Sign In
Upload
Manuals
Brands
NOVELL Manuals
Software
EDIRECTORY 8.8 SP2
NOVELL EDIRECTORY 8.8 SP2 Manuals
Manuals and User Guides for NOVELL EDIRECTORY 8.8 SP2. We have
4
NOVELL EDIRECTORY 8.8 SP2 manuals available for free PDF download: Manual, Installation Manual, Troubleshooting Manual
NOVELL EDIRECTORY 8.8 SP2 Manual (621 pages)
Brand:
NOVELL
| Category:
Software
| Size: 7 MB
Table of Contents
Table of Contents
5
About this Guide
17
1 Understanding Novell Edirectory
19
Ease of Management through Novell Imanager
20
Powerful Tree Structure
20
Web-Based Management Utility
22
Single Login and Authentication
23
Object Classes and Properties
23
List of Objects
23
Container Object Classes
25
Leaf Object Classes
29
Context and Naming
42
Distinguished Name
42
Typeful Name
42
Name Resolution
43
Current Workstation Context
43
Leading Period
43
Relative Naming
43
Trailing Periods
44
Context and Naming on Linux and UNIX
44
Schema
45
Schema Management
45
Schema Classes, Attributes, and Syntaxes
45
Understanding Mandatory and Optional Attributes
49
Sample Schema
50
Designing the Schema
50
Partitions
51
Distributing Replicas for Performance
52
Partitions and WAN Links
52
Replicas
54
Replica Types
55
Filtered Replicas
57
Netware Bindery Emulation
58
Server Synchronization in the Replica Ring
58
Access to Resources
59
Edirectory Rights
59
Trustee Assignments and Targets
60
Edirectory Rights Concepts
60
Default Rights for a New Server
64
Delegated Administration
65
Administering Rights
66
2 Designing Your Novell Edirectory Network
71
Edirectory Design Basics
71
Network Layout
71
Organizational Structure
71
Preparing for Edirectory SP2 Design
72
Designing the Edirectory Tree
72
Creating a Naming Standards Document
72
Designing the Upper Layers of the Tree
75
Designing the Lower Layers of the Tree
77
Guidelines for Partitioning Your Tree
78
Determining Partitions for the Upper Layers of the Tree
78
Determining Partitions for the Lower Layers of the Tree
79
Determining Partition Size
79
Considering Network Variables
80
Guidelines for Replicating Your Tree
80
Workgroup Needs
80
Fault Tolerance
80
Determining the Number of Replicas
81
Replicating the Tree Partition
81
Replicating for Administration
81
Meeting Bindery Services Needs for Netware
82
Managing WAN Traffic
82
Planning the User Environment
82
Reviewing Users' Needs
82
Creating Accessibility Guidelines
83
Designing Edirectory for E-Business
83
Understanding the Novell Certificate Server
84
Rights Required to Perform Tasks on Novell Certificate Server
84
Ensuring Secure Edirectory Operations on Linux, Solaris, AIX, and HP-UX Systems
85
Synchronizing Network Time
88
Synchronizing Time on Netware Servers
89
Synchronizing Time on Windows Servers
89
Synchronizing Time on Linux, Solaris, AIX, or HP-UX Systems
90
Verifying Time Synchronization
90
3 Managing Objects
91
General Object Tasks
91
Browsing the Edirectory Tree
91
Creating an Object
94
Modifying an Object's Properties
94
Copying Objects
94
Moving Objects
94
Deleting Objects
95
Renaming Objects
95
Managing User Accounts
95
Creating and Modifying User Accounts
96
Setting up Optional Account Features
97
Setting up Login Scripts
98
Login Time Restrictions for Remote Users
99
Deleting User Accounts
100
Configuring Role-Based Services
101
Defining RBS Roles
102
Defining Custom RBS Tasks
104
Synchronization
105
Features of Synchronization
106
Normal or Replica Synchronization
107
Priority Sync
109
4 Managing the Schema
117
Extending the Schema
117
Creating a Class
118
Deleting a Class
118
Creating an Attribute
119
Adding an Optional Attribute to a Class
119
Deleting an Attribute
119
Creating an Auxiliary Class
120
Extending an Object with the Properties of an Auxiliary Class
120
Modifying an Object's Auxiliary Properties
120
Deleting Auxiliary Properties from an Object
121
Viewing the Schema
121
Viewing Class Information
121
Viewing Attribute Information
122
Manually Extending the Schema
122
Extending the Schema on Netware
122
Extending the Schema on Windows
122
Extending the Schema on Linux, Solaris, AIX, or HP-UX Systems
123
Schema Flags Added in Edirectory 8.7
124
Using the Embox Client to Perform Schema Operations
126
Using the Dsschema Emtool
126
Dsschema Emtool Options
127
5 Managing Partitions and Replicas
129
Creating a Partition
130
Merging a Partition
130
Moving Partitions
131
Cancelling Create or Merge Partition Operations
133
Administering Replicas
133
Adding a Replica
133
Deleting a Replica
134
Changing a Replica Type
135
Setting up and Managing Filtered Replicas
136
Using the Filtered Replica Wizard
136
Defining a Partition Scope
137
Setting up a Server Filter
138
Viewing Partitions and Replicas
138
Viewing the Partitions on a Server
139
Viewing a Partition's Replicas
139
Viewing Information about a Partition
139
Viewing Partition Hierarchy
139
Viewing Information about a Replica
140
6 Novell Edirectory Management Utilities
141
Novell Import Conversion Export Utility
141
Using the Novell Imanager Import Convert Export Wizard
142
Using the Command Line Interface
148
Conversion Rules
166
LDAP Bulk Update/Replication Protocol
174
Migrating the Schema between LDAP Directories
175
Improving the Speed of LDIF Imports
175
Index Manager
177
Creating an Index
178
Deleting an Index
178
Taking an Index Offline
178
Managing Indexes on Other Servers
179
Using the Novell Import Conversion Export Utility to Manage Indexes
179
Predicate Data
181
Managing Predicate Data
182
Edirectory Service Manager
182
Using the Embox Client Service Manager Emtool
182
Using the Service Manager Plug-In to Novell Imanager
183
7 Offline Bulkload Utility
185
Using Ldif2Dib for Bulkloading
185
Multiple Instances
187
Tuning Ldif2Dib
187
Tuning the Cache
187
Transaction Size
187
Index
188
Block Cache Percent
188
Check Point Interval
188
Limitations
188
Schema
188
ACL Templates
189
Options
189
Unsupported Platforms
189
Simple Password LDIF
189
Custom Classes
189
Caveats
189
Duplicate Entries
190
No Schema Checks
190
Insufficient Space on Hard-Drive
190
Forced Termination
190
Terminal Resizing
190
8 Using Novell Imonitor 2.4
191
System Requirements
192
Platforms
192
Edirectory Versions that Can be Monitored
192
Accessing Imonitor
193
Imonitor Architecture
193
Anatomy of an Imonitor Page
193
Modes of Operation
194
Imonitor Features Available on Every Page
196
Netware Remote Manager Integration
196
Configuration Files
196
Imonitor Features
199
Viewing Edirectory Server Health
200
Viewing Partition Synchronization Status
200
Viewing Server Connection Information
200
Viewing Known Servers
201
Viewing Replica Information
202
Controlling and Configuring the DS Agent
202
Configuring Trace Settings
203
Viewing Process Status Information
204
Viewing Agent Activity
204
Viewing Traffic Patterns
205
Viewing Background Processes
205
Viewing Edirectory Server Errors
205
Viewing Dsrepair Information
205
Viewing Agent Health Information
206
Browsing Objects in Your Tree
206
Viewing Entries for Synchronization or Purging
207
Viewing Novell Nsure Identity Manager Details
207
Viewing the Synchronization Status of a Replica
207
Configuring and Viewing Reports
207
Viewing Schema, Class, and Attribute Definitions
209
Searching for Objects
209
Using the Stream Viewer
210
Clone DIB Set
210
Ensuring Secure Imonitor Operations
215
9 Merging Novell Edirectory Trees
217
Merging Edirectory Trees
217
Prerequisites
218
Target Tree Requirements
218
Schema Requirements
218
Merging the Source into the Target Tree
219
Partition Changes
219
Preparing the Source and Target Trees
220
Synchronizing Time before the Merge
220
Merging Two Trees
221
Post-Merge Tasks
222
Grafting a Single Server Tree
223
Understanding Context Name Changes
225
Preparing the Source and Target Trees
226
Grafting the Source and Target Tree
228
Renaming a Tree
228
Using the Embox Client to Merge Trees
229
Using the Dsmerge Emtool
229
Dsmerge Emtool Options
230
10 Encrypting Data in Edirectory
232
Encrypted Attributes
232
Using Encryption Schemes
233
Managing Encrypted Attributes Policies
234
Accessing the Encrypted Attributes
238
Viewing the Encrypted Attributes
239
Encrypting and Decrypting Backup Data
240
Cloning the DIB Fileset Containing Encrypted Attributes
240
Adding Edirectory 8.8 Servers to Replica Rings
240
Backward Compatibility
240
Migrating to Encrypted Attributes
241
Replicating the Encrypted Attributes
241
Encrypted Replication
241
Enabling Encrypted Replication
242
Adding a New Replica to a Replica Ring
246
Synchronization and Encrypted Replication
251
Viewing the Encrypted Replication Status
251
Achieving Complete Security While Encrypting Data
252
Encrypting Data in an All New Setup
252
Encrypting Data in an Existing Setup
253
Conclusion
254
11 Repairing the Novell Edirectory Database
256
Performing Basic Repair Operations
257
Performing an Unattended Full Repair
257
Performing a Local Database Repair
259
Checking External References
260
Repairing a Single Object
260
Deleting Unknown Leaf Objects
260
Viewing and Configuring the Repair Log File
261
Opening the Log File
261
Setting Log File Options
262
Performing a Repair in Novell Imonitor
262
Repairing Replicas
262
Repairing All Replicas
263
Repairing Selected Replicas
263
Repairing Time Stamps
263
Designating this Server as the New Master Replica
264
Destroying the Selected Replica
265
Repairing Replica Rings
265
Repairing All Replica Rings
265
Repairing the Selected Replica Ring
266
Sending All Objects to Every Server in the Ring
266
Receiving All Objects from the Master to the Selected Replica
266
Removing this Server from the Replica Ring
267
Maintaining the Schema
267
Requesting Schema from the Tree
268
Resetting the Local Schema
268
Performing a Post-Netware 5 Schema Update
268
Performing Optional Schema Enhancements
269
Importing Remote Schema
269
Declaring a New Schema Epoch
270
Repairing Server Network Addresses
270
Repairing All Network Addresses
271
Repairing a Server's Network Addresses
271
Performing Synchronization Operations
272
Synchronizing the Selected Replica on this Server
272
Reporting the Synchronization Status on this Server
272
Reporting the Synchronization Status on All Servers
273
Performing a Time Synchronization
273
Scheduling an Immediate Synchronization
274
Advanced Dsrepair Options
274
Running Dsrepair on the Edirectory Server
274
Dsrepair Command Line Options
275
Using Advanced Dsrepair Switches
277
Using the Embox Client to Repair a Database
278
Using the Dsrepair Emtool
278
Dsrepair Emtool Options
279
12 WAN Traffic Manager
281
Understanding WAN Traffic Manager
281
LAN Area Objects
283
WAN Traffic Policies
284
Limiting WAN Traffic
287
Assigning Cost Factors
289
WAN Traffic Manager Policy Groups
290
1-3Am.wmg
290
7Am-6Pm.wmg
290
Costlt20.Wmg
290
Ipx.wmg
291
Ndsttyps.wmg
291
Onospoof.wmg
302
Opnspoof.wmg
302
Samearea.wmg
303
Tcpip.wmg
303
Timecost.wmg
303
WAN Policy Structure
304
Declaration Section
304
Selector Section
306
Provider Section
306
Construction Used Within Policy Sections
307
13 Understanding LDAP Services for Novell Edirectory
311
Key Terms for LDAP Services
312
Clients and Servers
312
Objects
312
Referrals
313
Understanding How LDAP Works with Edirectory
314
Connecting to Edirectory from LDAP
315
Class and Attribute Mappings
318
Enabling Nonstandard Schema Output
321
Syntax Differences
321
Supported Novell LDAP Controls and Extensions
322
Using LDAP Tools on Linux, Solaris, AIX, or HP-UX
323
LDAP Tools
324
Extensible Match Search Filter
333
LDAP Transactions
334
Limitations
336
14 Configuring LDAP Services for Novell Edirectory
337
Loading and Unloading LDAP Services for Edirectory
337
Verifying that the LDAP Server Is Loaded
338
Verifying that the LDAP Server Is Running
339
Scenarios
339
Verifying that the LDAP Server Is Running
340
Verifying that a Device Is Listening
341
Configuring LDAP Objects
342
Configuring LDAP Server and LDAP Group Objects on Linux, Solaris, AIX, or HP-UX Systems
343
Refreshing the LDAP Server
348
Authentication and Security
349
Requiring TLS for Simple Binds with Passwords
349
Starting and Stopping TLS
350
Configuring the Server for TLS
350
Configuring the Client for TLS
352
Exporting the Trusted Root
352
Authenticating with a Client Certificate
352
Using Certificate Authorities from Third-Party Providers
353
Creating and Using LDAP Proxy Users
353
Using SASL
354
Using the LDAP Server to Search the Directory
357
Setting Search Limits
357
Using Referrals
358
Searching Filtered Replicas
365
Configuring for Superior Referrals
366
Scenario: Superior Referrals in a Federated Tree
366
Creating a Nonauthoritative Area
367
Specifying Reference Data
368
Updating Reference Information through LDAP
369
Affected Operations
369
Discovering Support for Superior References
370
Persistent Search: Configuring for Edirectory Events
370
Managing Persistent Searches
371
Controlling Use of the Monitor Events Extended Operation
372
Getting Information about the LDAP Server
372
15 Implementing the Service Location Protocol
375
Understanding SLP Components
375
User Agents
375
Service Agents
376
Directory Agents
377
SLP Scopes
379
How SLP Works
380
SLP with a User Agent, Service Agent, and no Directory Agent
380
SLP with a User Agent, Service Agent, and Directory Agent
381
Understanding Local Mode
382
Central Repository
382
SLP Scopes
383
Customized Scopes
383
Proxy Scopes
383
Scalability and Performance
384
Private Mode
384
Filtering
384
Understanding Directory Mode
384
How SLP Works in Directory Mode
385
SLP Edirectory Objects
386
Novell's Implementation of SLP
387
Novell's User Agents and Service Agents
387
The Novell Directory Agent
392
Using the Novell Windows NT Directory Agent
393
Using the Service Location Protocol Directory Agent
397
Setting up SLP on Windows
399
Setting up SLP on Netware
399
Installing the Netware SLP Directory Agent
399
Setting up the Netware Directory Agent Manually
399
Netware SLP Directory Agent Console Commands
400
Setting up SLP on Linux or Solaris
403
User Agents and Service Agents
403
Starting and Stopping the Daemon Process
404
Using the SLPINFO Diagnostic Utility
405
Edirectory Interoperatability with Openslp on Linux and Solaris 8.0 SLP
405
SLP V1- V2 Interoperatibility Issues
405
16 Backing up and Restoring Novell Edirectory
407
Checklist for Backing up Edirectory
408
Understanding Backup and Restore Services
411
About the Edirectory Backup Emtool
411
What's Different about Backup and Restore in Edirectory 8.7.3
412
Overview of How the Backup Emtool Does a Restore
414
Format of the Backup File Header
415
Format of the Backup Log File
419
Using DSMASTER Servers as Part of Disaster Recovery Planning
420
Transitive Vectors and the Restore Verification Process
421
Restore Verification Is Backward Compatible Only with Edirectory 8.5 or Later
422
Preserving Rights When Restoring File System Data on Netware
422
Using Roll-Forward Logs
423
Issues to be Aware of When Turning on Roll-Forward Logging
424
Location of the Roll-Forward Logs
425
Backing up and Removing Roll-Forward Logs
426
Cautionary Note: Removing Edirectory also Removes the Roll-Forward Logs
427
Preparing for a Restore
427
Prerequisites for Restoring
427
Locating the Right Backup Files for a Restore
429
Using Novell Imanager for Backup and Restore
430
Backing up Manually with Imanager
430
Configuring Roll-Forward Logs with Imanager
433
Restoring from Backup Files with Imanager
435
Using the Embox Client for Backup and Restore
438
Backing up Manually with the Embox Client
438
Doing Unattended Backups, Using a Batch File with the Embox Client
441
Configuring Roll-Forward Logs with the Embox Client
444
Restoring from Backup Files with the Embox Client
446
Backup and Restore Command Line Options
449
Using DSBK
456
Using Nlm on Netware
457
Using Dsbk on Linux/Aix/Solaris
457
Using Dsbk on Windows
458
Changes to Server-Specific Information Backup (Netware Only)
459
Recovering the Database if Restore Verification Fails
460
Cleaning up the Replica Ring
461
Repair the Failed Server and Readd Replicas to the Server
462
Scenarios for Backup and Restore
464
Scenario: Losing a Hard Drive Containing Edirectory in a Single-Server Network
464
Scenario: Losing a Hard Drive Containing Edirectory in a Multiserver Environment
465
Scenario: Losing an Entire Server in a Multiple-Server Environment
468
Scenario: Losing some Servers in a Multiple-Server Environment
468
Scenario: Losing All Servers in a Multiple-Server Environment
468
Backing up and Restoring NICI
470
Unix
471
Netware
473
Windows
473
17 SNMP Support for Novell Edirectory
475
Definitions and Terminology for SNMP
475
Understanding SNMP Services
476
Edirectory and SNMP
478
Benefits of SNMP Instrumentation on Edirectory
478
Understanding How SNMP Works with Edirectory
478
Installing and Configuring SNMP Services for Edirectory
481
Loading and Unloading the SNMP Server Module
481
Subagent Configuration
482
Setting up SNMP Services for Edirectory
484
Monitoring Edirectory Using SNMP
493
Traps
493
Configuring Traps
507
Statistics
516
Troubleshooting
520
18 Maintaining Novell Edirectory
522
Improving Edirectory Performance
522
Distributing Memory between Entry and Block Caches
523
Using the Default Cache Settings
523
Tuning LDAP for Edirectory
528
Improving Edirectory Performance on Linux, Solaris, AIX, and HP-UX Systems
530
Fine-Tuning the Edirectory Server
530
Optimizing Edirectory Cache
531
Tuning the Solaris os for Novell Edirectory
534
Improving Edirectory Searches and Reads
535
Advanced Referral Costing
536
Improving Server-To-Server Connection
537
Advantages of Referral Costing
539
Deploying ARC
540
Enabling Advanced Referral Costing
541
Tuning Advanced Referral Costing
541
Monitoring Advanced Referral Costing
542
Improving Bulkload Performance
545
Edirectory Cache Settings
545
LBURP Transaction Size Setting
546
Increasing the Number of Asynchronous Requests in ICE
546
Increased Number of LDAP Writer Threads
547
Disabling Schema Validation in ICE
547
Disabling ACL Templates
547
Backlinker
549
Enabling/Disabling Inline Cache
549
Increasing the LBURP Time out Period
550
Countering Memory Fragmentation
550
Enabling FLAIM Memory Pre-Allocation
551
Keeping Edirectory Healthy
551
When to Perform Health Checks
552
Health Check Overview
552
Checking Edirectory Health Using Imonitor
553
For more Information
554
Resources for Monitoring
554
Upgrading Hardware or Replacing a Server
554
Planned Hardware or Storage Device Upgrade Without Replacing the Server
555
Planned Replacement of a Server
559
Server IP Address Changes
562
Restoring Edirectory after a Hardware Failure
562
Advertisement
NOVELL EDIRECTORY 8.8 SP2 Installation Manual (150 pages)
Brand:
NOVELL
| Category:
Software
| Size: 1 MB
Table of Contents
Table of Contents
5
About this Book
9
1 Installing or Upgrading Novell Edirectory on Netware
11
System Requirements
11
Upgrade to Edirectory 8.8
11
Upgrade to Edirectory 8.8 SP2
11
Prerequisites
11
Hardware Requirements
12
Forcing the Backlink Process to Run
13
Updating the Edirectory Schema for Netware
13
Disk Space Check on Upgrading to Edirectory SP2 or Later
15
Installing or Upgrading Novell Edirectory on Netware
15
Chapter 7, "Upgrade Requirements of Edirectory 8.8," on
15
Installing or Upgrading Novell Edirectory 8.8 on Netware
15
Installing NMAS Server Software
16
Server Health Checks
16
Appendix B, "Edirectory Health Checks," on
16
Installing NMAS Client Software
17
Installing into a Tree with Dotted Name Containers
17
Unattended Upgrade to Edirectory 8.8 SP2 on Netware
18
Remote Installation or Upgrade
21
2 Installing or Upgrading Novell Edirectory on Windows
23
System Requirements
23
Prerequisites
23
Hardware Requirements
25
Forcing the Backlink Process to Run
25
Updating the Edirectory Schema for Windows
26
Disk Space Check on Upgrading to Edirectory SP2 or Later
26
Installing Novell Edirectory on Windows
27
Installing or Updating Novell Edirectory 8.8 on Windows 2000 or Server 2003
27
Appendix C, "Configuring Openslp for Edirectory," on
27
Server Health Checks
28
Communicating with Edirectory through LDAP
29
Installing NMAS Server Software
32
Installing NMAS Client Software
32
Installing into a Tree with Dotted Name Containers
32
Unattended Install and Upgrade to Edirectory 8.8 SP2 on Windows
33
3 Installing or Upgrading Novell Edirectory on Linux
43
System Requirements
43
Prerequisites
44
Hardware Requirements
45
Forcing the Backlink Process to Run
46
Upgrading Edirectory
46
Server Health Checks
46
Upgrading on Linux Servers Other than OES
47
Upgrading through Zenworks Linux Management on OES Linux SP2
47
Upgrading Edirectory During OES 1.0 to OES 2.0 Upgrade
52
Upgrading the Tarball Deployment of Edirectory 8.8
52
Upgrading Multiple Instances
53
Disk Space Check on Upgrading to Edirectory SP2 or Later
54
Installing Edirectory
54
Using SLP with Edirectory
54
Installing NICI
56
Using the Nds-Install Utility to Install Edirectory Components
57
Installing through Zenworks Linux Management on OES Linux SP2
60
Nonroot User Installing Edirectory 8.8
64
Using the Ndsconfig Utility to Add or Remove the Edirectory Replica Server
66
Using Ndsconfig to Configure Multiple Instances of Edirectory 8.8
71
Using Ndsconfig to Install a Linux Server into a Tree with Dotted Name Containers
76
Using the Nmasinst Utility to Configure NMAS
77
Nonroot User SNMP Configuration
78
4 Installing or Upgrading Novell Edirectory on Solaris
79
System Requirements
79
Prerequisites
79
Hardware Requirements
81
Forcing the Backlink Process to Run
81
Upgrading Edirectory
82
Upgrading Multiple Instances
82
Upgrading the Tarball Deployment of Edirectory 8.8
82
Installing Edirectory
82
Server Health Checks
83
Using SLP with Edirectory
83
Installing NICI
84
Using the Nds-Install Utility to Install Edirectory Components
85
Nonroot User Installing Edirectory 8.8
88
Using the Ndsconfig Utility to Add or Remove the Edirectory Replica Server
90
Using Ndsconfig to Configure Multiple Instances of Edirectory 8.8
92
Using Ndsconfig to Install a Solaris Server into a Tree with Dotted Name Containers
92
Using the Nmasinst Utility to Configure NMAS
92
Nonroot User SNMP Configuration
93
5 Installing or Upgrading Novell Edirectory on AIX
95
System Requirements
95
Prerequisites
95
Hardware Requirements
96
Forcing the Backlink Process to Run
97
Upgrading Edirectory
97
Upgrading Multiple Instances
98
Upgrading the Tarball Deployment of Edirectory 8.8
98
Installing Edirectory
98
Server Health Checks
98
Using SLP with Edirectory
99
Installing NICI
99
Using the Nds-Install Utility to Install Edirectory Components
101
Nonroot User Installing Edirectory 8.8
103
Using the Ndsconfig Utility to Add or Remove the Edirectory Replica Server
105
Using Ndsconfig to Configure Multiple Instances of Edirectory 8.8
107
Using Ndsconfig to Install an AIX Server into a Tree with Dotted Name Containers
107
Using the Nmasinst Utility to Configure NMAS
107
Nonroot User SNMP Configuration
108
6 Relocating the DIB
109
Linux and UNIX
109
Netware and Windows
110
7 Upgrade Requirements of Edirectory
111
Reference Changes in 8.8 SP2
112
Upgrade Process in 8.8 SP2
112
Performing a Dry Run before Upgrading Edirectory
114
Common Problems Encountered During the Upgrade Process
115
8 Configuring Novell Edirectory on Linux, Solaris, or AIX Systems
117
Configuration Utilities
117
The Ndsconfig Utility
117
Using the Ldapconfig Utility to Configure the LDAP Server and LDAP Group Objects
117
Using the Nmasinst Utility to Configure Novell Modular Authentication Service
118
Configuration Parameters
118
Security Considerations
122
9 Migrating to Edirectory 8.8 SP2
125
Migrating to Edirectory 8.8 SP2 While Upgrading the Operating System
125
Migrating to Edirectory 8.8 SP2 Without Upgrading the Operating System
127
10 Migrating Edirectory from Netware to OES 2 Linux
129
Planning Your Migration
129
System Requirements
129
Prerequisites
129
Supported Platforms
130
Considerations
130
Migration Tools
130
Migration Procedure
130
After the Migration
132
11 Uninstalling Novell Edirectory
133
Uninstalling Edirectory on Netware
133
Reinstalling Edirectory
133
Uninstalling Edirectory on Windows
134
Uninstalling Edirectory, Consoleone, and SLP da
134
Uninstalling NICI
134
Uninstalling Edirectory on Linux, Solaris, or AIX
134
A Linux, Solaris, and AIX Packages for Novell Edirectory
137
B Edirectory Health Checks
141
Need for Health Checks
141
Performing Health Checks
141
With the Upgrade
141
As a Standalone Utility
141
B.2.2 as a Standalone Utility
141
Types of Health Checks
142
Basic Server Health
142
Partitions and Replica Health
143
Categorization of Health
143
Normal
143
Warning
143
B.4 Categorization of Health
143
B.4.1 Normal
143
B.4.2 Warning
143
Critical
144
B.4.3 Critical
144
Log Files
145
B.5 Log Files
145
NOVELL EDIRECTORY 8.8 SP2 Troubleshooting Manual (97 pages)
Brand:
NOVELL
| Category:
Software
| Size: 0 MB
Table of Contents
Table of Contents
5
About this Book
9
1 Resolving Error Codes
11
2 Installation and Configuration
13
Installation
13
Installation Not Successful
13
Installation Takes a Long Time
14
Edirectory Install Fails for Container Administrators
14
Unable to Install into an Existing Tree over the WAN
14
NICI Installation Failed - 1497
15
Naming Objects
15
NICI Does Not Get Installed in the Server Mode on Windows
15
Tarball Upgrade Fails with "Cannot Open or Remove a File Containing a Running Program" Error Message
15
Configuration
15
Tree Name Lookup Failed: -632 Error While Configuring Edirectory 8.8 on Linux
16
Multiple Instances
16
If the First Instance Is Down, HTTP Does Not Work
16
Edirectory Does Not Listen on All the Configured Interfaces
16
Ndsd Falls Back to Default Port if the Interface Specified Is Incorrect
16
3 Determining the Edirectory Version Number
17
Netware
17
Windows
18
Linux
18
Solaris
19
Aix
19
Hp-Ux
20
4 Log Files
23
Modschema.log
23
Dsinstall.log
23
5 Troubleshooting LDIF Files
25
Understanding LDIF
25
LDIF File Format
25
LDIF Content Records
25
LDIF Change Records
27
Line Folding Within LDIF Files
32
Hashed Password Representation in LDIF Files
32
Debugging LDIF Files
33
Enabling Forward References
33
Checking the Syntax of LDIF Files
35
Using the LDIF Error File
36
Using LDAP SDK Debugging Flags
37
Using LDIF to Extend the Schema
37
Adding a New Object Class
37
Adding a New Attribute
39
Adding or Removing Auxiliary Classes
40
6 Troubleshooting SNMP
43
Traps Might Not Get Generated as Expected
43
SNMP Group Object
43
SNMP Initializing Errors
43
SNMP Subagent Does Not Start
44
SNMP on HP-UX
44
Error While Contacting the SNMP Master Agent from the MIB Browser
44
Problems Configuring NET-SNMP-5.0.8
44
Problems Configuring the NAA Agent
44
Unable to Get the SNMP Query Result from the MIB Browser
44
Traps Are Not Received at the SNMP Console or the MIB Browser
45
SNMP Issues after Upgrading from Edirectory 8.7.3 to Edirectory 8.8
45
7 Obituaries
47
Examples
48
Deleting an Object
48
Moving an Object
49
Impact of Stuck and Orphaned Obituaries
49
Prevention
49
Troubleshooting Tips
50
Solutions
51
Previous Practices
52
8 Migrating to Novell Edirectory
53
Migrating the Sun ONE Schema to Novell Edirectory
53
Step 1: Perform the Schema Cache Update Operation
53
Step 2: Rectify the Error LDIF File to Eliminate the Errors
53
Step 3: Import the LDIF File
55
Migrating the Active Directory Schema to Novell Edirectory Using ICE
56
Step 1: Perform the Schema Cache Update Operation
56
Step 2: Rectify the Error LDIF File to Eliminate the Errors
56
Step 3: Import the LDIF File
57
Migrating from Openldap to Novell Edirectory
57
Prerequisites
58
Migrating the Openldap Schema to Edirectory
58
Migrating the Open LDAP Data to Novell Edirectory
59
Making PAM Work with Novell Edirectory after Migration
59
9 Replication
61
Recovering from Edirectory Replica Problems
61
10 Novell Public Key Infrastructure Services
63
PKI Operations Not Working
63
LDAP Search from Netscape Address Book Fails
63
Removing the Configuration of an Edirectory Server that Is Acting as a Treekey Server in a
63
Multiserver Tree after Having Moved the Existing Edirectory Objects to a Different Server Fails with the Error Code for Crucial Replica
63
While Uninstalling the Edirectory Server Holding the CA, the Kmos Created on that Server will be Moved to Another Server in the Tree and Become Invalid
64
11 Troubleshooting Utilities on Linux and UNIX
65
Novell Import Convert Export Utility
65
Ndsmerge Utility
65
Ndstrace Utility
65
Ndsbackup Utility
65
Using Ndsrepair
66
Syntax
66
Troubleshooting Ndsrepair
72
Using Ndstrace
73
Basic Functions
73
Debugging Messages
73
Background Processes
76
12 NMAS on Linux and UNIX
81
Unable to Log in Using any Method
81
The User Added Using the ICE Utility Is Unable to Log in Using Simple Password
81
13 Troubleshooting on Windows
83
The Edirectory for Windows Server Won't Start
83
The Windows Server Can't Open the Edirectory Database Files
83
Restoring Edirectory on Windows after an Emergency Repair
84
14 Accessing HTTPSTK When DS Is Not Loaded
85
Setting the Sadmin Password on Netware
85
Setting the Sadmin Password on Windows
85
Setting the Sadmin Password on Linux, Solaris, AIX, and HP-UX
86
15 Encrypting Data in Edirectory
87
Error Messages
87
6090 0Xffffe836 ERR_ER_DISABLED
87
6089 0Xffffe837 ERR_REQUIRE_SECURE_ACCESS
87
666 Fffffd66 Incompatible Nds Version
88
Problem with Duplicate Encryption Algorithms
89
Encryption of Stream Attributes
89
Advertisement
NOVELL EDIRECTORY 8.8 SP2 Manual (78 pages)
Brand:
NOVELL
| Category:
Software
| Size: 1 MB
Table of Contents
Table of Contents
5
About this Guide
9
1 Install and Upgrade Enhancements
11
Chapter 1, "Install and Upgrade Enhancements
11
Multiple Package Formats for Installing Edirectory 8.8
12
Automatic Deployments
12
Upgrade Distributions
12
Easy Deployments
13
Installing and Configuring Edirectory through Yast
14
Installing Edirectory 8.8 in a Custom Location
14
Specifying a Custom Location for Application Files
14
Specifying a Custom Location for Data Files
15
Specifying a Custom Location for Configuration Files
15
Nonroot Install
16
Standards Compliance
16
FHS Compliance
16
LSB Compliance
17
Server Health Checks
17
Need for Health Checks
17
What Makes a Server Healthy
18
Performing Health Checks
18
Types of Health Checks
19
Categorization of Health
20
Log Files
22
Secretstore Integration with Edirectory
23
Unattended Upgrade to Edirectory 8.8 SP1 on Netware
23
For more Information
24
2 Migrating Edirectory 8.8 SP2 from Netware to OES
25
3 Multiple Instances
27
Need for Multiple Instances
27
Sample Scenarios for Deploying Multiple Instances
27
Chapter 3, "Multiple Instances
27
Using Multiple Instances
28
Planning the Setup
28
Configuring Multiple Instances
28
Managing Multiple Instances
29
The Ndsmanage Utility
29
Identifying a Specific Instance
32
Invoking a Utility for a Specific Instance
32
Sample Scenario for Multiple Instances
33
Planning the Setup
33
Configuring the Instances
33
Invoking a Utility for an Instance
34
Listing the Instances
34
For more Information
34
4 Authentication to Edirectory through SASL-GSSAPI
35
Concepts
35
What Is Kerberos
35
What Is SASL
35
Chapter 4, "Authentication to Edirectory through SASL-GSSAPI
35
What Is GSSAPI
36
How Does GSSAPI Work with Edirectory
36
Configuring GSSAPI
37
How Does LDAP Use GSSAPI
37
Commonly Used Terms
38
5 Enforcing Case-Sensitive Universal Passwords
39
Need for Case-Sensitive Passwords
39
Chapter 5, "Enforcing Case-Sensitive Universal Passwords
39
How to Make Your Password Case-Sensitive
40
Prerequisites
40
Making Your Password Case-Sensitive
40
Managing Case-Sensitive Passwords
41
Upgrading the Legacy Novell Clients and Utilities
41
Migrating to Case-Sensitive Passwords
41
Preventing Legacy Novell Clients from Accessing Edirectory 8.8 Server
42
Need for Preventing Legacy Novell Clients from Accessing Edirectory 8.8 Server
42
Managing NDS Login Configurations
42
Partition Operations
46
Enforcing Case-Sensitive Passwords in a Mixed Tree
46
For more Information
46
6 Priority Sync
49
Need for Priority Sync
49
Chapter 6, "Priority Sync
49
Using Priority Sync
50
For more Information
50
7 Data Encryption
51
Encrypting Attributes
51
Need for Encrypted Attributes
51
Chapter 7, "Data Encryption
51
How to Encrypt Attributes
52
Accessing the Encrypted Attributes
52
Encrypting Replication
52
Need for Encrypted Replication
52
Enabling Encrypted Replication
53
For more Information
53
8 Bulkload Performance
55
Chapter 8, "Bulkload Performance
55
9 Imanager ICE Plug-Ins
57
Adding Missing Schema
57
Add Schema from a File
57
Chapter 9, "Imanager ICE Plug-Ins
57
Add Schema from a Server
58
Comparing the Schema
58
Compare Schema Files
58
Compare Schema between a Server and a File
59
Generating an Order File
59
For more Information
59
10 LDAP-Based Backup
61
Need for LDAP Based Backup
61
For more Information
61
Chapter 10, "LDAP-Based Backup
61
11 Managing Error Logging in Edirectory 8.8
63
Message Severity Levels
63
Fatal
63
Warning
63
Chapter 11, "Managing Error Logging in Edirectory
63
Error
64
Information
64
Debug
64
Configuring Error Logging
64
Linux and UNIX
64
Windows
65
Netware
66
Dstrace Messages
68
Netware, Linux, and UNIX
68
Windows
69
Imonitor Message Filtering
70
SAL Message Filtering
71
Configuring the Severity Levels
71
Setting the Log File Path
72
Advertisement
Related Products
NOVELL EDIRECTORY 8.8 - GUIDE
NOVELL EDIRECTORY 8.8 SP1
NOVELL EDIRECTORY 8.8 SP3
NOVELL EDIRECTORY 8.8 SP5
NOVELL GROUPWISE 8 - MONITOR
NOVELL IMANAGER 2.7.3 - README 8-26-2010
Novell ZENworks Application Virtualization 8.0.1
Novell ZENworks Application Virtualization 8.0
Novell ZENworks Application Virtualization 8.0.3
NOVELL ZENWORKS APPLICATION VIRTUALIZATION 8.0 - 04-12-2010
NOVELL Categories
Software
Server
Desktop
Printer
Recording Equipment
More NOVELL Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL