JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Oracle Identity Synchronization for Windows 6.0 Deployment Planning Guide
search filter icon
search icon

Document Information

Preface

1.  Introduction

2.  Case Study: Deploying in a Multimaster Replication Environment

3.  Case Study: Deploying in a High-Availability Environment Over a Wide Area Network Using SSL

A.  Pluggable Authentication Modules

B.  Identity Manager and Identity Synchronization for Windows Cohabitation

C.  Logging and Debugging

Glossary

Index

Numbers and Symbols

A

B

C

D

E

F

G

H

I

J

L

M

N

O

P

R

S

T

U

W

X

A

accessor connector layers, Connector Layers - Accessor, Controller, and Agent
accessor.level, In Java Components
accessor.saint.level, In Java Components
accounts, new user, Example Bank’s Technical Requirements
action ID types, Actions
actions
Actions
Connector Layers - Accessor, Controller, and Agent
Connector Layers - Accessor, Controller, and Agent
Connector Layers - Accessor, Controller, and Agent
Glossary
Glossary
Glossary
Active Directory
changing passwords, Password Changes on Active Directory
connector layers, Connector Layers - Accessor, Controller, and Agent
deleted entries, Example Bank’s Technical Requirements
deployment considerations, Identity Synchronization for WindowsDeployment Considerations
domains, Active Directory Information
failover configuration, Primary Installation
global setting, Primary Installation
inactive accounts, Example Bank’s Technical Requirements
new users, Example Bank’s Technical Requirements
password changes, Password Changes on Active Directory
samaccountname, Active Directory Information
special users, Creating a Special Active Directory User for Identity Synchronization for Windows
synchronization user lists, SUL_NT
activedirectorydomainname attribute, Multiple Domains
administration rights, To Assign Administration Rights to the Special User
agent connector layers, Connector Layers - Accessor, Controller, and Agent
agent.level, In Java Components
agentout.level, In Java Components
attributes
activedirectorydomainname
Identity Synchronization for WindowsDeployment Considerations
Multiple Domains
configuring, Configuring the Attributes Settings
data, Actions
destinationindicator
Running idsync resync
Running idsync resync
Running idsync resync
Running the Resynchronization Procedure When Directory Server Is Authoritative
Multiple Domains
dspswuserlink
Example Bank’s Technical Requirements
Running idsync resync
Unlinking Migrated Windows NT Entries
dspswvalidate, Running idsync resync
mapping, To Configure the Object Creation Settings
mappings, To Configure the Object Creation Settings
modification settings, Configuring the Attribute Modification Settings
nsslapd-infolog-area, Directory Server Plugin
nsslapd-infolog-level, Directory Server Plugin
other, Actions
pwdlastset, Connector Layers - Accessor, Controller, and Agent
samaccountname
Active Directory Information
Running idsync resync
Active Directory Information
shadowmax, To Configure the Creation Attributes
shadowmin, To Configure the Creation Attributes
shadowwarning, To Configure the Creation Attributes
uid=PSWConnector, Creating a Special Active Directory User for Identity Synchronization for Windows
user_name, Windows NT Information
user_nt_domain_name, Multiple Domains
userPassword, Running idsync resync
audit.log, Connector Layers - Accessor, Controller, and Agent
audit logging, Logging and Debugging
authentication
Active Directory, Pluggable Authentication Modules
denying, Specifying Rules for Authentication and Password Management
domain controllers, When to Failover
editing /etc/nsswitch.conf, Specifying Rules for Authentication and Password Management
editing /etc/pam.conf
Specifying Rules for Authentication and Password Management
Specifying Rules for Authentication and Password Management
Specifying Rules for Authentication and Password Management
Specifying Rules for Authentication and Password Management
for failover, When to Failover
on Solaris
Directory Server Information
Overview
Step 4: Configuring a Solaris Host to Use PAM
on Windows, Step 2: Configuring Identity Synchronization for Windows
over TLS, Configuring Systems to Prevent Eavesdropping
rules, Specifying Rules for Authentication and Password Management
using PAM
Overview
Step 4: Configuring a Solaris Host to Use PAM
Specifying Rules for Authentication and Password Management
authentication certificates, Glossary