Index

Index

A

access control
ACI attribute, ACI Structure
ACI syntax, The ACI Syntax
allowing or denying access, Allowing or Denying Access
and replication, Access Control and Replication
and schema checking, Targeting Attributes
anonymous access, Anonymous Access (anyone Keyword)
bind rules, Bind Rules
access at specific time or day, Defining Access at a Specific Time of Day or Day of Week
access based on value matching, Defining Access Based on Value Matching
general access, General Access (all Keyword)
user and group access, Defining User Access - userdn Keyword
Boolean bind rules, Using Boolean Bind Rules
compatibility with earlier versions, Compatibility with Earlier Releases
creating from console, Creating ACIs from the Console
dynamic targets, LDAP URLs
from specific domain, Defining Access from a Specific Domain
from specific IP address, Defining Access from a Specific IP Address
logging information, Logging Access Control Information
overview, Managing Access Control
permissions, Defining Permissions
placement of ACIs, ACI Placement
rights, Assigning Rights
roles, Using Roles Securely
SASL authentication, Defining Access Based on Authentication Method
simple authentication, Defining Access Based on Authentication Method
SSL authentication, Defining Access Based on Authentication Method
structure of ACIs, ACI Structure
target DN
containing comma, Targeting a Directory Entry
target DN containing comma, Defining Permissions for DNs That Contain a Comma
targeting, Defining Targets
targeting attribute values, Targeting Attribute Values Using LDAP Filters
targeting attributes, Targeting Attributes
targeting entries, Targeting a Directory Entry
targeting using filters, Targeting Entries or Attributes Using LDAP Filters
using the Access Control Editor, Creating ACIs from the Console
value matching, Defining Access Based on Value Matching
viewing
Access Control Editor, Viewing ACIs
get effective rights, Get Effective Rights Control
Access Control Editor
displaying, Displaying the Access Control Editor
access control instruction (ACI). See ACI, ACI Structure
access log
configuring, Configuring the Access Log
manually rotating, Manual Log File Rotation
turning off, Configuring the Access Log
turning on, Configuring the Access Log
viewing, Viewing the Access Log
account inactivation, Inactivating Users and Roles
from command line, Inactivating User and Roles Using the Command-Line
from console, Inactivating User and Roles Using the Console
account lockout, Configuring the Account Lockout Policy Using the Console
configuration
attributes, Configuring the Account Lockout Policy Using the Command-Line
configuring, Configuring the Account Lockout Policy
using command line, Configuring the Account Lockout Policy Using the Command-Line
using console, Configuring the Account Lockout Policy Using the Console
disabling, Configuring the Account Lockout Policy Using the Console
enabling, Configuring the Account Lockout Policy Using the Console
lockout duration, Configuring the Account Lockout Policy Using the Console
password failure counter, Configuring the Account Lockout Policy Using the Console
replicating attributes, Replicating Account Lockout Attributes
ACI
assessment, ACI Structure
attribute, ACI Placement
authmethod keyword, Defining Access Based on Authentication Method
bind rules, The ACI Syntax
cascading chaining, Configuring Cascading Chaining from the Command-Line
creating from console, Creating a New ACI
dayofweek keyword, Defining Access at a Specific Time of Day or Day of Week
deleting from console, Deleting an ACI
dns keyword, Defining Access from a Specific Domain
editing from console, Editing an ACI
evaluation, ACI Evaluation
examples of use, Access Control Usage Examples
groupdn keyword, Defining Group Access - groupdn Keyword
inheritance, Using the userattr Keyword with Inheritance
ip keyword, Defining Access from a Specific IP Address
local evaluation
cascading chaining, Configuring Cascading Chaining from the Command-Line
name, The ACI Syntax
permissions, The ACI Syntax
precedence rule, ACI Evaluation
proxy rights example, Proxied Authorization ACI Example
replication, Access Control and Replication
rights, Assigning Rights
roledn keyword, Defining Role Access - roledn Keyword
structure, ACI Structure
syntax, The ACI Syntax
targattrfilters keyword, Targeting Attribute Values Using LDAP Filters
target, The ACI Syntax
target DN
containing comma, Targeting a Directory Entry
target DN containing comma, Defining Permissions for DNs That Contain a Comma
target keywords, Defining Targets
target overview, Defining Targets
targetattr keyword, Targeting Attributes
targetfilter keyword, Targeting Entries or Attributes Using LDAP Filters
userattr and parent, Using the userattr Keyword with Inheritance
userattr keyword, Using the userattr Keyword
using macro ACIs, Advanced Access Control: Using Macro ACIs
value-based, Targeting Attribute Values Using LDAP Filters
viewing current, Viewing ACIs
wildcard in target, Targeting a Directory Entry
wildcards, Wildcards
ACI attribute
default index for, Overview of System Indexes
overview, ACI Structure
ACI placement, ACI Placement
ACI targets, Targeting a Directory Entry
ACL. See ACI, Access Control Principles
activating accounts
from command line, Activating User and Roles Using the Command-Line
from console, Activating User and Roles Using the Console
Active Directory
schema differences between Directory Server, Schema Differences
add right, Assigning Rights
adding directory entries, Adding Entries Using ldapmodify
Administration Server
starting and stopping, Starting and Stopping Administration Server
algorithm
metaphone phonetic algorithm, Approximate Searches
search, Overview of the Searching Algorithm
All IDs Threshold, Managing Indexes
all keyword, General Access (all Keyword)
allowed attributes
creating, Creating Object Classes
deleting, Creating Object Classes
editing in object class, Editing Object Classes
allowing access, Allowing or Denying Access
anonymous access, Defining Access Based on Authentication Method
example, Examples
overview, Anonymous Access (anyone Keyword)
anyone keyword, Anonymous Access (anyone Keyword)
approximate index, About Index Types
query string codes, Approximate Searches
approximate search, Using Operators in Search Filters
attribute
ACI, ACI Structure
adding, Modifying an Entry Using LDIF
adding multiple values, Adding Attribute Values
adding to entry, Adding an Attribute to an Entry
creating, Creating Attributes, Creating Object Classes
deleting, Modifying an Entry Using LDIF, Deleting Attributes
deleting from object class, Creating Object Classes
deleting using LDIF update statements, Deleting All Values of an Attribute Using LDIF
editing, Editing Attributes
multi-valued, Creating Attributes
nsslapd-schemacheck, Turning Schema Checking On and Off
OID, Creating Attributes
passwordChange, Configuring a Global Password Policy Using the Command-Line
passwordExp, Configuring a Global Password Policy Using the Command-Line
passwordGraceLimit, Configuring a Global Password Policy Using the Command-Line
passwordInHistory, Configuring a Global Password Policy Using the Command-Line
passwordMaxRepeats, Configuring a Global Password Policy Using the Command-Line
passwordMin8bit, Configuring a Global Password Policy Using the Command-Line
passwordMinAlphas, Configuring a Global Password Policy Using the Command-Line
passwordMinCategories, Configuring a Global Password Policy Using the Command-Line
passwordMinDigits, Configuring a Global Password Policy Using the Command-Line
passwordMinLowers, Configuring a Global Password Policy Using the Command-Line
passwordMinSpecials, Configuring a Global Password Policy Using the Command-Line
passwordMinTokenLength, Configuring a Global Password Policy Using the Command-Line
passwordMinUppers, Configuring a Global Password Policy Using the Command-Line
passwordMustChange, Configuring a Global Password Policy Using the Command-Line
passwordStorageScheme, Configuring a Global Password Policy Using the Command-Line
ref, Creating Smart Referrals from the Command Line
removing a value, Removing an Attribute Value
roles, Managing Roles Using the Command-Line
searching for, Using Attributes in Search Filters
standard, Overview of Extending Schema
syntax, Creating Attributes
targeting, Targeting Attributes
user-defined, Viewing Attributes
very large, Adding Very Large Attributes
viewing, Viewing Attributes
attribute subtypes, Adding an Attribute Subtype
adding, Adding a Subtype to an Attribute
binary, Binary Subtype
language, Adding an Attribute Subtype
pronunciation, Pronunciation Subtype
attribute type field (LDIF), About the LDIF File Format
attribute uniqueness plug-in
creating an instance of, Creating an Instance of the Attribute Uniqueness Plug-in
attribute uniqueness plug-in. See unique attribute plug-in, Using the Attribute Uniqueness Plug-in
attribute value field (LDIF), About the LDIF File Format
attribute values
adding, Modifying an Entry Using LDIF
deleting, Deleting a Specific Attribute Value Using LDIF
modifying, Changing an Attribute Value Using LDIF
replacing, Modifying an Entry Using LDIF
syntax, Creating Attributes
attributes values
targeting, Targeting Attribute Values Using LDAP Filters
audit log
configuring, Configuring the Audit Log
disabling, Configuring the Audit Log
enabling, Configuring the Audit Log
viewing, Viewing the Audit Log
authentication
access control and, Defining Access Based on Authentication Method
bind DN, Logging into Directory Server
certificate-based, Using Certificate-Based Authentication
LDAP URLs, Examples of LDAP URLs
over SSL, Starting the Server with SSL Enabled
SASL, Managing SASL
SASL mechanisms, Authentication Mechanisms
authmethod keyword, Defining Access Based on Authentication Method

B

backing up data, Backing up and Restoring Data
all, Backing up All Databases
db2bak, Backing up All Databases from the Command-Line
dse.ldif, Backing up the dse.ldif Configuration File
bak2db script, Using the bak2db Command-Line Script
bak2db.pl perl script, Using bak2db.pl Perl Script
base 64 encoding, Representing Binary Data
base DN, ldapsearch and, Using LDAP_BASEDN
binary data, LDIF and, Representing Binary Data
binary subtype, Binary Subtype
bind credentials
for database links, Providing Bind Credentials
bind DN
accessing the server, Logging into Directory Server
resource limits based on, Setting Resource Limits Based on the Bind DN
viewing current, Viewing the Current Console Bind DN
bind rules
access at specific time or day, Defining Access at a Specific Time of Day or Day of Week
access based on authentication method, Defining Access Based on Authentication Method
LDIF example, Examples
access based on value matching
overview, Defining Access Based on Value Matching
ACI syntax, The ACI Syntax
all keyword, General Access (all Keyword)
anonymous access, Anonymous Access (anyone Keyword)
example, Examples
LDIF example, Examples
anyone keyword, Anonymous Access (anyone Keyword)
authmethod keyword, Defining Access Based on Authentication Method
Boolean, Using Boolean Bind Rules
dayofweek keyword, Defining Access at a Specific Time of Day or Day of Week
dns keyword, Defining Access from a Specific Domain
general access, General Access (all Keyword)
example, Examples
group access, Defining Group Access - groupdn Keyword
group access example, Granting a Group Full Access to a Suffix
groupdn keyword, Defining Group Access - groupdn Keyword
ip keyword, Defining Access from a Specific IP Address
LDAP URLs, LDAP URLs
LDIF keywords, Bind Rule Syntax
overview, Bind Rules
parent keyword, Parent Access (parent Keyword)
role access, Defining Role Access - roledn Keyword
roledn keyword, Defining Role Access - roledn Keyword
self keyword, Self Access (self Keyword)
timeofday keyword, Defining Access at a Specific Time of Day or Day of Week
user access
LDIF example, Examples
parent, Parent Access (parent Keyword)
self, Self Access (self Keyword)
user access example, Granting Write Access to Personal Entries
userattr keyword, Using the userattr Keyword
userdn keyword, Defining User Access - userdn Keyword
Boolean bind rules
example, Using Boolean Bind Rules
overview, Using Boolean Bind Rules
Boolean operators, in search filters, Using Compound Search Filters
browsing index, About Index Types

C

cascading chaining
client ACIs, Configuring Cascading Chaining from the Command-Line
configuration attributes, Summary of Cascading Chaining Configuration Attributes
configuring defaults, Configuring Cascading Chaining Defaults Using the Console
configuring from command line, Configuring Cascading Chaining from the Command-Line
configuring from console, Configuring Cascading Chaining Using the Console
example, Cascading Chaining Configuration Example
local ACI evaluation, Configuring Cascading Chaining from the Command-Line
loop detection, Detecting Loops
overview, Overview of Cascading Chaining
proxy admin user ACI, Configuring Cascading Chaining from the Command-Line
proxy authorization, Configuring Cascading Chaining from the Command-Line
cascading replication
initializing the replicas, Setting up the Replication Agreements
introduction, Cascading Replication
setting up, Configuring Cascading Replication
certificate
mapping to a DN, Setting up Certificate-Based Authentication
password, Creating a Password File for the Directory Server
certificate database
password, Introduction to SSL in the Directory Server
certificate-based authentication, Using Certificate-Based Authentication
setting up, Setting up Certificate-Based Authentication
chaining
cascading, Overview of Cascading Chaining
component operations, from command line, Chaining Component Operations from the Command-Line
component operations, from console, Chaining Component Operations Using the Console
overview, Creating and Maintaining Database Links
using SSL, Chaining Using SSL
change operations, LDIF Update Statements
add, Modifying an Entry Using LDIF
delete, Modifying an Entry Using LDIF
replace, Modifying an Entry Using LDIF
change type
add, Adding an Entry Using LDIF
delete, Deleting an Entry Using LDIF
LDIF, LDIF Update Statements
modify, Modifying an Entry Using LDIF
changelog, Changelog
deleting, Removing the Changelog
character type, About Locales
checkpoint interval, Changing the Database Checkpoint Interval
ciphers
list of
SSLv3, Available Ciphers
TLSv1, Available Ciphers
none,MD5
MD5 message authentication, Selecting the Encryption Cipher
overview, Setting Security Preferences
selecting, Setting Security Preferences
class of service (CoS), Assigning Class of Service
access control, Access Control and CoS
classic
example, How a Classic CoS Works
overview, How a Classic CoS Works
cosPriority attribute, Creating the CoS Template Entry from the Command-Line
creating, Creating a New CoS
definition entry, Creating the CoS Definition Entry from the Command-Line
editing, Editing an Existing CoS
indirect
example, How an Indirect CoS Works
overview, How an Indirect CoS Works
pointer
example, How a Pointer CoS Works
overview, How a Pointer CoS Works
qualifiers, Creating the CoS Definition Entry from the Command-Line
template entry
creating, Creating the CoS Template Entry
overview, About the CoS Template Entry
classic CoS
example, How a Classic CoS Works
overview, How a Classic CoS Works
client
using to find entries, Finding Directory Entries
client authentication
over SSL, Allowing/Requiring Client Authentication
code page, About Locales
collation order
international index, Creating Indexes from the Server Console
overview, About Locales
search filters and, Searching an Internationalized Directory
command line
providing input from, Providing Input from the Command-Line
command-line scripts
db2bak, Backing up All Databases from the Command-Line
command-line utilities
certificate-based authentication and, Using Certificate-Based Authentication
ldapdelete, Deleting Entries Using ldapdelete
ldapmodify, Adding and Modifying Entries Using ldapmodify
ldapsearch, LDAP Search Filters
ldif, Base-64 Encoding
ldif2db, Running the db2index.pl Script
commas, in DNs, Using Special Characters, Targeting a Directory Entry
using ldapsearch with, Specifying DNs That Contain Commas in Search Filters
compare right, Assigning Rights
compatibility
ACIs, Compatibility with Earlier Releases
replication, Compatibility with Earlier Versions of Directory Server
compound search filters, Using Compound Search Filters
configuration attributes
account lockout, Configuring the Account Lockout Policy Using the Command-Line
cascading chaining, Summary of Cascading Chaining Configuration Attributes
password policy, Configuring a Global Password Policy Using the Command-Line
suffix, Creating Root and Sub Suffixes from the Command-Line
connections
monitoring, Monitoring the Server from the Directory Server Console
viewing number of, Monitoring the Server from the Directory Server Console
consumer initialization
filesystem replica, Filesystem Replica Initialization
manual consumer creation, Manual Consumer Initialization Using the Command Line
online consumer creation, Online Consumer Initialization Using the Console
consumer server, Suppliers and Consumers
continued lines
in LDIF, Continuing Lines in LDIF
in LDIF update statements, LDIF Update Statements
CoS definition entry
attributes, Creating the CoS Definition Entry from the Command-Line
object classes, Creating the CoS Definition Entry from the Command-Line
CoS qualifiers, Creating the CoS Definition Entry from the Command-Line
default, Creating the CoS Definition Entry from the Command-Line
override, Creating the CoS Definition Entry from the Command-Line
CoS template entry, About the CoS Template Entry
creating, Creating the CoS Template Entry
CoS. See class of service., Assigning Class of Service
cosPriority attribute, Creating the CoS Template Entry from the Command-Line
counter, password failures, Configuring the Account Lockout Policy Using the Console
country code, Identifying Supported Locales
creating a database
from the command line, Creating a New Database for a Single Suffix from the Command-Line
from the console, Creating a New Database for an Existing Suffix Using the Console
creating a virtual DIT, Using Views
creating the directory, Defining Directories Using LDIF
custom distribution function
adding to suffix, Adding Multiple Databases for a Single Suffix
custom distribution logic
adding databases, Adding Multiple Databases for a Single Suffix
adding to suffix, Adding Multiple Databases for a Single Suffix

D

dash, in change operation, LDIF Update Statements
data consistency
using referential integrity, Maintaining Referential Integrity
database
and associated suffix, Creating and Maintaining Suffixes
backing up
db2bak, Backing up All Databases from the Command-Line
backup, Backing up and Restoring Data
backup files, Backing up All Databases from the Server Console
backup from console, Backing up All Databases
creating from command line, Creating a New Database for a Single Suffix from the Command-Line
creating from console, Creating a New Database for an Existing Suffix Using the Console
creating multiple, Adding Multiple Databases for a Single Suffix
creating using LDIF, Defining Directories Using LDIF
deleting, Deleting a Database
export, Exporting Data
db2ldif, Exporting to LDIF from the Command-Line
encrypted database, Exporting and Importing an Encrypted Database
export from console, Exporting Directory Data to LDIF Using the Console
import, Importing Data
encrypted database, Exporting and Importing an Encrypted Database
ldif2db, Importing Using the ldif2db Command-Line Script
ldif2db.pl, Importing Using the ldif2db.pl Perl Script
ldif2ldap, Importing Using the ldif2ldap Command-Line Script
initialization, Initializing a Database from the Console
making read-only, Placing a Database in Read-Only Mode
monitoring from command line, Monitoring Databases from the Command Line
monitoring from server console, Monitoring Database Activity from the Directory Server Console
overview, Creating and Maintaining Databases
read-only mode, Placing a Database in Read-Only Mode
replication, What Directory Units Are Replicated
restore, Backing up and Restoring Data
restoring, Tuning Transaction Logging
bak2db, Using the bak2db Command-Line Script
bak2db.pl, Using bak2db.pl Perl Script
restoring from console, Restoring All Databases from the Console
selecting for monitoring, Monitoring Database Activity
viewing backend information, Monitoring Database Activity
database encryption, Database Encryption
importing and exporting, Exporting and Importing an Encrypted Database
database link
cascading
configuring defaults, Configuring Cascading Chaining Defaults Using the Console
configuring from command line, Configuring Cascading Chaining from the Command-Line
configuring from console, Configuring Cascading Chaining Using the Console
overview, Overview of Cascading Chaining
chaining with SSL, Chaining Using SSL
configuration, Creating a New Database Link
configuration attributes, Summary of Database Link Configuration Attributes
configuration example, Summary of Database Link Configuration Attributes
configuring bind credentials, Providing Bind Credentials
configuring failover servers, Providing a List of Failover Servers
configuring LDAP URL, Providing an LDAP URL
configuring suffix, Creating a Database Link from the Command-Line
creating from command line, Creating a Database Link from the Command-Line
creating from console, Creating a New Database Link Using the Console
deleting, Deleting Database Links
maintaining remote server info, Updating Remote Server Authentication Information
overview, Creating and Maintaining Database Links
database server parameters
read-only, Monitoring Database Activity from the Directory Server Console
database transaction logging
described, Tuning Transaction Logging
durable transactions, Disabling Durable Transactions
log file location, Changing the Location of the Database Transaction Log
databases
in Directory Server, Configuring Directory Databases
date format, About Locales
dayofweek keyword, Defining Access at a Specific Time of Day or Day of Week
db2bak script, Backing up All Databases from the Command-Line
db2bak utility, Backing up All Databases from the Command-Line
db2ldif utility, Exporting to LDIF from the Command-Line
default CoS qualifier, Creating the CoS Definition Entry from the Command-Line
default referrals
setting, Setting Default Referrals
setting from console, Setting a Default Referral Using the Console
settings from command line, Setting a Default Referral from the Command-Line
defining
access control policy, Creating ACIs from the Console
attributes, Creating Attributes
object classes, Creating Object Classes
definition entry. See CoS definition entry., Creating the CoS Definition Entry from the Command-Line
delete right, Assigning Rights
deleting
ACI, Deleting an ACI
attribute values, Deleting a Specific Attribute Value Using LDIF
attributes, Modifying an Entry Using LDIF, Deleting Attributes
attributes from an object class, Creating Object Classes
database link, Deleting Database Links
entries, Deleting an Entry Using LDIF
multiple attributes, Modifying an Entry Using LDIF
object classes, Deleting Object Classes
deleting directory entries, Deleting Entries Using ldapdelete
denying access, Allowing or Denying Access
precedence rule, ACI Evaluation
directory creation, Defining Directories Using LDIF
directory entries
adding using LDIF, Adding Entries Using LDIF
creating, Creating Directory Entries
deleting, Deleting Directory Entries
managing from command line, Managing Entries from the Command-Line
managing from console, Managing Entries from the Directory Console
modifying, Modifying Directory Entries
moving, A Note on Renaming Entries
renaming, A Note on Renaming Entries
Directory Manager
attribute, Configuring the Directory Manager
configuring, Configuring the Directory Manager
privileges, Configuring the Directory Manager
Directory Server, Monitoring Server Activity
attributes, Configuring the Directory Manager
basic administration, General Red Hat Directory Server Usage
binding to, Logging into Directory Server
changing bind DN, Changing Login Identity
configuration, Changing Directory Server Port Numbers
configuring SASL authentication at startup, Configuring SASL Authentication at Directory Server Startup
controlling access, Managing Access Control
creating a root entry, Creating a Root Entry
creating content, Populating Directory Databases
creating entries, Creating Directory Entries
data, Populating Directory Databases
databases, Configuring Directory Databases
deleting entries, Deleting Directory Entries
file locations, Directory Server File Locations
importing data, Importing Data
international charactersets, Internationalization
login, Logging into Directory Server
managing entries, Creating Directory Entries
MIB, Using the Management Information Base
modifying entries, Modifying Directory Entries
monitoring, Viewing and Configuring Log Files
monitoring from command line, Monitoring the Directory Server from the Command Line
monitoring with SNMP, Monitoring Directory Server Using SNMP
overview, General Red Hat Directory Server Usage
performance counters, Monitoring Server Activity
plug-ins, Administering Directory Server Plug-ins
starting and stopping, Starting and Stopping Directory Server from the Command Line
starting the Console, Starting the Directory Server Console
suffixes, Configuring Directory Databases
supported languages, Identifying Supported Locales
Directory Server Console
starting, Starting the Directory Server Console
directory trees
finding entries in, Using ldapsearch
disabling suffixes, Disabling a Suffix
disk space
access log and, Configuring the Access Log
log files and, Manual Log File Rotation
distribution function, Adding Multiple Databases for a Single Suffix
dn field (LDIF), About the LDIF File Format
dns keyword, Defining Access from a Specific Domain
dse.ldif
PTA plugin, Turning the Plug-in On or Off
dse.ldif file
backing up, Backing up the dse.ldif Configuration File
PTA syntax, Turning the Plug-in On or Off
restoring, Restoring the dse.ldif Configuration File
durable transactions, Disabling Durable Transactions
dynamic groups, Managing Dynamic Groups
creating, Adding a New Dynamic Group
modifying, Modifying a Dynamic Group

E

editing
attributes, Editing Attributes
object classes, Editing Object Classes
encryption
database, Database Encryption
end of file marker, Providing Input from the Command-Line
entity table, Entity Table
entries
adding an object class, Adding an Object Class to an Entry
adding attributes, Adding an Attribute to an Entry
adding using LDIF, Adding Entries Using LDIF
adding using LDIF update statements, Adding an Entry Using LDIF
adding very large attributes, Adding Very Large Attributes
creating, Creating Directory Entries
using LDIF, Specifying Directory Entries Using LDIF
deleting, Deleting Directory Entries
using ldapdelete, Deleting Entries Using ldapdelete
deleting using LDIF update statements, Deleting an Entry Using LDIF
distribution, Creating Databases
finding, Using ldapsearch
managing, Creating Directory Entries
managing from command line, Managing Entries from the Command-Line
managing from console, Managing Entries from the Directory Console
modifying, Modifying Directory Entries
using ldapmodify, Adding and Modifying Entries Using ldapmodify
using LDIF update statements, Modifying an Entry Using LDIF
moving, A Note on Renaming Entries
order of creation, Providing Input from the Command-Line
order of deletion, Deleting Entries Using ldapdelete
removing an object class, Removing an Object Class
renaming, A Note on Renaming Entries
root, Defining Directories Using LDIF
targeting, Targeting a Directory Entry
entry distribution, Creating Databases
entry ID list, Managing Indexes
environment variables
LDAP_BASEDN, Using LDAP_BASEDN
EOF marker, Providing Input from the Command-Line
equality index, About Index Types
equality search, Using Operators in Search Filters
example, Search Filter Examples
international example, Equality Example
error log
access control information, Logging Access Control Information
configuring, Configuring the Error Log
manually rotating, Manual Log File Rotation
turning off, Configuring the Error Log
turning on, Configuring the Error Log
viewing, Viewing the Error Log
example
cascading chaining, Cascading Chaining Configuration Example
exporting data, Exporting Data
db2ldif, Exporting to LDIF from the Command-Line
encrypted database, Exporting and Importing an Encrypted Database
using console, Exporting Directory Data to LDIF Using the Console
extending the directory schema, Extending the Directory Schema

F

failover servers
for database links, Providing a List of Failover Servers
File locations, Directory Server File Locations
files
access log, Viewing the Access Log
database backup, Backing up All Databases from the Server Console
EOF marker, Providing Input from the Command-Line
error log, Viewing the Error Log
id2entry.db4, Overview of Standard Indexes
Filesystem Hierarchy Standard, Directory Server File Locations
filesystem replica initialization, Filesystem Replica Initialization
filtered role
creating, Creating a Filtered Role
example, Example: Filtered Role Definition
finding
attributes, Using Attributes in Search Filters
entries, Using ldapsearch
format, LDIF, LDAP Data Interchange Format

G

general access
example, Examples
overview, General Access (all Keyword)
get effective rights, Get Effective Rights Control
return codes, Get Effective Rights Return Codes
global password policy, Configuring the Password Policy
glue entries, Solving Orphan Entry Conflicts
greater than or equal to search
international example, Greater-Than or Equal-to Example
overview, Using Operators in Search Filters
groupdn keyword, Defining Group Access - groupdn Keyword
LDIF examples, Defining Group Access - groupdn Keyword
groupdnattr keyword, Using the userattr Keyword
groups
access control, Defining User Access - userdn Keyword
access control example, Granting a Group Full Access to a Suffix
access to directory, Defining Group Access - groupdn Keyword
differences between Directory Server and Active Directory, Groups
dynamic, Managing Dynamic Groups
creating, Adding a New Dynamic Group
modifying, Modifying a Dynamic Group
overview, Using Groups
static, Managing Static Groups
creating, Adding a New Static Group
modifying, Modifying a Static Group
GSS-API, Authentication Mechanisms

I

id field (LDIF), About the LDIF File Format
id2entry.db4 file, Overview of Standard Indexes
identity mapping
default, SASL Identity Mapping
importing data, Importing Data
encrypted database, Exporting and Importing an Encrypted Database
from console, Importing a Database from the Console
ldif2ldap, Importing Using the ldif2ldap Command-Line Script
using ldif2db, Importing Using the ldif2db Command-Line Script
using ldif2db.pl, Importing Using the ldif2db.pl Perl Script
inactivating accounts, Inactivating Users and Roles
inactivating roles, About Roles
index types, About Index Types
approximate index, About Index Types
browsing index, About Index Types
equality index, About Index Types
international index, About Index Types
presence index, About Index Types
substring index, About Index Types
virtual list view index, About Index Types
indexes
creating dynamically, Creating Indexes from the Command-Line
dynamic changes to, Creating Indexes from the Command-Line
presence, Overview of System Indexes
indexing, About Index Types
creating indexes from console, Creating Indexes from the Server Console
system indexes, Overview of System Indexes
indirect CoS
example, How an Indirect CoS Works
overview, How an Indirect CoS Works
init scripts
configuring SASL authentication, Configuring SASL Authentication at Directory Server Startup
initializing databases, Initializing a Database from the Console
initializing replicas
cascading replication, Setting up the Replication Agreements
filesystem replica, Filesystem Replica Initialization
interaction table, Interaction Table
international charactersets, Internationalization
international index, About Index Types
collation order, Creating Indexes from the Server Console
international searches, Searching an Internationalized Directory
equality, Equality Example
examples, International Search Examples
greater than, Greater-Than Example
greater than or equal to, Greater-Than or Equal-to Example
less than, Less-Than Example
less than or equal to, Less-Than or Equal-to Example
matching rule filter syntax, Matching Rule Filter Syntax
substring, Substring Example
using OIDs, Matching Rule Formats
internationalization
character type, About Locales
collation order, About Locales
country code, Identifying Supported Locales
date format, About Locales
language tag, Identifying Supported Locales
locales and, About Locales
location of files, About Locales
matching rule filters, Matching Rule Filter Syntax
modifying entries, Modifying an Entry in an Internationalized Directory
monetary format, About Locales
object identifiers and, Identifying Supported Locales
of LDIF files, Storing Information in Multiple Languages
search filters and, Searching an Internationalized Directory
supported locales, Identifying Supported Locales
time format, About Locales
ip keyword, Defining Access from a Specific IP Address

J

jpeg images, Representing Binary Data

K

Kerberos, Authentication Mechanisms
configuring, Configuring Kerberos
realms, Realms

L

language code
in LDIF entries, Storing Information in Multiple Languages
list of supported, Identifying Supported Locales
language subtype, Adding an Attribute Subtype
language support
language tag, Identifying Supported Locales
searching and, Searching an Internationalized Directory
specifying using locales, Identifying Supported Locales
language tags
described, Identifying Supported Locales
in international searches, Using a Language Tag for the Matching Rule
in LDIF update statements, Modifying an Entry in an Internationalized Directory
LDAP clients
authentication over SSL, Configuring LDAP Clients to Use SSL
certificate-based authentication and, Using Certificate-Based Authentication
monitoring database with, Monitoring Databases from the Command Line
monitoring server with, Monitoring the Directory Server from the Command Line
schema and, Overview of Extending Schema
using to find entries, Finding Directory Entries
LDAP Data Interchange Format, see LDIF, LDIF Update Statements
LDAP search filters
DNs with commas and, Specifying DNs That Contain Commas in Search Filters
in targets, Targeting Entries or Attributes Using LDAP Filters
example, Setting a Target Using Filtering
examples, Targeting Entries or Attributes Using LDAP Filters
LDAP URLs
components of, Components of an LDAP URL
examples, Examples of LDAP URLs
for database links, Providing an LDAP URL
in access control, LDAP URLs
security, Examples of LDAP URLs
syntax, Components of an LDAP URL
ldap-agent, Starting the Subagent
ldapdelete utility, Adding and Modifying Entries Using ldapmodify
deleting entries, Deleting Entries Using ldapdelete
DNs with commas and, Using Special Characters
example, Deleting Entries Using ldapdelete
ldapmodify utility, Adding and Modifying Entries Using ldapmodify
attributes with language tags, Modifying an Entry in an Internationalized Directory
creating a root entry, Creating a Root Entry from the Command-Line
creating entries, Adding Entries Using ldapmodify
DNs with commas and, Using Special Characters
example, Adding Entries Using ldapmodify
example of use, Adding Entries Using ldapmodify
modifying entries, Adding and Modifying Entries Using ldapmodify
schema checking and, Adding and Modifying Entries Using ldapmodify
vs. ldapdelete, Adding and Modifying Entries Using ldapmodify
ldapsearch utility
base DN and, Using LDAP_BASEDN
commonly used options, Commonly Used ldapsearch Options
DNs with commas and, Using Special Characters
example of use, ldapsearch Examples
format, ldapsearch Command-Line Format
international searches, Searching an Internationalized Directory
limiting attributes returned, Displaying Subsets of Attributes
search filters, LDAP Search Filters
specifying files, Displaying Subsets of Attributes
using, Using ldapsearch
LDAP_BASEDN environment variable, Using LDAP_BASEDN
LDIF
access control keywords
groupdnattr, Using the userattr Keyword
userattr, Using the userattr Keyword
adding entries, Adding Entries Using LDIF
binary data, Representing Binary Data
change type, LDIF Update Statements
entry format, LDAP Data Interchange Format
organization, Specifying Domain Entries
organizational person, Specifying Organizational Person Entries
organizational unit, Specifying Organizational Unit Entries
example, LDIF File Example
internationalization and, Storing Information in Multiple Languages
line continuation, Continuing Lines in LDIF
Server Console and, Adding Entries Using LDIF
specifying entries
organization, Specifying Domain Entries
organizational person, Specifying Organizational Person Entries
organizational unit, Specifying Organizational Unit Entries
update statements, LDIF Update Statements
using to create directory, Defining Directories Using LDIF
LDIF entries
binary data in, Representing Binary Data
creating, Specifying Directory Entries Using LDIF
organizational person, Specifying Organizational Person Entries
organizational units, Specifying Organizational Unit Entries
organizations, Specifying Domain Entries
internationalization and, Storing Information in Multiple Languages
LDIF files
continued lines, Continuing Lines in LDIF
creating directory using, Defining Directories Using LDIF
creating multiple entries, Adding Entries Using LDIF
example, LDIF File Example
importing from Server Console, Adding Entries Using LDIF
internationalization and, Storing Information in Multiple Languages
LDIF format, LDAP Data Interchange Format
LDIF update statements, LDIF Update Statements
adding attributes, Adding Attributes to Existing Entries Using LDIF
adding entries, Adding an Entry Using LDIF
continued lines, LDIF Update Statements
deleting attribute values, Deleting a Specific Attribute Value Using LDIF
deleting attributes, Deleting All Values of an Attribute Using LDIF
deleting entries, Deleting an Entry Using LDIF
modifying attribute values, Changing an Attribute Value Using LDIF
modifying entries, Modifying an Entry Using LDIF
syntax, LDIF Update Statements
ldif utility
converting binary data to LDIF, Base-64 Encoding
ldif2db utility, Importing Using the ldif2db Command-Line Script
options, Running the db2index.pl Script
ldif2db.pl perl script, Importing Using the ldif2db.pl Perl Script
ldif2ldap utility, Importing Using the ldif2ldap Command-Line Script
legacy consumer
configuration, Replication with Earlier Releases
legacy replication plug-in
overview, Compatibility with Earlier Versions of Directory Server
less than or equal to search
international example, Less-Than or Equal-to Example
syntax, Using Operators in Search Filters
less than search
international example, Less-Than Example
syntax, Using Operators in Search Filters
local password policy, Configuring the Password Policy
locales
defined, About Locales
location of files, About Locales
supported, Identifying Supported Locales
locked accounts, Configuring the Account Lockout Policy Using the Console
lockout duration, Configuring the Account Lockout Policy Using the Console
log files, Viewing and Configuring Log Files
access log, Access Log
audit log, Audit Log
database transaction, Tuning Transaction Logging
deletion policy, Defining a Log File Deletion Policy
error log, Error Log
location of, Manual Log File Rotation
manually rotating, Manual Log File Rotation
rotation policy, Defining a Log File Rotation Policy
setting file permissions, Defining a Log File Rotation Policy
viewing when server is down, Viewing and Configuring Log Files
logging
for WinSync, Troubleshooting
login identity
changing, Changing Login Identity
viewing, Viewing the Current Console Bind DN
loop detection
cascading chaining, Detecting Loops

M

macro ACIs
example, Macro ACI Example
overview, Advanced Access Control: Using Macro ACIs
syntax, Macro ACI Syntax
managed device
overview, About SNMP
managed object, About SNMP
managed role
creating, Creating a Managed Role
example, Examples: Managed Role Definition
manually rotating log files, Manual Log File Rotation
markerObjectClass keyword, Using the markerObjectClass and requiredObjectClass Keywords
matchingRule format, Matching Rule Formats
using language tag, Using a Language Tag for the Matching Rule
using language tag and suffix, Using a Language Tag and Suffix for the Matching Rule
using OID, Matching Rule Formats
using OID and suffix, Using an OID and Suffix for the Matching Rule
metaphone phonetic algorithm, Approximate Searches
MIB
Directory Server, Using the Management Information Base
redhat-directory.mib, Using the Management Information Base
entity table, Entity Table
entries table, Entries Table
interaction table, Interaction Table
operations table, Operations Table
modifying
attribute values, Changing an Attribute Value Using LDIF
entries, Modifying an Entry Using LDIF
international entries, Modifying an Entry in an Internationalized Directory
monetary format, About Locales
monitoring
database from command line, Monitoring Databases from the Command Line
database from server console, Monitoring Database Activity from the Directory Server Console
Directory Server, Viewing and Configuring Log Files
from console, Monitoring Server Activity
log files, Viewing and Configuring Log Files
replication status, Monitoring Replication Status
threads, Monitoring the Server from the Directory Server Console
with SNMP, Monitoring Directory Server Using SNMP
monitoring from console, Monitoring Server Activity
moving entries, A Note on Renaming Entries
multi-master replication
introduction, Multi-Master Replication
preventing monopolization of the consumer, Preventing Monopolization of the Consumer in Multi-Master Replication
setting up, Configuring Multi-Master Replication
multiple search filters, Using Compound Search Filters

N

naming conflicts
in replication, Solving Naming Conflicts
nested role
creating, Creating a Nested Role
example, Example: Nested Role Definition
nsds5ReplicaBusyWaitTime, Preventing Monopolization of the Consumer in Multi-Master Replication
nsds5ReplicaSessionPauseTime, Preventing Monopolization of the Consumer in Multi-Master Replication
nsRole, About Roles
nsslapd-db-checkpoint-interval, Changing the Database Checkpoint Interval
nsslapd-db-durable-transactions, Disabling Durable Transactions
nsslapd-db-logdirectory, Changing the Location of the Database Transaction Log
nsslapd-idlistscanlimit, Overview of the Searching Algorithm
nsslapd-lookthroughlimit attribute
role in searching algorithm, Overview of the Searching Algorithm
nsslapd-maxbersize, Adding Very Large Attributes
nsslapd-schemacheck attribute, Turning Schema Checking On and Off
nsslapd-sizelimit attribute
role in searching algorithm, Overview of the Searching Algorithm
nsslapd-timelimit attribute
role in searching algorithm, Overview of the Searching Algorithm
nsview, Using Views
nsviewfilter, Using Views

O

object class
adding to an entry, Adding an Object Class to an Entry
creating, Creating Object Classes
deleting, Deleting Object Classes
editing, Editing Object Classes
name, Creating Object Classes
OID, Creating Object Classes
parent object, Creating Object Classes
referral, Creating Smart Referrals from the Command Line
removing from an entry, Removing an Object Class
roles, Managing Roles Using the Command-Line
standard, Overview of Extending Schema
user-defined, Viewing Object Classes
viewing, Viewing Object Classes
object identifier (OID), Identifying Supported Locales
attribute, Creating Attributes
in matchingRule, Matching Rule Formats
object class, Creating Object Classes
objectClass field (LDIF), About the LDIF File Format
OID, See object identifier, Identifying Supported Locales
operations table, Operations Table
operations, defined, Monitoring the Server from the Directory Server Console
operators
Boolean, Using Compound Search Filters
international searches and, Supported Search Types
search filters and, Using Operators in Search Filters
suffix, Supported Search Types
optional attributes
creating, Creating Object Classes
deleting, Creating Object Classes
editing, Editing Object Classes
editing in object class, Editing Object Classes
organization, specifying entries for, Specifying Domain Entries
organizational person, specifying entries for, Specifying Organizational Person Entries
organizational unit, specifying entries for, Specifying Organizational Unit Entries
override CoS qualifier, Creating the CoS Definition Entry from the Command-Line

P

parent access, Parent Access (parent Keyword)
parent keyword, Parent Access (parent Keyword)
parent object, Creating Object Classes
pass-through authentication (PTA). See PTA plug-in, Using the Pass-through Authentication Plug-in
password change extended operation, Password Change Extended Operation
password file
Administration Server, Creating a Password File for the Administration Server
SSL certificate, Creating a Password File for the Directory Server
password policy
account lockout, Configuring the Account Lockout Policy Using the Console
attributes, Configuring a Global Password Policy Using the Command-Line
configuring, Configuring the Password Policy
using command line, Configuring a Global Password Policy Using the Command-Line
using console, Configuring a Global Password Policy Using the Console
global, Configuring the Password Policy
lockout duration, Configuring the Account Lockout Policy Using the Console
managing, Managing the Password Policy
password failure counter, Configuring the Account Lockout Policy Using the Console
replicating account lockout attributes, Replicating Account Lockout Attributes
replication, Managing the Password Policy in a Replicated Environment
subtree level, Configuring the Password Policy
user level, Configuring the Password Policy
Password Sync, Password Sync Service
installation directory, Step 4: Install and Configure the Password Sync Service
installed files, Step 4: Install and Configure the Password Sync Service
installing, Step 4: Install and Configure the Password Sync Service
modifying, Modifying Password Sync
setting up SSL, Step 4: Install and Configure the Password Sync Service
starting and stopping, Starting and Stopping the Password Sync Service
uninstalling, Uninstalling Password Sync Service
passwordChange attribute, Configuring a Global Password Policy Using the Command-Line
passwordExp attribute, Configuring a Global Password Policy Using the Command-Line
passwordGraceLimit attribute, Configuring a Global Password Policy Using the Command-Line
passwordInHistory attribute, Configuring a Global Password Policy Using the Command-Line
passwordMaxRepeats attribute, Configuring a Global Password Policy Using the Command-Line
passwordMin8bit attribute, Configuring a Global Password Policy Using the Command-Line
passwordMinAlphas attribute, Configuring a Global Password Policy Using the Command-Line
passwordMinCategories attribute, Configuring a Global Password Policy Using the Command-Line
passwordMinDigits attribute, Configuring a Global Password Policy Using the Command-Line
passwordMinLowers attribute, Configuring a Global Password Policy Using the Command-Line
passwordMinSpecials attribute, Configuring a Global Password Policy Using the Command-Line
passwordMinTokenLength attribute, Configuring a Global Password Policy Using the Command-Line
passwordMinUppers attribute, Configuring a Global Password Policy Using the Command-Line
passwordMustChange attribute, Configuring a Global Password Policy Using the Command-Line
passwords
account lockout, Configuring the Account Lockout Policy Using the Console
certificate, Creating a Password File for the Directory Server
changing, Password Change Extended Operation
failure counter, Configuring the Account Lockout Policy Using the Console
lockout duration, Configuring the Account Lockout Policy Using the Console
policy
differences between Directory Server and Active Directory, Password Policies
setting, Setting User Passwords
synching with Active Directory, Password Sync Service
passwordStorageScheme attribute, Configuring a Global Password Policy Using the Command-Line
PDUs, About SNMP
performance counters, Monitoring Database Activity from the Directory Server Console
monitoring the server with, Monitoring Server Activity
performance tuning
database, Tuning Database Performance
server, Tuning Server Performance
permissions
ACI syntax, The ACI Syntax
allowing or denying access, Allowing or Denying Access
assigning rights, Assigning Rights
overview, Defining Permissions
precedence rule, ACI Evaluation
plug-in functions, Administering Directory Server Plug-ins
plug-ins
7-bit check plug-in, 7-Bit Check Plug-in
ACL plug-in, ACL Plug-in
ACL preoperation plug-in, ACL Preoperation Plug-in
binary syntax plug-in, Binary Syntax Plug-in
Boolean syntax plug-in, Boolean Syntax Plug-in
case exact string syntax plug-in, Case Exact String Syntax Plug-in
case ignore string syntax plug-in, Case Ignore String Syntax Plug-in
chaining database plug-in, Chaining Database Plug-in
Class of Service plug-in, Class of Service Plug-in
CLEAR password storage plug-in, CLEAR Password Storage Plug-in
Country String Syntax Plug-in, Country String Syntax Plug-in
CRYPT password storage plug-in, CRYPT Password Storage Plug-in
disabling, Enabling and Disabling Plug-ins
distinguished name syntax plug-in, Distinguished Name Syntax Plug-in
enabling, Enabling and Disabling Plug-ins
generalized time syntax plug-in, Generalized Time Syntax Plug-in
integer syntax plug-in, Integer Syntax Plug-in
internationalization plug-in, Internationalization Plug-in
ldbm database plug-in, ldbm Database Plug-in
legacy replication plug-in, Legacy Replication Plug-in
multimaster replication plug-in, Multi-Master Replication Plug-in
NS-MTA-MD5 password storage plug-in, NS-MTA-MD5 Password Storage Plug-in
octet string syntax plug-in, Octet String Syntax Plug-in
postal address string syntax plug-in, Postal Address String Syntax Plug-in
PTA plug-in, PTA Plug-in
reference, Server Plug-in Functionality Reference
referential integrity plug-in, Referential Integrity Postoperation Plug-in
retro changelog plug-in, Retro Changelog Plug-in
roles plug-in, Roles Plug-in
SHA password storage plug-in, SHA Password Storage Plug-in
space insensitive string syntax plug-in, Space Insensitive String Syntax Plug-in
SSHA password storage plug-in, SSHA Password Storage Plug-in
state change plug-in, State Change Plug-in
telephone syntax plug-in, Telephone Syntax Plug-in
uid uniqueness plug-in, UID Uniqueness Plug-in
URI plug-in, URI Plug-in
pointer CoS
example, How a Pointer CoS Works
overview, How a Pointer CoS Works
port number
Directory Server configuration, Changing Directory Server Port Numbers
for SSL communications, Changing Directory Server Port Numbers
precedence rule
ACI, ACI Evaluation
preferences
security, Setting Security Preferences
presence index, About Index Types
defaults, Overview of System Indexes
presence search
example, Search Filter Examples
syntax, Using Operators in Search Filters
preventing monopolization of the consumer in multi-master replication, Preventing Monopolization of the Consumer in Multi-Master Replication
pronunciation subtype, Pronunciation Subtype
Property Editor
displaying, Displaying the Property Editor
protocol data units. See PDUs, About SNMP
proxy authorization
ACI example, Proxied Authorization ACI Example
with cascading chaining, Configuring Cascading Chaining from the Command-Line
proxy DN, Proxied Authorization ACI Example
proxy right, Assigning Rights
PTA plug-in
configuring, Configuring the PTA Plug-in
examples, PTA Plug-in Syntax Examples
syntax, PTA Plug-in Syntax
use in Directory Server, How Directory Server Uses PTA

Q

quotation marks, in parameter values, Using Special Characters

R

read right, Assigning Rights
read-only mode, Monitoring Database Activity from the Directory Server Console
database, Placing a Database in Read-Only Mode
read-only replica, Read-Write and Read-Only Replicas
read-write replica, Read-Write and Read-Only Replicas
redhat-directory.mib, Using the Management Information Base
entity table, Entity Table
entries table, Entries Table
interaction table, Interaction Table
operations table, Operations Table
ref attribute, Creating Smart Referrals from the Command Line
refer command, Starting the Server in Referral Mode
referential integrity
attributes, How Referential Integrity Works
disabling, Enabling/Disabling Referential Integrity
enabling, Enabling/Disabling Referential Integrity
log file, How Referential Integrity Works
modifying attributes, Modifying the Attribute List
overview, Maintaining Referential Integrity
with replication, Using Referential Integrity with Replication
referral mode, Starting the Server in Referral Mode
referral object class, Creating Smart Referrals from the Command Line
referrals
creating smart referrals, Creating Smart Referrals
creating suffix, Creating Suffix Referrals
on update, Enabling Referrals Only During Update Operations
setting default, Setting Default Referrals
suffix, Using Referrals in a Suffix
renaming entries
restrictions, A Note on Renaming Entries
repl-monitor.pl script, Monitoring Replication Status from Administration Express
replacing attribute values, Modifying an Entry Using LDIF
replica
exporting to LDIF, Exporting a Replica to LDIF
read-only, Read-Write and Read-Only Replicas
read-write, Read-Write and Read-Only Replicas
replicate_now.sh script, Forcing Replication Updates from the Command-Line
replication
and access control, Access Control and Replication
and password policy, Managing the Password Policy in a Replicated Environment
and referential integrity, Using Referential Integrity with Replication
and SSL, Replication over SSL
cascading, Configuring Cascading Replication
changelog, Changelog
compatibility with earlier versions, Compatibility with Earlier Versions of Directory Server
configuring from the command line, Configuring Replication from the Command Line
configuring legacy replication, Replication with Earlier Releases
configuring SSL, Replication over SSL
consumer server, Suppliers and Consumers
creating the supplier bind DN, Creating the Supplier Bind DN Entry
forcing synchronization, Forcing Replication Updates
hub, Suppliers and Consumers
managing, Managing Replication
monitoring status, Monitoring Replication Status
multi-master, Configuring Multi-Master Replication
of ACIs, Access Control and Replication
overview, Replication Overview
replicate_now.sh script, Forcing Replication Updates from the Command-Line
replicating account lockout attributes, Replicating Account Lockout Attributes
replication manager entry, Replication Identity
single-master, Configuring Single-Master Replication
solving conflicts, Solving Common Replication Conflicts
supplier bind DN, Replication Identity
supplier server, Suppliers and Consumers
supplier-initiated, Suppliers and Consumers
troubleshooting, Troubleshooting Replication-Related Problems
unit of, What Directory Units Are Replicated
using repl-monitor.pl script, Monitoring Replication Status from Administration Express
using template-cl-dump.pl script, Troubleshooting Replication-Related Problems
replication agreement, Replication Agreement
replication manager, Replication Identity
required attributes
creating, Creating Object Classes
deleting, Creating Object Classes
editing, Editing Object Classes
requiredObjectClass keyword, Using the markerObjectClass and requiredObjectClass Keywords
resource limits, Setting Resource Limits Based on the Bind DN
setting
using command line, Setting Resource Limits Using the Command-Line
using console, Setting Resource Limits Using the Console
Resource Summary
viewing, Monitoring the Server from the Directory Server Console
resource use
connections, Monitoring the Server from the Directory Server Console
monitoring, Monitoring the Server from the Directory Server Console
restoring data, Backing up and Restoring Data
bak2db, Using the bak2db Command-Line Script
bak2db.pl, Using bak2db.pl Perl Script
dse.ldif, Restoring the dse.ldif Configuration File
from console, Restoring All Databases from the Console
replicated entries, Restoring Databases That Include Replicated Entries
restoring the database, Tuning Transaction Logging
retro changelog
and access control, Retro Changelog and the Access Control Policy
attributes, Using the Retro Changelog Plug-in
object class, Using the Retro Changelog Plug-in
searching, Retro Changelog and the Access Control Policy
trimming, Trimming the Retro Changelog
retro changelog plug-in
enabling, Enabling the Retro Changelog Plug-in
overview, Compatibility with Earlier Versions of Directory Server
rights
list of, Assigning Rights
roledn keyword, Defining Role Access - roledn Keyword
roles, Using Roles
access control, Using Roles Securely
access to directory, Defining Role Access - roledn Keyword
activating, Activating User and Roles Using the Console
attributes, Managing Roles Using the Command-Line
editing, Viewing and Editing an Entry's Roles
filtered
creating, Creating a Filtered Role
example, Example: Filtered Role Definition
inactivating, About Roles
managed
creating, Creating a Managed Role
example, Examples: Managed Role Definition
nested
creating, Creating a Nested Role
example, Example: Nested Role Definition
object classes, Managing Roles Using the Command-Line
overview, About Roles
root DN, see Directory Manager, Configuring the Directory Manager
root DSE, Searching the Root DSE Entry
root entry creation, Defining Directories Using LDIF
root suffix, Creating Suffixes
creating from command line, Creating Root and Sub Suffixes from the Command-Line
creating from console, Creating a New Root Suffix Using the Console

S

SASL
authentication, Defining Access Based on Authentication Method
configuring
KDC server, Configuring the KDC Server
configuring authentication at startup, Configuring SASL Authentication at Directory Server Startup
configuring Kerberos, Configuring Kerberos
identity mapping, SASL Identity Mapping
configuring form the Console, Configuring SASL Identity Mapping from the Console
configuring from the command-line, Configuring SASL Identity Mapping from the Command-Line
default, SASL Identity Mapping
KDC server
configuration example, Example: Configuring an Example KDC Server
Kerberos realms, Realms
mechanisms, Authentication Mechanisms
CRAM-MD5, Authentication Mechanisms
DIGEST-MD5, Authentication Mechanisms
GSS-API, Authentication Mechanisms
password change extended operation, Password Change Extended Operation
schema
checking, Turning Schema Checking On and Off
creating new attributes, Creating Attributes
creating new object classes, Creating Object Classes
deleting attributes, Deleting Attributes
deleting object classes, Deleting Object Classes
differences between Directory Server and Active Directory, Schema Differences
initials, Contraints on the initials attribute
street and streetAddress, Values for street and streetAddress
editing attributes, Editing Attributes
editing object classes, Editing Object Classes
extending, Extending the Directory Schema
nsslapd-schemacheck attribute, Turning Schema Checking On and Off
standard, Extending the Directory Schema
viewing attributes, Viewing Attributes
viewing object classes, Viewing Object Classes
schema checking
and access control, Targeting Attributes
ldapmodify and, Adding and Modifying Entries Using ldapmodify
overview, Turning Schema Checking On and Off
turning on or off, Turning Schema Checking On and Off
turning on or off in the command line, Turning Schema Checking On and Off
scripts
repl-monitor.pl, Monitoring Replication Status from Administration Express
template-cl-dump.pl, Troubleshooting Replication-Related Problems
search filters, LDAP Search Filters
Boolean operators, Using Compound Search Filters
contained in file, Displaying Subsets of Attributes
examples, LDAP Search Filters
matching rule, Matching Rule Filter Syntax
operators in, Using Operators in Search Filters
specifying attributes, Using Attributes in Search Filters
syntax, Search Filter Syntax
using compound, Using Compound Search Filters
using multiple, Using Compound Search Filters
Search Performance, Search Performance
search right, Assigning Rights
search types, list of, Using Operators in Search Filters
searches
approximate, Using Operators in Search Filters
equality, Using Operators in Search Filters
example, ldapsearch Examples
greater than or equal to, Using Operators in Search Filters
international, Searching an Internationalized Directory
international examples, International Search Examples
less than, Less-Than Example
less than or equal to, Using Operators in Search Filters
of directory tree, Using ldapsearch
presence, Using Operators in Search Filters
specifying scope, Commonly Used ldapsearch Options
substring, Using Operators in Search Filters
searching algorithm
overview, Overview of the Searching Algorithm
Secure Sockets Layer, see SSL, Starting the Server with SSL Enabled
security
certificate-based authentication, Using Certificate-Based Authentication
LDAP URLs, Examples of LDAP URLs
setting preferences, Setting Security Preferences
self access, Self Access (self Keyword)
LDIF example, Examples
self keyword, Self Access (self Keyword)
selfwrite right, Assigning Rights
example, Allowing Users to Add or Remove Themselves from a Group
server parameters
database
read-only, Monitoring Database Activity from the Directory Server Console
setting access controls, Creating ACIs from the Console
setting passwords, Setting User Passwords
simple authentication, Defining Access Based on Authentication Method
Simple Authentication and Security Layer, Managing SASL
Simple Authentication and Security Layer (SASL). See SASL authentication, Defining Access Based on Authentication Method
Simple Network Management Protocol. See SNMP, About SNMP
Simple Sockets Layer. See SSL, Defining Access Based on Authentication Method
single-master replication
introduction, Single-Master Replication
setting up, Configuring Single-Master Replication
smart referrals
creating, Creating Smart Referrals
creating from command line, Creating Smart Referrals from the Command Line
creating from console, Creating Smart Referrals Using the Directory Server Console
SNMP
configuring
Directory Server, Configuring the Directory Server for SNMP
ldap-agent, Starting the Subagent
managed device, About SNMP
managed objects, About SNMP
master agent, About SNMP
configuring, Configuring the Master Agent
mib, Testing the Subagent
MIB
entity table, Entity Table
entries table, Entries Table
interaction table, Interaction Table
operations table, Operations Table
monitoring the Directory Server, Monitoring Directory Server Using SNMP
overview, About SNMP
subagent, About SNMP
configuration file, Subagent Configuration File
location, Configuring the Subagent
starting, Starting the Subagent
stopping, Starting the Subagent
testing the subagent, Testing the Subagent
SSL
Administration Server password file, Creating a Password File for the Administration Server
and replication, Replication over SSL
authentication, Starting the Server with SSL Enabled
certificate password, Creating a Password File for the Directory Server
chaining with, Chaining Using SSL
client authentication, Configuring LDAP Clients to Use SSL
configuring clients to use, Configuring LDAP Clients to Use SSL
enabling, Starting the Server with SSL Enabled
port number, Changing Directory Server Port Numbers
setting preferences, Setting Security Preferences
starting the server with, Starting the Server with SSL Enabled
SSL authentication, Defining Access Based on Authentication Method
standard
attributes, Overview of Extending Schema
index files, Overview of Standard Indexes
object classes, Overview of Extending Schema
schema, Extending the Directory Schema
Start TLS, Command-Line Functions for Start TLS
Starting and stopping
Directory Server and Administration Server, Starting and Stopping Servers
Directory Server Console, Starting the Directory Server Console
starting the Directory Server
with SSL, Starting the Server with SSL Enabled
static groups, Managing Static Groups
creating, Adding a New Static Group
modifying, Modifying a Static Group
sub suffix, Creating Suffixes
creating from command line, Creating Root and Sub Suffixes from the Command-Line
creating from console, Creating a New Sub Suffix Using the Console
substring index, About Index Types
substring index limitation, About Index Types
substring search, Using Operators in Search Filters
international example, Substring Example
subtree level password policy, Configuring the Password Policy
subtypes
of attributes, Adding an Attribute Subtype
suffix
and associated database, Creating and Maintaining Suffixes
configuration attributes, Creating Root and Sub Suffixes from the Command-Line
creating, Creating a Root Entry
creating from command line, Creating Root and Sub Suffixes from the Command-Line
creating root suffix, Creating a New Root Suffix Using the Console
creating sub suffix, Creating a New Sub Suffix Using the Console
custom distribution function, Adding Multiple Databases for a Single Suffix
custom distribution logic, Adding Multiple Databases for a Single Suffix
disabling, Disabling a Suffix
in Directory Server, Configuring Directory Databases
using referrals, Using Referrals in a Suffix
on update only, Enabling Referrals Only During Update Operations
with multiple databases, Adding Multiple Databases for a Single Suffix
suffix referrals
creating, Creating Suffix Referrals
creating from command line, Creating Suffix Referrals from the Command-Line
creating from console, Creating Suffix Referrals Using the Console
supplier bind DN, Replication Identity
supplier server, Suppliers and Consumers
symbols
'', in ldapsearch, Using Special Characters
-, in change operation, LDIF Update Statements
::, in LDIF statements, Base-64 Encoding
<, in LDIF statements, Standard LDIF Notation
quotation marks, in ldapmodify commands, Using Special Characters
synchronization agreement
changing, Modifying the Sync Agreement
syntax
ACI statements, The ACI Syntax
attribute value, Creating Attributes
LDAP URLs, Components of an LDAP URL
ldapsearch, ldapsearch Command-Line Format
LDIF update statements, LDIF Update Statements
matching rule filter, Matching Rule Filter Syntax
search filter, Search Filter Syntax
system connections
monitoring, Monitoring the Server from the Directory Server Console
system indexes, Overview of System Indexes
system resources
monitoring, Monitoring the Server from the Directory Server Console

T

targattrfilters keyword, Targeting Attribute Values Using LDAP Filters
target
ACI syntax, The ACI Syntax
attribute values, Targeting Attribute Values Using LDAP Filters
attributes, Targeting Attributes
keywords in ACIs, Defining Targets
overview, Defining Targets
using LDAP search filters, Targeting Entries or Attributes Using LDAP Filters
using LDAP URLs, LDAP URLs
target DNs
containing commas, Targeting a Directory Entry
target keyword, Targeting a Directory Entry
targetattr keyword, Targeting Attributes
targetfilter keyword, Targeting Entries or Attributes Using LDAP Filters
targeting
directory entries, Targeting a Directory Entry
template entry. See CoS template entry., About the CoS Template Entry
template-cl-dump.pl script, Troubleshooting Replication-Related Problems
thread
monitoring, Monitoring the Server from the Directory Server Console
time format, About Locales
timeofday keyword, Defining Access at a Specific Time of Day or Day of Week
tuning performance
database, Tuning Database Performance
server, Tuning Server Performance

V

value-based ACI, Targeting Attribute Values Using LDAP Filters
viewing
access control
get effective rights, Get Effective Rights Control
attributes, Viewing Attributes
object classes, Viewing Object Classes
virtual list view index, About Index Types
vlvindex command-line tool, About Index Types

Note: This documentation is provided {and copyrighted} by Red Hat®, Inc. and is released via the Open Publication License. The copyright holder has added the further requirement that Distribution of substantively modified versions of this document is prohibited without the explicit permission of the copyright holder. The CentOS project redistributes these original works (in their unmodified form) as a reference for CentOS-5 because CentOS-5 is built from publicly available, open source SRPMS. The documentation is unmodified to be compliant with upstream distribution policy. Neither CentOS-5 nor the CentOS Project are in any way affiliated with or sponsored by Red Hat®, Inc.