Index
A
- access control
-
- ACI attribute, ACI Structure
- ACI syntax, The ACI Syntax
- allowing or denying access, Allowing or Denying Access
- and replication, Access Control and Replication
- and schema checking, Targeting Attributes
- anonymous access, Anonymous Access (anyone Keyword)
- bind rules, Bind Rules
-
- access at specific time or day, Defining Access at a Specific Time of Day or Day of Week
- access based on value matching, Defining Access Based on Value Matching
- general access, General Access (all Keyword)
- user and group access, Defining User Access - userdn Keyword
- Boolean bind rules, Using Boolean Bind Rules
- compatibility with earlier versions, Compatibility with Earlier Releases
- creating from console, Creating ACIs from the Console
- dynamic targets, LDAP URLs
- from specific domain, Defining Access from a Specific Domain
- from specific IP address, Defining Access from a Specific IP Address
- logging information, Logging Access Control Information
- overview, Managing Access Control
- permissions, Defining Permissions
- placement of ACIs, ACI Placement
- rights, Assigning Rights
- roles, Using Roles Securely
- SASL authentication, Defining Access Based on Authentication Method
- simple authentication, Defining Access Based on Authentication Method
- SSL authentication, Defining Access Based on Authentication Method
- structure of ACIs, ACI Structure
- target DN
-
- containing comma, Targeting a Directory Entry
- target DN containing comma, Defining Permissions for DNs That Contain a Comma
- targeting, Defining Targets
- targeting attribute values, Targeting Attribute Values Using LDAP Filters
- targeting attributes, Targeting Attributes
- targeting entries, Targeting a Directory Entry
- targeting using filters, Targeting Entries or Attributes Using LDAP Filters
- using the Access Control Editor, Creating ACIs from the Console
- value matching, Defining Access Based on Value Matching
- viewing
-
- Access Control Editor, Viewing ACIs
- get effective rights, Get Effective Rights Control
- Access Control Editor
-
- displaying, Displaying the Access Control Editor
- access control instruction (ACI). See ACI, ACI Structure
- access log
-
- configuring, Configuring the Access Log
- manually rotating, Manual Log File Rotation
- turning off, Configuring the Access Log
- turning on, Configuring the Access Log
- viewing, Viewing the Access Log
- account inactivation, Inactivating Users and Roles
-
- from command line, Inactivating User and Roles Using the Command-Line
- from console, Inactivating User and Roles Using the Console
- account lockout, Configuring the Account Lockout Policy Using the Console
-
- configuration
-
- attributes, Configuring the Account Lockout Policy Using the Command-Line
- configuring, Configuring the Account Lockout Policy
-
- using command line, Configuring the Account Lockout Policy Using the Command-Line
- using console, Configuring the Account Lockout Policy Using the Console
- disabling, Configuring the Account Lockout Policy Using the Console
- enabling, Configuring the Account Lockout Policy Using the Console
- lockout duration, Configuring the Account Lockout Policy Using the Console
- password failure counter, Configuring the Account Lockout Policy Using the Console
- replicating attributes, Replicating Account Lockout Attributes
- ACI
-
- assessment, ACI Structure
- attribute, ACI Placement
- authmethod keyword, Defining Access Based on Authentication Method
- bind rules, The ACI Syntax
- cascading chaining, Configuring Cascading Chaining from the Command-Line
- creating from console, Creating a New ACI
- dayofweek keyword, Defining Access at a Specific Time of Day or Day of Week
- deleting from console, Deleting an ACI
- dns keyword, Defining Access from a Specific Domain
- editing from console, Editing an ACI
- evaluation, ACI Evaluation
- examples of use, Access Control Usage Examples
- groupdn keyword, Defining Group Access - groupdn Keyword
- inheritance, Using the userattr Keyword with Inheritance
- ip keyword, Defining Access from a Specific IP Address
- local evaluation
-
- cascading chaining, Configuring Cascading Chaining from the Command-Line
- name, The ACI Syntax
- permissions, The ACI Syntax
- precedence rule, ACI Evaluation
- proxy rights example, Proxied Authorization ACI Example
- replication, Access Control and Replication
- rights, Assigning Rights
- roledn keyword, Defining Role Access - roledn Keyword
- structure, ACI Structure
- syntax, The ACI Syntax
- targattrfilters keyword, Targeting Attribute Values Using LDAP Filters
- target, The ACI Syntax
- target DN
-
- containing comma, Targeting a Directory Entry
- target DN containing comma, Defining Permissions for DNs That Contain a Comma
- target keywords, Defining Targets
- target overview, Defining Targets
- targetattr keyword, Targeting Attributes
- targetfilter keyword, Targeting Entries or Attributes Using LDAP Filters
- userattr and parent, Using the userattr Keyword with Inheritance
- userattr keyword, Using the userattr Keyword
- using macro ACIs, Advanced Access Control: Using Macro ACIs
- value-based, Targeting Attribute Values Using LDAP Filters
- viewing current, Viewing ACIs
- wildcard in target, Targeting a Directory Entry
- wildcards, Wildcards
- ACI attribute
-
- default index for, Overview of System Indexes
- overview, ACI Structure
- ACI placement, ACI Placement
- ACI targets, Targeting a Directory Entry
- ACL. See ACI, Access Control Principles
- activating accounts
-
- from command line, Activating User and Roles Using the Command-Line
- from console, Activating User and Roles Using the Console
- Active Directory
-
- schema differences between Directory Server, Schema Differences
- add right, Assigning Rights
- adding directory entries, Adding Entries Using ldapmodify
- Administration Server
-
- starting and stopping, Starting and Stopping Administration Server
- algorithm
-
- metaphone phonetic algorithm, Approximate Searches
- search, Overview of the Searching Algorithm
- All IDs Threshold, Managing Indexes
- all keyword, General Access (all Keyword)
- allowed attributes
-
- creating, Creating Object Classes
- deleting, Creating Object Classes
- editing in object class, Editing Object Classes
- allowing access, Allowing or Denying Access
- anonymous access, Defining Access Based on Authentication Method
-
- example, Examples
- overview, Anonymous Access (anyone Keyword)
- anyone keyword, Anonymous Access (anyone Keyword)
- approximate index, About Index Types
-
- query string codes, Approximate Searches
- approximate search, Using Operators in Search Filters
- attribute
-
- ACI, ACI Structure
- adding, Modifying an Entry Using LDIF
- adding multiple values, Adding Attribute Values
- adding to entry, Adding an Attribute to an Entry
- creating, Creating Attributes, Creating Object Classes
- deleting, Modifying an Entry Using LDIF, Deleting Attributes
- deleting from object class, Creating Object Classes
- deleting using LDIF update statements, Deleting All Values of an Attribute Using LDIF
- editing, Editing Attributes
- multi-valued, Creating Attributes
- nsslapd-schemacheck, Turning Schema Checking On and Off
- OID, Creating Attributes
- passwordChange, Configuring a Global Password Policy Using the Command-Line
- passwordExp, Configuring a Global Password Policy Using the Command-Line
- passwordGraceLimit, Configuring a Global Password Policy Using the Command-Line
- passwordInHistory, Configuring a Global Password Policy Using the Command-Line
- passwordMaxRepeats, Configuring a Global Password Policy Using the Command-Line
- passwordMin8bit, Configuring a Global Password Policy Using the Command-Line
- passwordMinAlphas, Configuring a Global Password Policy Using the Command-Line
- passwordMinCategories, Configuring a Global Password Policy Using the Command-Line
- passwordMinDigits, Configuring a Global Password Policy Using the Command-Line
- passwordMinLowers, Configuring a Global Password Policy Using the Command-Line
- passwordMinSpecials, Configuring a Global Password Policy Using the Command-Line
- passwordMinTokenLength, Configuring a Global Password Policy Using the Command-Line
- passwordMinUppers, Configuring a Global Password Policy Using the Command-Line
- passwordMustChange, Configuring a Global Password Policy Using the Command-Line
- passwordStorageScheme, Configuring a Global Password Policy Using the Command-Line
- ref, Creating Smart Referrals from the Command Line
- removing a value, Removing an Attribute Value
- roles, Managing Roles Using the Command-Line
- searching for, Using Attributes in Search Filters
- standard, Overview of Extending Schema
- syntax, Creating Attributes
- targeting, Targeting Attributes
- user-defined, Viewing Attributes
- very large, Adding Very Large Attributes
- viewing, Viewing Attributes
- attribute subtypes, Adding an Attribute Subtype
-
- adding, Adding a Subtype to an Attribute
- binary, Binary Subtype
- language, Adding an Attribute Subtype
- pronunciation, Pronunciation Subtype
- attribute type field (LDIF), About the LDIF File Format
- attribute uniqueness plug-in
-
- creating an instance of, Creating an Instance of the Attribute Uniqueness Plug-in
- attribute uniqueness plug-in. See unique attribute plug-in, Using the Attribute Uniqueness Plug-in
- attribute value field (LDIF), About the LDIF File Format
- attribute values
-
- adding, Modifying an Entry Using LDIF
- deleting, Deleting a Specific Attribute Value Using LDIF
- modifying, Changing an Attribute Value Using LDIF
- replacing, Modifying an Entry Using LDIF
- syntax, Creating Attributes
- attributes values
-
- targeting, Targeting Attribute Values Using LDAP Filters
- audit log
-
- configuring, Configuring the Audit Log
- disabling, Configuring the Audit Log
- enabling, Configuring the Audit Log
- viewing, Viewing the Audit Log
- authentication
-
- access control and, Defining Access Based on Authentication Method
- bind DN, Logging into Directory Server
- certificate-based, Using Certificate-Based Authentication
- LDAP URLs, Examples of LDAP URLs
- over SSL, Starting the Server with SSL Enabled
- SASL, Managing SASL
- SASL mechanisms, Authentication Mechanisms
- authmethod keyword, Defining Access Based on Authentication Method
B
- backing up data, Backing up and Restoring Data
-
- all, Backing up All Databases
- db2bak, Backing up All Databases from the Command-Line
- dse.ldif, Backing up the dse.ldif Configuration File
- bak2db script, Using the bak2db Command-Line Script
- bak2db.pl perl script, Using bak2db.pl Perl Script
- base 64 encoding, Representing Binary Data
- base DN, ldapsearch and, Using LDAP_BASEDN
- binary data, LDIF and, Representing Binary Data
- binary subtype, Binary Subtype
- bind credentials
-
- for database links, Providing Bind Credentials
- bind DN
-
- accessing the server, Logging into Directory Server
- resource limits based on, Setting Resource Limits Based on the Bind DN
- viewing current, Viewing the Current Console Bind DN
- bind rules
-
- access at specific time or day, Defining Access at a Specific Time of Day or Day of Week
- access based on authentication method, Defining Access Based on Authentication Method
-
- LDIF example, Examples
- access based on value matching
-
- overview, Defining Access Based on Value Matching
- ACI syntax, The ACI Syntax
- all keyword, General Access (all Keyword)
- anonymous access, Anonymous Access (anyone Keyword)
-
- example, Examples
- LDIF example, Examples
- anyone keyword, Anonymous Access (anyone Keyword)
- authmethod keyword, Defining Access Based on Authentication Method
- Boolean, Using Boolean Bind Rules
- dayofweek keyword, Defining Access at a Specific Time of Day or Day of Week
- dns keyword, Defining Access from a Specific Domain
- general access, General Access (all Keyword)
-
- example, Examples
- group access, Defining Group Access - groupdn Keyword
- group access example, Granting a Group Full Access to a Suffix
- groupdn keyword, Defining Group Access - groupdn Keyword
- ip keyword, Defining Access from a Specific IP Address
- LDAP URLs, LDAP URLs
- LDIF keywords, Bind Rule Syntax
- overview, Bind Rules
- parent keyword, Parent Access (parent Keyword)
- role access, Defining Role Access - roledn Keyword
- roledn keyword, Defining Role Access - roledn Keyword
- self keyword, Self Access (self Keyword)
- timeofday keyword, Defining Access at a Specific Time of Day or Day of Week
- user access
-
- LDIF example, Examples
- parent, Parent Access (parent Keyword)
- self, Self Access (self Keyword)
- user access example, Granting Write Access to Personal Entries
- userattr keyword, Using the userattr Keyword
- userdn keyword, Defining User Access - userdn Keyword
- Boolean bind rules
-
- example, Using Boolean Bind Rules
- overview, Using Boolean Bind Rules
- Boolean operators, in search filters, Using Compound Search Filters
- browsing index, About Index Types
C
- cascading chaining
-
- client ACIs, Configuring Cascading Chaining from the Command-Line
- configuration attributes, Summary of Cascading Chaining Configuration Attributes
- configuring defaults, Configuring Cascading Chaining Defaults Using the Console
- configuring from command line, Configuring Cascading Chaining from the Command-Line
- configuring from console, Configuring Cascading Chaining Using the Console
- example, Cascading Chaining Configuration Example
- local ACI evaluation, Configuring Cascading Chaining from the Command-Line
- loop detection, Detecting Loops
- overview, Overview of Cascading Chaining
- proxy admin user ACI, Configuring Cascading Chaining from the Command-Line
- proxy authorization, Configuring Cascading Chaining from the Command-Line
- cascading replication
-
- initializing the replicas, Setting up the Replication Agreements
- introduction, Cascading Replication
- setting up, Configuring Cascading Replication
- certificate
-
- mapping to a DN, Setting up Certificate-Based Authentication
- password, Creating a Password File for the Directory Server
- certificate database
-
- password, Introduction to SSL in the Directory Server
- certificate-based authentication, Using Certificate-Based Authentication
-
- setting up, Setting up Certificate-Based Authentication
- chaining
-
- cascading, Overview of Cascading Chaining
- component operations, from command line, Chaining Component Operations from the Command-Line
- component operations, from console, Chaining Component Operations Using the Console
- overview, Creating and Maintaining Database Links
- using SSL, Chaining Using SSL
- change operations, LDIF Update Statements
-
- add, Modifying an Entry Using LDIF
- delete, Modifying an Entry Using LDIF
- replace, Modifying an Entry Using LDIF
- change type
-
- add, Adding an Entry Using LDIF
- delete, Deleting an Entry Using LDIF
- LDIF, LDIF Update Statements
- modify, Modifying an Entry Using LDIF
- changelog, Changelog
-
- deleting, Removing the Changelog
- character type, About Locales
- checkpoint interval, Changing the Database Checkpoint Interval
- ciphers
-
- list of
-
- SSLv3, Available Ciphers
- TLSv1, Available Ciphers
- none,MD5
-
- MD5 message authentication, Selecting the Encryption Cipher
- overview, Setting Security Preferences
- selecting, Setting Security Preferences
- class of service (CoS), Assigning Class of Service
-
- access control, Access Control and CoS
- classic
-
- example, How a Classic CoS Works
- overview, How a Classic CoS Works
- cosPriority attribute, Creating the CoS Template Entry from the Command-Line
- creating, Creating a New CoS
- definition entry, Creating the CoS Definition Entry from the Command-Line
- editing, Editing an Existing CoS
- indirect
-
- example, How an Indirect CoS Works
- overview, How an Indirect CoS Works
- pointer
-
- example, How a Pointer CoS Works
- overview, How a Pointer CoS Works
- qualifiers, Creating the CoS Definition Entry from the Command-Line
- template entry
-
- creating, Creating the CoS Template Entry
- overview, About the CoS Template Entry
- classic CoS
-
- example, How a Classic CoS Works
- overview, How a Classic CoS Works
- client
-
- using to find entries, Finding Directory Entries
- client authentication
-
- over SSL, Allowing/Requiring Client Authentication
- code page, About Locales
- collation order
-
- international index, Creating Indexes from the Server Console
- overview, About Locales
- search filters and, Searching an Internationalized Directory
- command line
-
- providing input from, Providing Input from the Command-Line
- command-line scripts
-
- db2bak, Backing up All Databases from the Command-Line
- command-line utilities
-
- certificate-based authentication and, Using Certificate-Based Authentication
- ldapdelete, Deleting Entries Using ldapdelete
- ldapmodify, Adding and Modifying Entries Using ldapmodify
- ldapsearch, LDAP Search Filters
- ldif, Base-64 Encoding
- ldif2db, Running the db2index.pl Script
- commas, in DNs, Using Special Characters, Targeting a Directory Entry
-
- using ldapsearch with, Specifying DNs That Contain Commas in Search Filters
- compare right, Assigning Rights
- compatibility
-
- ACIs, Compatibility with Earlier Releases
- replication, Compatibility with Earlier Versions of Directory Server
- compound search filters, Using Compound Search Filters
- configuration attributes
-
- account lockout, Configuring the Account Lockout Policy Using the Command-Line
- cascading chaining, Summary of Cascading Chaining Configuration Attributes
- password policy, Configuring a Global Password Policy Using the Command-Line
- suffix, Creating Root and Sub Suffixes from the Command-Line
- connections
-
- monitoring, Monitoring the Server from the Directory Server Console
- viewing number of, Monitoring the Server from the Directory Server Console
- consumer initialization
-
- filesystem replica, Filesystem Replica Initialization
- manual consumer creation, Manual Consumer Initialization Using the Command Line
- online consumer creation, Online Consumer Initialization Using the Console
- consumer server, Suppliers and Consumers
- continued lines
-
- in LDIF, Continuing Lines in LDIF
- in LDIF update statements, LDIF Update Statements
- CoS definition entry
-
- attributes, Creating the CoS Definition Entry from the Command-Line
- object classes, Creating the CoS Definition Entry from the Command-Line
- CoS qualifiers, Creating the CoS Definition Entry from the Command-Line
-
- default, Creating the CoS Definition Entry from the Command-Line
- override, Creating the CoS Definition Entry from the Command-Line
- CoS template entry, About the CoS Template Entry
-
- creating, Creating the CoS Template Entry
- CoS. See class of service., Assigning Class of Service
- cosPriority attribute, Creating the CoS Template Entry from the Command-Line
- counter, password failures, Configuring the Account Lockout Policy Using the Console
- country code, Identifying Supported Locales
- creating a database
-
- from the command line, Creating a New Database for a Single Suffix from the Command-Line
- from the console, Creating a New Database for an Existing Suffix Using the Console
- creating a virtual DIT, Using Views
- creating the directory, Defining Directories Using LDIF
- custom distribution function
-
- adding to suffix, Adding Multiple Databases for a Single Suffix
- custom distribution logic
-
- adding databases, Adding Multiple Databases for a Single Suffix
- adding to suffix, Adding Multiple Databases for a Single Suffix
D
- dash, in change operation, LDIF Update Statements
- data consistency
-
- using referential integrity, Maintaining Referential Integrity
- database
-
- and associated suffix, Creating and Maintaining Suffixes
- backing up
-
- db2bak, Backing up All Databases from the Command-Line
- backup, Backing up and Restoring Data
- backup files, Backing up All Databases from the Server Console
- backup from console, Backing up All Databases
- creating from command line, Creating a New Database for a Single Suffix from the Command-Line
- creating from console, Creating a New Database for an Existing Suffix Using the Console
- creating multiple, Adding Multiple Databases for a Single Suffix
- creating using LDIF, Defining Directories Using LDIF
- deleting, Deleting a Database
- export, Exporting Data
-
- db2ldif, Exporting to LDIF from the Command-Line
- encrypted database, Exporting and Importing an Encrypted Database
- export from console, Exporting Directory Data to LDIF Using the Console
- import, Importing Data
-
- encrypted database, Exporting and Importing an Encrypted Database
- ldif2db, Importing Using the ldif2db Command-Line Script
- ldif2db.pl, Importing Using the ldif2db.pl Perl Script
- ldif2ldap, Importing Using the ldif2ldap Command-Line Script
- initialization, Initializing a Database from the Console
- making read-only, Placing a Database in Read-Only Mode
- monitoring from command line, Monitoring Databases from the Command Line
- monitoring from server console, Monitoring Database Activity from the Directory Server Console
- overview, Creating and Maintaining Databases
- read-only mode, Placing a Database in Read-Only Mode
- replication, What Directory Units Are Replicated
- restore, Backing up and Restoring Data
- restoring, Tuning Transaction Logging
-
- bak2db, Using the bak2db Command-Line Script
- bak2db.pl, Using bak2db.pl Perl Script
- restoring from console, Restoring All Databases from the Console
- selecting for monitoring, Monitoring Database Activity
- viewing backend information, Monitoring Database Activity
- database encryption, Database Encryption
-
- importing and exporting, Exporting and Importing an Encrypted Database
- database link
-
- cascading
-
- configuring defaults, Configuring Cascading Chaining Defaults Using the Console
- configuring from command line, Configuring Cascading Chaining from the Command-Line
- configuring from console, Configuring Cascading Chaining Using the Console
- overview, Overview of Cascading Chaining
- chaining with SSL, Chaining Using SSL
- configuration, Creating a New Database Link
- configuration attributes, Summary of Database Link Configuration Attributes
- configuration example, Summary of Database Link Configuration Attributes
- configuring bind credentials, Providing Bind Credentials
- configuring failover servers, Providing a List of Failover Servers
- configuring LDAP URL, Providing an LDAP URL
- configuring suffix, Creating a Database Link from the Command-Line
- creating from command line, Creating a Database Link from the Command-Line
- creating from console, Creating a New Database Link Using the Console
- deleting, Deleting Database Links
- maintaining remote server info, Updating Remote Server Authentication Information
- overview, Creating and Maintaining Database Links
- database server parameters
-
- read-only, Monitoring Database Activity from the Directory Server Console
- database transaction logging
-
- described, Tuning Transaction Logging
- durable transactions, Disabling Durable Transactions
- log file location, Changing the Location of the Database Transaction Log
- databases
-
- in Directory Server, Configuring Directory Databases
- date format, About Locales
- dayofweek keyword, Defining Access at a Specific Time of Day or Day of Week
- db2bak script, Backing up All Databases from the Command-Line
- db2bak utility, Backing up All Databases from the Command-Line
- db2ldif utility, Exporting to LDIF from the Command-Line
- default CoS qualifier, Creating the CoS Definition Entry from the Command-Line
- default referrals
-
- setting, Setting Default Referrals
- setting from console, Setting a Default Referral Using the Console
- settings from command line, Setting a Default Referral from the Command-Line
- defining
-
- access control policy, Creating ACIs from the Console
- attributes, Creating Attributes
- object classes, Creating Object Classes
- definition entry. See CoS definition entry., Creating the CoS Definition Entry from the Command-Line
- delete right, Assigning Rights
- deleting
-
- ACI, Deleting an ACI
- attribute values, Deleting a Specific Attribute Value Using LDIF
- attributes, Modifying an Entry Using LDIF, Deleting Attributes
- attributes from an object class, Creating Object Classes
- database link, Deleting Database Links
- entries, Deleting an Entry Using LDIF
- multiple attributes, Modifying an Entry Using LDIF
- object classes, Deleting Object Classes
- deleting directory entries, Deleting Entries Using ldapdelete
- denying access, Allowing or Denying Access
-
- precedence rule, ACI Evaluation
- directory creation, Defining Directories Using LDIF
- directory entries
-
- adding using LDIF, Adding Entries Using LDIF
- creating, Creating Directory Entries
- deleting, Deleting Directory Entries
- managing from command line, Managing Entries from the Command-Line
- managing from console, Managing Entries from the Directory Console
- modifying, Modifying Directory Entries
- moving, A Note on Renaming Entries
- renaming, A Note on Renaming Entries
- Directory Manager
-
- attribute, Configuring the Directory Manager
- configuring, Configuring the Directory Manager
- privileges, Configuring the Directory Manager
- Directory Server, Monitoring Server Activity
-
- attributes, Configuring the Directory Manager
- basic administration, General Red Hat Directory Server Usage
- binding to, Logging into Directory Server
- changing bind DN, Changing Login Identity
- configuration, Changing Directory Server Port Numbers
- configuring SASL authentication at startup, Configuring SASL Authentication at Directory Server Startup
- controlling access, Managing Access Control
- creating a root entry, Creating a Root Entry
- creating content, Populating Directory Databases
- creating entries, Creating Directory Entries
- data, Populating Directory Databases
- databases, Configuring Directory Databases
- deleting entries, Deleting Directory Entries
- file locations, Directory Server File Locations
- importing data, Importing Data
- international charactersets, Internationalization
- login, Logging into Directory Server
- managing entries, Creating Directory Entries
- MIB, Using the Management Information Base
- modifying entries, Modifying Directory Entries
- monitoring, Viewing and Configuring Log Files
- monitoring from command line, Monitoring the Directory Server from the Command Line
- monitoring with SNMP, Monitoring Directory Server Using SNMP
- overview, General Red Hat Directory Server Usage
- performance counters, Monitoring Server Activity
- plug-ins, Administering Directory Server Plug-ins
- starting and stopping, Starting and Stopping Directory Server from the Command Line
- starting the Console, Starting the Directory Server Console
- suffixes, Configuring Directory Databases
- supported languages, Identifying Supported Locales
- Directory Server Console
-
- starting, Starting the Directory Server Console
- directory trees
-
- finding entries in, Using ldapsearch
- disabling suffixes, Disabling a Suffix
- disk space
-
- access log and, Configuring the Access Log
- log files and, Manual Log File Rotation
- distribution function, Adding Multiple Databases for a Single Suffix
- dn field (LDIF), About the LDIF File Format
- dns keyword, Defining Access from a Specific Domain
- dse.ldif
-
- PTA plugin, Turning the Plug-in On or Off
- dse.ldif file
-
- backing up, Backing up the dse.ldif Configuration File
- PTA syntax, Turning the Plug-in On or Off
- restoring, Restoring the dse.ldif Configuration File
- durable transactions, Disabling Durable Transactions
- dynamic groups, Managing Dynamic Groups
-
- creating, Adding a New Dynamic Group
- modifying, Modifying a Dynamic Group
E
- editing
-
- attributes, Editing Attributes
- object classes, Editing Object Classes
- encryption
-
- database, Database Encryption
- end of file marker, Providing Input from the Command-Line
- entity table, Entity Table
- entries
-
- adding an object class, Adding an Object Class to an Entry
- adding attributes, Adding an Attribute to an Entry
- adding using LDIF, Adding Entries Using LDIF
- adding using LDIF update statements, Adding an Entry Using LDIF
- adding very large attributes, Adding Very Large Attributes
- creating, Creating Directory Entries
-
- using LDIF, Specifying Directory Entries Using LDIF
- deleting, Deleting Directory Entries
-
- using ldapdelete, Deleting Entries Using ldapdelete
- deleting using LDIF update statements, Deleting an Entry Using LDIF
- distribution, Creating Databases
- finding, Using ldapsearch
- managing, Creating Directory Entries
- managing from command line, Managing Entries from the Command-Line
- managing from console, Managing Entries from the Directory Console
- modifying, Modifying Directory Entries
-
- using ldapmodify, Adding and Modifying Entries Using ldapmodify
- using LDIF update statements, Modifying an Entry Using LDIF
- moving, A Note on Renaming Entries
- order of creation, Providing Input from the Command-Line
- order of deletion, Deleting Entries Using ldapdelete
- removing an object class, Removing an Object Class
- renaming, A Note on Renaming Entries
- root, Defining Directories Using LDIF
- targeting, Targeting a Directory Entry
- entry distribution, Creating Databases
- entry ID list, Managing Indexes
- environment variables
-
- LDAP_BASEDN, Using LDAP_BASEDN
- EOF marker, Providing Input from the Command-Line
- equality index, About Index Types
- equality search, Using Operators in Search Filters
-
- example, Search Filter Examples
- international example, Equality Example
- error log
-
- access control information, Logging Access Control Information
- configuring, Configuring the Error Log
- manually rotating, Manual Log File Rotation
- turning off, Configuring the Error Log
- turning on, Configuring the Error Log
- viewing, Viewing the Error Log
- example
-
- cascading chaining, Cascading Chaining Configuration Example
- exporting data, Exporting Data
-
- db2ldif, Exporting to LDIF from the Command-Line
- encrypted database, Exporting and Importing an Encrypted Database
- using console, Exporting Directory Data to LDIF Using the Console
- extending the directory schema, Extending the Directory Schema
F
- failover servers
-
- for database links, Providing a List of Failover Servers
- File locations, Directory Server File Locations
- files
-
- access log, Viewing the Access Log
- database backup, Backing up All Databases from the Server Console
- EOF marker, Providing Input from the Command-Line
- error log, Viewing the Error Log
- id2entry.db4, Overview of Standard Indexes
- Filesystem Hierarchy Standard, Directory Server File Locations
- filesystem replica initialization, Filesystem Replica Initialization
- filtered role
-
- creating, Creating a Filtered Role
- example, Example: Filtered Role Definition
- finding
-
- attributes, Using Attributes in Search Filters
- entries, Using ldapsearch
- format, LDIF, LDAP Data Interchange Format
G
- general access
-
- example, Examples
- overview, General Access (all Keyword)
- get effective rights, Get Effective Rights Control
-
- return codes, Get Effective Rights Return Codes
- global password policy, Configuring the Password Policy
- glue entries, Solving Orphan Entry Conflicts
- greater than or equal to search
-
- international example, Greater-Than or Equal-to Example
- overview, Using Operators in Search Filters
- groupdn keyword, Defining Group Access - groupdn Keyword
-
- LDIF examples, Defining Group Access - groupdn Keyword
- groupdnattr keyword, Using the userattr Keyword
- groups
-
- access control, Defining User Access - userdn Keyword
- access control example, Granting a Group Full Access to a Suffix
- access to directory, Defining Group Access - groupdn Keyword
- differences between Directory Server and Active Directory, Groups
- dynamic, Managing Dynamic Groups
-
- creating, Adding a New Dynamic Group
- modifying, Modifying a Dynamic Group
- overview, Using Groups
- static, Managing Static Groups
-
- creating, Adding a New Static Group
- modifying, Modifying a Static Group
- GSS-API, Authentication Mechanisms
I
- id field (LDIF), About the LDIF File Format
- id2entry.db4 file, Overview of Standard Indexes
- identity mapping
-
- default, SASL Identity Mapping
- importing data, Importing Data
-
- encrypted database, Exporting and Importing an Encrypted Database
- from console, Importing a Database from the Console
- ldif2ldap, Importing Using the ldif2ldap Command-Line Script
- using ldif2db, Importing Using the ldif2db Command-Line Script
- using ldif2db.pl, Importing Using the ldif2db.pl Perl Script
- inactivating accounts, Inactivating Users and Roles
- inactivating roles, About Roles
- index types, About Index Types
-
- approximate index, About Index Types
- browsing index, About Index Types
- equality index, About Index Types
- international index, About Index Types
- presence index, About Index Types
- substring index, About Index Types
- virtual list view index, About Index Types
- indexes
-
- creating dynamically, Creating Indexes from the Command-Line
- dynamic changes to, Creating Indexes from the Command-Line
- presence, Overview of System Indexes
- indexing, About Index Types
-
- creating indexes from console, Creating Indexes from the Server Console
- system indexes, Overview of System Indexes
- indirect CoS
-
- example, How an Indirect CoS Works
- overview, How an Indirect CoS Works
- init scripts
-
- configuring SASL authentication, Configuring SASL Authentication at Directory Server Startup
- initializing databases, Initializing a Database from the Console
- initializing replicas
-
- cascading replication, Setting up the Replication Agreements
- filesystem replica, Filesystem Replica Initialization
- interaction table, Interaction Table
- international charactersets, Internationalization
- international index, About Index Types
-
- collation order, Creating Indexes from the Server Console
- international searches, Searching an Internationalized Directory
-
- equality, Equality Example
- examples, International Search Examples
- greater than, Greater-Than Example
- greater than or equal to, Greater-Than or Equal-to Example
- less than, Less-Than Example
- less than or equal to, Less-Than or Equal-to Example
- matching rule filter syntax, Matching Rule Filter Syntax
- substring, Substring Example
- using OIDs, Matching Rule Formats
- internationalization
-
- character type, About Locales
- collation order, About Locales
- country code, Identifying Supported Locales
- date format, About Locales
- language tag, Identifying Supported Locales
- locales and, About Locales
- location of files, About Locales
- matching rule filters, Matching Rule Filter Syntax
- modifying entries, Modifying an Entry in an Internationalized Directory
- monetary format, About Locales
- object identifiers and, Identifying Supported Locales
- of LDIF files, Storing Information in Multiple Languages
- search filters and, Searching an Internationalized Directory
- supported locales, Identifying Supported Locales
- time format, About Locales
- ip keyword, Defining Access from a Specific IP Address
L
- language code
-
- in LDIF entries, Storing Information in Multiple Languages
- list of supported, Identifying Supported Locales
- language subtype, Adding an Attribute Subtype
- language support
-
- language tag, Identifying Supported Locales
- searching and, Searching an Internationalized Directory
- specifying using locales, Identifying Supported Locales
- language tags
-
- described, Identifying Supported Locales
- in international searches, Using a Language Tag for the Matching Rule
- in LDIF update statements, Modifying an Entry in an Internationalized Directory
- LDAP clients
-
- authentication over SSL, Configuring LDAP Clients to Use SSL
- certificate-based authentication and, Using Certificate-Based Authentication
- monitoring database with, Monitoring Databases from the Command Line
- monitoring server with, Monitoring the Directory Server from the Command Line
- schema and, Overview of Extending Schema
- using to find entries, Finding Directory Entries
- LDAP Data Interchange Format, see LDIF, LDIF Update Statements
- LDAP search filters
-
- DNs with commas and, Specifying DNs That Contain Commas in Search Filters
- in targets, Targeting Entries or Attributes Using LDAP Filters
-
- example, Setting a Target Using Filtering
- examples, Targeting Entries or Attributes Using LDAP Filters
- LDAP URLs
-
- components of, Components of an LDAP URL
- examples, Examples of LDAP URLs
- for database links, Providing an LDAP URL
- in access control, LDAP URLs
- security, Examples of LDAP URLs
- syntax, Components of an LDAP URL
- ldap-agent, Starting the Subagent
- ldapdelete utility, Adding and Modifying Entries Using ldapmodify
-
- deleting entries, Deleting Entries Using ldapdelete
- DNs with commas and, Using Special Characters
- example, Deleting Entries Using ldapdelete
- ldapmodify utility, Adding and Modifying Entries Using ldapmodify
-
- attributes with language tags, Modifying an Entry in an Internationalized Directory
- creating a root entry, Creating a Root Entry from the Command-Line
- creating entries, Adding Entries Using ldapmodify
- DNs with commas and, Using Special Characters
- example, Adding Entries Using ldapmodify
- example of use, Adding Entries Using ldapmodify
- modifying entries, Adding and Modifying Entries Using ldapmodify
- schema checking and, Adding and Modifying Entries Using ldapmodify
- vs. ldapdelete, Adding and Modifying Entries Using ldapmodify
- ldapsearch utility
-
- base DN and, Using LDAP_BASEDN
- commonly used options, Commonly Used ldapsearch Options
- DNs with commas and, Using Special Characters
- example of use, ldapsearch Examples
- format, ldapsearch Command-Line Format
- international searches, Searching an Internationalized Directory
- limiting attributes returned, Displaying Subsets of Attributes
- search filters, LDAP Search Filters
- specifying files, Displaying Subsets of Attributes
- using, Using ldapsearch
- LDAP_BASEDN environment variable, Using LDAP_BASEDN
- LDIF
-
- access control keywords
-
- groupdnattr, Using the userattr Keyword
- userattr, Using the userattr Keyword
- adding entries, Adding Entries Using LDIF
- binary data, Representing Binary Data
- change type, LDIF Update Statements
- entry format, LDAP Data Interchange Format
-
- organization, Specifying Domain Entries
- organizational person, Specifying Organizational Person Entries
- organizational unit, Specifying Organizational Unit Entries
- example, LDIF File Example
- internationalization and, Storing Information in Multiple Languages
- line continuation, Continuing Lines in LDIF
- Server Console and, Adding Entries Using LDIF
- specifying entries
-
- organization, Specifying Domain Entries
- organizational person, Specifying Organizational Person Entries
- organizational unit, Specifying Organizational Unit Entries
- update statements, LDIF Update Statements
- using to create directory, Defining Directories Using LDIF
- LDIF entries
-
- binary data in, Representing Binary Data
- creating, Specifying Directory Entries Using LDIF
-
- organizational person, Specifying Organizational Person Entries
- organizational units, Specifying Organizational Unit Entries
- organizations, Specifying Domain Entries
- internationalization and, Storing Information in Multiple Languages
- LDIF files
-
- continued lines, Continuing Lines in LDIF
- creating directory using, Defining Directories Using LDIF
- creating multiple entries, Adding Entries Using LDIF
- example, LDIF File Example
- importing from Server Console, Adding Entries Using LDIF
- internationalization and, Storing Information in Multiple Languages
- LDIF format, LDAP Data Interchange Format
- LDIF update statements, LDIF Update Statements
-
- adding attributes, Adding Attributes to Existing Entries Using LDIF
- adding entries, Adding an Entry Using LDIF
- continued lines, LDIF Update Statements
- deleting attribute values, Deleting a Specific Attribute Value Using LDIF
- deleting attributes, Deleting All Values of an Attribute Using LDIF
- deleting entries, Deleting an Entry Using LDIF
- modifying attribute values, Changing an Attribute Value Using LDIF
- modifying entries, Modifying an Entry Using LDIF
- syntax, LDIF Update Statements
- ldif utility
-
- converting binary data to LDIF, Base-64 Encoding
- ldif2db utility, Importing Using the ldif2db Command-Line Script
-
- options, Running the db2index.pl Script
- ldif2db.pl perl script, Importing Using the ldif2db.pl Perl Script
- ldif2ldap utility, Importing Using the ldif2ldap Command-Line Script
- legacy consumer
-
- configuration, Replication with Earlier Releases
- legacy replication plug-in
-
- overview, Compatibility with Earlier Versions of Directory Server
- less than or equal to search
-
- international example, Less-Than or Equal-to Example
- syntax, Using Operators in Search Filters
- less than search
-
- international example, Less-Than Example
- syntax, Using Operators in Search Filters
- local password policy, Configuring the Password Policy
- locales
-
- defined, About Locales
- location of files, About Locales
- supported, Identifying Supported Locales
- locked accounts, Configuring the Account Lockout Policy Using the Console
- lockout duration, Configuring the Account Lockout Policy Using the Console
- log files, Viewing and Configuring Log Files
-
- access log, Access Log
- audit log, Audit Log
- database transaction, Tuning Transaction Logging
- deletion policy, Defining a Log File Deletion Policy
- error log, Error Log
- location of, Manual Log File Rotation
- manually rotating, Manual Log File Rotation
- rotation policy, Defining a Log File Rotation Policy
- setting file permissions, Defining a Log File Rotation Policy
- viewing when server is down, Viewing and Configuring Log Files
- logging
-
- for WinSync, Troubleshooting
- login identity
-
- changing, Changing Login Identity
- viewing, Viewing the Current Console Bind DN
- loop detection
-
- cascading chaining, Detecting Loops
M
- macro ACIs
-
- example, Macro ACI Example
- overview, Advanced Access Control: Using Macro ACIs
- syntax, Macro ACI Syntax
- managed device
-
- overview, About SNMP
- managed object, About SNMP
- managed role
-
- creating, Creating a Managed Role
- example, Examples: Managed Role Definition
- manually rotating log files, Manual Log File Rotation
- markerObjectClass keyword, Using the markerObjectClass and requiredObjectClass Keywords
- matchingRule format, Matching Rule Formats
-
- using language tag, Using a Language Tag for the Matching Rule
- using language tag and suffix, Using a Language Tag and Suffix for the Matching Rule
- using OID, Matching Rule Formats
- using OID and suffix, Using an OID and Suffix for the Matching Rule
- metaphone phonetic algorithm, Approximate Searches
- MIB
-
- Directory Server, Using the Management Information Base
- redhat-directory.mib, Using the Management Information Base
-
- entity table, Entity Table
- entries table, Entries Table
- interaction table, Interaction Table
- operations table, Operations Table
- modifying
-
- attribute values, Changing an Attribute Value Using LDIF
- entries, Modifying an Entry Using LDIF
- international entries, Modifying an Entry in an Internationalized Directory
- monetary format, About Locales
- monitoring
-
- database from command line, Monitoring Databases from the Command Line
- database from server console, Monitoring Database Activity from the Directory Server Console
- Directory Server, Viewing and Configuring Log Files
- from console, Monitoring Server Activity
- log files, Viewing and Configuring Log Files
- replication status, Monitoring Replication Status
- threads, Monitoring the Server from the Directory Server Console
- with SNMP, Monitoring Directory Server Using SNMP
- monitoring from console, Monitoring Server Activity
- moving entries, A Note on Renaming Entries
- multi-master replication
-
- introduction, Multi-Master Replication
- preventing monopolization of the consumer, Preventing Monopolization of the Consumer in Multi-Master Replication
- setting up, Configuring Multi-Master Replication
- multiple search filters, Using Compound Search Filters
N
- naming conflicts
-
- in replication, Solving Naming Conflicts
- nested role
-
- creating, Creating a Nested Role
- example, Example: Nested Role Definition
- nsds5ReplicaBusyWaitTime, Preventing Monopolization of the Consumer in Multi-Master Replication
- nsds5ReplicaSessionPauseTime, Preventing Monopolization of the Consumer in Multi-Master Replication
- nsRole, About Roles
- nsslapd-db-checkpoint-interval, Changing the Database Checkpoint Interval
- nsslapd-db-durable-transactions, Disabling Durable Transactions
- nsslapd-db-logdirectory, Changing the Location of the Database Transaction Log
- nsslapd-idlistscanlimit, Overview of the Searching Algorithm
- nsslapd-lookthroughlimit attribute
-
- role in searching algorithm, Overview of the Searching Algorithm
- nsslapd-maxbersize, Adding Very Large Attributes
- nsslapd-schemacheck attribute, Turning Schema Checking On and Off
- nsslapd-sizelimit attribute
-
- role in searching algorithm, Overview of the Searching Algorithm
- nsslapd-timelimit attribute
-
- role in searching algorithm, Overview of the Searching Algorithm
- nsview, Using Views
- nsviewfilter, Using Views
O
- object class
-
- adding to an entry, Adding an Object Class to an Entry
- creating, Creating Object Classes
- deleting, Deleting Object Classes
- editing, Editing Object Classes
- name, Creating Object Classes
- OID, Creating Object Classes
- parent object, Creating Object Classes
- referral, Creating Smart Referrals from the Command Line
- removing from an entry, Removing an Object Class
- roles, Managing Roles Using the Command-Line
- standard, Overview of Extending Schema
- user-defined, Viewing Object Classes
- viewing, Viewing Object Classes
- object identifier (OID), Identifying Supported Locales
-
- attribute, Creating Attributes
- in matchingRule, Matching Rule Formats
- object class, Creating Object Classes
- objectClass field (LDIF), About the LDIF File Format
- OID, See object identifier, Identifying Supported Locales
- operations table, Operations Table
- operations, defined, Monitoring the Server from the Directory Server Console
- operators
-
- Boolean, Using Compound Search Filters
- international searches and, Supported Search Types
- search filters and, Using Operators in Search Filters
- suffix, Supported Search Types
- optional attributes
-
- creating, Creating Object Classes
- deleting, Creating Object Classes
- editing, Editing Object Classes
- editing in object class, Editing Object Classes
- organization, specifying entries for, Specifying Domain Entries
- organizational person, specifying entries for, Specifying Organizational Person Entries
- organizational unit, specifying entries for, Specifying Organizational Unit Entries
- override CoS qualifier, Creating the CoS Definition Entry from the Command-Line
P
- parent access, Parent Access (parent Keyword)
- parent keyword, Parent Access (parent Keyword)
- parent object, Creating Object Classes
- pass-through authentication (PTA). See PTA plug-in, Using the Pass-through Authentication Plug-in
- password change extended operation, Password Change Extended Operation
- password file
-
- Administration Server, Creating a Password File for the Administration Server
- SSL certificate, Creating a Password File for the Directory Server
- password policy
-
- account lockout, Configuring the Account Lockout Policy Using the Console
- attributes, Configuring a Global Password Policy Using the Command-Line
- configuring, Configuring the Password Policy
-
- using command line, Configuring a Global Password Policy Using the Command-Line
- using console, Configuring a Global Password Policy Using the Console
- global, Configuring the Password Policy
- lockout duration, Configuring the Account Lockout Policy Using the Console
- managing, Managing the Password Policy
- password failure counter, Configuring the Account Lockout Policy Using the Console
- replicating account lockout attributes, Replicating Account Lockout Attributes
- replication, Managing the Password Policy in a Replicated Environment
- subtree level, Configuring the Password Policy
- user level, Configuring the Password Policy
- Password Sync, Password Sync Service
-
- installation directory, Step 4: Install and Configure the Password Sync Service
- installed files, Step 4: Install and Configure the Password Sync Service
- installing, Step 4: Install and Configure the Password Sync Service
- modifying, Modifying Password Sync
- setting up SSL, Step 4: Install and Configure the Password Sync Service
- starting and stopping, Starting and Stopping the Password Sync Service
- uninstalling, Uninstalling Password Sync Service
- passwordChange attribute, Configuring a Global Password Policy Using the Command-Line
- passwordExp attribute, Configuring a Global Password Policy Using the Command-Line
- passwordGraceLimit attribute, Configuring a Global Password Policy Using the Command-Line
- passwordInHistory attribute, Configuring a Global Password Policy Using the Command-Line
- passwordMaxRepeats attribute, Configuring a Global Password Policy Using the Command-Line
- passwordMin8bit attribute, Configuring a Global Password Policy Using the Command-Line
- passwordMinAlphas attribute, Configuring a Global Password Policy Using the Command-Line
- passwordMinCategories attribute, Configuring a Global Password Policy Using the Command-Line
- passwordMinDigits attribute, Configuring a Global Password Policy Using the Command-Line
- passwordMinLowers attribute, Configuring a Global Password Policy Using the Command-Line
- passwordMinSpecials attribute, Configuring a Global Password Policy Using the Command-Line
- passwordMinTokenLength attribute, Configuring a Global Password Policy Using the Command-Line
- passwordMinUppers attribute, Configuring a Global Password Policy Using the Command-Line
- passwordMustChange attribute, Configuring a Global Password Policy Using the Command-Line
- passwords
-
- account lockout, Configuring the Account Lockout Policy Using the Console
- certificate, Creating a Password File for the Directory Server
- changing, Password Change Extended Operation
- failure counter, Configuring the Account Lockout Policy Using the Console
- lockout duration, Configuring the Account Lockout Policy Using the Console
- policy
-
- differences between Directory Server and Active Directory, Password Policies
- setting, Setting User Passwords
- synching with Active Directory, Password Sync Service
- passwordStorageScheme attribute, Configuring a Global Password Policy Using the Command-Line
- PDUs, About SNMP
- performance counters, Monitoring Database Activity from the Directory Server Console
-
- monitoring the server with, Monitoring Server Activity
- performance tuning
-
- database, Tuning Database Performance
- server, Tuning Server Performance
- permissions
-
- ACI syntax, The ACI Syntax
- allowing or denying access, Allowing or Denying Access
- assigning rights, Assigning Rights
- overview, Defining Permissions
- precedence rule, ACI Evaluation
- plug-in functions, Administering Directory Server Plug-ins
- plug-ins
-
- 7-bit check plug-in, 7-Bit Check Plug-in
- ACL plug-in, ACL Plug-in
- ACL preoperation plug-in, ACL Preoperation Plug-in
- binary syntax plug-in, Binary Syntax Plug-in
- Boolean syntax plug-in, Boolean Syntax Plug-in
- case exact string syntax plug-in, Case Exact String Syntax Plug-in
- case ignore string syntax plug-in, Case Ignore String Syntax Plug-in
- chaining database plug-in, Chaining Database Plug-in
- Class of Service plug-in, Class of Service Plug-in
- CLEAR password storage plug-in, CLEAR Password Storage Plug-in
- Country String Syntax Plug-in, Country String Syntax Plug-in
- CRYPT password storage plug-in, CRYPT Password Storage Plug-in
- disabling, Enabling and Disabling Plug-ins
- distinguished name syntax plug-in, Distinguished Name Syntax Plug-in
- enabling, Enabling and Disabling Plug-ins
- generalized time syntax plug-in, Generalized Time Syntax Plug-in
- integer syntax plug-in, Integer Syntax Plug-in
- internationalization plug-in, Internationalization Plug-in
- ldbm database plug-in, ldbm Database Plug-in
- legacy replication plug-in, Legacy Replication Plug-in
- multimaster replication plug-in, Multi-Master Replication Plug-in
- NS-MTA-MD5 password storage plug-in, NS-MTA-MD5 Password Storage Plug-in
- octet string syntax plug-in, Octet String Syntax Plug-in
- postal address string syntax plug-in, Postal Address String Syntax Plug-in
- PTA plug-in, PTA Plug-in
- reference, Server Plug-in Functionality Reference
- referential integrity plug-in, Referential Integrity Postoperation Plug-in
- retro changelog plug-in, Retro Changelog Plug-in
- roles plug-in, Roles Plug-in
- SHA password storage plug-in, SHA Password Storage Plug-in
- space insensitive string syntax plug-in, Space Insensitive String Syntax Plug-in
- SSHA password storage plug-in, SSHA Password Storage Plug-in
- state change plug-in, State Change Plug-in
- telephone syntax plug-in, Telephone Syntax Plug-in
- uid uniqueness plug-in, UID Uniqueness Plug-in
- URI plug-in, URI Plug-in
- pointer CoS
-
- example, How a Pointer CoS Works
- overview, How a Pointer CoS Works
- port number
-
- Directory Server configuration, Changing Directory Server Port Numbers
- for SSL communications, Changing Directory Server Port Numbers
- precedence rule
-
- ACI, ACI Evaluation
- preferences
-
- security, Setting Security Preferences
- presence index, About Index Types
-
- defaults, Overview of System Indexes
- presence search
-
- example, Search Filter Examples
- syntax, Using Operators in Search Filters
- preventing monopolization of the consumer in multi-master replication, Preventing Monopolization of the Consumer in Multi-Master Replication
- pronunciation subtype, Pronunciation Subtype
- Property Editor
-
- displaying, Displaying the Property Editor
- protocol data units. See PDUs, About SNMP
- proxy authorization
-
- ACI example, Proxied Authorization ACI Example
- with cascading chaining, Configuring Cascading Chaining from the Command-Line
- proxy DN, Proxied Authorization ACI Example
- proxy right, Assigning Rights
- PTA plug-in
-
- configuring, Configuring the PTA Plug-in
- examples, PTA Plug-in Syntax Examples
- syntax, PTA Plug-in Syntax
- use in Directory Server, How Directory Server Uses PTA
R
- read right, Assigning Rights
- read-only mode, Monitoring Database Activity from the Directory Server Console
-
- database, Placing a Database in Read-Only Mode
- read-only replica, Read-Write and Read-Only Replicas
- read-write replica, Read-Write and Read-Only Replicas
- redhat-directory.mib, Using the Management Information Base
-
- entity table, Entity Table
- entries table, Entries Table
- interaction table, Interaction Table
- operations table, Operations Table
- ref attribute, Creating Smart Referrals from the Command Line
- refer command, Starting the Server in Referral Mode
- referential integrity
-
- attributes, How Referential Integrity Works
- disabling, Enabling/Disabling Referential Integrity
- enabling, Enabling/Disabling Referential Integrity
- log file, How Referential Integrity Works
- modifying attributes, Modifying the Attribute List
- overview, Maintaining Referential Integrity
- with replication, Using Referential Integrity with Replication
- referral mode, Starting the Server in Referral Mode
- referral object class, Creating Smart Referrals from the Command Line
- referrals
-
- creating smart referrals, Creating Smart Referrals
- creating suffix, Creating Suffix Referrals
- on update, Enabling Referrals Only During Update Operations
- setting default, Setting Default Referrals
- suffix, Using Referrals in a Suffix
- renaming entries
-
- restrictions, A Note on Renaming Entries
- repl-monitor.pl script, Monitoring Replication Status from Administration Express
- replacing attribute values, Modifying an Entry Using LDIF
- replica
-
- exporting to LDIF, Exporting a Replica to LDIF
- read-only, Read-Write and Read-Only Replicas
- read-write, Read-Write and Read-Only Replicas
- replicate_now.sh script, Forcing Replication Updates from the Command-Line
- replication
-
- and access control, Access Control and Replication
- and password policy, Managing the Password Policy in a Replicated Environment
- and referential integrity, Using Referential Integrity with Replication
- and SSL, Replication over SSL
- cascading, Configuring Cascading Replication
- changelog, Changelog
- compatibility with earlier versions, Compatibility with Earlier Versions of Directory Server
- configuring from the command line, Configuring Replication from the Command Line
- configuring legacy replication, Replication with Earlier Releases
- configuring SSL, Replication over SSL
- consumer server, Suppliers and Consumers
- creating the supplier bind DN, Creating the Supplier Bind DN Entry
- forcing synchronization, Forcing Replication Updates
- hub, Suppliers and Consumers
- managing, Managing Replication
- monitoring status, Monitoring Replication Status
- multi-master, Configuring Multi-Master Replication
- of ACIs, Access Control and Replication
- overview, Replication Overview
- replicate_now.sh script, Forcing Replication Updates from the Command-Line
- replicating account lockout attributes, Replicating Account Lockout Attributes
- replication manager entry, Replication Identity
- single-master, Configuring Single-Master Replication
- solving conflicts, Solving Common Replication Conflicts
- supplier bind DN, Replication Identity
- supplier server, Suppliers and Consumers
- supplier-initiated, Suppliers and Consumers
- troubleshooting, Troubleshooting Replication-Related Problems
- unit of, What Directory Units Are Replicated
- using repl-monitor.pl script, Monitoring Replication Status from Administration Express
- using template-cl-dump.pl script, Troubleshooting Replication-Related Problems
- replication agreement, Replication Agreement
- replication manager, Replication Identity
- required attributes
-
- creating, Creating Object Classes
- deleting, Creating Object Classes
- editing, Editing Object Classes
- requiredObjectClass keyword, Using the markerObjectClass and requiredObjectClass Keywords
- resource limits, Setting Resource Limits Based on the Bind DN
-
- setting
-
- using command line, Setting Resource Limits Using the Command-Line
- using console, Setting Resource Limits Using the Console
- Resource Summary
-
- viewing, Monitoring the Server from the Directory Server Console
- resource use
-
- connections, Monitoring the Server from the Directory Server Console
- monitoring, Monitoring the Server from the Directory Server Console
- restoring data, Backing up and Restoring Data
-
- bak2db, Using the bak2db Command-Line Script
- bak2db.pl, Using bak2db.pl Perl Script
- dse.ldif, Restoring the dse.ldif Configuration File
- from console, Restoring All Databases from the Console
- replicated entries, Restoring Databases That Include Replicated Entries
- restoring the database, Tuning Transaction Logging
- retro changelog
-
- and access control, Retro Changelog and the Access Control Policy
- attributes, Using the Retro Changelog Plug-in
- object class, Using the Retro Changelog Plug-in
- searching, Retro Changelog and the Access Control Policy
- trimming, Trimming the Retro Changelog
- retro changelog plug-in
-
- enabling, Enabling the Retro Changelog Plug-in
- overview, Compatibility with Earlier Versions of Directory Server
- rights
-
- list of, Assigning Rights
- roledn keyword, Defining Role Access - roledn Keyword
- roles, Using Roles
-
- access control, Using Roles Securely
- access to directory, Defining Role Access - roledn Keyword
- activating, Activating User and Roles Using the Console
- attributes, Managing Roles Using the Command-Line
- editing, Viewing and Editing an Entry's Roles
- filtered
-
- creating, Creating a Filtered Role
- example, Example: Filtered Role Definition
- inactivating, About Roles
- managed
-
- creating, Creating a Managed Role
- example, Examples: Managed Role Definition
- nested
-
- creating, Creating a Nested Role
- example, Example: Nested Role Definition
- object classes, Managing Roles Using the Command-Line
- overview, About Roles
- root DN, see Directory Manager, Configuring the Directory Manager
- root DSE, Searching the Root DSE Entry
- root entry creation, Defining Directories Using LDIF
- root suffix, Creating Suffixes
-
- creating from command line, Creating Root and Sub Suffixes from the Command-Line
- creating from console, Creating a New Root Suffix Using the Console
S
- SASL
-
- authentication, Defining Access Based on Authentication Method
- configuring
-
- KDC server, Configuring the KDC Server
- configuring authentication at startup, Configuring SASL Authentication at Directory Server Startup
- configuring Kerberos, Configuring Kerberos
- identity mapping, SASL Identity Mapping
-
- configuring form the Console, Configuring SASL Identity Mapping from the Console
- configuring from the command-line, Configuring SASL Identity Mapping from the Command-Line
- default, SASL Identity Mapping
- KDC server
-
- configuration example, Example: Configuring an Example KDC Server
- Kerberos realms, Realms
- mechanisms, Authentication Mechanisms
-
- CRAM-MD5, Authentication Mechanisms
- DIGEST-MD5, Authentication Mechanisms
- GSS-API, Authentication Mechanisms
- password change extended operation, Password Change Extended Operation
- schema
-
- checking, Turning Schema Checking On and Off
- creating new attributes, Creating Attributes
- creating new object classes, Creating Object Classes
- deleting attributes, Deleting Attributes
- deleting object classes, Deleting Object Classes
- differences between Directory Server and Active Directory, Schema Differences
-
- initials, Contraints on the initials attribute
- street and streetAddress, Values for street and streetAddress
- editing attributes, Editing Attributes
- editing object classes, Editing Object Classes
- extending, Extending the Directory Schema
- nsslapd-schemacheck attribute, Turning Schema Checking On and Off
- standard, Extending the Directory Schema
- viewing attributes, Viewing Attributes
- viewing object classes, Viewing Object Classes
- schema checking
-
- and access control, Targeting Attributes
- ldapmodify and, Adding and Modifying Entries Using ldapmodify
- overview, Turning Schema Checking On and Off
- turning on or off, Turning Schema Checking On and Off
- turning on or off in the command line, Turning Schema Checking On and Off
- scripts
-
- repl-monitor.pl, Monitoring Replication Status from Administration Express
- template-cl-dump.pl, Troubleshooting Replication-Related Problems
- search filters, LDAP Search Filters
-
- Boolean operators, Using Compound Search Filters
- contained in file, Displaying Subsets of Attributes
- examples, LDAP Search Filters
- matching rule, Matching Rule Filter Syntax
- operators in, Using Operators in Search Filters
- specifying attributes, Using Attributes in Search Filters
- syntax, Search Filter Syntax
- using compound, Using Compound Search Filters
- using multiple, Using Compound Search Filters
- Search Performance, Search Performance
- search right, Assigning Rights
- search types, list of, Using Operators in Search Filters
- searches
-
- approximate, Using Operators in Search Filters
- equality, Using Operators in Search Filters
- example, ldapsearch Examples
- greater than or equal to, Using Operators in Search Filters
- international, Searching an Internationalized Directory
- international examples, International Search Examples
- less than, Less-Than Example
- less than or equal to, Using Operators in Search Filters
- of directory tree, Using ldapsearch
- presence, Using Operators in Search Filters
- specifying scope, Commonly Used ldapsearch Options
- substring, Using Operators in Search Filters
- searching algorithm
-
- overview, Overview of the Searching Algorithm
- Secure Sockets Layer, see SSL, Starting the Server with SSL Enabled
- security
-
- certificate-based authentication, Using Certificate-Based Authentication
- LDAP URLs, Examples of LDAP URLs
- setting preferences, Setting Security Preferences
- self access, Self Access (self Keyword)
-
- LDIF example, Examples
- self keyword, Self Access (self Keyword)
- selfwrite right, Assigning Rights
-
- example, Allowing Users to Add or Remove Themselves from a Group
- server parameters
-
- database
-
- read-only, Monitoring Database Activity from the Directory Server Console
- setting access controls, Creating ACIs from the Console
- setting passwords, Setting User Passwords
- simple authentication, Defining Access Based on Authentication Method
- Simple Authentication and Security Layer, Managing SASL
- Simple Authentication and Security Layer (SASL). See SASL authentication, Defining Access Based on Authentication Method
- Simple Network Management Protocol. See SNMP, About SNMP
- Simple Sockets Layer. See SSL, Defining Access Based on Authentication Method
- single-master replication
-
- introduction, Single-Master Replication
- setting up, Configuring Single-Master Replication
- smart referrals
-
- creating, Creating Smart Referrals
- creating from command line, Creating Smart Referrals from the Command Line
- creating from console, Creating Smart Referrals Using the Directory Server Console
- SNMP
-
- configuring
-
- Directory Server, Configuring the Directory Server for SNMP
- ldap-agent, Starting the Subagent
- managed device, About SNMP
- managed objects, About SNMP
- master agent, About SNMP
-
- configuring, Configuring the Master Agent
- mib, Testing the Subagent
- MIB
-
- entity table, Entity Table
- entries table, Entries Table
- interaction table, Interaction Table
- operations table, Operations Table
- monitoring the Directory Server, Monitoring Directory Server Using SNMP
- overview, About SNMP
- subagent, About SNMP
-
- configuration file, Subagent Configuration File
- location, Configuring the Subagent
- starting, Starting the Subagent
- stopping, Starting the Subagent
- testing the subagent, Testing the Subagent
- SSL
-
- Administration Server password file, Creating a Password File for the Administration Server
- and replication, Replication over SSL
- authentication, Starting the Server with SSL Enabled
- certificate password, Creating a Password File for the Directory Server
- chaining with, Chaining Using SSL
- client authentication, Configuring LDAP Clients to Use SSL
- configuring clients to use, Configuring LDAP Clients to Use SSL
- enabling, Starting the Server with SSL Enabled
- port number, Changing Directory Server Port Numbers
- setting preferences, Setting Security Preferences
- starting the server with, Starting the Server with SSL Enabled
- SSL authentication, Defining Access Based on Authentication Method
- standard
-
- attributes, Overview of Extending Schema
- index files, Overview of Standard Indexes
- object classes, Overview of Extending Schema
- schema, Extending the Directory Schema
- Start TLS, Command-Line Functions for Start TLS
- Starting and stopping
-
- Directory Server and Administration Server, Starting and Stopping Servers
- Directory Server Console, Starting the Directory Server Console
- starting the Directory Server
-
- with SSL, Starting the Server with SSL Enabled
- static groups, Managing Static Groups
-
- creating, Adding a New Static Group
- modifying, Modifying a Static Group
- sub suffix, Creating Suffixes
-
- creating from command line, Creating Root and Sub Suffixes from the Command-Line
- creating from console, Creating a New Sub Suffix Using the Console
- substring index, About Index Types
- substring index limitation, About Index Types
- substring search, Using Operators in Search Filters
-
- international example, Substring Example
- subtree level password policy, Configuring the Password Policy
- subtypes
-
- of attributes, Adding an Attribute Subtype
- suffix
-
- and associated database, Creating and Maintaining Suffixes
- configuration attributes, Creating Root and Sub Suffixes from the Command-Line
- creating, Creating a Root Entry
- creating from command line, Creating Root and Sub Suffixes from the Command-Line
- creating root suffix, Creating a New Root Suffix Using the Console
- creating sub suffix, Creating a New Sub Suffix Using the Console
- custom distribution function, Adding Multiple Databases for a Single Suffix
- custom distribution logic, Adding Multiple Databases for a Single Suffix
- disabling, Disabling a Suffix
- in Directory Server, Configuring Directory Databases
- using referrals, Using Referrals in a Suffix
-
- on update only, Enabling Referrals Only During Update Operations
- with multiple databases, Adding Multiple Databases for a Single Suffix
- suffix referrals
-
- creating, Creating Suffix Referrals
- creating from command line, Creating Suffix Referrals from the Command-Line
- creating from console, Creating Suffix Referrals Using the Console
- supplier bind DN, Replication Identity
- supplier server, Suppliers and Consumers
- symbols
-
- '', in ldapsearch, Using Special Characters
- -, in change operation, LDIF Update Statements
- ::, in LDIF statements, Base-64 Encoding
- <, in LDIF statements, Standard LDIF Notation
- quotation marks, in ldapmodify commands, Using Special Characters
- synchronization agreement
-
- changing, Modifying the Sync Agreement
- syntax
-
- ACI statements, The ACI Syntax
- attribute value, Creating Attributes
- LDAP URLs, Components of an LDAP URL
- ldapsearch, ldapsearch Command-Line Format
- LDIF update statements, LDIF Update Statements
- matching rule filter, Matching Rule Filter Syntax
- search filter, Search Filter Syntax
- system connections
-
- monitoring, Monitoring the Server from the Directory Server Console
- system indexes, Overview of System Indexes
- system resources
-
- monitoring, Monitoring the Server from the Directory Server Console
T
- targattrfilters keyword, Targeting Attribute Values Using LDAP Filters
- target
-
- ACI syntax, The ACI Syntax
- attribute values, Targeting Attribute Values Using LDAP Filters
- attributes, Targeting Attributes
- keywords in ACIs, Defining Targets
- overview, Defining Targets
- using LDAP search filters, Targeting Entries or Attributes Using LDAP Filters
- using LDAP URLs, LDAP URLs
- target DNs
-
- containing commas, Targeting a Directory Entry
- target keyword, Targeting a Directory Entry
- targetattr keyword, Targeting Attributes
- targetfilter keyword, Targeting Entries or Attributes Using LDAP Filters
- targeting
-
- directory entries, Targeting a Directory Entry
- template entry. See CoS template entry., About the CoS Template Entry
- template-cl-dump.pl script, Troubleshooting Replication-Related Problems
- thread
-
- monitoring, Monitoring the Server from the Directory Server Console
- time format, About Locales
- timeofday keyword, Defining Access at a Specific Time of Day or Day of Week
- tuning performance
-
- database, Tuning Database Performance
- server, Tuning Server Performance
U
- unique attribute plug-in, Using the Attribute Uniqueness Plug-in
-
- configuring, Configuring Attribute Uniqueness Plug-ins
- disabling, Turning the Plug-in On or Off
- enabling, Turning the Plug-in On or Off
- examples, Attribute Uniqueness Plug-in Syntax Examples
- markerObjectClass, Using the markerObjectClass and requiredObjectClass Keywords
- requiredObjectClass, Using the markerObjectClass and requiredObjectClass Keywords
- syntax, Attribute Uniqueness Plug-in Syntax
- user access, Defining User Access - userdn Keyword
-
- example, Granting Write Access to Personal Entries
- LDIF example, Examples
- to child entries, Parent Access (parent Keyword)
- to own entry, Self Access (self Keyword)
-
- LDIF example, Examples
- user and group management
-
- referential integrity, Maintaining Referential Integrity
- user level password policy, Configuring the Password Policy
- user passwords, Setting User Passwords
- user-defined attributes, Viewing Attributes
- user-defined object classes, Viewing Object Classes
- userattr keyword, Using the userattr Keyword
-
- restriction on add, Granting Add Permission Using the userattr Keyword
- userdn keyword, Defining User Access - userdn Keyword
- users
-
- activating, Activating User and Roles Using the Console
- inactivating, Inactivating Users and Roles
- UTF-8, Internationalization
W
- wildcard
-
- in LDAP URL, Wildcards
- in target, Targeting a Directory Entry
- wildcards
-
- in international searches, Using Wildcards in Matching Rule Filters
- in matching rule filters, Using Wildcards in Matching Rule Filters
- WinSync, Synchronizing Red Hat Directory Server with Microsoft Active Directory
-
- about, About Windows Sync
- changing the sync agreement, Modifying the Sync Agreement
- checking sync status, Checking Synchronization Status
- configuring, Configuring Windows Sync
- deleting entries, Deleting Entries
- groups, Synchronizing Groups
- logging levels, Troubleshooting
- manually updating, Manually Updating and Resynchronizing Entries
- Password Sync service, Step 4: Install and Configure the Password Sync Service, Password Sync Service
-
- modifying, Modifying Password Sync
- setting up SSL, Step 4: Install and Configure the Password Sync Service
- starting and stopping, Starting and Stopping the Password Sync Service
- uninstalling, Uninstalling Password Sync Service
- resurrecting deleted entries, Resurrecting Entries
- schema differences, Schema Differences
- troubleshooting, Troubleshooting
- users, Synchronizing Users
- using, Using Windows Sync
- write performance, Indexing Performance
- write right, Assigning Rights
Note: This documentation is provided {and copyrighted} by Red Hat®, Inc. and is released via the Open Publication License. The copyright holder has added the further requirement that Distribution of substantively modified versions of this document is prohibited without the explicit permission of the copyright holder. The CentOS project redistributes these original works (in their unmodified form) as a reference for CentOS-5 because CentOS-5 is built from publicly available, open source SRPMS. The documentation is unmodified to be compliant with upstream distribution policy. Neither CentOS-5 nor the CentOS Project are in any way affiliated with or sponsored by Red Hat®, Inc.