Sign In
Upload
Manuals
Brands
NOVELL Manuals
Software
EDIRECTORY 8.8 SP3
NOVELL EDIRECTORY 8.8 SP3 Manuals
Manuals and User Guides for NOVELL EDIRECTORY 8.8 SP3. We have
2
NOVELL EDIRECTORY 8.8 SP3 manuals available for free PDF download: Administration Manual, Installation Manual
NOVELL EDIRECTORY 8.8 SP3 Administration Manual (634 pages)
Brand:
NOVELL
| Category:
Software
| Size: 6 MB
Table of Contents
Table of Contents
5
About this Guide
17
1 Understanding Novell Edirectory
19
Ease of Management through Novell Imanager
20
Powerful Tree Structure
20
Web-Based Management Utility
22
Object Classes and Properties
23
Single Login and Authentication
23
List of Objects
23
Container Object Classes
25
Leaf Object Classes
29
Context and Naming
42
Distinguished Name
43
Typeful Name
43
Name Resolution
44
Current Workstation Context
44
Leading Period
44
Relative Naming
44
Schema
45
Trailing Periods
45
Context and Naming on Linux and UNIX
45
Schema Management
46
Schema Classes, Attributes, and Syntaxes
46
Understanding Mandatory and Optional Attributes
50
Sample Schema
51
Designing the Schema
51
Partitions
52
Distributing Replicas for Performance
53
Partitions and WAN Links
53
Replicas
55
Replica Types
56
Filtered Replicas
58
Netware Bindery Emulation
59
Server Synchronization in the Replica Ring
59
Access to Resources
60
Edirectory Rights
60
Trustee Assignments and Targets
61
Edirectory Rights Concepts
61
Default Rights for a New Server
65
Delegated Administration
66
Administering Rights
67
2 Designing Your Novell Edirectory Network
73
Edirectory Design Basics
73
Network Layout
73
Organizational Structure
73
Designing the Edirectory Tree
74
Preparing for Edirectory SP3 Design
74
Creating a Naming Standards Document
74
Designing the Upper Layers of the Tree
77
Designing the Lower Layers of the Tree
79
Guidelines for Partitioning Your Tree
80
Determining Partitions for the Upper Layers of the Tree
80
Determining Partitions for the Lower Layers of the Tree
81
Determining Partition Size
81
Considering Network Variables
81
Guidelines for Replicating Your Tree
82
Workgroup Needs
82
Fault Tolerance
82
Determining the Number of Replicas
83
Replicating the Tree Partition
83
Replicating for Administration
83
Meeting Bindery Services Needs for Netware
84
Managing WAN Traffic
84
Planning the User Environment
84
Reviewing Users' Needs
84
Creating Accessibility Guidelines
85
Designing Edirectory for E-Business
85
Understanding the Novell Certificate Server
86
Rights Required to Perform Tasks on Novell Certificate Server
86
Ensuring Secure Edirectory Operations on Linux, Solaris, and AIX Systems
87
Synchronizing Network Time
90
Synchronizing Time on Netware Servers
90
Synchronizing Time on Windows Servers
91
Synchronizing Time on Linux, Solaris, or AIX Systems
91
Verifying Time Synchronization
92
3 Managing Objects
93
General Object Tasks
93
Browsing the Edirectory Tree
93
Creating an Object
96
Modifying an Object's Properties
96
Copying Objects
96
Moving Objects
97
Deleting Objects
97
Renaming Objects
97
Managing User Accounts
97
Creating and Modifying User Accounts
98
Setting up Optional Account Features
99
Setting up Login Scripts
101
Login Time Restrictions for Remote Users
102
Deleting User Accounts
103
Configuring Role-Based Services
103
Defining RBS Roles
105
Defining Custom RBS Tasks
107
Synchronization
108
Features of Synchronization
109
Normal or Replica Synchronization
110
Priority Sync
112
4 Managing the Schema
121
Extending the Schema
121
Creating a Class
122
Deleting a Class
122
Creating an Attribute
123
Adding an Optional Attribute to a Class
123
Deleting an Attribute
123
Creating an Auxiliary Class
124
Extending an Object with the Properties of an Auxiliary Class
124
Modifying an Object's Auxiliary Properties
125
Deleting Auxiliary Properties from an Object
125
Viewing the Schema
125
Viewing Class Information
125
Viewing Attribute Information
126
Manually Extending the Schema
126
Extending the Schema on Netware
126
Extending the Schema on Windows
126
Extending the Schema on Linux, Solaris, or AIX Systems
127
Schema Flags Added in Edirectory 8.7
128
Using the Embox Client to Perform Schema Operations
130
Using the Dsschema Emtool
130
Dsschema Emtool Options
131
5 Managing Partitions and Replicas
133
Creating a Partition
134
Merging a Partition
134
Moving Partitions
135
Cancelling Create or Merge Partition Operations
137
Administering Replicas
137
Adding a Replica
137
Deleting a Replica
138
Changing a Replica Type
139
Setting up and Managing Filtered Replicas
140
Using the Filtered Replica Wizard
140
Defining a Partition Scope
141
Setting up a Server Filter
142
Viewing Partitions and Replicas
142
Viewing the Partitions on a Server
143
Viewing a Partition's Replicas
143
Viewing Information about a Partition
143
Viewing Partition Hierarchy
143
Viewing Information about a Replica
144
6 Novell Edirectory Management Utilities
145
Novell Import Conversion Export Utility
145
Using the Novell Imanager Import Convert Export Wizard
146
Using the Command Line Interface
152
Conversion Rules
171
LDAP Bulk Update/Replication Protocol
179
Migrating the Schema between LDAP Directories
180
Improving the Speed of LDIF Imports
180
Index Manager
182
Creating an Index
183
Deleting an Index
183
Taking an Index Offline
184
Managing Indexes on Other Servers
184
Using the Novell Import Conversion Export Utility to Manage Indexes
184
Predicate Data
187
Managing Predicate Data
187
Edirectory Service Manager
187
Using the Embox Client Service Manager Emtool
188
Using the Service Manager Plug-In to Novell Imanager
189
7 Offline Bulkload Utility
191
Using Ldif2Dib for Bulkloading
191
Multiple Instances
193
Tuning Ldif2Dib
193
Tuning the Cache
193
Transaction Size
193
Index
194
Block Cache Percent
194
Check Point Interval
194
Limitations
194
Schema
194
ACL Templates
195
Options
195
Unsupported Platforms
195
Simple Password LDIF
195
Custom Classes
195
Caveats
196
Duplicate Entries
196
No Schema Checks
196
Insufficient Space on Hard-Drive
196
Forced Termination
196
Terminal Resizing
196
8 Using Novell Imonitor 2.4
197
System Requirements
198
Platforms
198
Edirectory Versions that Can be Monitored
198
Accessing Imonitor
199
Imonitor Architecture
199
Anatomy of an Imonitor Page
199
Modes of Operation
200
Imonitor Features Available on Every Page
202
Netware Remote Manager Integration
202
Configuration Files
202
Imonitor Features
205
Viewing Edirectory Server Health
206
Viewing Partition Synchronization Status
206
Viewing Server Connection Information
207
Viewing Known Servers
207
Viewing Replica Information
208
Controlling and Configuring the DS Agent
208
Configuring Trace Settings
209
Viewing Process Status Information
210
Viewing Agent Activity
210
Viewing Traffic Patterns
211
Viewing Background Processes
211
Viewing Edirectory Server Errors
211
Viewing Dsrepair Information
211
Viewing Agent Health Information
212
Browsing Objects in Your Tree
212
Viewing Entries for Synchronization or Purging
213
Viewing Novell Nsure Identity Manager Details
213
Viewing the Synchronization Status of a Replica
213
Configuring and Viewing Reports
213
Viewing Schema, Class, and Attribute Definitions
215
Searching for Objects
216
Using the Stream Viewer
216
Clone DIB Set
217
Ensuring Secure Imonitor Operations
221
9 Merging Novell Edirectory Trees
223
Merging Edirectory Trees
223
Prerequisites
224
Target Tree Requirements
224
Schema Requirements
224
Merging the Source into the Target Tree
225
Partition Changes
225
Preparing the Source and Target Trees
226
Synchronizing Time before the Merge
226
Merging Two Trees
227
Post-Merge Tasks
228
Grafting a Single Server Tree
229
Understanding Context Name Changes
231
Preparing the Source and Target Trees
232
Renaming a Tree
234
Grafting the Source and Target Tree
234
Using the Embox Client to Merge Trees
235
Using the Dsmerge Emtool
235
Dsmerge Emtool Options
236
10 Encrypting Data in Edirectory
239
Encrypted Attributes
239
Using Encryption Schemes
240
Managing Encrypted Attributes Policies
241
Accessing the Encrypted Attributes
245
Viewing the Encrypted Attributes
246
Encrypting and Decrypting Backup Data
247
Cloning the DIB Fileset Containing Encrypted Attributes
247
Adding Edirectory 8.8 Servers to Replica Rings
247
Backward Compatibility
247
Migrating to Encrypted Attributes
248
Replicating the Encrypted Attributes
248
Encrypted Replication
248
Enabling Encrypted Replication
249
Adding a New Replica to a Replica Ring
253
Synchronization and Encrypted Replication
258
Viewing the Encrypted Replication Status
258
Achieving Complete Security While Encrypting Data
259
Encrypting Data in an All New Setup
259
Encrypting Data in an Existing Setup
260
Conclusion
261
11 Repairing the Novell Edirectory Database
263
Performing Basic Repair Operations
264
Performing an Unattended Full Repair
264
Performing a Local Database Repair
266
Checking External References
267
Repairing a Single Object
267
Deleting Unknown Leaf Objects
267
Viewing and Configuring the Repair Log File
268
Opening the Log File
268
Setting Log File Options
268
Performing a Repair in Novell Imonitor
269
Repairing Replicas
269
Repairing All Replicas
269
Repairing Selected Replicas
270
Repairing Time Stamps
270
Designating this Server as the New Master Replica
271
Destroying the Selected Replica
272
Repairing Replica Rings
272
Repairing All Replica Rings
272
Repairing the Selected Replica Ring
273
Sending All Objects to Every Server in the Ring
273
Receiving All Objects from the Master to the Selected Replica
273
Removing this Server from the Replica Ring
274
Maintaining the Schema
274
Requesting Schema from the Tree
275
Resetting the Local Schema
275
Performing a Post-Netware 5 Schema Update
275
Performing Optional Schema Enhancements
276
Importing Remote Schema
276
Declaring a New Schema Epoch
277
Repairing Server Network Addresses
277
Repairing All Network Addresses
277
Repairing a Server's Network Addresses
278
Performing Synchronization Operations
278
Synchronizing the Selected Replica on this Server
279
Reporting the Synchronization Status on this Server
279
Reporting the Synchronization Status on All Servers
279
Performing a Time Synchronization
280
Scheduling an Immediate Synchronization
281
Advanced Dsrepair Options
281
Running Dsrepair on the Edirectory Server
281
Dsrepair Command Line Options
282
Using Advanced Dsrepair Switches
284
Using the Embox Client to Repair a Database
285
Using the Dsrepair Emtool
285
Dsrepair Emtool Options
286
12 WAN Traffic Manager
289
Understanding WAN Traffic Manager
289
LAN Area Objects
291
WAN Traffic Policies
292
Limiting WAN Traffic
295
Assigning Cost Factors
297
WAN Traffic Manager Policy Groups
298
1-3Am.wmg
298
7Am-6Pm.wmg
298
Costlt20.Wmg
298
Ipx.wmg
299
Ndsttyps.wmg
299
Onospoof.wmg
310
Opnspoof.wmg
311
Samearea.wmg
311
Tcpip.wmg
311
Timecost.wmg
312
WAN Policy Structure
312
Declaration Section
312
Selector Section
314
Provider Section
315
Construction Used Within Policy Sections
315
13 Understanding LDAP Services for Novell Edirectory
321
Key Terms for LDAP Services
322
Clients and Servers
322
Objects
322
Referrals
323
Understanding How LDAP Works with Edirectory
324
Connecting to Edirectory from LDAP
325
Class and Attribute Mappings
327
Enabling Nonstandard Schema Output
330
Syntax Differences
331
Supported Novell LDAP Controls and Extensions
332
Using LDAP Tools on Linux, Solaris, or AIX
333
LDAP Tools
334
Extensible Match Search Filter
343
LDAP Transactions
345
Limitations
346
14 Configuring LDAP Services for Novell Edirectory
349
Loading and Unloading LDAP Services for Edirectory
349
Verifying that the LDAP Server Is Loaded
350
Verifying that the LDAP Server Is Running
351
Scenarios
351
Verifying that the LDAP Server Is Running
352
Verifying that a Device Is Listening
353
Configuring LDAP Objects
354
14.4.1 Configuring LDAP Server and LDAP Group Objects on Linux, Solaris, AIX Systems
355
Refreshing the LDAP Server
360
Authentication and Security
361
Requiring TLS for Simple Binds with Passwords
361
Starting and Stopping TLS
362
Configuring the Server for TLS
362
Configuring the Client for TLS
364
Exporting the Trusted Root
364
Authenticating with a Client Certificate
365
Using Certificate Authorities from Third-Party Providers
365
Creating and Using LDAP Proxy Users
365
Using SASL
366
Using the LDAP Server to Search the Directory
369
Setting Search Limits
369
Using Referrals
370
Searching Filtered Replicas
377
Configuring for Superior Referrals
378
Scenario: Superior Referrals in a Federated Tree
378
Creating a Nonauthoritative Area
379
Specifying Reference Data
381
Updating Reference Information through LDAP
382
Affected Operations
382
Discovering Support for Superior References
382
Persistent Search: Configuring for Edirectory Events
383
Managing Persistent Searches
383
Controlling Use of the Monitor Events Extended Operation
385
Getting Information about the LDAP Server
385
Auditing LDAP Events
387
15 Implementing the Service Location Protocol
389
Understanding SLP Components
389
User Agents
389
Service Agents
390
Directory Agents
391
SLP Scopes
393
How SLP Works
394
SLP with a User Agent, Service Agent, and no Directory Agent
394
SLP with a User Agent, Service Agent, and Directory Agent
395
Understanding Local Mode
396
Central Repository
397
SLP Scopes
397
Customized Scopes
397
Proxy Scopes
397
Scalability and Performance
398
Private Mode
398
Filtering
398
Understanding Directory Mode
398
How SLP Works in Directory Mode
399
SLP Edirectory Objects
400
Novell's Implementation of SLP
401
Novell's User Agents and Service Agents
402
The Novell Directory Agent
406
Using the Novell Windows NT Directory Agent
407
Using the Service Location Protocol Directory Agent
411
Setting up SLP on Windows
413
Setting up SLP on Netware
413
Installing the Netware SLP Directory Agent
413
Setting up the Netware Directory Agent Manually
414
Netware SLP Directory Agent Console Commands
414
Setting up SLP on Linux or Solaris
417
User Agents and Service Agents
418
Starting and Stopping the Daemon Process
419
Using the SLPINFO Diagnostic Utility
419
Edirectory Interoperatability with Openslp on Linux and Solaris 8.0 SLP
419
SLP V1- V2 Interoperatibility Issues
420
16 Backing up and Restoring Novell Edirectory
421
Checklist for Backing up Edirectory
423
Understanding Backup and Restore Services
425
About the Edirectory Backup Emtool
425
What's Different about Backup and Restore in Edirectory 8.7.3
426
Overview of How the Backup Emtool Does a Restore
428
Format of the Backup File Header
429
Format of the Backup Log File
433
Using DSMASTER Servers as Part of Disaster Recovery Planning
434
Transitive Vectors and the Restore Verification Process
435
Restore Verification Is Backward Compatible Only with Edirectory 8.5 or Later
436
Preserving Rights When Restoring File System Data on Netware
436
Using Roll-Forward Logs
437
Issues to be Aware of When Turning on Roll-Forward Logging
438
Location of the Roll-Forward Logs
439
Backing up and Removing Roll-Forward Logs
441
Cautionary Note: Removing Edirectory also Removes the Roll-Forward Logs
441
Preparing for a Restore
442
Prerequisites for Restoring
442
Locating the Right Backup Files for a Restore
443
Using Novell Imanager for Backup and Restore
444
Backing up Manually with Imanager
445
Configuring Roll-Forward Logs with Imanager
448
Restoring from Backup Files with Imanager
450
Using the Embox Client for Backup and Restore
454
Backing up Manually with the Embox Client
454
Doing Unattended Backups, Using a Batch File with the Embox Client
457
Configuring Roll-Forward Logs with the Embox Client
460
Restoring from Backup Files with the Embox Client
462
Backup and Restore Command Line Options
465
Using DSBK
473
Chapter 20, "The Edirectory Management Toolbox," on
473
Using Dsbk on Linux/Aix/Solaris
474
Using Nlm on Netware
474
Using Dsbk on Windows
475
Changes to Server-Specific Information Backup (Netware Only)
476
Recovering the Database if Restore Verification Fails
477
Cleaning up the Replica Ring
478
Repair the Failed Server and Readd Replicas to the Server
480
Scenarios for Backup and Restore
481
Scenario: Losing a Hard Drive Containing Edirectory in a Single-Server Network
482
Scenario: Losing a Hard Drive Containing Edirectory in a Multiserver Environment
483
Scenario: Losing an Entire Server in a Multiple-Server Environment
485
Scenario: Losing some Servers in a Multiple-Server Environment
486
Scenario: Losing All Servers in a Multiple-Server Environment
486
Backing up and Restoring NICI
488
Unix
488
Netware
490
Windows
490
17 SNMP Support for Novell Edirectory
493
Definitions and Terminology for SNMP
493
Understanding SNMP Services
494
Edirectory and SNMP
496
Benefits of SNMP Instrumentation on Edirectory
496
Understanding How SNMP Works with Edirectory
496
Installing and Configuring SNMP Services for Edirectory
499
Loading and Unloading the SNMP Server Module
499
Subagent Configuration
500
Setting up SNMP Services for Edirectory
502
Monitoring Edirectory Using SNMP
508
Traps
508
Configuring Traps
522
Statistics
532
Troubleshooting
536
18 Maintaining Novell Edirectory
537
Improving Edirectory Performance
537
Distributing Memory between Entry and Block Caches
538
Using the Default Cache Settings
538
Tuning LDAP for Edirectory
543
Improving Edirectory Performance on Linux, Solaris, and AIX Systems
545
Fine-Tuning the Edirectory Server
545
Optimizing Edirectory Cache
546
Tuning the Solaris os for Novell Edirectory
549
Improving Edirectory Searches and Reads
550
Advanced Referral Costing
551
Improving Server-To-Server Connection
552
Advantages of Referral Costing
554
Deploying ARC
555
Enabling Advanced Referral Costing
556
Tuning Advanced Referral Costing
556
Monitoring Advanced Referral Costing
557
Improving Bulkload Performance
560
Edirectory Cache Settings
560
LBURP Transaction Size Setting
561
Increasing the Number of Asynchronous Requests in ICE
561
Increased Number of LDAP Writer Threads
562
Disabling Schema Validation in ICE
562
Disabling ACL Templates
563
Backlinker
564
Enabling/Disabling Inline Cache
564
Increasing the LBURP Time out Period
565
Countering Memory Fragmentation
565
Enabling FLAIM Memory Pre-Allocation
565
Keeping Edirectory Healthy
566
When to Perform Health Checks
566
Health Check Overview
567
Checking Edirectory Health Using Imonitor
567
For more Information
569
Resources for Monitoring
569
Upgrading Hardware or Replacing a Server
569
Planned Hardware or Storage Device Upgrade Without Replacing the Server
570
Planned Replacement of a Server
573
Server IP Address Changes
576
Restoring Edirectory after a Hardware Failure
576
19 Dhost Iconsole Manager
577
What Is Dhost
578
Running Dhost Iconsole
578
Running Dhost Iconsole on Netware
579
Running Dhost Iconsole on Windows
579
Running Dhost Iconsole on Linux, Solaris, and AIX
579
Managing Edirectory Modules
580
Loading or Unloading Modules on Netware
580
Loading or Unloading Modules on Windows
581
Loading or Unloading Modules on Linux, Solaris, and AIX
581
Querying for Dhost Information
581
Viewing the Configuration Parameters
582
Viewing Protocol Information
582
Viewing Connection Properties
582
Viewing the Thread Pools Statistics
583
Process Stack
583
Setting the Sadmin Password
584
Setting the Sadmin Password on Netware
584
Setting the Sadmin Password on Windows
584
Setting the Sadmin Password on Linux, Solaris, and AIX
585
20 The Edirectory Management Toolbox
587
Using the Embox Command Line Client
588
Displaying the Command Line Help
588
Running the Embox Command Line Client in Interactive Mode
588
Running the Embox Command Line Client in Batch Mode
592
Embox Command Line Client Options
594
Establishing a Secure Connection with the Embox Client
595
Finding out Edirectory Port Numbers
596
Using the Embox Logger
597
Using the Embox Logger Command Line Client
598
Using the Embox Logger Feature in Novell Imanager
598
A NMAS Considerations
601
Setting up a Security Container as a Separate Partition
601
A.1 Setting up a Security Container as a Separate Partition
601
Merging Trees with Multiple Security Containers
601
Product-Specific Operations to Perform Prior to Tree Merge
602
Performing the Tree Merge
605
Product-Specific Operations to Perform after the Tree Merge
605
B Novell Edirectory Linux and UNIX Commands and Usage
607
General Utilities
607
B.1 General Utilities
607
LDAP-Specific Commands
611
C Configuring Openslp for Edirectory
615
Service Location Protocol
615
SLP Fundamentals
615
C.2 SLP Fundamentals
615
C.2.2 User Agents
616
Novell Service Location Providers
616
User Agents
616
Service Agents
617
Configuration Parameters
617
C.2.3 Service Agents
617
C.3 Configuration Parameters
617
D How Novell Edirectory Works with DNS
619
E Configuring GSSAPI with Edirectory
621
Prerequisites
621
E.1 Prerequisites
621
Assumptions on Network Characteristics
622
Installing the Kerberos Plug-In for Imanager
622
Adding Kerberos LDAP Extensions
624
Exporting the Trusted Root Certificate
625
Configuring the SASL-GSSAPI Method
625
Merging Edirectory Trees Configured with SASL-GSSAPI Method
626
Managing the SASL-GSSAPI Method
626
Extending the Kerberos Schema
626
Managing the Kerberos Realm Object
626
Managing a Service Principal
628
Editing Foreign Principals
632
Creating a Login Sequence
632
How Does LDAP Use SASL-GSSAPI
632
Error Messages
632
E.6 Error Messages
632
F Security Considerations
633
LDAP Binds
633
F.1 LDAP Binds
633
Nessus Scan Results
634
Advertisement
NOVELL EDIRECTORY 8.8 SP3 Installation Manual (154 pages)
Brand:
NOVELL
| Category:
Software
| Size: 1 MB
Table of Contents
Table of Contents
5
About this Book
9
1 Installing or Upgrading Novell Edirectory on Netware
11
System Requirements
11
Prerequisites
11
Hardware Requirements
12
Forcing the Backlink Process to Run
13
Updating the Edirectory Schema for Netware
13
Disk Space Check on Upgrading to Edirectory SP3 or Later
14
Installing or Upgrading Novell Edirectory on Netware
14
Chapter 7, "Upgrade Requirements of Edirectory 8.8," on
14
Installing or Upgrading Novell Edirectory 8.8 on Netware
15
Installing NMAS Client Software
16
Installing NMAS Server Software
16
Server Health Checks
16
Appendix B, "Edirectory Health Checks," on
16
Installing into a Tree with Dotted Name Containers
17
Unattended Upgrade to Edirectory 8.8 SP3 on Netware
17
Remote Installation or Upgrade
21
2 Installing or Upgrading Novell Edirectory on Windows
23
System Requirements
23
Prerequisites
24
Hardware Requirements
25
Forcing the Backlink Process to Run
25
Updating the Edirectory Schema for Windows
26
Disk Space Check on Upgrading to Edirectory SP3 or Later
27
Installing Novell Edirectory on Windows
27
Installing or Updating Novell Edirectory 8.8 on Windows 2000 or Server 2003
27
Appendix C, "Configuring Openslp for Edirectory," on
27
Server Health Checks
29
Communicating with Edirectory through LDAP
29
Installing NMAS Server Software
32
Installing NMAS Client Software
32
Installing into a Tree with Dotted Name Containers
32
Unattended Install and Upgrade to Edirectory 8.8 SP3 on Windows
34
3 Installing or Upgrading Novell Edirectory on Linux 3.1 System Requirements
45
Prerequisites
46
Hardware Requirements
48
Forcing the Backlink Process to Run
48
Upgrading Edirectory
48
Server Health Checks
49
Upgrading on Linux Servers Other than OES
49
Upgrading through Zenworks Linux Management on OES Linux SP3
50
Upgrading Edirectory During OES 1.0 to OES 2.0 Upgrade
54
Upgrading the Tarball Deployment of Edirectory 8.8
55
Upgrading Multiple Instances
56
Disk Space Check on Upgrading to Edirectory SP3 or Later
56
Installing Edirectory
57
Using SLP with Edirectory
57
Installing NICI
59
Using the Nds-Install Utility to Install Edirectory Components
60
Installing through Zenworks Linux Management on OES Linux SP3
63
Nonroot User Installing Edirectory 8.8
67
Using the Ndsconfig Utility to Add or Remove the Edirectory Replica Server
70
Using Ndsconfig to Configure Multiple Instances of Edirectory 8.8
74
Using Ndsconfig to Install a Linux Server into a Tree with Dotted Name Containers
80
Using the Nmasinst Utility to Configure NMAS
80
Nonroot User SNMP Configuration
81
4 Installing or Upgrading Novell Edirectory on Solaris
83
System Requirements
83
Prerequisites
84
Hardware Requirements
85
Forcing the Backlink Process to Run
85
Upgrading Edirectory
86
Upgrading Multiple Instances
86
Installing Edirectory
86
Upgrading the Tarball Deployment of Edirectory 8.8
86
Server Health Checks
87
Using SLP with Edirectory
87
Installing NICI
88
Using the Nds-Install Utility to Install Edirectory Components
89
Nonroot User Installing Edirectory 8.8
92
Using the Ndsconfig Utility to Add or Remove the Edirectory Replica Server
94
Using Ndsconfig to Configure Multiple Instances of Edirectory 8.8
96
Using the Nmasinst Utility to Configure NMAS
96
Nonroot User SNMP Configuration
97
5 Installing or Upgrading Novell Edirectory on AIX
99
System Requirements
99
Prerequisites
99
Hardware Requirements
100
Forcing the Backlink Process to Run
101
Upgrading Edirectory
101
Upgrading Multiple Instances
102
Installing Edirectory
102
Upgrading the Tarball Deployment of Edirectory 8.8
102
Server Health Checks
102
Using SLP with Edirectory
103
Installing NICI
104
Using the Nds-Install Utility to Install Edirectory Components
105
Nonroot User Installing Edirectory 8.8
107
Using the Ndsconfig Utility to Add or Remove the Edirectory Replica Server
109
Using Ndsconfig to Configure Multiple Instances of Edirectory 8.8
111
Using Ndsconfig to Install an AIX Server into a Tree with Dotted Name Containers
111
Using the Nmasinst Utility to Configure NMAS
111
Nonroot User SNMP Configuration
112
6 Relocating the DIB
115
Linux and UNIX
115
Netware and Windows
116
7 Upgrade Requirements of Edirectory
117
Reference Changes in 8.8 SP3
118
Upgrade Process in 8.8 SP3
118
Performing a Dry Run before Upgrading Edirectory
120
Common Problems Encountered During the Upgrade Process
121
8 Configuring Novell Edirectory on Linux, Solaris, or AIX Systems
123
Configuration Utilities
123
The Ndsconfig Utility
123
Using the Ldapconfig Utility to Configure the LDAP Server and LDAP Group Objects
123
Using the Nmasinst Utility to Configure Novell Modular Authentication Service
124
Configuration Parameters
124
Security Considerations
129
9 Migrating to Edirectory 8.8 SP3
131
Migrating to Edirectory 8.8 SP3 While Upgrading the Operating System
131
Migrating to Edirectory 8.8 SP3 Without Upgrading the Operating System
133
10 Uninstalling Novell Edirectory
135
Uninstalling Edirectory on Netware
135
Reinstalling Edirectory
135
Uninstalling Edirectory on Windows
136
Uninstalling Edirectory, Consoleone, and SLP da
136
Unattended Uninstallation of Edirectory
136
Uninstalling NICI
139
Uninstalling Microsoft Visual C++ 2005 Runtime Libraries
139
Uninstalling Edirectory on Linux, Solaris, or AIX
139
A Linux, Solaris, and AIX Packages for Novell Edirectory
141
B Edirectory Health Checks
145
Need for Health Checks
145
Performing Health Checks
145
With the Upgrade
145
As a Standalone Utility
145
B.2.2 as a Standalone Utility
145
Types of Health Checks
146
Basic Server Health
146
Partitions and Replica Health
147
Categorization of Health
147
Normal
147
Warning
147
B.4 Categorization of Health
147
B.4.1 Normal
147
B.4.2 Warning
147
Critical
148
B.4.3 Critical
148
Log Files
149
B.5 Log Files
149
C Configuring Openslp for Edirectory
151
Service Location Protocol
151
SLP Fundamentals
151
C.2 SLP Fundamentals
151
C.2.2 User Agents
152
Novell Service Location Providers
152
User Agents
152
Service Agents
153
Configuration Parameters
153
C.2.3 Service Agents
153
C.3 Configuration Parameters
153
Advertisement
Related Products
NOVELL EDIRECTORY 8.8 - GUIDE
NOVELL EDIRECTORY 8.8 SP1
NOVELL EDIRECTORY 8.8 SP2
NOVELL EDIRECTORY 8.8 SP5
NOVELL GROUPWISE 8 - MONITOR
NOVELL GROUPWISE 8 - POST OFFICES
NOVELL ZENWORKS APPLICATION VIRTUALIZATION 8.0 - 04-12-2010
NOVELL ZENWORKS APPLICATION VIRTUALIZATION 8.0.1 - 8-20-2010
NOVELL GROUPWISE 8 - USERS
Novell ZENworks Application Virtualization 8.0.2
NOVELL Categories
Software
Server
Desktop
Printer
Recording Equipment
More NOVELL Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL