Previous     Contents     DocHome    
iPlanet Directory Server 5.1 Deployment Guide


 SymbolsABCDEFGHIJKLMNOPQRSTUVWXYZ 
Index



A

access
anonymous   1
determining general types of   1
precedence rule   1
access control
password protection and   1
access control information (ACI)   1
bind rules   1, 2, 3
filtered rules   1
format   1, 2
permission   1
target   1, 2
usage advice   1
where to place   1
access rights
granting   1
account inactivation   1
account lockout   1
ACI instruction
password protection and   1
ACI. See access control information 1
allow permissions   1
anonymous access   1
for read   1
overview   1
applications   1
approximate index   1
attribute
defining in schema   1
operational   1
required and allowed   1
values   1
attribute-data pair   1, 2
audits, for security   1
authentication methods   1
anonymous access   1
certificate-based   1
proxy authorization   1
simple password   1
over TLS   1

B

bind rules   1, 2, 3
branch point
DN attributes   1, 2
for international trees   1
for replication and referrals   1
network names   1
browsing index   1

C

c attribute   1
cascading replication   1
certificate-based authentication   1
chaining   1, 2
compared to referrals   1
database links   1
change log   1
checking password syntax   1
class of service (CoS)   1
classic CoS   1
indirect CoS   1
pointer CoS   1
classic CoS   1
clients
bind algorithm   1
cn attribute   1, 2, 3
commonName attribute   1, 2, 3, 4
consumer server   1, 2
role   1
CoS. See class of service. 1
country attribute   1, 2
custom schema files   1

D

data access   1
data management
replication example   1
data master   1
for replication   1
data ownership   1
data privacy   1
database   1
chaining   1
LDBM   1
multiple   1
database link   1
default permissions   1
default referrals   1
deleting schema   1
deleting schema elements   1
deny permissions   1
directory applications   1
browsers   1
email   1
directory data
access   1
examples of   1
mastering   1
ownership   1
planning   1
representation   1
directory design
overview   1, 2
directory service   1, 2
global   1
iPlanet solution   1
LDAP   1
directory tree
access control considerations   1
branch point
DN attributes   1, 2
for international trees   1
for replication and referrals   1
network names   1
branching   1
creating structure   1
default   1
design
choosing a suffix   1
creating structure   1
naming entries   1
examples
international enterprise   1
ISP   1
replication considerations   1
distinguished name
name collision   1
DIT. See directory tree 1
DNS   1
dynamic groups   1

E

email applications   1
encryption
password   1
Salted SHA   1
SHA   1
enterprise deployment example   1
entries   1
naming   1
non-person   1
organization   1
person   1
entry distribution   1
multiple databases   1
suffixes   1
equality index   1
example
deployment
extranet   1
examples
deployment
enterprise   1
multinational enterprise   1
replication
large sites   1
load balancing server traffic   1
local data management   1
small sites   1
expiration of passwords
overview   1
warning message   1
extending the schema   1

F

filtered access control rules   1
filtered roles   1

G

global directory services   1
group attribute   1
groups
dynamic   1
static   1

H

high availability   1, 2
hub supplier   1, 2, 3
role   1

I

illegal strings, passwords   1
index
approximate   1
browsing   1
equality   1
international   1
presence   1
substring   1
indirect CoS   1
inetOrgPerson attribute   1
international index   1
iPlanet Directory Server   1
architecture   1, 2
database   1

K

knowledge references   1
chaining   1
referrals   1

L

LDAP, See Lightweight Directory Access Protocol 1
LDAP referrals   1
LDAPv3 schema   1
LDBM database   1
length, password   1
Lightweight Directory Access Protocol (LDAP)   1
directory services   1
load balancing
the network   1

M

mail attribute   1
managed roles   1
master server   1
role   1
minimum length of passwords   1
multi-master replication   1
multinational enterprise deployment   1
multiple databases   1

N

name collision   1
naming entries   1
organization   1
people   1
nested roles   1
network names, branching to reflect   1
network, load balancing   1

O

object class
defining in schema   1
standard   1
object identifier. See OID. 1
OID
getting and assigning   1
organization attribute   1
organizationalPerson object class   1
organizationalUnit attribute   1

P

password
simple
over TLS   1
password policies
attributes   1
change after reset   1
design   1
expiration warning   1
overview   1
password expiration   1
password history   1
password length   1
password storage scheme   1
overview   1
replication of   1
syntax checking   1
user defined passwords   1
password storage scheme
configuring   1
passwords
changing after reset   1
encryption of   1
expiration   1
expiration warning   1
history   1
illegal strings   1
minimum length   1
reusing   1
simple   1
syntax checking   1
user defined   1
performance
replication   1
permissions   1
allow   1
bind rules   1, 2, 3
default   1
deny   1
on ACIs   1
precedence rule   1
person entries   1
pointer CoS   1
precedence rule   1
presence index   1
proxy authentication   1
proxy authorization   1
proxy DN   1

R

read-only replica   1
read-write replica   1
referrals   1, 2
branching to support   1
compared to chaining   1
default   1
LDAP   1
smart referrals   1
replica
read-only   1
read-write   1
replication   1, 2
access control   1
branching to support   1
cascading   1
change log   1
consumer server   1, 2
consumer-initiated   1
data consistency   1
data master   1
database links   1
examples
large sites   1
load balancing server traffic   1
local data management   1
small sites   1
high availability   1
hub server   1
hub supplier   1, 2
load balancing
the network   1
local availability   1
master server   1
overview   1
password policies   1
performance   1
replication manager   1
resource requirements   1
schema   1
server plug-ins   1
single-master   1
site survey   1
strategy   1
supplier bind DN   1
supplier server   1, 2
supplier-initiated   1
replication manager   1
reusing passwords   1
roles   1, 2
compared to groups   1
filtered   1
managed   1
nested   1
root suffix   1

S

Salted SHA encryption   1
schema   1, 2
adding new attributes   1
assigning OIDs   1
best practices   1
checking   1
consistency   1, 2
custom files   1
deleting elements   1
extending   1
iPlanet standard   1, 2
LDAPv3   1
naming attributes   1
naming elements   1
naming object classes   1
object class strategies   1
schema replication   1
secure sockets layer   1
security
conducting audits   1
security methods
overview   1
security policy   1
security threats   1
denial of service   1
unauthorized access   1
unauthorized tampering   1
server database   1
SHA encryption   1
simple password   1
single-master replication
defined   1
site survey   1
characterizing data   1
identifying applications   1
identifying data sources   1
network capabilities   1
smart referral   1
sn attribute   1
standard object classes   1
standard schema   1, 2
Start TLS   1
static groups   1
streetAddress attribute   1
sub suffix   1
substring index   1
suffix
naming conventions   1
root suffix   1
sub suffix   1
supplier bind DN   1
supplier server   1, 2
role   1
surname attribute   1
syntax
password   1

T

telephoneNumber attribute   1
topology
overview   1
trivial words   1

U

uid attribute   1, 2
user authentication   1
user defined passwords   1
userPassword attribute   1

V

virtual list view index   1

W

warning, password expiration   1

Previous     Contents     DocHome    
Copyright © 2001 Sun Microsystems, Inc. Some preexisting portions Copyright © 2001 Netscape Communications Corp. All rights reserved.

Last Updated October 29, 2001