Go to main content
2/55
List of Examples
5-1 Using Network Group Criteria to Route to Different Workflows
5-2 Using a Network Group QOS Policy to Filter Requests
5-3 A Network Group Routing to Several Workflows
7-1 Safe Data Level = 1
7-2 Safe Data Level = 2 (RS and DS on Different Hosts)
7-3 Safe Data Level = 2 (RS and DS on Same Host)
7-4 Safe Read Mode in a Single Data Center With One Group
7-5 Safe Read Mode in a Single Data Center With More Than One Group
7-6 Safe Read Mode in a Multi-Data Center Deployment
12-1 Examples of Searches Using Numeric Distribution Algorithm
12-2 Examples of Searches Using Lexico Distribution Algorithm
12-3 Example of DN Pattern Algorithm Split by Region
12-4 Using a Global Index Catalog for Telephone Numbers
14-1 Using dsconfig in Interactive Mode to Configure Attribute Encryption
17-1 Display Suffix Information Using Default manage-suffix Options
17-2 List Suffixes Using BaseDN and Workflow Element Options
17-3 List Suffixes Using the --advanced Option
18-1 Equality Search
18-2 Less-Than Search
18-3 Less-Than-or-Equal-To Search
18-4 Greater-Than-or-Equal-To Search
18-5 Greater-Than Search
18-6 Substring Search
18-7 Creating a New Equality Index
18-8 Adding a Substring Index
18-9 Creating a New VLV Index
18-10 Sample Monitoring Output
18-11 List of All Configured Virtual Attribute Rules
21-1 Example of Client Connection Affinity Rejected
23-1 Restarting a Global Index Catalog in a Replicated Topology
23-2 Adding a Global Index to a Replicated Global Index Catalog Topology
23-3 Overwriting the Contents of Replicated Global Index Catalogs
23-4 Adding a Proxy to a Replicated Topology
26-1 Edited Kerberos Client Configuration File /etc/krb5/krb5.conf
26-2 Edited Administration Server ACL Configuration File
26-3 Edited KDC Server Configuration File /etc/krb5/kdc.conf
26-4 New testuser.ldif File
30-1 Configuring Account Lockout
30-2 Configuring Last Login
30-3 Configuring Password History Count and Duration
35-1 Example Output for a Directory Server Instance
35-2 Example Output for a Replication Gateway Instance:
35-3 Example Output for a Proxy Server Instance
A-1 Creating the Script
A-2 Starting the Directory Server by Using the New Script
A-3 Stopping the Directory Server by Using the New Script
A-4 Restarting the Directory Server by Using the New Script
A-5 Specifying JAVA_HOME and JAVA_ARGS in the Script
A-6 Viewing the Global Help Subcommands
A-7 Migrating a Directory Proxy Server Configuration to an Oracle Unified Directory Configuration
A-8 Viewing the Global Help Subcommands
A-9 Running ds2oud in Interactive Mode From the Command Line
A-10 Running ds2oud for Diagnosing Data
A-11 Migrating an Existing Oracle Directory Server Enterprise Edition Configuration to an Oracle Unified Directory Configuration
A-12 Viewing the Global Help Subcommands and Global Options
A-13 Viewing a Component's Subcommand Help Information
A-14 Viewing Help on an Individual Subcommand
A-15 Displaying a Component's Properties
A-16 Parameters Supported by the -F, --batchFilePath subcommand
A-17 Modifying a Script
A-18 Enabling Directory Server Replication
A-19 Initializing Directory Server Replication
A-20 Obtaining the Directory Server Replication Status
A-21 Disabling Directory Server Replication
A-22 Configuring the External Change Log on a Non-replicated Server
A-23 Memory-Based Tuning
A-24 Data-Based Tuning
A-25 Runtime Tuning
A-26 Displaying the Current Tuning Mode
A-27 Viewing the Global Help Subcommands and Global Options
A-28 Viewing Help on an Individual Subcommand
A-29 Using gicadm to Create a Global Index Catalog
A-30 Using gicadm to Add a Global Index to a Global Index Catalog
A-31 Using gicadm to Associate a Global Index Catalog to a Distribution
A-32 Displaying a Summary of Scheduled Tasks
A-33 Obtaining Task Information
A-34 Canceling a Scheduled Task
A-35 Obtaining a Copy of an Existing Configuration
A-36 Running the Help Command Option
A-37 Editing the Configuration
A-38 Running the Help Command Option
A-39 Pasting the Configuration
A-40 Running the Help Command Option
A-41 Running oud-replication-gateway-setup in GUI Mode
A-42 Running oud-replication-gateway-setup in Interactive Mode From the Command Line
A-43 Running oud-setup in GUI Mode
A-44 Running oud-setup in Interactive Mode From the Command Line
A-45 Running oud-setup in Non-Interactive CLI Mode
A-46 Running oud-setup in Non-Interactive CLI Mode With LDIF Import
A-47 Running oud-setup in Non-Interactive Mode With Sample Entry Generation
A-48 Running oud-setup on Windows
A-49 Running oud-setup in Interactive Mode To Tune the Server
A-50 Running oud-proxy-setup in GUI Mode
A-51 Running oud-proxy-setup in Non-Interactive CLI Mode
A-52 Starting the Server
A-53 Starting the Server as a Foreground Process
A-54 Displaying the Server Status
A-55 Stopping a Server Locally
A-56 Stopping a Server Remotely
A-57 Restarting a Server Remotely
A-58 Uninstalling by Using the Graphical Uninstaller
A-59 Uninstalling by Using the Command Line
A-60 Uninstalling in Non-Interactive CLI Mode
A-61 Enabling the Server as a Windows Service
A-62 Disabling the Server as a Windows Service
A-63 Displaying a Status
A-64 Backing Up All Configured Back Ends
A-65 Backing Up a Specific Back End
A-66 Running an Incremental Backup
A-67 Running an Incremental Backup on a Specific Back End
A-68 Running an Incremental Backup Against an Existing Backup
A-69 Backing Up All Configured Back Ends with Encryption and Signed Hash
A-70 Scheduling a Backup
A-71 Base64 Encoding a String
A-72 Base64 Encoding the Contents of a File
A-73 Decoding a Base64-Encoded String
A-74 Decoding the Contents of a Base64-Encoded File
A-75 Base64-Encoding and Decoding on Linux Systems
A-76 Displaying the List of Root Containers
A-77 Displaying a List of Entry Containers
A-78 Displaying a List of Database Containers
A-79 Dumping the Contents of a Database and Skipping Decode
A-80 Listing the Storage Schemes on the Server
A-81 Listing the Authenticated Passcode Syntax Storage Schemes on the Server
A-82 Encoding a Clear-Text Password to Another Scheme
A-83 Encoding a Clear-Text Password to Another Scheme using the Authentication Password Syntax
A-84 Comparing a Clear-Text Password to an Encoded Password
A-85 Compare a Clear-Text Password to an Encoded Password and Return an Exit Code
A-86 Encoding a Password Contained in a File using SSHA
A-87 Performing an Offline Export
A-88 Performing an Online Export
A-89 Scheduling an Export
A-90 Running an Offline Import
A-91 Importing Part of an LDIF File Offline
A-92 Importing Data From a MakeLDIF Template
A-93 Importing User Attributes Only
A-94 Importing User Attributes and Excluding an Attribute
A-95 Importing Operational Attributes Only
A-96 Importing Selected User and Operational Attributes
A-97 Running an Online Import
A-98 Scheduling an Import
A-99 Comparing Two LDIF files and Sending the Differences to Standard Output
A-100 Comparing Two LDIF files and Sending the Differences to a File
A-101 Modifying an LDIF File
A-102 Searching an LDIF File
A-103 Searching an LDIF File by Using a Filter File
A-104 Listing the Current Back Ends
A-105 Listing the Back-end ID
A-106 Listing the Base DN
A-107 Creating a Sample LDIF File
A-108 Creating a Large Sample LDIF File
A-109 Viewing All Password Policy State Information for a User
A-110 Disabling a User Account
A-111 Enabling a User Account
A-112 Rebuilding an Index
A-113 Rebuilding All Indexes
A-114 Rebuilding Extensible Indexes
A-115 Displaying the Backup Information
A-116 Restoring a Backup
A-117 Restoring an Encrypted Backup
A-118 Scheduling a Restore
A-119 Using split-ldif to Populate a Global Index with One Indexed Attribute
A-120 Using split-ldif to Populate a Global Index with Several Indexed Attributes
A-121 Verifying an Index
A-122 Verifying an Index and Counting Errors
A-123 Comparing an Entity for Group Membership
A-124 Comparing an Attribute Value to an Entry
A-125 Using ldapcompare with Server Authentication
A-126 Using ldapcompare with Client Authentication
A-127 Deleting an Entry from the Command Line
A-128 Deleting Multiple Entries by Using a DN File
A-129 Deleting Entries by Using Server Authentication
A-130 Deleting Entries by Using Client Authentication
A-131 Adding an Entry
A-132 Adding an Attribute to an Entry
A-133 Modifying the Value of an Attribute
A-134 Modifying Multiple Attributes
A-135 Deleting an Attribute from the Command Line
A-136 Deleting an Entry from the Command Line
A-137 Using ldapmodify with Server Authentication
A-138 Using ldapmodify with Client Authentication
A-139 Modifying Your User Password
A-140 Modifying and Generating a Password for Another User
A-141 Modifying a Password for Another User
A-142 Returning All Entries
A-143 Returning Attributes Names but No Values
A-144 Returning Specific Attribute Values
A-145 Returning the Root DSE
A-146 Searching by Using Server Authentication
A-147 Searching by Using Client Authentication
A-148 Returning the Effective Rights of a User
A-149 Returning the Schema
A-150 Performing a Persistent Search
A-151 Viewing ACI Attributes
A-152 Viewing Monitoring Information
A-153 Searching by Using a Properties File
Scripting on this page enhances content navigation, but does not change the content in any way.