Go to main content
3/55
List of Figures
1-1 Transitioning an Existing ODSEE Deployment to OUD
2-1 Basic Replication Topology
2-2 Multiple Data Center Topology
2-3 Replication Groups Over WAN
3-1 Simple Load Balancing
3-2 Simple Distribution
3-3 Failover Between Data Centers
3-4 Distribution with Load Balancing
3-5 Distribution with Failover Between Data Centers
3-6 Proxy Enterprise User Security
3-7 Multiple Proxy Instances
4-1 Pass-Through Authentication Mechanism
4-2 Shadow Joiner Configuration
5-1 Network Group Selection
5-2 Client Request for a Directory Server
5-3 High-Level Presentation of Oracle Unified Directory Components
9-1 Example Directory Tree for Macro ACIs
12-1 Failover Load Balancing Example
12-2 Optimal Load Balancing Example
12-3 Proportional Load Balancing Example
12-4 Proportional Load Balancing with Request Specific Management
12-5 Saturation Load Balancing Example
12-6 Search Filter Load Balancing
12-7 Numeric Distribution Example
12-8 Lexico Distribution Example
12-9 Capacity Distribution Example
12-10 DN Pattern Distribution Example
12-11 Example of Directory Information Tree
12-12 Pass-Through Authentication Mechanism
12-13 Pass-Through Authentication Configuration Model
12-14 Join Workflow Element Configuration Model
12-15 Join Workflow Element and Join Participants
12-16 Sample One-to-One Joiner Type for Authentication
12-17 One-To-Many Joiner Type
12-18 Example Shadow Join Used for Storing Application-Specific Data Locally
12-19 Pass-Through Authentication Using the Join Workflow Element
12-20 DN Renaming
12-21 RDN Changing
12-22 Read Transformation
12-23 Write Transformation
12-24 Mapping Transformation
16-1 ODSM Screen
17-1 Example Settings for Open LDAP/DSML Connection Dialog
17-2 Browsing the JXplorer Tree
18-1 Virtual Attributes
19-1 Structure of a Dynamic Group
19-2 Virtual Static Group
19-3 Nested Static Group
22-1 Criticality Flag
23-1 Replicated Global Index Catalogs
23-2 Restarting a Global Index Catalog
23-3 Adding a Global Index to a Replicated Global Index Catalog Topology
23-4 Overwriting the Contents of Replicated Global Index Catalogs
23-5 Adding a Proxy to a Replicated Topology
24-1 Configuration Model
24-2 Transformation Types
24-3 Value Definition Screen
25-1 Load Balancing
25-2 Configuring Distribution
25-3 Configuring Distribution and Load Balancing
27-1 Connections in the user Secure Mode
27-2 Multiple Pools of Connections
31-1 Connection Error
31-2 Oracle Schema
32-1 Basic Replication Architecture
32-2 Large Replicated Topology
32-3 Isolated Replicas in a Demilitarized Zone
32-4 Isolated Replicas in a Staging Area
35-1 Java Monitoring and Management Console
35-2 Simple Replication Topology
35-3 Simple Replication Topology
35-4 Results for dsreplication status with a Replication Gateway Deployed
35-5 Example LDAP Connector Monitoring Panel
Scripting on this page enhances content navigation, but does not change the content in any way.