Red Hat DIRECTORY SERVER 7.1 Configuration page 317

Configuration, command, and file reference
Hide thumbs Also See for DIRECTORY SERVER 7.1:
Table of Contents

Advertisement

suffix The name of the entry at the top of the directory tree, below which data is
stored. Multiple suffixes are possible within the same directory. Each database only
has one suffix.
superuser The most privileged user available on Unix machines. The superuser
has complete access privileges to all files on the machine. Also called root.
supplier Server containing the master copy of directory trees or subtrees that are
replicated to consumer servers.
supplier server In the context of replication, a server that holds a replica that is
copied to a different server is called a supplier for that replica.
supplier-initiated replication Replication configuration where supplier servers
replicate directory data to consumer servers.
symmetric encryption Encryption that uses the same key for both encrypting
and decrypting. DES is an example of a symmetric encryption algorithm.
system index Cannot be deleted or modified as it is essential to Directory Server
operations.
target In the context of access control, the target identifies the directory
information to which a particular ACI applies.
target entry The entries within the scope of a CoS.
TCP/IP Transmission Control Protocol/Internet Protocol. The main network protocol
for the Internet and for enterprise (company) networks.
template entry See CoS template entry.
time / date format Indicates the customary formatting for times and dates in a
specific region.
TLS Also Transport Layer Security. The new standard for secure socket layers; a
public key based protocol.
topology The way a directory tree is divided among physical servers and how
these servers link with one another.
Transport Layer Security See TLS.
Glossary
317

Advertisement

Table of Contents
loading

Table of Contents