Red Hat DIRECTORY SERVER 8.0 Command Reference Manual page 261

Hide thumbs Also See for DIRECTORY SERVER 8.0:
Table of Contents

Advertisement

read-only replica
read-write replica
relative distinguished name
replica
replica-initiated replication
replication
replication agreement
RFC
role
role-based attributes
root
root suffix
S
SASL
schema
(2) In the context of replication, when a read-only replica receives
an update request, it forwards it to the server that holds the
corresponding read-write replica. This forwarding process is called a
referral.
A replica that refers all update operations to read-write replicas. A
server can hold any number of read-only replicas.
A replica that contains a master copy of directory information and can
be updated. A server can hold any number of read-write replicas.
See RDN.
A database that participates in replication.
Replication configuration where replica servers, either hub or
consumer servers, pull directory data from supplier servers. This
method is available only for legacy replication.
Act of copying directory trees or subtrees from supplier servers to
replica servers.
Set of configuration parameters that are stored on the supplier server
and identify the databases to replicate, the replica servers to which
the data is pushed, the times during which replication can occur, the
DN and credentials used by the supplier to bind to the consumer, and
how the connection is secured.
Request for Comments. Procedures or standards documents
submitted to the Internet community. People can send comments on
the technologies before they become accepted standards.
An entry grouping mechanism. Each role has members, which are the
entries that possess the role.
Attributes that appear on an entry because it possesses a particular
role within an associated CoS template.
The most privileged user available on Unix machines. The root user
has complete access privileges to all files on the machine.
The parent of one or more sub suffixes. A directory tree can contain
more than one root suffix.
An authentication framework for clients as they attempt to bind to a
Simple Authentication and Security Layer
directory. Also
Definitions describing what types of information can be stored as
entries in the directory. When information that does not match the
schema is stored in the directory, clients attempting to access the
directory may be unable to display the proper results.
.
251

Advertisement

Table of Contents
loading

Table of Contents