Red Hat 8.1 Configuration And Command Reference page 258

Directory server; configuring and managing with command-line utilities
Hide thumbs Also See for 8.1:
Table of Contents

Advertisement

258
Glossary
master agent. Also called a subagent.
SSL
A software library establishing a secure connection between two parties (client and server)
used to implement HT T PS, the secure version of HT T P. Also called
standard index
index maintained by default.
sub suffix
A branch underneath a root suffix.
subagent
See
SNMP
subagent.
substring index
Allows for efficient searching against substrings within entries. Substring indexes are limited to
a minimum of two characters for each entry.
suffix
T he name of the entry at the top of the directory tree, below which data is stored. Multiple
suffixes are possible within the same directory. Each database only has one suffix.
superuser
T he most privileged user available on Unix machines. T he superuser has complete access
privileges to all files on the machine. Also called root.
supplier
Server containing the master copy of directory trees or subtrees that are replicated to replica
servers.
supplier server
In the context of replication, a server that holds a replica that is copied to a different server is
called a supplier for that replica.
supplier-initiated replication
Replication configuration where
symmetric encryption
Encryption that uses the same key for both encrypting and decrypting. DES is an example of a
symmetric encryption algorithm.
system index
Cannot be deleted or modified as it is essential to Directory Server operations.
T
target
In the context of access control, the target identifies the directory information to which a
particular ACI applies.
supplier
servers replicate directory data to any replica servers.
Secure Sockets
Layer.

Advertisement

Table of Contents
loading

Table of Contents