Sign In
Upload
Manuals
Brands
NOVELL Manuals
Software
EDIRECTORY 8.8 - GUIDE
NOVELL EDIRECTORY 8.8 - GUIDE Manuals
Manuals and User Guides for NOVELL EDIRECTORY 8.8 - GUIDE. We have
5
NOVELL EDIRECTORY 8.8 - GUIDE manuals available for free PDF download: Manual, Installation Manual, Troubleshooting Manual
NOVELL EDIRECTORY 8.8 - GUIDE Manual (574 pages)
Brand:
NOVELL
| Category:
Software
| Size: 6 MB
Table of Contents
Table of Contents
5
About this Guide
17
1 Understanding Novell Edirectory
19
Ease of Management through Novell Imanager
20
Powerful Tree Structure
20
Web-Based Management Utility
22
Single Login and Authentication
23
Object Classes and Properties
23
List of Objects
23
Container Object Classes
25
Leaf Object Classes
29
Context and Naming
38
Distinguished Name
39
Typeful Name
39
Name Resolution
40
Current Workstation Context
40
Leading Period
40
Relative Naming
40
Trailing Periods
41
Context and Naming on Linux and UNIX
41
Schema
41
Schema Management
42
Schema Classes, Attributes, and Syntaxes
42
Understanding Mandatory and Optional Attributes
46
Sample Schema
46
Designing the Schema
47
Partitions
47
Partitions
48
Distributing Replicas for Performance
49
Partitions and WAN Links
49
Replicas
50
Replica Types
52
Filtered Replicas
54
Netware Bindery Emulation
55
Server Synchronization in the Replica Ring
55
Access to Resources
55
Edirectory Rights
56
Trustee Assignments and Targets
56
Edirectory Rights Concepts
57
Default Rights for a New Server
61
Delegated Administration
62
Administering Rights
62
2 Designing Your Novell Edirectory Network
69
Edirectory Design Basics
69
Network Layout
69
Organizational Structure
69
Preparing for Edirectory Design
70
Designing the Edirectory Tree
70
Creating a Naming Standards Document
70
Designing the Upper Layers of the Tree
73
Designing the Lower Layers of the Tree
75
Guidelines for Partitioning Your Tree
76
Determining Partitions for the Upper Layers of the Tree
76
Determining Partitions for the Lower Layers of the Tree
77
Determining Partition Size
77
Considering Network Variables
77
Guidelines for Replicating Your Tree
78
Workgroup Needs
78
Fault Tolerance
78
Determining the Number of Replicas
79
Replicating the Tree Partition
79
Replicating for Administration
79
Meeting Bindery Services Needs for Netware
80
Managing WAN Traffic
80
Planning the User Environment
80
Reviewing Users' Needs
80
Creating Accessibility Guidelines
81
Designing Edirectory for E-Business
81
Understanding the Novell Certificate Server
82
Rights Required to Perform Tasks on Novell Certificate Server
82
Ensuring Secure Edirectory Operations on Linux, Solaris, AIX, and HP-UX
83
Systems
83
Synchronizing Network Time
86
Synchronizing Time on Netware Servers
86
Synchronizing Time on Windows Servers
87
Synchronizing Time on Linux, Solaris, AIX, or HP-UX Systems
87
Verifying Time Synchronization
88
Security Considerations
88
3 Managing Objects
91
General Object Tasks
91
Browsing the Edirectory Tree
91
Creating an Object
94
Modifying an Object's Properties
94
Copying Objects
94
Moving Objects
94
Deleting Objects
95
Renaming Objects
95
Managing User Accounts
95
Creating and Modifying User Accounts
96
Setting up Optional Account Features
97
Setting up Login Scripts
98
Login Time Restrictions for Remote Users
99
Deleting User Accounts
100
Configuring Role-Based Services
101
Defining RBS Roles
102
Defining Custom RBS Tasks
104
Synchronization
105
Features of Synchronization
106
Normal or Replica Synchronization
107
Priority Sync
109
4 Managing the Schema
117
Extending the Schema
117
Creating a Class
118
Deleting a Class
118
Creating an Attribute
119
Adding an Optional Attribute to a Class
119
Deleting an Attribute
119
Creating an Auxiliary Class
120
Extending an Object with the Properties of an Auxiliary Class
120
Modifying an Object's Auxiliary Properties
120
Deleting Auxiliary Properties from an Object
121
Viewing the Schema
121
Viewing Class Information
121
Viewing Attribute Information
122
Manually Extending the Schema
122
Extending the Schema on Netware
122
Extending the Schema on Windows
122
Extending the Schema on Linux, Solaris, AIX, or HP-UX Systems
123
Schema Flags Added in Edirectory 8.7
124
Using the Embox Client to Perform Schema Operations
126
Using the Dsschema Emtool
126
Dsschema Emtool Options
127
5 Managing Partitions and Replicas
129
Creating a Partition
130
Merging a Partition
131
Moving Partitions
132
Cancelling Create or Merge Partition Operations
133
Administering Replicas
133
Adding a Replica
133
Deleting a Replica
134
Changing a Replica Type
135
Setting up and Managing Filtered Replicas
136
Using the Filtered Replica Wizard
136
Defining a Partition Scope
137
Setting up a Server Filter
138
Viewing Partitions and Replicas
138
Viewing the Partitions on a Server
139
Viewing a Partition's Replicas
139
Viewing Information about a Partition
139
Viewing Partition Hierarchy
139
Viewing Information about a Replica
140
6 Novell Edirectory Management Utilities
141
Novell Import Conversion Export Utility
141
Using the Novell Imanager Import Convert Export Wizard
142
Using the Command Line Interface
148
Conversion Rules
165
LDAP Bulk Update/Replication Protocol
174
Migrating the Schema between LDAP Directories
175
Improving the Speed of LDIF Imports
175
Index Manager
177
Creating an Index
178
Deleting an Index
178
Taking an Index Offline
179
Managing Indexes on Other Servers
179
Using the Novell Import Conversion Export Utility to Manage Indexes
179
Predicate Data
181
Managing Predicate Data
181
Edirectory Service Manager
182
Using the Embox Client Service Manager Emtool
182
Using the Service Manager Plug-In to Novell Imanager
183
7 Using Novell Imonitor 2.1
185
System Requirements
186
Platforms
186
Edirectory Versions that Can be Monitored
186
Accessing Imonitor
187
Imonitor Architecture
187
Imonitor Features Available on Every
187
Anatomy of an Imonitor Page
188
Modes of Operation
189
Imonitor Features Available on Every Page
190
Netware Remote Manager Integration
190
Configuration Files
191
Imonitor Features
193
Viewing Edirectory Server Health
194
Viewing Partition Synchronization Status
194
Viewing Server Connection Information
195
Viewing Known Servers
195
Viewing Replica Information
196
Controlling and Configuring the DS Agent
196
Configuring Trace Settings
197
Viewing Process Status Information
198
Viewing Agent Activity
198
Viewing Traffic Patterns
199
Viewing Background Processes
199
Viewing Edirectory Server Errors
199
Viewing Dsrepair Information
199
Viewing Agent Health Information
200
Browsing Objects in Your Tree
200
Viewing Entries for Synchronization or Purging
201
Viewing Novell Nsure Identity Manager Details
201
Viewing the Synchronization Status of a Replica
201
Configuring and Viewing Reports
201
Viewing Schema, Class, and Attribute Definitions
203
Searching for Objects
203
Using the Stream Viewer
204
Clone DIB Set
204
Ensuring Secure Imonitor Operations
210
8 Merging Novell Edirectory Trees
211
Merging Edirectory Trees
211
Prerequisites
212
Target Tree Requirements
212
Schema Requirements
212
Merging the Source into the Target Tree
213
Partition Changes
213
Preparing the Source and Target Trees
214
Synchronizing Time before the Merge
214
Merging Two Trees
215
Post-Merge Tasks
216
Grafting a Single Server Tree
217
Understanding Context Name Changes
219
Preparing the Source and Target Trees
220
Grafting the Source and Target Tree
222
Renaming a Tree
222
Using the Embox Client to Merge Trees
223
Using the Dsmerge Emtool
223
Dsmerge Emtool Options
224
9 Encrypting Data in Edirectory
226
Encrypted Attributes
226
Using Encryption Schemes
227
Managing Encrypted Attributes Policies
228
Accessing the Encrypted Attributes
231
Viewing the Encrypted Attributes
232
Encrypting and Decrypting Backup Data
233
Cloning the DIB Fileset Containing Encrypted Attributes
233
Adding Edirectory 8.8 Servers to Replica Rings
233
Backward Compatibility
234
Migrating to Encrypted Attributes
234
Replicating the Encrypted Attributes
234
Encrypted Replication
234
Enabling Encrypted Replication
235
Adding a New Replica to a Replica Ring
239
Synchronization and Encrypted Replication
244
Viewing the Encrypted Replication Status
244
Achieving Complete Security While Encrypting Data
245
Encrypting Data in an All New Setup
246
Encrypting Data in an Existing Setup
246
Conclusion
248
10 Repairing the Novell Edirectory Database
250
Performing Basic Repair Operations
251
Performing an Unattended Full Repair
251
Performing a Local Database Repair
253
Checking External References
254
Repairing a Single Object
254
Deleting Unknown Leaf Objects
255
Viewing and Configuring the Repair Log File
255
Opening the Log File
255
Setting Log File Options
256
Performing a Repair in Novell Imonitor
256
Repairing Replicas
256
Repairing All Replicas
257
Repairing Selected Replicas
257
Repairing Time Stamps
257
Designating this Server as the New Master Replica
258
Destroying the Selected Replica
259
Repairing Replica Rings
259
Repairing All Replica Rings
259
Repairing the Selected Replica Ring
260
Sending All Objects to Every Server in the Ring
260
Receiving All Objects from the Master to the Selected Replica
261
Removing this Server from the Replica Ring
261
Maintaining the Schema
261
Requesting Schema from the Tree
262
Resetting the Local Schema
262
Performing a Post-Netware 5 Schema Update
263
Performing Optional Schema Enhancements
263
Importing Remote Schema
263
Declaring a New Schema Epoch
264
Repairing Server Network Addresses
264
Repairing All Network Addresses
265
Repairing a Server's Network Addresses
265
Performing Synchronization Operations
266
Synchronizing the Selected Replica on this Server
266
Reporting the Synchronization Status on this Server
266
Reporting the Synchronization Status on All Servers
267
Performing a Time Synchronization
267
Scheduling an Immediate Synchronization
268
Advanced Dsrepair Options
268
Running Dsrepair on the Edirectory Server
268
Dsrepair Command Line Options
270
Using Advanced Dsrepair Switches
271
Using the Embox Client to Repair a Database
272
Using the Dsrepair Emtool
272
Dsrepair Emtool Options
273
11 WAN Traffic Manager
276
Understanding WAN Traffic Manager
276
LAN Area Objects
278
WAN Traffic Policies
279
Limiting WAN Traffic
282
Assigning Cost Factors
284
WAN Traffic Manager Policy Groups
285
1-3Am.wmg
285
7Am-6Pm.wmg
285
Costlt20.Wmg
285
Ipx.wmg
286
Ndsttyps.wmg
286
Onospoof.wmg
297
Opnspoof.wmg
297
Samearea.wmg
298
Tcpip.wmg
298
Timecost.wmg
298
WAN Policy Structure
299
Declaration Section
299
Selector Section
301
Provider Section
301
Construction Used Within Policy Sections
302
12 Understanding LDAP Services for Novell Edirectory
308
Key Terms for LDAP Services
309
Clients and Servers
309
Objects
309
Referrals
310
Understanding How LDAP Works with Edirectory
311
Connecting to Edirectory from LDAP
312
Class and Attribute Mappings
315
Enabling Nonstandard Schema Output
318
Syntax Differences
318
Supported Novell LDAP Controls and Extensions
319
Using LDAP Tools on Linux, Solaris, AIX, or HP-UX
320
LDAP Tools
321
Extensible Match Search Filter
330
13 Configuring LDAP Services for Novell Edirectory
334
Loading and Unloading LDAP Services for Edirectory
334
Verifying that the LDAP Server Is Loaded
335
Verifying that the LDAP Server Is Running
336
Scenarios
336
Verifying that the LDAP Server Is Running
337
Verifying that a Device Is Listening
338
Configuring LDAP Objects
339
Configuring LDAP Server and LDAP Group Objects on Linux, Solaris, AIX, or HP-UX Systems
340
Refreshing the LDAP Server
343
Authentication and Security
344
Requiring TLS for Simple Binds with Passwords
345
Starting and Stopping TLS
345
Configuring the Server for TLS
346
Configuring the Client for TLS
347
Exporting the Trusted Root
348
Authenticating with a Client Certificate
348
Using Certificate Authorities from Third-Party Providers
348
Creating and Using LDAP Proxy Users
349
Using SASL
350
Using the LDAP Server to Search the Directory
352
Setting Search Limits
352
Using Referrals
353
Searching Filtered Replicas
358
Using LDAP Referral Filtering
359
Need for LDAP Referral Filtering
359
Format for Specifying LDAP Referral Filters
360
Example Scenarios
361
Invalid Filters
362
Known Issues
362
Configuring for Superior Referrals
362
Scenario: Superior Referrals in a Federated Tree
362
Creating a Nonauthoritative Area
363
Specifying Reference Data
364
Updating Reference Information through LDAP
365
Affected Operations
365
Discovering Support for Superior References
366
Persistent Search: Configuring for Edirectory Events
366
Managing Persistent Searches
367
Controlling Use of the Monitor Events Extended Operation
368
Getting Information about the LDAP Server
369
14 Backing up and Restoring Novell Edirectory
372
Checklist for Backing up Edirectory
373
Understanding Backup and Restore Services
375
About the Edirectory Backup Emtool
376
What's Different about Backup and Restore in Edirectory 8.7.3
377
Overview of How the Backup Emtool Does a Restore
379
Format of the Backup File Header
380
Format of the Backup Log File
384
Using DSMASTER Servers as Part of Disaster Recovery Planning
385
Transitive Vectors and the Restore Verification Process
386
Restore Verification Is Backward Compatible Only with Edirectory 8.5 or Later
387
Preserving Rights When Restoring File System Data on Netware
387
Using Roll-Forward Logs
388
Issues to be Aware of When Turning on Roll-Forward Logging
389
Location of the Roll-Forward Logs
390
Backing up and Removing Roll-Forward Logs
391
Cautionary Note: Removing Edirectory also Removes the Roll-Forward Logs
392
Preparing for a Restore
392
Prerequisites for Restoring
393
Locating the Right Backup Files for a Restore
394
Using Novell Imanager for Backup and Restore
395
Backing up Manually with Imanager
396
Configuring Roll-Forward Logs with Imanager
398
Restoring from Backup Files with Imanager
400
Using the Embox Client for Backup and Restore
400
Backing up Manually with the Embox Client
403
Doing Unattended Backups, Using a Batch File with the Embox Client
406
Configuring Roll-Forward Logs with the Embox Client
409
Restoring from Backup Files with the Embox Client
411
Backup and Restore Command Line Options
414
Using DSBK.NLM on Netware
422
Changes to Server-Specific Information Backup (Netware Only)
422
Recovering the Database if Restore Verification Fails
424
Cleaning up the Replica Ring
425
Repair the Failed Server and Readd Replicas to the Server
426
Scenario: Losing a Hard Drive Containing Edirectory in a Single-Server Network
428
Scenarios for Backup and Restore
428
Scenario: Losing a Hard Drive Containing Edirectory in a Multiserver Environment
429
Scenario: Losing an Entire Server in a Multiple-Server Environment
431
Scenario: Losing some Servers in a Multiple-Server Environment
432
Scenario: Losing All Servers in a Multiple-Server Environment
432
Backing up and Restoring NICI
434
Unix
435
Netware
436
Windows
437
15 SNMP Support for Novell Edirectory
440
Definitions and Terminology for SNMP
440
Understanding SNMP Services
441
Edirectory and SNMP
443
Benefits of SNMP Instrumentation on Edirectory
443
Understanding How SNMP Works with Edirectory
443
Installing and Configuring SNMP Services for Edirectory
446
Loading and Unloading the SNMP Server Module
446
Subagent Configuration
447
Setting up SNMP Services for Edirectory
449
Monitoring Edirectory Using SNMP
460
Traps
460
Configuring Traps
474
Statistics
484
Troubleshooting
488
16 Maintaining Novell Edirectory
490
Improving Edirectory Performance
490
Distributing Memory between Entry and Block Caches
491
Using the Default Cache Settings
491
Tuning LDAP for Edirectory
495
Improving Edirectory Performance on Linux, Solaris, AIX, and HP-UX Systems
497
Fine-Tuning the Edirectory Server
497
Optimizing Edirectory Cache
498
Tuning the Solaris os for Novell Edirectory
501
Improving Bulkload Performance
503
Edirectory Cache Settings
503
LBURP Transaction Size Setting
503
Increasing the Number of Asynchronous Requests in ICE
504
Increased Number of LDAP Writer Threads
505
Disabling Schema Validation in ICE
505
Disabling ACL Templates
505
Backlinker
507
Enabling/Disabling Inline Cache
507
Increasing the LBURP Time out Period
507
Keeping Edirectory Healthy
508
When to Perform Health Checks
508
Health Check Overview
508
Checking Edirectory Health Using Imonitor
509
For more Information
510
Resources for Monitoring
510
Upgrading Hardware or Replacing a Server
511
Planned Hardware or Storage Device Upgrade Without Replacing the Server
511
Planned Replacement of a Server
515
Restoring Edirectory after a Hardware Failure
518
17 Dhost Iconsole Manager
520
What Is Dhost
521
Running Dhost Iconsole
521
Running Dhost Iconsole on Netware
522
Running Dhost Iconsole on Windows
522
Running Dhost Iconsole on Linux, Solaris, AIX, and HP-UX
522
Managing Edirectory Modules
523
Loading or Unloading Modules on Netware
523
Loading or Unloading Modules on Windows
524
Loading or Unloading Modules on Linux, Solaris, AIX, and HP-UX
524
Querying for Dhost Information
524
Viewing the Configuration Parameters
524
Viewing Protocol Information
525
Viewing Connection Properties
525
Viewing the Thread Pools Statistics
525
Process Stack
526
Setting the Sadmin Password
526
Setting the Sadmin Password on Netware
527
Setting the Sadmin Password on Windows
527
Setting the Sadmin Password on Linux, Solaris, AIX, and HP-UX
528
18 The Edirectory Management Toolbox
530
Using the Embox Command Line Client
530
Displaying the Command Line Help
531
Running the Embox Command Line Client in Interactive Mode
531
Running the Embox Command Line Client in Batch Mode
535
Embox Command Line Client Options
537
Establishing a Secure Connection with the Embox Client
538
Finding out Edirectory Port Numbers
538
Using the Embox Logger
540
Using the Embox Logger Command Line Client
540
Using the Embox Logger Feature in Novell Imanager
541
A NMAS Considerations
542
Setting up a Security Container as a Separate Partition
542
Merging Trees with Multiple Security Containers
542
Product-Specific Operations to Perform Prior to Tree Merge
543
Performing the Tree Merge
546
Product-Specific Operations to Perform after the Tree Merge
546
B Novell Edirectory Linux and UNIX Commands and Usage
548
General Utilities
548
B.1 General Utilities
548
LDAP-Specific Commands
553
C Configuring Openslp for Edirectory
556
Service Location Protocol
556
SLP Fundamentals
556
C.2 SLP Fundamentals
556
C.2.2 User Agents
557
Novell Service Location Providers
557
Service Agents
558
Configuration Parameters
558
C.2.3 Service Agents
558
C.3 Configuration Parameters
558
D How Novell Edirectory Works with DNS
560
Prerequisites
562
E.1 Prerequisites
562
Assumptions on Network Characteristics
563
Installing the Kerberos Plug-In for Imanager
563
Adding Kerberos LDAP Extensions
564
Exporting the Trusted Root Certificate
566
Configuring the SASL-GSSAPI Method
566
Merging Edirectory Trees Configured with SASL-GSSAPI Method
567
Managing the SASL-GSSAPI Method
567
Extending the Kerberos Schema
567
Managing the Kerberos Realm Object
567
Managing a Service Principal
569
Editing Foreign Principals
573
Creating a Login Sequence
573
How Does LDAP Use SASL-GSSAPI
573
Error Messages
573
E.6 Error Messages
573
Advertisement
NOVELL EDIRECTORY 8.8 - GUIDE Troubleshooting Manual (96 pages)
Brand:
NOVELL
| Category:
Software
| Size: 0 MB
Table of Contents
Table of Contents
5
About this Book
9
1 Resolving Error Codes
11
Chapter 1, "Resolving Error Codes
11
2 Installation and Configuration
13
Installation
13
Installation Not Successful
13
Installation Takes a Long Time
13
Chapter 2, "Installation and Configuration
13
Edirectory Install Fails for Container Administrators
14
Unable to Install into an Existing Tree over the WAN
14
NICI Installation Failed - 1497
15
Naming Objects
15
NICI Does Not Get Installed in the Server Mode on Windows
15
Configuration
15
Tree Name Lookup Failed: -632 Error While Configuring Edirectory 8.8 on Linux
15
Multiple Instances
15
If the First Instance Is Down, HTTP Does Not Work
15
3 Determining the Edirectory Version Number
17
Netware
17
Chapter 3, "Determining the Edirectory Version Number
17
Windows
18
Linux
18
Solaris
19
Aix
20
Hp-Ux
20
4 Log Files
23
Modschema.log
23
Dsinstall.log
23
Chapter 4, "Log Files
23
5 Troubleshooting LDIF Files
25
Understanding LDIF
25
LDIF File Format
25
Chapter 5, "Troubleshooting LDIF Files
25
LDIF Content Records
26
LDIF Change Records
27
Line Folding Within LDIF Files
31
Hashed Password Representation in LDIF Files
32
Debugging LDIF Files
32
Enabling Forward References
33
Checking the Syntax of LDIF Files
35
Using the LDIF Error File
36
Using LDAP SDK Debugging Flags
37
Using LDIF to Extend the Schema
37
Adding a New Object Class
37
Adding a New Attribute
38
Adding or Removing Auxiliary Classes
40
6 Troubleshooting SNMP
43
Traps Might Not Get Generated as Expected
43
SNMP Group Object
43
SNMP Initializing Errors
43
Chapter 6, "Troubleshooting SNMP
43
SNMP Subagent Does Not Start
44
SNMP on Linux
44
SNMP on HP-UX
44
Error While Contacting the SNMP Master Agent from the MIB Browser
44
Problems Configuring NET-SNMP-5.0.8
45
Problems Configuring the NAA Agent
45
Unable to Get the SNMP Query Result from the MIB Browser
45
Traps Are Not Received at the SNMP Console or the MIB Browser
45
SNMP Issues after Upgrading from Edirectory 8.7.3 to Edirectory 8.8
45
7 Obituaries
47
Chapter 7, "Obituaries
47
Examples
48
Deleting an Object
48
Moving an Object
49
Impact of Stuck and Orphaned Obituaries
49
Prevention
49
Troubleshooting Tips
50
Solutions
51
Previous Practices
52
8 Migrating to Novell Edirectory
53
Migrating the Sun ONE Schema to Novell Edirectory
53
Step 1: Perform the Schema Cache Update Operation
53
Step 2: Rectify the Error LDIF File to Eliminate the Errors
53
Chapter 8, "Migrating to Novell Edirectory
53
Step 3: Import the LDIF File
56
Migrating the Active Directory Schema to Novell Edirectory Using ICE
56
Step 1: Perform the Schema Cache Update Operation
56
Step 2: Rectify the Error LDIF File to Eliminate the Errors
57
Step 3: Import the LDIF File
57
Migrating from Openldap to Novell Edirectory
58
Prerequisites
58
Migrating the Openldap Schema to Edirectory
58
Migrating the Open LDAP Data to Novell Edirectory
59
Making PAM Work with Novell Edirectory after Migration
59
9 Replication
61
Recovering from Edirectory Replica Problems
61
Chapter 9, "Replication
61
10 Novell Public Key Infrastructure Services
63
PKI Operations Not Working
63
LDAP Search from Netscape Address Book Fails
63
Moved the Existing Edirectory Objects to a Different Server Fails with the Error Code for Crucial Replica
63
Chapter 10, "Novell Public Key Infrastructure Services
63
Removing the Configuration of an Edirectory Server that Is Acting as a Treekey Server in a Multiserver Tree after Having Moved the Existing Edirectory Objects to a Different Server Fails with the Error Code for Crucial Replica
63
While Uninstalling the Edirectory Server Holding the CA, the Kmos Created on that Server will be Moved to Another Server in the Tree and Become Invalid
64
11 Troubleshooting Utilities on Linux and UNIX
65
Novell Import Convert Export Utility
65
Ndsmerge Utility
65
Ndstrace Utility
65
Chapter 11, "Troubleshooting Utilities on Linux and UNIX
65
Ndsbackup Utility
66
Using Ndsrepair
66
Syntax
66
Troubleshooting Ndsrepair
72
Using Ndstrace
73
Basic Functions
73
Debugging Messages
73
Background Processes
76
12 NMAS on Linux and UNIX
81
Unable to Log in Using any Method
81
The User Added Using the ICE Utility Is Unable to Log in Using Simple Password
81
Chapter 12, "NMAS on Linux and UNIX
81
13 Troubleshooting on Windows
83
The Edirectory for Windows Server Won't Start
83
The Windows Server Can't Open the Edirectory Database Files
83
Chapter 13, "Troubleshooting on Windows
83
Restoring Edirectory on Windows after an Emergency Repair
84
14 Accessing HTTPSTK When DS Is Not Loaded
85
Setting the Sadmin Password on Netware
85
Setting the Sadmin Password on Windows
85
Chapter 14, "Accessing HTTPSTK When DS Is Not Loaded
85
Setting the Sadmin Password on Linux, Solaris, AIX, and HP-UX
86
15 Encrypting Data in Edirectory
87
Error Messages
87
6090 0Xffffe836 ERR_ER_DISABLED
87
6089 0Xffffe837 ERR_REQUIRE_SECURE_ACCESS
87
Chapter 15, "Encrypting Data in Edirectory
87
666 Fffffd66 Incompatible Nds Version
88
Problem with Duplicate Encryption Algorithms
89
Encryption of Stream Attributes
89
16 The Edirectory Management Toolbox
91
Unable to Stop the Emtool Services
91
Chapter 16, "The Edirectory Management Toolbox
91
17 Sasl-Gssapi
93
Log File Locations
93
Error Messages
93
Chapter 17, "SASL-GSSAPI
93
18 Miscellaneous
95
Backing up a Container
95
Repeated Edirectory Logins
95
NDS Error, System Failure (-632) Occurs When Doing Ldapsearch for the User Objects
95
Chapter 18, "Miscellaneous
95
Disabling Secretstore
96
On Linix and UNIX
96
On Netware
96
On Windows
96
NOVELL EDIRECTORY 8.8 - GUIDE Manual (70 pages)
WHAT’S NEW GUIDE
Brand:
NOVELL
| Category:
Software
| Size: 0 MB
Table of Contents
Table of Contents
5
About this Guide
9
Install and Upgrade Enhancements
11
Multiple Package Formats for Installing Edirectory 8.8
12
Automatic Deployments
12
Upgrade Distributions
12
Easy Deployments
13
Installing and Configuring Edirectory through Yast
14
Installing Edirectory 8.8 in a Custom Location
14
Specifying a Custom Location for Application Files
14
Specifying a Custom Location for Data Files
14
Specifying a Custom Location for Configuration Files
15
Nonroot Install
15
Nonroot User
16
Nonadminstrator User
16
Standards Compliance
16
FHS Compliance
16
LSB Compliance
17
Server Health Checks
17
Need for Health Checks
17
What Makes a Server Healthy
18
Performing Health Checks
18
Types of Health Checks
18
Categorization of Health
19
Log Files
21
Secretstore Integration with Edirectory
22
For more Information
22
Multiple Instances
25
Need for Multiple Instances
25
Sample Scenarios for Deploying Multiple Instances
25
Using Multiple Instances
26
Planning the Setup
26
Configuring Multiple Instances
26
Managing Multiple Instances
27
The Ndsmanage Utility
27
Identifying a Specific Instance
30
Invoking a Utility for a Specific Instance
30
Sample Scenario for Multiple Instances
31
Planning the Setup
31
Configuring the Instances
31
Invoking a Utility for an Instance
31
Listing the Instances
32
For more Information
32
Authentication to Edirectory through SASL-GSSAPI
33
Concepts
33
What Is Kerberos
33
What Is SASL
34
What Is GSSAPI
34
How Does GSSAPI Work with Edirectory
34
Configuring GSSAPI
35
How Does LDAP Use GSSAPI
35
Commonly Used Terms
36
Enforcing Case-Sensitive Universal Passwords
37
Need for Case-Sensitive Passwords
37
How to Make Your Password Case-Sensitive
38
Prerequisites
38
Making Your Password Case-Sensitive
38
Managing Case-Sensitive Passwords
39
Upgrading the Legacy Novell Clients and Utilities
39
Migrating to Case-Sensitive Passwords
39
Preventing Legacy Novell Clients from Accessing Edirectory 8.8 Server
40
Need for Preventing Legacy Novell Clients from Accessing Edirectory 8.8 Server
40
Managing NDS Login Configurations
40
Partition Operations
44
Enforcing Case-Sensitive Passwords in a Mixed Tree
44
For more Information
44
Priority Sync
45
Need for Priority Sync
45
Using Priority Sync
46
For more Information
46
Data Encryption
47
Encrypting Attributes
47
Need for Encrytped Attributes
47
How to Encrypt Attributes
48
Accessing the Encrypted Attributes
48
Encrypting Replication
48
Need for Encrypted Replication
48
Enabling Encrypted Replication
49
For more Information
49
Bulkload Performance
51
Imanager ICE Plug-Ins
53
Adding Missing Schema
53
Add Schema from a File
53
Add Schema from a Server
54
Comparing the Schema
54
Compare Schema Files
55
Compare Schema between a Server and a File
55
Generating an Order File
55
LDAP-Based Backup
57
Need for LDAP Based Backup
57
For more Information
57
Managing Error Logging in Edirectory 8.8
59
Message Severity Levels
59
Fatal
59
Warning
59
Error
60
Information
60
Debug
60
Configuring Error Logging
60
Linux and UNIX
60
Windows
61
Netware
62
Dstrace Messages
64
Netware, Linux, and UNIX
64
Windows
65
Imonitor Message Filtering
67
SAL Message Filtering
67
Configuring the Severity Levels
67
Setting the Log File Path
68
Miscellaneous
69
Security Object Caching
69
Subtree Search Performance Improvement
69
Localhost Changes
70
256 File Handler on Solaris
70
Memory Manager on Solaris
70
Advertisement
NOVELL EDIRECTORY 8.8 - GUIDE Installation Manual (119 pages)
Brand:
NOVELL
| Category:
Software
| Size: 1 MB
Table of Contents
Legal Notices
2
About this Book
5
Installing or Upgrading Novell Edirectory on Netware
7
System Requirements
7
Hardware Requirements
8
Forcing the Backlink Process to Run
9
Updating the Edirectory Schema for Netware
9
Installing or Upgrading Novell Edirectory 8.8 on Netware
10
Installing NMAS Server Software
11
Installing NMAS Client Software
12
Installing into a Tree with Dotted Name Containers
12
Installing or Upgrading Novell Edirectory on Windows
13
Updating the Edirectory Schema for Windows
15
Installing Novell Edirectory on Windows
16
Communicating with Edirectory through LDAP
18
Installing or Upgrading Novell Edirectory on Linux
23
Upgrading Edirectory
25
Installing Edirectory
26
Using SLP with Edirectory
27
Installing NICI
29
Using the Nds-Install Utility to Install Edirectory Components
30
Using the Ndsconfig Utility to Add or Remove the Edirectory Replica Server
34
Listing the Instances
38
Configuring the Instances
41
Using Ndsconfig to Install a Linux Server into a Tree with Dotted Name Containers
41
Using the Nmasinst Utility to Configure NMAS
44
Installing or Upgrading Novell Edirectory on Solaris
47
System Requirements
47
Hardware Requirements
48
Forcing the Backlink Process to Run
49
Upgrading Edirectory
49
Installing Edirectory
50
Installing NICI
51
Using the Ndsconfig Utility to Add or Remove the Edirectory Replica Server
57
Using the Nmasinst Utility to Configure NMAS
60
Using Ndsconfig to Install an AIX Server into a Tree with Dotted Name Containers
75
Using Openslp for HP-UX
80
Installing Edirectory Components
82
Using Ndsconfig to Install an HP-UX Server into a Tree with Dotted Name Containers
89
Relocating the DIB
91
Linux and UNIX
91
Netware and Windows
92
Configuring Novell Edirectory on Linux, Solaris, AIX, or HP-UX Systems
93
Configuration Utilities
93
Using the Nmasinst Utility to Configure Novell Modular Authentication Service
94
Configuration Parameters
94
Uninstalling Novell Edirectory
101
Uninstalling Edirectory on Netware
101
Uninstalling Edirectory on Windows
101
Uninstalling Edirectory, Consoleone, and SLP da
102
Uninstalling NICI
102
Uninstalling Edirectory on Linux, Solaris, or AIX
102
Uninstalling Edirectory on HP-UX
103
Package Name Specifications for HP-UX
107
Server Health Checks
109
Need for Health Checks
109
Performing Health Checks
109
Types of Health Checks
110
Categorization of Health
111
Log Files
113
Service Location Protocol
115
SLP Fundamentals
115
Novell Service Location Providers
116
User Agents
116
Service Agents
117
NOVELL EDIRECTORY 8.8 - GUIDE Manual (68 pages)
WHAT'S NEW GUIDE
Brand:
NOVELL
| Category:
Software
| Size: 1 MB
Table of Contents
Table of Contents
5
Chapter 1, "Install and Upgrade Enhancements
7
Chapter 2, "Multiple Instances
21
Chapter 3, "Authentication to Edirectory through SASL-GSSAPI
31
Chapter 4, "Enforcing Case-Sensitive Universal Passwords
33
Chapter 5, "Priority Sync
41
Chapter 6, "Data Encryption
45
Chapter 7, "Bulkload Performance
47
Chapter 8, "Imanager ICE Plug-Ins
49
Chapter 9, "LDAP-Based Backup
53
Chapter 10, "Managing Error Logging in Edirectory
57
Chapter 11, "Offline Bulkload Utility: Ldif2Dib
65
Chapter 12, "Miscellaneous
67
Advertisement
Related Products
NOVELL EDIRECTORY 8.8 SP1
NOVELL EDIRECTORY 8.8 SP2
NOVELL EDIRECTORY 8.8 SP3
NOVELL EDIRECTORY 8.8 SP5
NOVELL GROUPWISE 8 - MONITOR
NOVELL IMANAGER 2.7.3 - README 8-26-2010
Novell ZENworks Application Virtualization 8.0.1
Novell ZENworks Application Virtualization 8.0
Novell ZENworks Application Virtualization 8.0.3
NOVELL ZENWORKS APPLICATION VIRTUALIZATION 8.0 - 04-12-2010
NOVELL Categories
Software
Server
Printer
Recording Equipment
Print Server
More NOVELL Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL