List of Figures
- 1-1 Transitioning an Existing ODSEE Deployment to OUD
- 2-1 Basic Replication Topology
- 2-2 Multiple Data Center Topology
- 2-3 Replication Groups Over WAN
- 3-1 Simple Load Balancing
- 3-2 Simple Distribution
- 3-3 Failover Between Data Centers
- 3-4 Distribution with Load Balancing
- 3-5 Distribution with Failover Between Data Centers
- 3-6 Proxy Enterprise User Security
- 3-7 Multiple Proxy Instances
- 4-1 Pass-Through Authentication Mechanism
- 4-2 Shadow Joiner Configuration
- 5-1 Network Group Selection
- 5-2 Client Request for a Directory Server
- 5-3 High-Level Presentation of Oracle Unified Directory Components
- 9-1 Example Directory Tree for Macro ACIs
- 12-1 Failover Load Balancing Example
- 12-2 Optimal Load Balancing Example
- 12-3 Proportional Load Balancing Example
- 12-4 Proportional Load Balancing with Request Specific Management
- 12-5 Saturation Load Balancing Example
- 12-6 Search Filter Load Balancing
- 12-7 Numeric Distribution Example
- 12-8 Lexico Distribution Example
- 12-9 Capacity Distribution Example
- 12-10 DN Pattern Distribution Example
- 12-11 Example of Directory Information Tree
- 12-12 Pass-Through Authentication Mechanism
- 12-13 Pass-Through Authentication Configuration Model
- 12-14 Join Workflow Element Configuration Model
- 12-15 Join Workflow Element and Join Participants
- 12-16 Sample One-to-One Joiner Type for Authentication
- 12-17 One-To-Many Joiner Type
- 12-18 Example Shadow Join Used for Storing Application-Specific Data Locally
- 12-19 Pass-Through Authentication Using the Join Workflow Element
- 12-20 DN Renaming
- 12-21 RDN Changing
- 12-22 Read Transformation
- 12-23 Write Transformation
- 12-24 Mapping Transformation
- 17-1 Example Settings for Open LDAP/DSML Connection Dialog
- 17-2 Browsing the JXplorer Tree
- 18-1 Virtual Attributes
- 19-1 Structure of a Dynamic Group
- 19-2 Virtual Static Group
- 19-3 Nested Static Group
- 22-1 Criticality Flag
- 23-1 Replicated Global Index Catalogs
- 23-2 Restarting a Global Index Catalog
- 23-3 Adding a Global Index to a Replicated Global Index Catalog Topology
- 23-4 Overwriting the Contents of Replicated Global Index Catalogs
- 23-5 Adding a Proxy to a Replicated Topology
- 24-1 Configuration Model
- 24-2 Transformation Types
- 24-3 Value Definition Screen
- 24-4 ForkJoin Workflow Element Configuration Model
- 25-1 Load Balancing
- 25-2 Configuring Distribution
- 25-3 Configuring Distribution and Load Balancing
- 26-1 Example1: Subject Alternative Name to User Attribute Certificate Mapper
- 26-2 Example 2: Subject Alternative Name to User Attribute Certificate Mapper
- 27-1 Connections in the
user
Secure Mode - 27-2 Multiple Pools of Connections
- 31-1 Connection Error
- 31-2 Oracle Schema
- 32-1 Basic Replication Architecture
- 32-2 Large Replicated Topology
- 32-3 Isolated Replicas in a Demilitarized Zone
- 32-4 Isolated Replicas in a Staging Area
- 35-1 Java Monitoring and Management Console
- 35-2 Simple Replication Topology
- 35-3 Simple Replication Topology
- 35-4 Results for
dsreplication status
with a Replication Gateway Deployed - 35-5 Example LDAP Connector Monitoring Panel