Skip Headers
Oracle® Fusion Middleware Reference for Oracle Directory Server Enterprise Edition
11
g
Release 1 (11.1.1.7.0)
Part Number E28969-01
Home
Contents
Index
Contact Us
Previous
Next
PDF
·
Mobi
·
ePub
List of Figures
2-1 Two Root Suffixes in a Single Directory Server
2-2 One Root Suffix With Multiple Subsuffixes
5-1 Password-Based Authentication
5-2 Certificate-Based Authentication
5-3 Hierarchy of Certificate Authorities
5-4 Certificate Chain
5-5 Verifying A Certificate Chain
5-6 Verifying A Certificate Chain to an Intermediate CA
5-7 Certificate Chain That Cannot Be Verified
5-8 Where SSL Runs
5-9 Authenticating a Client Certificate During SSL Handshake
5-10 Authentication and Verification During SSL Handshake
5-11 Digital Signatures
5-12 Symmetric-Key Encryption
5-13 Public-Key Encryption
5-14 Attribute Encryption
6-1 Overall Monitoring Information Flow
6-2 SNMP Information Flow
7-1 Retro Change Log and Multi-Master Replication
7-2 Simplified Topology for Replication of the Retro Change Log
7-3 Failover of the Retro Change Log
8-1 Entry and Database Caches in Context
8-2 How Directory Server Performs Searches
8-3 How Directory Server Performs Updates
8-4 How Directory Server Initializes a Suffix
9-1 Presence Index
9-2 Equality Index
9-3 Substring Index for the SN Attribute
9-4 Representation of a Browsing Index
12-1 CoS Scope
12-2 Example of a Pointer CoS Definition and Template
12-3 Example of an Indirect CoS Definition and Template
12-4 Example of a Classic CoS Definition and Template
12-5 Generating CompanyName With Pointer CoS
12-6 Generating DepartmentNumber With Indirect CoS
12-7 Generating Mail Stop and Fax Number With Indirect CoS
12-8 Generating Service-Level Data With Classic CoS
13-1 Sample DSML-Enabled Directory Deployment
15-1 Simplified Architecture of Directory Proxy Server
16-1 Distribution of Requests According to the Proportional Algorithm for Load Balancing
16-2 Distribution of Requests According to the Saturation Algorithm for Load Balancing
16-3 Distribution of Requests According to the Operational Affinity Algorithm for Load Balancing
16-4 Distribution of Requests According to the Adaptive Failover Algorithm for Load Balancing
17-1 Attribute Renaming
17-2 DN Renaming
17-3 Example Deployment That Routes All Requests to a Data Source Pool, Irrespective of the Target DN
17-4 Example Deployment That Routes Requests When a List of Subtrees Is Stored on Multiple, Data-Equivalent Data Sources
17-5 Example Deployment That Provides a Single Point of Access When Different Subtrees Are Stored on Different Data Sources
17-6 Example Deployment That Routes Requests When Different Parts of a Subtree Are Stored in Different Data Sources
17-7 Example Deployment to Route Requests When Superior and Subordinate Subtrees Are Stored in Different Data Sources
17-8 Data View With Hierarchy and a Distribution Algorithm
18-1 Virtual Data View
18-2 Mapping Transformation
18-3 Write Transformation
18-4 Read Transformation
19-1 Authentication in BIND Replay
19-2 Connections for Proxy Authorization
19-3 Information Flow When Proxy Authorization Control Is Added by Directory Proxy Server
19-4 Information Flow When Proxy Authorization Control Is Contained in the Client Request
19-5 Local Mapping of a Client Identity to an Alternate Identity
19-6 Remote Mapping of Client Identity to an Alternate Identity
20-1 List of Data Views in a Connection Handler