network names 1

branching 1

creating structure 1

design

choosing a suffix 1

examples

international enterprise 1

ISP 1

replication considerations 1

distinguished name

collisions 1

1

DN

defined 1

syntax 1

DN name collisions 1

dynamic groups 1

E

entries

naming 1

non-person 1

organization 1

person 1

entry distribution 1

multiple databases 1

suffixes 1

expiration of passwords

overview 1

warning message 1

F

failure 1

filtered access control rules 1

G

givenName, Directory Server attribute 1

group attribute 1

groups

dynamic 1

static 1

H

high availability 1, 2

hub replica 1

hub supplier 1

I

indirect CoS 1

inetOrgPerson attribute 1

L

l, RDN keyword 1

LDAP referrals 1

load balancing 1

M

mail attribute 1

mail, Directory Server attribute 1

managed devices 1

managed object 1

master agent 1

master replica 1

multi-master replication 1, 2

multiple databases 1

N

naming entries 1

organization 1

people 1

network management station (NMS) 1

network names, branching to reflect 1

network, load balancing 1

nsslapd-cachememsize 1

nsslapd-dbcachesize 1

nsslapd-db-home-directory 1

nsslapd-directory 1

nsslapd-errorlog 1

nsslapd-import-cachesize 1

nsslapd-maxconnections 1

nsslapd-threadnumber 1

O

o, RDN keyword 1

object classes

defining in schema 1

naming 1

standard 1

1

OID registry 1

OIDs

obtaining and assigning 1

organization attribute 1

organizationalPerson object class 1

organizationalUnit attribute 1

ou, RDN keyword 1

P

password policies

account lockout 1

and replication 1

design 1

expiration warning 1

password expiration 1

password length 1, 2

syntax checking 1, 2

passwords

expiration 1

expiration warning 1

minimum length 1

simple 1

syntax checking 1

PDUs 1

performance

replication and 1

permissions

allowing 1

bind rules 1

denying 1

on ACIs 1

precedence rule 1

person entries 1

pointer CoS 1

precedence rule 1

1

proxy authentication 1

proxy authorization 1

proxy DN 1

R

RDN

defined 1

keywords 1

referrals 1, 2

and chaining 1

branching to support 1

default 1

LDAP 1

smart referrals 1

1

replicas 1

consumer 1

hub 1

master 1

replication 1

access control 1

branching to support 1

cascading 1

change log 1

consumer server 1

consumer-initiated 1

data consistency 1

database links 1

high availability 1

hub server 1

load balancing 1

local availability 1

local data management and 1

overview 1

performance 1

replication manager 1

resource requirements 1

schema 1

server plug-ins 1

single-master 1

site survey 1

strategy 1

supplier bind DN 1

supplier-initiated 1

replication examples

large sites 1

load balancing 1

small sites 1

replication manager 1

replication topologies 1, 2

five data centers 1

one data center 1

three data centers 1

two data centers 1

using retro changelog 1

restore

binary 1

restoring data 1

roles 1, 2

access control 1

chaining limitation 1

compared to groups 1

CoS limitation 1

limitations 1

root suffix 1

S

schema

assigning OIDs 1

checking 1

custom files 1

designing 1

naming attributes 1

naming object classes 1

standard 1

schema replication 1

schema_push.pl 1

security

audits 1

security audits 1

security methods 1

security threats 1

denial of service 1

unauthorized access 1

unauthorized tampering 1

1

simple password 1

single-master replication 1

site survey

network capabilities 1

sizing

backups 1

core files 1

database files 1

disk subsystems 1, 2

insufficient RAM 1

iostat 1

LDIF files 1

logs 1, 2, 3

minimum requirements 1, 2

multiprocessor systems 1

network capacity 1

RAID 1, 2

RAM 1, 2

SSL 1

smart referrals 1

sn, RDN keyword 1

SNMP

agents 1

managed devices 1

managed objects 1

master agent 1

NMS-initiated communication 1

overview 1

subagent 1

st, RDN keyword 1

standard object classes 1

standard schema 1

static groups 1

streetAddress, Directory Server attribute 1

sub suffix 1

subagents 1

suffix

naming conventions 1

root suffix 1

sub suffix 1

supplier bind DN 1

syntax

password 1

T

telephoneNumber, Directory Server attribute 1

1

title, Directory Server attribute 1

topology

overview 1

total update 1

U

uid attribute 1

uid, Directory Server attribute 1

user accounts

lockout policy after wrong passwords 1

user authentication 1

userPassword, Directory Server attribute 1

W

warning, password expiration 1




Previous      Contents


Copyright 2004 Sun Microsystems, Inc. All rights reserved.