Red Hat DIRECTORY SERVER 8.0 Command Reference Manual page 263

Hide thumbs Also See for DIRECTORY SERVER 8.0:
Table of Contents

Advertisement

SSL
standard index
sub suffix
subagent
substring index
suffix
superuser
supplier
supplier server
supplier-initiated replication
symmetric encryption
system index
T
target
target entry
TCP/IP
template entry
time/date format
TLS
A software library establishing a secure connection between two
parties (client and server) used to implement HTTPS, the secure
version of HTTP. Also called
index maintained by default.
A branch underneath a root suffix.
SNMP
subagent.
See
Allows for efficient searching against substrings within entries.
Substring indexes are limited to a minimum of two characters for each
entry.
The name of the entry at the top of the directory tree, below which
data is stored. Multiple suffixes are possible within the same directory.
Each database only has one suffix.
The most privileged user available on Unix machines. The superuser
has complete access privileges to all files on the machine. Also called
root.
Server containing the master copy of directory trees or subtrees that
are replicated to replica servers.
In the context of replication, a server that holds a replica that is copied
to a different server is called a supplier for that replica.
Replication configuration where
data to any replica servers.
Encryption that uses the same key for both encrypting and decrypting.
DES is an example of a symmetric encryption algorithm.
Cannot be deleted or modified as it is essential to Directory Server
operations.
In the context of access control, the target identifies the directory
information to which a particular ACI applies.
The entries within the scope of a CoS.
Transmission Control Protocol/Internet Protocol. The main network
protocol for the Internet and for enterprise (company) networks.
CoS template
entry.
See
Indicates the customary formatting for times and dates in a specific
region.
The new standard for secure socket layers; a public key based
Transport Layer
protocol. Also
Secure Sockets
Layer.
supplier
servers replicate directory
Security.
253

Advertisement

Table of Contents
loading

Table of Contents