Previous Contents DocHome |
iPlanet Directory Server 5.1 Deployment Guide |
  | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z |   |
Index
access
anonymous 1 determining general types of 1 precedence rule 1 access control
password protection and 1 access control information (ACI) 1
bind rules 1, 2, 3 filtered rules 1 format 1, 2 permission 1 target 1, 2 usage advice 1 where to place 1 access rights
granting 1 account inactivation 1 account lockout 1 ACI instruction
password protection and 1 ACI. See access control information 1 allow permissions 1 anonymous access 1
for read 1 overview 1 applications 1 approximate index 1 attribute
defining in schema 1 operational 1 required and allowed 1 values 1 attribute-data pair 1, 2 audits, for security 1 authentication methods 1
anonymous access 1 certificate-based 1 proxy authorization 1 simple password 1
over TLS 1
bind rules 1, 2, 3 branch point
DN attributes 1, 2 for international trees 1 for replication and referrals 1 network names 1 browsing index 1
c attribute 1 cascading replication 1 certificate-based authentication 1 chaining 1, 2
compared to referrals 1 database links 1 change log 1 checking password syntax 1 class of service (CoS) 1
classic CoS 1 indirect CoS 1 pointer CoS 1 classic CoS 1 clients
bind algorithm 1 cn attribute 1, 2, 3 commonName attribute 1, 2, 3, 4 consumer server 1, 2
role 1 CoS. See class of service. 1 country attribute 1, 2 custom schema files 1
data access 1 data management
replication example 1 data master 1
for replication 1 data ownership 1 data privacy 1 database 1
chaining 1 LDBM 1 multiple 1 database link 1 default permissions 1 default referrals 1 deleting schema 1 deleting schema elements 1 deny permissions 1 directory applications 1
browsers 1 email 1 directory data
access 1 examples of 1 mastering 1 ownership 1 planning 1 representation 1 directory design
overview 1, 2 directory service 1, 2
global 1 iPlanet solution 1 LDAP 1 directory tree
access control considerations 1 branch point
DN attributes 1, 2 for international trees 1 for replication and referrals 1 network names 1 branching 1 creating structure 1 default 1 design
choosing a suffix 1 creating structure 1 naming entries 1 examples
international enterprise 1 ISP 1 replication considerations 1 distinguished name
name collision 1 DIT. See directory tree 1 DNS 1 dynamic groups 1
email applications 1 encryption
password 1 Salted SHA 1 SHA 1 enterprise deployment example 1 entries 1
naming 1 non-person 1 organization 1 person 1 entry distribution 1
multiple databases 1 suffixes 1 equality index 1 example
deployment
extranet 1 examples
deployment
enterprise 1 multinational enterprise 1 replication
large sites 1 load balancing server traffic 1 local data management 1 small sites 1 expiration of passwords
overview 1 warning message 1 extending the schema 1
filtered access control rules 1 filtered roles 1
global directory services 1 group attribute 1 groups
dynamic 1 static 1
high availability 1, 2 hub supplier 1, 2, 3
role 1
illegal strings, passwords 1 index
approximate 1 browsing 1 equality 1 international 1 presence 1 substring 1 indirect CoS 1 inetOrgPerson attribute 1 international index 1 iPlanet Directory Server 1
architecture 1, 2 database 1
knowledge references 1
chaining 1 referrals 1
LDAP, See Lightweight Directory Access Protocol 1 LDAP referrals 1 LDAPv3 schema 1 LDBM database 1 length, password 1 Lightweight Directory Access Protocol (LDAP) 1
directory services 1 load balancing
the network 1
mail attribute 1 managed roles 1 master server 1
role 1 minimum length of passwords 1 multi-master replication 1 multinational enterprise deployment 1 multiple databases 1
name collision 1 naming entries 1
organization 1 people 1 nested roles 1 network names, branching to reflect 1 network, load balancing 1
object class
defining in schema 1 standard 1 object identifier. See OID. 1 OID
getting and assigning 1 organization attribute 1 organizationalPerson object class 1 organizationalUnit attribute 1
password
simple
over TLS 1 password policies
attributes 1 change after reset 1 design 1 expiration warning 1 overview 1 password expiration 1 password history 1 password length 1 password storage scheme 1
overview 1 replication of 1 syntax checking 1 user defined passwords 1 password storage scheme
configuring 1 passwords
changing after reset 1 encryption of 1 expiration 1 expiration warning 1 history 1 illegal strings 1 minimum length 1 reusing 1 simple 1 syntax checking 1 user defined 1 performance
replication 1 permissions 1
allow 1 bind rules 1, 2, 3 default 1 deny 1 on ACIs 1 precedence rule 1 person entries 1 pointer CoS 1 precedence rule 1 presence index 1 proxy authentication 1 proxy authorization 1 proxy DN 1
read-only replica 1 read-write replica 1 referrals 1, 2
branching to support 1 compared to chaining 1 default 1 LDAP 1 smart referrals 1 replica
read-only 1 read-write 1 replication 1, 2
access control 1 branching to support 1 cascading 1 change log 1 consumer server 1, 2 consumer-initiated 1 data consistency 1 data master 1 database links 1 examples
large sites 1 load balancing server traffic 1 local data management 1 small sites 1 high availability 1 hub server 1 hub supplier 1, 2 load balancing
the network 1 local availability 1 master server 1 overview 1 password policies 1 performance 1 replication manager 1 resource requirements 1 schema 1 server plug-ins 1 single-master 1 site survey 1 strategy 1 supplier bind DN 1 supplier server 1, 2 supplier-initiated 1 replication manager 1 reusing passwords 1 roles 1, 2
compared to groups 1 filtered 1 managed 1 nested 1 root suffix 1
Salted SHA encryption 1 schema 1, 2
adding new attributes 1 assigning OIDs 1 best practices 1 checking 1 consistency 1, 2 custom files 1 deleting elements 1 extending 1 iPlanet standard 1, 2 LDAPv3 1 naming attributes 1 naming elements 1 naming object classes 1 object class strategies 1 schema replication 1 secure sockets layer 1 security
conducting audits 1 security methods
overview 1 security policy 1 security threats 1
denial of service 1 unauthorized access 1 unauthorized tampering 1 server database 1 SHA encryption 1 simple password 1 single-master replication
defined 1 site survey 1
characterizing data 1 identifying applications 1 identifying data sources 1 network capabilities 1 smart referral 1 sn attribute 1 standard object classes 1 standard schema 1, 2 Start TLS 1 static groups 1 streetAddress attribute 1 sub suffix 1 substring index 1 suffix
naming conventions 1 root suffix 1 sub suffix 1 supplier bind DN 1 supplier server 1, 2
role 1 surname attribute 1 syntax
password 1
telephoneNumber attribute 1 topology
overview 1 trivial words 1
uid attribute 1, 2 user authentication 1 user defined passwords 1 userPassword attribute 1
virtual list view index 1
warning, password expiration 1
Previous Contents DocHome
Copyright © 2002 Sun Microsystems, Inc. Some preexisting portions Copyright © 2001 Netscape Communications Corp. All rights reserved.
Last Updated February 26, 2002