Oracle® Fusion Middleware Man Page Reference for Oracle Directory Server Enterprise Edition 11g Release 1 (11.1.1.7.0) Part Number E28967-01 |
|
|
PDF · Mobi · ePub |
introduction to Directory Server configuration properties
Description
This section describes Directory Server configuration properties. You set these properties with the dsconf
command.
This section also describes legacy Directory Server configuration attributes. You set the attributes by using the ldapmodify
command on entries under cn=config
.
LIST OF CONFIGURATION ELEMENTS
This reference manual section includes the following pages. Many Directory Server properties exist. The properties that do not appear here are however also covered in the following pages.
Maximum number of values per index key in an index list
LDAP controls handled by Directory Server
Optional description of configuration element
DSML SSL client authentication
DSMLv2 schema location
buffer size for DSML requests
maximum number of DSML parsers
default number of DSML parsers
DSML port number
maximum DSML request size
maximum size of DSML response
root URL for DSML
DSML SSL port number
SOAP schema location for DSML
Specify soft and hard thresholds for heap memory use
Specify soft and hard thresholds for heap memory use
Whether replication is enabled
Accept, rather than refer, update operations
Time stamp for last initialization
Accept update operations after the specified delay
Automatically initialize dedicated consumer
Timeout for replication operations
Compression used for replication
Throttle replication concurrency
Grouping size for replication updates
Effective group packet size
Window size for replication updates
Replication update vector, version 6
Maximum age of change log entries
Maximum number of change log records
Checksum for partial replication
Attribute types to exclude from replication
Attribute types to include in replication
Whether the configuration element is operational
DS attribute encryption (ETA) properties
LDAP extended operations handled by Directory Server
Counts the number of times ds-maxheaphigh or ds-maxheaplow has been exceeded
Counts the number of times ds-maxheaphigh or ds-maxheaplow has been exceeded
DS attribute indexing (IDX) properties
DS logging configuration (LOG) properties
Whether the server accepts mod DN operations
interval between checks for abandoned chaining operations
components using chaining
maximum TCP connections for chaining
maximum bind attemps for chaining suffix
timeout for chaining binds
evaluate access control on chained suffix
maximum concurrent binds on TCP connection for chaining
maximum concurrent operations for chaining
connection lifetime for chaining
Replication update vector, version 5
Force initialization of the consumer
Change logging and referral flags
Reserved for internal use
Bind DN for replication operations
Bind protocol used for replication
Number of entries in the change log
Number of updates since startup
Credentials for replication operations
Host name of consumer
Replica identification number
Time of last initialization
Time of last initialization
Replica initialization status
Time of last update
Time of last update
Replica update status
Unique replica identifier
Port number on which consumer listens
Maximum time to keep tombstones
Referrals for a replica
Base DN for replication
Attributes not to replicate
Timeout for replication operations
Time interval between tombstone purge operations
Transport used for replication
Role of the replica
Indicate whether or not a replication schedule update is in progress
When replication is scheduled
Internal replication tasks
LDAP URL for chaining farm server
maximum hops for chaining
type of index
maximum number of entries checked during search
collation order OID for international index
maximum delay for chained response
maximum delay to test chaining response
bind DN for chaining multiplexor
bind password for chaining multiplexor
maximum number of LDAP connections for chaining
disable proxy authorization for chaining
referrals for chained searches
Turn access control on and off
Specify the path and filename of the access|audit|error log
Provide a list of log files used in access, audit, or error log rotation.
Determines whether the server writes access log entries directly to disk
Specify the maximum age that an access, audit, or error log file is allowed to reach before it is deleted
Determines the unit of the log expiration time
Enable or disable access, audit, or error logging
Specify the maximum amount of disk space in megabytes that the access, audit or error logs are allowed to consume
Specify the minimum amount of free disk space in megabytes that is allowed before an access, audit, or error log is deleted
Specify the time interval, the time of the day, and the minimum file size for rotation of the access log, audit log, or error log
Specify the unit for the time-interval part of the nsslapd-access|audit|errorlog-logrotationtime attribute
Specify the maximum size of the access, audit, or error log in megabytes
Specify the total number of access, audit, or error logs that can be contained in the access, audit, or error logs directory
Specify the permissions for the log files
Maximum number of values per index key in an index list
allow non-standard characters in attribute names
suffix used to process requests
initial BER buffer size
cache memory size
cache size
certificate map search base
changelog path
maximum changelog age
maximum number of changelog records
DN of the server configuration
database checkpoint interval
circulate through transaction logs
when to write transactions to disk
database file location
number of blocks per database page
number of database locks used
database log buffer size
database transaction log directory
maximum size of single database log file
size of database pages in bytes
number of database transactions to batch before commit
maximum concurrent database transactions
database cache size
split database cache
absolute path to database instance
full disk threshold to limit database updates
low disk threshold to limit database updates
distribution plug-in function
distribution plug-in library
DN cache memory size
DN cache size
allow 4.x style schema definitions
enable superior object class enquoting
attributes excluded during database export
level of access control nesting for group evaluations
Maximum number of members in the static group used for ACI evaluation.
idle timeout
database cache size for import
Specify the component for which logging information should be provided.
Specify the level of logging information that should be returned for the server component defined by the nsslapd-infolog-area attribute
instance path
IO block time out
track modification time
maximum number of pending connections
listen to IP address
local host system name
local user name
maximum message size
maximum number of connections
maximum file descriptors
maximum number of persistent searches
maximum threads per connection
database index file permissions
delay sending responses
plug-in legacy configuration
LDAP port number
private naming contexts
Generated password length
read only mode
referral
referral mode
allow only indexed searches
reserve file descriptors
Directory Manager DN
Directory Manager password
root password storage scheme
replicate only user-defined schema elements
schema checking
Skip check for modifications during search before returning entries
listen to IP address for secure connections
encrypted LDAP port number
security
size limit
how a suffix handles operations
chained suffix identifier
thread number
time limit
version string
SSL v2 support
SSL v3 support
SSL encryption ciphers
use SSL client authentication
use SSL server authentication
SSL session time out
Clock state for replication
identify index as system index
chained LDAP controls
DS plug-in configuration (PLG) properties
Number of threads that are polling connections
Whether the server accepts mod DN operations
DS replication agreement configuration (RAG) properties
DS prioritized replication configuration (RPR) properties
replication configuration
Attribute to replicate with high priority
Replicate changes under this base with high priority
Replicate changes performed by this user with high priority
Operation type to replicate with high priority
DS server instance configuration (SER) properties
DS suffix configuration (SUF) properties
record proxied authorization information