Sun Directory Services 3.1 Administration Guide

Chapter 4 Configuring a Directory Server

This chapter explains how to configure a directory server using the Admin Console. It describes the following tasks:

This chapter also describes the default configuration for Sun Directory Services.

However, before you configure each directory server individually, you must define a global plan for your directory service. Chapter 3, Planning a Directory Service guides you through the decisions you need to make to set up an overall plan that covers your directory needs, naming service needs, and authentication and accounting needs.

Use the table below to find the section that describes the tasks that are not covered in this chapter.

Task 

Section 

Configuring the NIS service 

"Configuring the NIS Service"

Configuring the RADIUS service 

"Configuring the RADIUS Server"

Viewing and modifying the schema 

Chapter 8, Configuring the Directory Schema

Configuring replication 

Chapter 9, Implementing Replication

Configuring the web gateway 

"Configuring the Web Gateway"

Logging In for the First Time

If you have installed Sun Directory Services for the first time, you must specify a password for the administrator user. To do this, type the following command as root:

# /opt/SUNWconn/ldap/sbin/dsadmintool

You are prompted to provide a password. When you have done this, the Admin Console is displayed. You are logged in as user admin, with the password that you specified. You can change this name and password at any time from the Security section of the Admin Console. This procedure is explained in "Configuring Security".

All of the examples in this manual use the administrator name admin and the password secret.


Note -

When you log in to the Admin Console for the first time, you cannot start dsadmintool as a background process.


Displaying the Admin Console

Before you follow the instructions in this section to display the Admin Console, make sure that the Sun Directory Services administration daemon, dsadm, is running. If it is not, start it as explained in "Starting the Sun Directory Services".

This section explains three methods of displaying the Admin Console:

To Start the Admin Console Application

If you do not have a web server colocated with Sun Directory Services, you can also run the Admin Console locally as an application. To start it, type the following command as root:

 /opt/SUNWconn/ldap/sbin/dsadmintool &

The Admin Console is displayed, as shown in Figure 4-1.

Figure 4-1 Admin Console Main Window

Graphic

To Display the Admin Console Remotely through a Web Server

  1. Create a symbolic link from the documentation root directory for your web server to /opt/SUNWconn/html:

    prompt% cd docroot_dir
    prompt% ln -s /opt/SUNWconn/html sds

    where docroot_dir is the documentation root directory for your web server.

    Your web server must be running on the same machine as the dsservd daemon.

  2. If you are using the HotJava browser, change the default security level by editing the .hotjava/properties file in your home directory.

    Use any text editor to change the following line from:

    hotjava.default.security=medium

    to:

    hotjava.default.security=low

    If you have not used the HotJava browser before, you must create the .hotjava/properties file and add the line hotjava.default.security=low.

  3. Start the HotJava browser on any machine, and point it at the Admin Console:

    prompt% /usr/dt/bin/hotjava http://hostname/sds/dsadmin.html

    where hostname is the hostname of the machine running the Sun Directory Services and the web server.

  4. Log in to the Admin Console using the name and password of the administrator user.

    The Admin Console is displayed.

To Display the Admin Console Locally without a Web Server

  1. If you are using the HotJava browser , change the default security level by editing the .hotjava/properties file in your home directory. Use any text editor to change the following line from:

    hotjava.default.security=medium

    to:

    hotjava.default.security=low

    If you have not used the HotJava browser before, you must create the .hotjava/properties file and add the line hotjava.default.security=low.

  2. Start the HotJava browser with the following path to point it at the administration files:

    prompt% /usr/dt/bin/hotjava file:/opt/SUNWconn/html/dsadmin.html
  3. Log in to the Admin Console using the name and password of the administrator user.

    The Admin Console is displayed.

Minimal Configuration

When you install the Sun Directory Services, most configurable characteristics are given default settings that enable you to start and run a directory server. However, you must:

When you have specified this information your directory server has a default configuration.

Default LDAP Configuration

The LDAP directory service has the following characteristics:

Default RADIUS Configuration

The RADIUS service has the following characteristics:

Default Web Gateway Configuration

The web gateway has the following characteristics:

Default NIS Configuration

The NIS service is disabled.

Starting and Stopping Services

At any time, you can independently start or stop the following components of Sun Directory Services from the Admin Console.

The Admin Console also enables you to specify whether you want any of these components except LDAP to restart automatically when the server daemon, dsservd, is restarted.

  1. From the Admin Console main window, in the Status section, select the service that you want to start or stop.

  2. For each service, verify the status for Automatic Restart at boot time. Change it as necessary.

  3. Click Apply to save your changes.

Configuring Security

You can configure the security level you require for your directory server by setting the administrator's name and password, defining the encryption method for all passwords stored in the directory, and specifying the security mode for your server.

Specifying the Administrator Name and Password

You can change the name and password of the administrator user at any time.

  1. From the Admin Console main window, in the Security section, specify the name and password for the directory administrator.

    The administrator name and password are stored in the configuration file dsserv.conf, so that the administrator always has access to the directory. This is necessary so that the administrator can solve problems with access control, for example.

    By default, the administrator's password is encrypted using the default encryption method. If you want the password to be stored unencrypted, choose None from the Encryption method menu.

  2. Click Apply to save your changes.

Specifying the Encryption Method

The encryption method you specify is used to encrypt the userPassword attribute that you can store in directory entries. There are two encryption methods:

  1. From the Admin Console main window, in the Security section, select the Encryption method for passwords from the menu button.

    The possible choices are: None, sunds, crypt.

  2. Click Apply to save your changes.

Specifying the Security Mode

You can specify a security mode that guarantees that authentication takes place between the server and the client during the bind process, or that the entire communication between the server and the client is encrypted. You can also allow insecure binding. These options are not mutually exclusive. The security mode used for a particular connection is actually negotiated between the client and the server.

  1. From the Admin Console main window, in the Security section, specify the Security modes supported by the server.

    The options are:

    • Insecure

    • TLS: establishes a secure connection at any time during an LDAP session by calling the Start TLS extended operation

    • SSL on Specific Port: opens a secure connection on the specified port (by default, port 636)

    You can enable several options.

  2. Specify the following parameters:

    If you have selected TLS or SSL on Specific Port:

    • The SSL key package (usually the IP address of the host)

    • Whether you want the server to authenticate clients: set the SSL Client Verification flag to On

    If you have selected SSL on Specific Port:

    • A port number to use for SSL connections

  3. Click Apply to save your changes.


    Note -

    Due to legal restrictions in certain countries, SSL is not available worldwide.


Configuring LDAP Parameters

In the Admin Console, use the LDAP section under Services to configure the following properties of the LDAP server:

Configuring the Data Store

To configure a data store, you must specify the distinguished name of the naming context that identifies the data store, and the name of the directory where the database files reside. Optional configuration information includes:

"To Create a Data Store" gives step-by-step instructions for creating a new data store. "To Modify a Data Store or Naming Context" explains how to modify an existing data store.

To Rename the Default Data Store

In your initial configuration, you must specify the distinguished name of the naming context that identifies the data store on the server, and the directory where the data store files are held.

  1. In the Admin Console main window, highlight the default data store o=XYZ, c=US, in the Data Store section and choose Modify from the Selected menu.

    Alternatively, you can double-click on the default data store o=XYZ, c=US. The Modify Data Store window is displayed, as shown in Figure 4-2.

    Figure 4-2 Modify Data Store Window

    Graphic

  2. Modify the data store suffix to reflect the distinguished name of the naming context that the directory server will store.

    If you intend to initialize the NIS service, you must modify the suffix made up of dc elements so that this naming context can contain the NIS domain managed by the server.

    If you want the data store to hold more than one naming context, you can specify additional naming suffixes by clicking the More Suffixes button. If necessary, use the Set button to specify the distinguished name. "Using the DN Editor" explains how to enter a DN in the Admin Console.

  3. Specify the path name to the directory where the data store is to be held.

    For a default configuration, you do not need to specify any other information. For more information about creating a data store, see "Creating or Modifying a Data Store".

Creating or Modifying a Data Store

This section gives information on the options you can configure when creating or modifying a data store. It also guides you through the steps for performing these tasks.

Naming Contexts

A data store can be identified by up to four suffixes. A suffix corresponds to a naming context. The term naming context also applies to any subtree under a data store suffix. In the Admin Console, the Data Store section displays the naming contexts held in the data store. This list contains the data store suffixes plus any naming contexts created under the data store suffixes.

The distinguished name of a naming context corresponds to the base DN you specify when you perform a directory operation such as a search, or when you configure an LDAP client application.

You can specify a DN that conforms to the OSI tree structure (for example o=XYZ, c=US), or a DN that reflects your organization's DNS naming structure, through a sequence of domain components (for example dc=XYZ, dc=com).

A data store can contain a mixture of master and replica (slave) naming contexts, some or all of which can be replicated to other servers. For information on replication, refer to Chapter 9, Implementing Replication.


Note -

You can modify the DN of a data store only when the data store is empty.


Caching

As information is retrieved from the directory it is saved in the cache. When the cache is full, the oldest entry is discarded to make room for new information. Retrieving information from the cache is faster than retrieving entries from the database, but a large cache occupies more memory.

Default value for cache size is 5000 entries.

Congestion Thresholds

Congestion thresholds ensure that the directory does not become overloaded, by preventing new operations from starting when there are insufficient resources.

If your database reaches the congested limit, after deleting unnecessary entries, you must still regenerate the database to optimize the use of disk space. Refer to "Regenerating the Database".

Threshold values are given in Kbytes free on the disk holding the data store. The default location for the data store is /var/opt/SUNWconn/ldap/dbm.

To Create a Data Store

  1. In the Admin Console, choose Data Store from the Create menu.

    The Create Data Store window is displayed. It is similar to the Modify Data Store window shown in Figure 4-2.

  2. In the General Section, in the Data Store Suffix field, specify the distinguished name of the naming context stored in this data store.

    To specify more than one naming context, click the More Suffixes button.

  3. Specify the path name to the directory where this database is to be stored.

  4. Specify whether the data store is read-only or not.

    By default, it is not.

  5. Specify whether the last modification attributes should be recorded.

    When this option is enabled, the creator's DN, a creation timestamp, the modifier's DN, and a modification timestamp are added in the entry. This enables you to search the directory for entries created or modified since a particular date or time. This can be useful if you are synchronizing changes across data stores, or you are using partial replication.

  6. Specify the cache size limit, in entries and in bytes.

    See "Caching" for details.

  7. Specify congestion thresholds.

    See "Congestion Thresholds" for details.

  8. Optionally, you can specify which attributes to index in the database.

    See "To Create Indexes" for details.

  9. In the Naming Contexts section, specify the master and slave subtrees held in this data store.

    These are naming contexts that are subtrees or objects under the naming context used to name the data store. If you do not specify any naming contexts, the distinguished name of the data store itself is added to the list of master naming contexts automatically, but it is not displayed until you save the naming contexts information. See "Naming Contexts" for details.

    1. Choose Naming Context from the Create menu.

      The Add Naming Context window is displayed. Figure 4-3 shows the appearance of the window when Slave mode is selected.

      Figure 4-3 Add Naming Context window (Slave Mode)

      Graphic

    2. Specify:

      • The subtree type (subtree or object)

      • The DN of the subtree or object in the Suffix field

      • The mode (master or slave)

    3. If the naming context is a replica (slave), specify:

      • The name of the server from which it is replicated in the Master hostname field

      • The Master Update DN that dspushd will use when the master initiates the bind to replicate changes.

      • Whether you want the slave to pull updates from the master. If so, see "To Create Replicas" for details on how to specify the bind parameters.

    4. Click OK to save the naming context information.

      The new naming context is displayed in the Naming Contexts section.

  10. Optionally, you can replicate any of the stored naming contexts to a different server.

    If you do, you must create the naming context on the target server following the procedure described in Step 9, because the replication procedure does not create it automatically. See "Setting Up Replication" for details.

  11. Click OK in the Create Data Store window to save the data store definition.

  12. Add a directory entry for the root of the data store.

    See "Creating the Root Entry" for details of how to add an entry to the directory. You cannot add any entries to this data store until this root entry exists.

To Modify a Data Store or Naming Context

    To modify a data store, select the data store you want to modify from the Data Store list, and choose Modify Data Store or Modify Naming Context from the Selected menu.

Alternatively, you can double-click on your selection. The current characteristics of the data store or naming context are displayed. You can modify any part of the configuration, apart from a data store suffix, when the data store is not empty.

Indexing Directory Data

A data store can contain a number of attribute indexes to help optimize the speed of access to directory information. An attribute index is a list of entries containing a given attribute or attribute value. You can index attributes using any of the following matching rules:

In a data store having the default characteristics, the following attributes are indexed:

The advantage of indexing is that it optimizes access for indexed attributes. The disadvantages are that it uses more disk space, and that adding and modifying entries takes longer.

When you add or modify an entry after an index has been created, the index is automatically updated. However, if you create a new index and the data store already contains entries, those entries are not automatically included in the index. Indexes are not automatically updated when entries are removed from the directory, so the size of the index files does not reduce as entries are removed.

To update all the indexes defined in a data store, choose Refresh Index from the Data Store menu of the data store window (see "Directory Maintenance".) Regenerating the indexes for a data store can take several minutes, depending on the number and complexity of the indexes defined. For example, regenerating the default indexes for a data store of 20,000 entries takes approximately five minutes.

To Create Indexes

  1. Whether you are creating a new data store or modifying an existing one, select Index from the Create menu.

    The Add Index window is displayed.

  2. Specify the name of the indexed attribute and the index types.

    Use the Set button to select attributes from a list. You can specify several attributes separated by commas. These indexed attributes will have the same index types.

  3. Click Apply to add the index.

Backing Up and Restoring a Data Store

The backup function enables you to create a backup of the information held in your directory database in text format. The restore option enables you to restore your database from a set of backup files.

To Back Up a Data Store

  1. To back up a data store, double-click on the data store in the Data Store list to display it.

    The Modify Data Store window is displayed.

  2. Click the Data Store pull-down menu, and select Backup.

    A selector window is displayed.

  3. Use the selector window to select or create a directory for your backup.

  4. Click Save.

To Restore a Data Store

  1. To restore a data store, double-click on the data store in the Data Store list to display it.

    The Modify Data Store window is displayed.

  2. Click the Data Store pull-down menu, and select Restore.

    A selector window is displayed.

  3. Select the directory containing the backed up data store that you want to restore.

    The default selection is the previous backup directory.

  4. Click Load.

    The directory service is restarted with the restored data store.

Configuring Access Control

Access controls determine who has access to a given directory entry, and what level of access is granted. "Access Control" explains how to design an access control policy for your directory. The following sections explain how to configure default access, and add, modify, and delete access control rules.

An access control rule defines the level of access to specific directory information given to a particular user. There are two stages to defining a new access control rule:

Access control rules are ordered, with the most specific rules first, followed by more general rules. The first rule in the list that matches the requested operation is applied, the following rules in the list are ignored.

Default access is the level of access granted to entries and attributes for which access control is not specifically defined.

Configuring Default Access

  1. In the Admin Console main window, go to the Access Control section.

  2. Use the Default Access menu button to select a level of access.

    By default, this option is set to read.

To Add an Access Control Rule

  1. Choose Access Control from the Create menu.

    The Create Access Control Rule window is displayed.

  2. Specify the information to which the new rule will apply, as follows:

    1. From the Selected Entries menu, select the method of specifying the entries.

      You can specify entries using a DN-based regular expression, an LDAP filter, or you can specify that the rule applies to all entries.

      • If you selected DN-based regular expression, type the regular expression in the Distinguished name field, or click Set to use the Distinguished Name Editor to specify the regular expression.

        If you want to protect only certain attributes within the set of entries defined by the regular expression, click the Attribute Set button and select the attributes to be protected. If you do not specify any attributes, all attributes in the specified entries are protected.

      • If you selected LDAP filter, click the LDAP filter Set button to launch the LDAP Filter Editor. Specify the filter, and click Apply.

        If you want to protect only certain attributes within the set of entries defined by the regular expression, click the Attribute Set button and select the attributes to be protected. If you do not specify any attributes, all attributes in the specified entries are protected.

    2. Type the name of an attribute to be protected in the Attributes field.

      To see a list of attributes, click the Set button. You can specify any number of attributes.

  3. Choose Access Rule from the Create menu.

    The Add User Rule window is displayed.

  4. Select the Rule type. This defines the set of users to which the rule applies.

    You can specify a rule for Everyone, DN-based Regular Expression, Self (that is, the entity described by the entry), Address, Domain, or Member Attribute.

    • If you selected Everyone, the rule will apply to all users whose directory entries contain this attribute.

    • If you selected DN-based Regular Expression, specify the regular expression for the set of users to which the rule applies. The rule will apply to all users who bind with a distinguished name that matches the regular expression.

      You can type the distinguished name directly in the field, or you can click Set to use the Distinguished Name editor to construct the distinguished name. See "Using the DN Editor" for more information about how to specify a distinguished name.

    • If you selected Address, specify an IP address.

      The IP address can contain wildcards. The rule will apply to all users who bind from the specified IP address.

    • If you selected Domain, specify a domain name.

      The domain name can contain wildcards. The rule will apply to all users who bind from the specified domain.

    • If you selected Member Attribute, specify an attribute.

      The rule will allow the DN used in the bind to be added to or removed from the list of members specified by the attribute.

  5. Specify the access rights to be granted to the specified set of users.

  6. Click Apply to add the rule.

    You can then define other rules for entries you have selected. When you have created and added all the rules for these entries, click Cancel to dismiss the Add User Rule window. Figure 4-4 shows a new ACL created to authorize users to update their own homePhone and homePostalAddress attributes.

    Figure 4-4 Create Access Control Window

    Graphic

  7. In the Create Access Control Rule window, click Apply to store the new rules.

    You can then select another set of entries and define access controls for them, as described in Step a.

    Configuration changes are implemented when you restart the dsservd daemon.

To Modify an Access Control Rule

  1. Select the set of entries whose access control you want to modify, and choose Modify ACL from the Selected menu.

    The Modify Access Control Rule window is displayed. If you double-click a rule, this window is displayed automatically.

  2. Select the rule that you want to modify, and choose Modify Access Rule from the Selected menu.

    The Modify User Rule window is displayed. If you double-click the rule you want to modify, the Modify User Rule window is displayed automatically.

  3. Make the modification you require.

  4. Click Apply.

    Make any other modifications you require. When you have made and applied all the modifications, click Cancel to dismiss the Modify User Rule window.

  5. Click OK in the Modify Access Control Rule window.

    These changes will take effect when you restart the dsservd daemon.

To Delete an Access Control Rule

    To delete all access control rules for a set of entries, select the entry set and choose Delete ACL from the Selected menu.

You are prompted to confirm that you want to delete all access controls for the set of entries.

    To delete one rule from an ACL:

  1. Select the set of entries and choose Modify ACL from the Selected menu.

    The Modify Access Control Rule window is displayed.

  2. Select the rule you want to delete and choose Delete User Rule from the Selected menu.

    You are prompted to confirm that you want to delete this rule.

To Reorder Access Control Rules

    In the Access Control section of the main window, select the rule you want to move, and choose Move Up or Move Down from the Selected menu.

    When the rules are reordered as you require, click Apply to save the changes to the configuration file. The changes are implemented when you restart the dsservd daemon.


    Note -

    The Admin Console will display a warning message if you break the convention of placing the rules from the more specific to the more general.


Configuring Logging

You can configure the following parameters for the log:

Go to the Log section of the Admin Console main window to configure these parameters.

The log directory /var/opt/SUNWconn/ldap/log contains the following log files:

You can change the name of the default log directory but you cannot modify the names of the log files themselves.

By default the maximum size of a log file is 500Kb. The maximum size is the same for all log files. When this limit is reached, the log is renamed by appending a .1 suffix, and a new log file is created. When that log reaches the size limit, it is in turn renamed. You can have up to ten files for each log.


Note -

Log files can use up to 40 Mbytes of disk space, or more if you increase the default log file size. Therefore, it is necessary to clean up log files regularly.


The available trace levels are:

Backing Up and Restoring the Configuration

The Admin Console enables you to back up your directory service configuration at any time and save as many configurations as you want. You can restore any of your backed up directory service configurations.

To Back Up the Configuration

  1. In the Admin Console, click the Server pull-down menu and choose Backup Config.

    If the directory service damon dsservd is running, you are prompted to stop it. When it is stopped, a selector window is displayed.

  2. Use the selector window to select or create a directory for your backup.

  3. Click Save.

To Restore a Configuration

  1. In the Admin Console, click the Server pull-down menu and select Restore Config.

    If the directory service damon dsservd is running, you are prompted to stop it. When it has stopped, a selector window is displayed.

  2. Select the directory containing the backed up configuration that you want to restore.

    The default selection is the /etc/opt/SUNWconn/ldap/backup directory.

  3. Click Load.

    The directory service is restarted with the restored configuration.

Displaying Server Characteristics

You can display the characteristics of the directory server at any time, using the following command:

/opt/SUNWconn/bin/ldapsearch -h host -b "" -s base 'objectclass=*'

host is the hostname of the directory server whose characteristics you want to display. The output from this command is similar to:

objectclass=top
namingcontexts=O=XYZ,C=US
namingcontexts=DC=XYZ,DC=COM
subschemasubentry=cn=schema
supportedsaslmechanisms=CRAM-MD5
supportedcontrol=1.2.840.113556.1.4.319
supportedcontrol=2.16.840.1.113730.3.4.2
supportedcontrol=1.3.6.1.4.1.1466.20035
supportedldapversion=2
supportedldapversion=3

Using the DN Editor

A distinguished name (DN) is a sequence of relative distinguished names (RDNs), separated by a comma, for example o=XYZ, c=US. When you have to specify a DN in the Admin Console, you can type it directly into the field supplied, or you can construct it using the Distinguished Name Editor.

Regular Expressions in Distinguished Names

You can specify a DN that contains a regular expression to indicate a set of entries. This is useful when configuring access control, for example, but not when specifying a naming context. The Admin Console does not prevent you from entering a regular expression in any DN, but you should use wildcards only where it is appropriate. See the regex(1F) man page for information about regular expressions.

You can specify a regular expression for the distinguished name of an entry. For example, the regular expression dn="cn=Joe Smith, ou=.*, o=XYZ, c=US" specifies the set of entries for people called Joe Smith in the whole of the XYZ Corporation.

You can also use a DN-based regular expression to specify a set of values for an attribute whose values are DNs. For example, you can grant write access to a distribution list entry to any person whose DN is a value of the member attribute, using the regular expression member="dn=.*".

To Create a Distinguished Name with the DN Editor

  1. Start the DN Editor by clicking the Set Button to the right of the field where you must enter a DN.

    The DN Editor dialog box is displayed.

    Figure 4-5 Distinguished Name Editor

    Graphic

  2. Use the Previous and Next buttons to position the cursor where you want to add an RDN, or to highlight an RDN that you want to replace.

    If you position the cursor between two RDNs, the dialog box has an Add RDN button. If you highlight an RDN, this button is replaced by a Replace RDN button.

  3. Select the Naming Attribute for the RDN, and type the value in the RDN value field.

  4. Click the Add RDN button or Replace RDN button.

  5. Click Apply to save the new DN, and click Cancel to dismiss the DN Editor dialog box.

To Modify a Distinguished Name with the DN Editor

  1. Start the DN Editor by clicking the Set Button to the right of the field containing the DN to modify.

    The DN Editor dialog box is displayed.

  2. Use the Previous and Next buttons to position the cursor where you want to insert an RDN, or select the existing RDN that you want to replace.

  3. Select the Attribute Type for the RDN, and type the value in the RDN value field.

  4. Click the Modify RDN button.

  5. Click Apply to save the new DN, and click Cancel to dismiss the DN Editor dialog box.

Using the Filter Editor

An LDAP filter is a way of specifying a set of entries, based on the presence of a particular attribute or attribute value. You can use an LDAP filter in an access control rule. For example, the default access control rules include a filter specifying that users can add their own DNs to the member attribute of any entry that contains the attribute joinable with a value of TRUE. This allows users to add or remove their names from distribution lists.

The Current Filter field shows the filter you are modifying, or the current state of the filter you are creating.

To Create an LDAP Filter

  1. Click the Set button to the right of the field where you need to specify a filter.

    The Filter Editor is displayed.

    Figure 4-6 Filter Editor Dialog Box

    Graphic

  2. Select an attribute from the list displayed.

  3. Type a value in the Value field.

  4. Select a match type from the pull-down menu.

  5. Click AND, OR, or NOT, to indicate how this expression is used in the filter.

  6. Click Add Expression to add the expression to the filter.

    The Current Filter field shows the modified filter.

  7. Repeat from Step 3 to Step 6 until the Current Filter field shows the filter as you want it.

  8. Click Apply to save the filter, and click Cancel to dismiss the Filter Editor dialog box.

To Modify an LDAP Filter

  1. Click the Set button to the right of the field where you need to specify a filter.

    The Filter Editor is displayed, as shown in Figure 4-6.

    The Current Filter field shows the filter to be modified.

  2. Position the cursor where you want to add an expression, or select the expression that you want to modify.

  3. Select an attribute from the list displayed.

  4. Type a value in the Value field.

  5. Select a match type from the pull-down menu.

  6. Click AND, OR, or NOT, to indicate how this expression is used in the filter.

  7. Click Add Expression to add the expression to the filter.

    The Current Filter field shows the modified filter.

  8. Repeat from Step 3 to Step 7 until the Current Filter field shows the filter as you want it.

  9. Click Apply to save the filter, and click Cancel to dismiss the Filter Editor dialog box.