Sun Java logo     Previous      Contents

Sun logo
Sun Java(TM) System Directory Server 5.2 2005Q1 Deployment Planning Guide 

A - B - C - D - E - F - G - H - I - J - K - L - M - N - O - P - Q - R - S - T - U - V - W - X - Y - Z

Index

A

access

anonymous  1, 2

determining general types of  1

precedence rule  1

access control

ACI attribute  1

roles  1

access control information (ACI)

filtered rules  1

where to place  1

access control instruction (ACI)  1

access rights

granting  1

account inactivation  1

1

ACI attribute  1

1

Administration Server

master agents and  1

agents

subagent  1

anonymous access  1, 2

overview  1

attribute

ACI  1

defining in schema  1

required and allowed  1

attributes

defined  1

naming  1

syntax  1

audits

security  1

authentication methods  1

anonymous access  1

proxy authorization  1

simple password  1

B

backup

binary  1

methods  1

planning  1

to ldif  1

bak2db  1

binary backup  1

binary restore  1

branch point

DN attributes  1

for replication and referrals  1

network names  1

C

c, RDN keyword  1

cascading replication  1

chained suffixes  1

chaining  1, 2

and referrals  1

roles limitation  1

change log  1

checking password syntax  1

class of service (CoS)

access control  1

cache  1

classic  1

filtered role limitation  1

indirect  1

limitations  1

pointer  1

template entry  1

classic CoS  1

clients

bind algorithm  1

cn, RDN keyword  1

commonName attribute  1, 2

configuration directory  1

consumer replica  1

consumer server  1

role  1

core files

sizing for  1

CoS template entry  1

country attribute  1

custom schema files  1

D

data

backing up  1, 2

consistency  1

management  1

privacy  1

restoring  1

database

chaining  1

LDBM  1

multiple  1

db2bak  1

db2ldif  1

dc, RDN keyword  1

default referrals  1

Directory Server

attributes  1

common attributes in  1

DN and attribute syntax  1

directory tree

access control considerations  1

branch point

DN attributes  1

for replication and referrals  1

network names  1

branching  1

creating structure  1

design

choosing a suffix  1

replication considerations  1

distinguished name

collisions  1

1

DN

defined  1

syntax  1

DN name collisions  1

documentation  1

dynamic groups  1

E

entries

naming  1

non-person  1

organization  1

person  1

entry distribution  1

multiple databases  1

suffixes  1

expiration of passwords

overview  1

warning message  1

F

failure  1

filtered access control rules  1

G

givenName, Directory Server attribute  1

group attribute  1

groups

dynamic  1

static  1

H

high availability  1, 2

hub replica  1

hub supplier  1

I

indirect CoS  1

inetOrgPerson attribute  1

L

l, RDN keyword  1

LDAP referrals  1

LDIF

LDAP Data Interchange Format  1

load balancing  1

M

mail attribute  1

mail, Directory Server attribute  1

managed devices  1

managed object  1

master agent  1

master replica  1

multi-master replication  1, 2

multiple databases  1

N

naming entries  1

organization  1

people  1

network management station (NMS)  1

network names, branching to reflect  1

network, load balancing  1

nsslapd-cachememsize  1

nsslapd-dbcachesize  1

nsslapd-db-home-directory  1

nsslapd-directory  1

nsslapd-errorlog  1

nsslapd-import-cachesize  1

nsslapd-maxconnections  1

nsslapd-threadnumber  1

O

o, RDN keyword  1

object classes

defining in schema  1

naming  1

standard  1

1

OID registry  1

OIDs

obtaining and assigning  1

organization attribute  1

organizationalPerson object class  1

organizationalUnit attribute  1

ou, RDN keyword  1

P

password policies

account lockout  1

and replication  1

design  1

expiration warning  1

password expiration  1

password length  1, 2

syntax checking  1, 2

passwords

expiration  1

expiration warning  1

minimum length  1

simple  1

syntax checking  1

PDUs  1

performance

replication and  1

permissions

allowing  1

denying  1

precedence rule  1

person entries  1

pointer CoS  1

precedence rule  1

1

proxy authentication  1

proxy authorization  1

proxy DN  1

R

RDN

defined  1

keywords  1

referrals  1, 2

and chaining  1

branching to support  1

default  1

LDAP  1

smart referrals  1

1

replicas  1

consumer  1

hub  1

master  1

replication  1

access control  1

branching to support  1

cascading  1

change log  1

consumer server  1

consumer-initiated  1

data consistency  1

database links  1

high availability  1

hub server  1

load balancing  1

local availability  1

local data management and  1

overview  1

performance  1

replication manager  1

resource requirements  1

schema  1

single-master  1

site survey  1

strategy  1

supplier bind DN  1

supplier-initiated  1

replication examples

large sites  1

load balancing  1

small sites  1

replication manager  1

replication topologies  1, 2

five data centers  1

one data center  1

three data centers  1

two data centers  1

using retro changelog  1

restore

binary  1

restoring data  1

roles  1, 2

access control  1

chaining limitation  1

compared to groups  1

CoS limitation  1

limitations  1

root suffix  1

S

schema

assigning OIDs  1

checking  1

custom files  1

designing  1

naming attributes  1

naming object classes  1

standard  1

schema replication  1

schema_push.pl  1

security

audits  1

security audits  1

security methods  1

security threats  1

denial of service  1

unauthorized access  1

unauthorized tampering  1

1

simple password  1

single-master replication  1

site survey

network capabilities  1

sizing

backups  1

core files  1

database files  1

disk subsystems  1, 2

insufficient RAM  1

iostat  1

LDIF files  1

logs  1, 2, 3

minimum requirements  1, 2

multiprocessor systems  1

network capacity  1

RAID  1, 2

RAM  1, 2

SSL  1

smart referrals  1

sn, RDN keyword  1

SNMP

agents  1

managed devices  1

managed objects  1

master agent  1

NMS-initiated communication  1

overview  1

subagent  1

st, RDN keyword  1

standard object classes  1

standard schema  1, 2

static groups  1

streetAddress, Directory Server attribute  1

sub suffix  1

subagents  1

suffix

naming conventions  1

root suffix  1

sub suffix  1

supplier bind DN  1

syntax

password  1

T

telephoneNumber, Directory Server attribute  1

1

title, Directory Server attribute  1

topology

overview  1

total update  1

U

uid attribute  1

uid, Directory Server attribute  1

user accounts

lockout policy after wrong passwords  1

user authentication  1

user directory  1

userPassword, Directory Server attribute  1

W

warning, password expiration  1




Previous      Contents


Copyright 2005 Sun Microsystems, Inc. All rights reserved.