Sign In
Upload
Manuals
Brands
NOVELL Manuals
Software
EDIRECTORY 8.8 SP5
User Manuals: NOVELL EDIRECTORY 8.8 SP5 Software
Manuals and User Guides for NOVELL EDIRECTORY 8.8 SP5 Software. We have
5
NOVELL EDIRECTORY 8.8 SP5 Software manuals available for free PDF download: Administration Manual, Installation Manual, Manual, Tuning Manual
NOVELL EDIRECTORY 8.8 SP5 Administration Manual (616 pages)
Brand:
NOVELL
| Category:
Software
| Size: 6 MB
Table of Contents
Table of Contents
5
About this Guide
17
1 Understanding Novell Edirectory
19
Ease of Management through Novell Imanager
20
Powerful Tree Structure
20
Web-Based Management Utility
22
Object Classes and Properties
23
Single Login and Authentication
23
List of Objects
23
Container Object Classes
25
Leaf Object Classes
29
Context and Naming
42
Distinguished Name
43
Typeful Name
43
Name Resolution
43
Current Workstation Context
44
Leading Period
44
Relative Naming
44
Trailing Periods
44
Schema
45
Context and Naming on Linux and UNIX
45
Schema Management
45
Schema Classes, Attributes, and Syntaxes
46
Understanding Mandatory and Optional Attributes
50
Sample Schema
50
Partitions
51
Designing the Schema
51
Partitions
52
Distributing Replicas for Performance
53
Partitions and WAN Links
53
Replicas
54
Replica Types
55
Filtered Replicas
58
Netware Bindery Emulation
59
Server Synchronization in the Replica Ring
59
Access to Resources
60
Edirectory Rights
60
Trustee Assignments and Targets
61
Edirectory Rights Concepts
61
Default Rights for a New Server
65
Delegated Administration
66
Administering Rights
67
2 Designing Your Novell Edirectory Network
73
Edirectory Design Basics
73
Network Layout
73
Organizational Structure
73
Designing the Edirectory Tree
74
Preparing for Edirectory Design
74
Creating a Naming Standards Document
74
Designing the Upper Layers of the Tree
77
Designing the Lower Layers of the Tree
79
Guidelines for Partitioning Your Tree
80
Determining Partitions for the Upper Layers of the Tree
80
Determining Partitions for the Lower Layers of the Tree
81
Determining Partition Size
81
Considering Network Variables
81
Guidelines for Replicating Your Tree
82
Workgroup Needs
82
Fault Tolerance
82
Determining the Number of Replicas
83
Replicating the Tree Partition
83
Replicating for Administration
83
Meeting Bindery Services Needs for Netware
84
Managing WAN Traffic
84
Planning the User Environment
84
Reviewing Users' Needs
84
Creating Accessibility Guidelines
85
Designing Edirectory for E-Business
85
Understanding the Novell Certificate Server
86
Rights Required to Perform Tasks on Novell Certificate Server
86
Ensuring Secure Edirectory Operations on Linux, Solaris, and AIX Systems
87
Synchronizing Network Time
90
Synchronizing Time on Netware Servers
90
Synchronizing Time on Windows Servers
91
Synchronizing Time on Linux, Solaris, or AIX Systems
91
Verifying Time Synchronization
92
3 Managing Objects
93
General Object Tasks
93
Browsing the Edirectory Tree
93
Creating an Object
96
Modifying an Object's Properties
96
Copying Objects
96
Moving Objects
96
Deleting Objects
97
Renaming Objects
97
Managing User Accounts
97
Creating and Modifying User Accounts
98
Setting up Optional Account Features
99
Setting up Login Scripts
100
Login Time Restrictions for Remote Users
102
Deleting User Accounts
102
Configuring Role-Based Services
103
Defining RBS Roles
104
Defining Custom RBS Tasks
106
Synchronization
107
Features of Synchronization
108
Normal or Replica Synchronization
109
Priority Sync
111
4 Managing the Schema
119
Extending the Schema
119
Creating a Class
120
Deleting a Class
120
Creating an Attribute
121
Adding an Optional Attribute to a Class
121
Deleting an Attribute
121
Creating an Auxiliary Class
122
Extending an Object with the Properties of an Auxiliary Class
122
Modifying an Object's Auxiliary Properties
122
Deleting Auxiliary Properties from an Object
123
Viewing the Schema
123
Viewing Class Information
123
Viewing Attribute Information
124
Manually Extending the Schema
124
Extending the Schema on Netware
124
Extending the Schema on Windows
124
Extending the Schema on Linux, Solaris, or AIX Systems
125
Schema Flags Added in Edirectory 8.7
126
Using the Client to Perform Schema Operations
128
Using the Dsschema Emtool
128
Dsschema Emtool Options
129
5 Managing Partitions and Replicas
131
Creating a Partition
132
Merging a Partition
132
Moving Partitions
133
Cancelling Create or Merge Partition Operations
135
Administering Replicas
135
Adding a Replica
135
Deleting a Replica
136
Changing a Replica Type
137
Setting up and Managing Filtered Replicas
138
Using the Filtered Replica Wizard
138
Defining a Partition Scope
139
Setting up a Server Filter
140
Viewing Partitions and Replicas
140
Viewing the Partitions on a Server
141
Viewing a Partition's Replicas
141
Viewing Information about a Partition
141
Viewing Partition Hierarchy
141
Viewing Information about a Replica
142
6 Novell Edirectory Management Utilities
143
Novell Import Conversion Export Utility
143
Using the Novell Imanager Import Convert Export Wizard
144
Using the Command Line Interface
150
Conversion Rules
168
LDAP Bulk Update/Replication Protocol
177
Migrating the Schema between LDAP Directories
178
Improving the Speed of LDIF Imports
178
Index Manager
180
Creating an Index
181
Deleting an Index
181
Taking an Index Offline
182
Managing Indexes on Other Servers
182
Using the Novell Import Conversion Export Utility to Manage Indexes
182
Predicate Data
185
Managing Predicate Data
185
Edirectory Service Manager
185
Using the Client Service Manager Emtool
186
Using the Service Manager Plug-In to Novell Imanager
187
7 Offline Bulkload Utility
189
Using Ldif2Dib for Bulkloading
189
Multiple Instances
191
Tuning Ldif2Dib
191
Tuning the Cache
191
Transaction Size
191
Index
192
Block Cache Percent
192
Check Point Interval
192
Limitations
192
Schema
192
ACL Templates
193
Options
193
Unsupported Platforms
193
Simple Password LDIF
193
Custom Classes
193
Caveats
193
Duplicate Entries
194
No Schema Checks
194
Insufficient Space on Hard-Drive
194
Forced Termination
194
Terminal Resizing
194
8 Using Novell Imonitor 2.4
195
System Requirements
196
Platforms
196
Edirectory Versions that Can be Monitored
197
Accessing Imonitor
197
Imonitor Architecture
197
Anatomy of an Imonitor Page
198
Modes of Operation
199
Imonitor Features Available on Every Page
200
Netware Remote Manager Integration
200
Configuration Files
201
Imonitor Features
203
Viewing Edirectory Server Health
204
Viewing Partition Synchronization Status
204
Viewing Server Connection Information
205
Viewing Known Servers
205
Viewing Replica Information
206
Controlling and Configuring the DS Agent
206
Configuring Trace Settings
207
Viewing Process Status Information
208
Viewing Agent Activity
208
Viewing Traffic Patterns
209
Viewing Background Processes
209
Viewing Edirectory Server Errors
209
Viewing Dsrepair Information
209
Viewing Agent Health Information
210
Browsing Objects in Your Tree
210
Viewing Entries for Synchronization or Purging
211
Viewing Novell Nsure Identity Manager Details
211
Viewing the Synchronization Status of a Replica
211
Configuring and Viewing Reports
212
Viewing Schema, Class, and Attribute Definitions
213
Searching for Objects
214
Using the Stream Viewer
214
Clone DIB Set
215
Ensuring Secure Imonitor Operations
219
Configuring HTTP Server Object
220
Setting HTTP Stack Parameters Using Ndsconfig
221
9 Secretstore Configuration for Edirectory Server
223
Unix
223
Windows
223
Netware
224
10 Merging Novell Edirectory Trees
225
Merging Edirectory Trees
225
Prerequisites
226
Target Tree Requirements
226
Schema Requirements
226
Merging the Source into the Target Tree
227
Partition Changes
227
Preparing the Source and Target Trees
228
Synchronizing Time before the Merge
228
Merging Two Trees
229
Post-Merge Tasks
230
Grafting a Single Server Tree
231
Understanding Context Name Changes
233
Preparing the Source and Target Trees
234
Grafting the Source and Target Tree
236
Renaming a Tree
236
Using the Client to Merge Trees
237
Using the Dsmerge Emtool
237
Dsmerge Emtool Options
238
11 Encrypting Data in Edirectory
241
Encrypted Attributes
241
Using Encryption Schemes
242
Managing Encrypted Attributes Policies
243
Accessing the Encrypted Attributes
247
Viewing the Encrypted Attributes
248
Encrypting and Decrypting Backup Data
249
Cloning the DIB Fileset Containing Encrypted Attributes
249
Adding Edirectory 8.8 Servers to Replica Rings
249
Backward Compatibility
249
Migrating to Encrypted Attributes
250
Replicating the Encrypted Attributes
250
Encrypted Replication
250
Enabling Encrypted Replication
251
Adding a New Replica to a Replica Ring
255
Synchronization and Encrypted Replication
260
Viewing the Encrypted Replication Status
260
Achieving Complete Security While Encrypting Data
261
Encrypting Data in an All New Setup
261
Encrypting Data in an Existing Setup
262
Conclusion
263
12 Repairing the Novell Edirectory Database
265
Performing Basic Repair Operations
266
Performing an Unattended Full Repair
266
Performing a Local Database Repair
268
Checking External References
269
Repairing a Single Object
269
Deleting Unknown Leaf Objects
269
Viewing and Configuring the Repair Log File
270
Opening the Log File
270
Setting Log File Options
270
Performing a Repair in Novell Imonitor
271
Repairing Replicas
271
Repairing All Replicas
271
Repairing Selected Replicas
272
Repairing Time Stamps
272
Designating this Server as the New Master Replica
273
Destroying the Selected Replica
274
Repairing Replica Rings
274
Repairing All Replica Rings
274
Repairing the Selected Replica Ring
275
Sending All Objects to Every Server in the Ring
275
Receiving All Objects from the Master to the Selected Replica
275
Removing this Server from the Replica Ring
276
Maintaining the Schema
276
Requesting Schema from the Tree
277
Resetting the Local Schema
277
Performing a Post-Netware 5 Schema Update
277
Performing Optional Schema Enhancements
278
Importing Remote Schema
278
Declaring a New Schema Epoch
279
Repairing Server Network Addresses
279
Repairing All Network Addresses
279
Repairing a Server's Network Addresses
280
Performing Synchronization Operations
280
Synchronizing the Selected Replica on this Server
281
Reporting the Synchronization Status on this Server
281
Reporting the Synchronization Status on All Servers
281
Performing a Time Synchronization
282
Scheduling an Immediate Synchronization
283
Advanced Dsrepair Options
283
Running Dsrepair on the Edirectory Server
283
Dsrepair Command Line Options
284
Using Advanced Dsrepair Switches
286
Using the Client to Repair a Database
287
Using the Dsrepair Emtool
287
Dsrepair Emtool Options
288
13 WAN Traffic Manager
291
Understanding WAN Traffic Manager
291
LAN Area Objects
293
WAN Traffic Policies
294
Limiting WAN Traffic
297
Assigning Cost Factors
299
WAN Traffic Manager Policy Groups
300
1-3Am.wmg
300
7Am-6Pm.wmg
300
Costlt20.Wmg
300
Ipx.wmg
301
Ndsttyps.wmg
301
Onospoof.wmg
312
Opnspoof.wmg
313
Samearea.wmg
313
Tcpip.wmg
313
Timecost.wmg
314
WAN Policy Structure
314
Declaration Section
314
Selector Section
316
Provider Section
317
Construction Used Within Policy Sections
317
14 Understanding LDAP Services for Novell Edirectory
323
Key Terms for LDAP Services
324
Clients and Servers
324
Objects
324
Referrals
325
Understanding How LDAP Works with Edirectory
326
Connecting to Edirectory from LDAP
327
Class and Attribute Mappings
329
Enabling Nonstandard Schema Output
332
Syntax Differences
333
Supported Novell LDAP Controls and Extensions
334
Using LDAP Tools on Linux, Solaris, or AIX
335
LDAP Tools
335
Extensible Match Search Filter
345
LDAP Transactions
347
Limitations
348
15 Configuring LDAP Services for Novell Edirectory
349
Loading and Unloading LDAP Services for Edirectory
349
Verifying that the LDAP Server Is Loaded
350
Verifying that the LDAP Server Is Running
351
Scenarios
351
Verifying that the LDAP Server Is Running
352
Verifying that a Device Is Listening
353
Configuring LDAP Objects
354
Configuring LDAP Server and LDAP Group Objects on Linux, Solaris, AIX Systems
356
Refreshing the LDAP Server
361
Authentication and Security
362
Requiring TLS for Simple Binds with Passwords
363
Starting and Stopping TLS
363
Configuring the Server for TLS
364
Configuring the Client for TLS
365
Exporting the Trusted Root
365
Authenticating with a Client Certificate
366
Using Certificate Authorities from Third-Party Providers
366
Creating and Using LDAP Proxy Users
367
Using SASL
368
Using the LDAP Server to Search the Directory
370
Setting Search Limits
370
Using Referrals
371
Searching Filtered Replicas
378
Configuring for Superior Referrals
379
Scenario: Superior Referrals in a Federated Tree
379
Creating a Nonauthoritative Area
380
Specifying Reference Data
382
Updating Reference Information through LDAP
383
Affected Operations
383
Discovering Support for Superior References
383
Persistent Search: Configuring for Edirectory Events
384
Managing Persistent Searches
384
Controlling Use of the Monitor Events Extended Operation
385
Getting Information about the LDAP Server
386
Auditing LDAP Events
388
16 Implementing the Service Location Protocol
389
Understanding SLP Components
389
User Agents
389
Service Agents
390
Directory Agents
391
SLP Scopes
393
How SLP Works
394
SLP with a User Agent, Service Agent, and no Directory Agent
394
SLP with a User Agent, Service Agent, and Directory Agent
395
Understanding Local Mode
396
Central Repository
397
SLP Scopes
397
Customized Scopes
397
Proxy Scopes
397
Scalability and Performance
398
Private Mode
398
Filtering
398
Understanding Directory Mode
398
How SLP Works in Directory Mode
399
SLP Edirectory Objects
400
Novell's Implementation of SLP
401
Novell's User Agents and Service Agents
402
The Novell Directory Agent
406
Using the Novell Windows NT Directory Agent
407
Using the Service Location Protocol Directory Agent
411
Setting up SLP on Windows
413
Setting up SLP on Netware
413
Installing the Netware SLP Directory Agent
413
Setting up the Netware Directory Agent Manually
414
Netware SLP Directory Agent Console Commands
414
Setting up SLP on Linux or Solaris
417
User Agents and Service Agents
418
Starting and Stopping the Daemon Process
419
Using the SLPINFO Diagnostic Utility
419
Edirectory Interoperatability with Openslp on Linux and Solaris 8.0 SLP
419
SLP V1- V2 Interoperatibility Issues
420
17 Backing up and Restoring Novell Edirectory
421
Checklist for Backing up Edirectory
422
Understanding Backup and Restore Services
425
About the Edirectory Backup Tool
425
What's Different between Backup and Restore in DSBK and TSA for NDS Backup
426
Overview of How the Backup Tool Does a Restore
427
Format of the Backup File Header
428
Format of the Backup Log File
432
Using DSMASTER Servers as Part of Disaster Recovery Planning
433
Transitive Vectors and the Restore Verification Process
434
Preserving Rights When Restoring File System Data on Netware
434
Using Roll-Forward Logs
436
Issues to be Aware of When Turning on Roll-Forward Logging
437
Location of the Roll-Forward Logs
438
Backing up and Removing Roll-Forward Logs
439
Cautionary Note: Removing Edirectory also Removes the Roll-Forward Logs
440
Preparing for a Restore
440
Prerequisites for Restoring
440
Locating the Right Backup Files for a Restore
441
Backing up and Restoring NICI
442
Backing up NICI
443
Restoring NICI
443
Using DSBK
444
Prerequisites
445
Using DSBK on Various Platforms
445
Backing up Manually with DSBK
448
Configuring Roll-Forward Logs with DSBK
449
Restoring from Backup Files with DSBK
450
Backup and Restore Command Line Options
451
Recovering the Database if Restore Verification Fails
459
Cleaning up the Replica Ring
460
Repair the Failed Server and Readd Replicas to the Server
462
Scenarios for Backup and Restore
463
Scenario: Losing a Hard Drive Containing Edirectory in a Single-Server Network
463
Scenario: Losing a Hard Drive Containing Edirectory in a Multiserver Environment
464
Scenario: Losing an Entire Server in a Multiple-Server Environment
466
Scenario: Losing some Servers in a Multiple-Server Environment
467
Scenario: Losing All Servers in a Multiple-Server Environment
467
Disaster Recovery Plan Using DSBK
469
Disaster Recovery Plan on Linux
469
18 SNMP Support for Novell Edirectory
471
Definitions and Terminology for SNMP
471
Understanding SNMP Services
472
Edirectory and SNMP
474
Benefits of SNMP Instrumentation on Edirectory
474
Understanding How SNMP Works with Edirectory
474
Installing and Configuring SNMP Services for Edirectory
477
Loading and Unloading the SNMP Server Module
477
Subagent Configuration
478
Setting up SNMP Services for Edirectory
480
Monitoring Edirectory Using SNMP
486
Traps
486
Configuring Traps
500
Statistics
510
Troubleshooting
514
19 Maintaining Novell Edirectory
515
Advanced Referral Costing
515
Improving Server-To-Server Connection
516
Advantages of Referral Costing
518
Deploying ARC
519
Enabling Advanced Referral Costing
520
Tuning Advanced Referral Costing
520
Monitoring Advanced Referral Costing
521
Improving Bulkload Performance
524
Edirectory Cache Settings
524
LBURP Transaction Size Setting
525
Increasing the Number of Asynchronous Requests in ICE
525
Increased Number of LDAP Writer Threads
526
Disabling ACL Templates
526
Disabling Schema Validation in ICE
526
Backlinker
528
Enabling/Disabling Inline Cache
528
Increasing the LBURP Time out Period
528
Keeping Edirectory Healthy
529
When to Perform Health Checks
529
Health Check Overview
529
Checking Edirectory Health Using Imonitor
530
For more Information
531
Resources for Monitoring
531
Upgrading Hardware or Replacing a Server
532
Planned Hardware or Storage Device Upgrade Without Replacing the Server
532
Planned Replacement of a Server
536
Server IP Address Changes
539
Restoring Edirectory after a Hardware Failure
539
20 Dhost Iconsole Manager
541
What Is Dhost
542
Running Dhost Iconsole
542
Running Dhost Iconsole on Netware
543
Running Dhost Iconsole on Windows
543
Running Dhost Iconsole on Linux, Solaris, and AIX
543
Managing Edirectory Modules
543
Loading or Unloading Modules on Netware
544
Loading or Unloading Modules on Windows
545
Loading or Unloading Modules on Linux, Solaris, and AIX
545
Querying for Dhost Information
545
Viewing the Configuration Parameters
545
Viewing Protocol Information
546
Viewing Connection Properties
546
Viewing the Thread Pools Statistics
546
Process Stack
547
Advertisement
NOVELL EDIRECTORY 8.8 SP5 Installation Manual (164 pages)
Brand:
NOVELL
| Category:
Software
| Size: 1 MB
Table of Contents
Table of Contents
5
About this Book
9
Chapter 1, "Installing or Upgrading Novell Edirectory on Netware," on
11
Installing or Upgrading Novell Edirectory on Netware
11
System Requirements
11
Prerequisites
11
Upgrade to Edirectory 8.8
11
Upgrade to Edirectory 8.8 SP5
11
Hardware Requirements
12
Forcing the Backlink Process to Run
13
Chapter 7, "Upgrade Requirements of Edirectory 8.8," on
14
Server Health Checks
15
Installing NMAS Server Software
15
Installing NMAS Client Software
16
Installing into a Tree with Dotted Name Containers
16
Unattended Upgrade to Edirectory 8.8 SP5 on Netware
17
Remote Installation or Upgrade
21
Disk Space Check on Upgrading to Edirectory SP5 or Later
14
Installing or Upgrading Novell Edirectory on Netware
14
Installing or Upgrading Novell Edirectory 8.8 on Netware
14
Installing or Upgrading Novell Edirectory on Windows
23
System Requirements
23
Prerequisites
24
Hardware Requirements
25
Forcing the Backlink Process to Run
26
Disk Space Check on Upgrading to Edirectory SP5 or Later
26
Installing Novell Edirectory on Windows
26
Installing or Updating Novell Edirectory 8.8 on a Windows Server
27
Server Health Checks
28
Communicating with Edirectory through LDAP
29
Installing NMAS Server Software
32
Installing NMAS Client Software
32
Installing into a Tree with Dotted Name Containers
32
Unattended Install and Upgrade to Edirectory 8.8 SP5 on Windows
34
Installing or Upgrading Novell Edirectory on Linux 3.1 System Requirements
45
Prerequisites
47
Hardware Requirements
48
Forcing the Backlink Process to Run
49
Upgrading Edirectory
49
Server Health Checks
50
Upgrading on Linux Servers Other than OES
50
Upgrading Edirectory on Existing OES
51
Upgrading Edirectory During OES 1.0 to OES 2.0 Upgrade
51
Upgrading the Tarball Deployment of Edirectory 8.8
51
Upgrading Multiple Instances
52
Disk Space Check on Upgrading to Edirectory SP5
53
Installing Edirectory
53
Using SLP with Edirectory
54
Using the Nds-Install Utility to Install Edirectory Components
55
Nonroot User Installing Edirectory 8.8
58
Using the Ndsconfig Utility to Add or Remove the Edirectory Replica Server
62
Using Ndsconfig to Configure Multiple Instances of Edirectory 8.8
67
Using Ndsconfig to Install a Linux Server into a Tree with Dotted Name Containers
72
Using the Nmasinst Utility to Configure NMAS
73
Nonroot User SNMP Configuration
74
Installing or Upgrading Novell Edirectory on Solaris
75
System Requirements
75
Prerequisites
76
Hardware Requirements
77
Forcing the Backlink Process to Run
78
Upgrading Edirectory
78
Upgrading Multiple Instances
79
Installing Edirectory
79
Upgrading the Tarball Deployment of Edirectory 8.8
79
Server Health Checks
79
Using SLP with Edirectory
80
Using the Nds-Install Utility to Install Edirectory Components
81
Nonroot User Installing Edirectory 8.8
83
Installing Edirectory 8.8 on Solaris 10 Zones
86
Using the Ndsconfig Utility to Add or Remove the Edirectory Replica Server
87
Using Ndsconfig to Configure Multiple Instances of Edirectory 8.8
89
Using Ndsconfig to Install a Solaris Server into a Tree with Dotted Name Containers
89
Using the Nmasinst Utility to Configure NMAS
89
Nonroot User SNMP Configuration
90
Installing or Upgrading Novell Edirectory on AIX
93
System Requirements
93
Prerequisites
93
Hardware Requirements
95
Forcing the Backlink Process to Run
95
Upgrading Edirectory
95
Upgrading Multiple Instances
96
Installing Edirectory
96
Upgrading the Tarball Deployment of Edirectory 8.8
96
Server Health Checks
97
Using SLP with Edirectory
97
Using the Nds-Install Utility to Install Edirectory Components
98
Nonroot User Installing Edirectory 8.8
100
Using the Ndsconfig Utility to Add or Remove the Edirectory Replica Server
103
Using Ndsconfig to Configure Multiple Instances of Edirectory 8.8
105
Using Ndsconfig to Install an AIX Server into a Tree with Dotted Name Containers
105
Using the Nmasinst Utility to Configure NMAS
105
Nonroot User SNMP Configuration
106
Relocating the DIB
109
Linux and UNIX
109
Netware and Windows
110
Upgrade Requirements of Edirectory
111
Reference Changes in 8.8 SP1 or Later Versions
112
Upgrade Process in 8.8 SP5
112
Performing a Dry Run before Upgrading Edirectory
114
Common Problems Encountered During the Upgrade Process
115
Configuring Novell Edirectory on Linux, Solaris, or AIX Systems
117
Configuration Utilities
117
The Ndsconfig Utility
117
Using the Ldapconfig Utility to Configure the LDAP Server and LDAP Group Objects
117
Using the Nmasinst Utility to Configure Novell Modular Authentication Service
118
Configuration Parameters
118
Security Considerations
123
Migrating to Edirectory 8.8 SP5
125
Migrating to Edirectory 8.8 SP5 While Upgrading the Operating System
125
Migrating to Edirectory 8.8 SP5 Without Upgrading the Operating System
126
Migrating Edirectory from Netware to OES 2 Linux
129
Planning Your Migration
129
System Requirements
129
Prerequisites
129
Supported Platforms
130
Considerations
130
Migration Tools
130
Migration Procedure
130
After the Migration
132
Uninstalling Novell Edirectory
133
Uninstalling Edirectory on Netware
133
Reinstalling Edirectory
133
Uninstalling Edirectory on Windows
134
Uninstalling Edirectory, Consoleone, and SLP da
134
Unattended Uninstallation of Edirectory
134
Uninstalling NICI
136
Uninstalling Microsoft Visual C++ 2005 Runtime Libraries
137
Uninstalling Edirectory on Linux, Solaris, or AIX
137
Edirectory Instrumentation
139
Supported Platforms
139
Prerequisites
140
Installing Edirectory Instrumentation
140
Configuring Edirectory Instrumentation
142
Linux and Solaris
142
Windows
143
Netware
144
Uninstalling Edirectory Instrumentation
145
Uninstalling Edirectory Instrumentation on Linux
145
Uninstalling Edirectory Instrumentation on Solaris
146
Uninstalling Edirectory Instrumentation on Windows
146
Unistalling Edirectory Instrumentation on Netware
147
A Linux, Solaris, and AIX Packages for Novell Edirectory
149
B Edirectory Health Checks
153
Need for Health Checks
153
Performing Health Checks
153
With the Upgrade
153
As a Standalone Utility
153
B.2.2 as a Standalone Utility
153
Types of Health Checks
154
Basic Server Health
154
Partitions and Replica Health
155
Categorization of Health
155
Normal
155
Warning
155
B.4 Categorization of Health
155
B.4.1 Normal
155
B.4.2 Warning
155
Critical
156
B.4.3 Critical
156
Log Files
157
B.5 Log Files
157
NOVELL EDIRECTORY 8.8 SP5 Manual (90 pages)
Brand:
NOVELL
| Category:
Software
| Size: 1 MB
Table of Contents
Table of Contents
5
About this Guide
9
1 Supported Platforms for Edirectory Installation
11
Netware
11
Linux
11
Chapter 1, "Supported Platforms for Edirectory Installation
11
Solaris
12
Aix
12
Windows
12
2 Install and Upgrade Enhancements
15
Chapter 2, "Install and Upgrade Enhancements
15
Multiple Package Formats for Installing Edirectory 8.8
16
Automatic Deployments
16
Easy Deployments
16
Installing and Configuring Edirectory through Yast
17
Installing Edirectory 8.8 in a Custom Location
17
Specifying a Custom Location for Application Files
18
Specifying a Custom Location for Data Files
18
Specifying a Custom Location for Configuration Files
19
Nonroot Install
19
Standards Compliance
19
FHS Compliance
20
LSB Compliance
21
Server Health Checks
21
Need for Health Checks
21
What Makes a Server Healthy
21
Performing Health Checks
21
Types of Health Checks
22
Categorization of Health
23
Log Files
25
Secretstore Integration with Edirectory
26
Unattended Upgrade to Edirectory 8.8 SP5 on Netware
27
Edirectory Instrumentation Installation
27
For more Information
27
3 NICI Backup and Restore
29
Chapter 3, "NICI Backup and Restore
29
4 The Ndspassstore Utility
31
Chapter 4, "The Ndspassstore Utility
31
5 Migrating Edirectory 8.8 SP5 from Netware to OES
33
Chapter 5, "Migrating Edirectory 8.8 SP5 from Netware to OES
33
6 Multiple Instances
35
Need for Multiple Instances
35
Sample Scenarios for Deploying Multiple Instances
35
Chapter 6, "Multiple Instances
35
Using Multiple Instances
36
Planning the Setup
36
Configuring Multiple Instances
36
Managing Multiple Instances
37
The Ndsmanage Utility
37
Identifying a Specific Instance
40
Invoking a Utility for a Specific Instance
41
Sample Scenario for Multiple Instances
41
Planning the Setup
41
Configuring the Instances
41
Invoking a Utility for an Instance
42
Listing the Instances
42
For more Information
42
7 Authentication to Edirectory through SASL-GSSAPI
43
Concepts
43
What Is Kerberos
43
What Is SASL
43
Chapter 7, "Authentication to Edirectory through SASL-GSSAPI
43
What Is GSSAPI
44
How Does GSSAPI Work with Edirectory
44
Configuring GSSAPI
45
How Does LDAP Use GSSAPI
45
Commonly Used Terms
46
8 Enforcing Case-Sensitive Universal Passwords
47
Need for Case-Sensitive Passwords
47
Chapter 8, "Enforcing Case-Sensitive Universal Passwords
47
How to Make Your Password Case-Sensitive
48
Prerequisites
48
Making Your Password Case-Sensitive
48
Managing Case-Sensitive Passwords
49
Upgrading the Legacy Novell Clients and Utilities
49
Migrating to Case-Sensitive Passwords
49
Preventing Legacy Novell Clients from Accessing Edirectory 8.8 Server
50
Need for Preventing Legacy Novell Clients from Accessing Edirectory 8.8 Server
50
Managing NDS Login Configurations
51
Partition Operations
54
Enforcing Case-Sensitive Passwords in a Mixed Tree
55
For more Information
55
9 Priority Sync
57
Need for Priority Sync
57
Chapter 9, "Priority Sync
57
Using Priority Sync
58
For more Information
58
10 Data Encryption
59
Encrypting Attributes
59
Need for Encrypted Attributes
59
Chapter 10, "Data Encryption
59
How to Encrypt Attributes
60
Accessing the Encrypted Attributes
60
Encrypting Replication
60
Need for Encrypted Replication
60
Enabling Encrypted Replication
61
For more Information
61
11 Bulkload Performance
63
Chapter 11, "Bulkload Performance
63
12 Imanager ICE Plug-Ins
65
Adding Missing Schema
65
Add Schema from a File
65
Chapter 12, "Imanager ICE Plug-Ins
65
Add Schema from a Server
66
Comparing the Schema
66
Compare Schema Files
67
Compare Schema between a Server and a File
67
Generating an Order File
67
For more Information
67
13 LDAP-Based Backup
69
Need for LDAP Based Backup
69
For more Information
69
Chapter 13, "LDAP-Based Backup
69
14 LDAP Get Effective Privileges List
71
Need for LDAP Get Effective Privileges List Interface
71
For more Information
71
15 Managing Error Logging in Edirectory
73
Message Severity Levels
73
Fatal
73
Warning
73
Chapter 15, "Managing Error Logging in Edirectory
73
Error
74
Information
74
Debug
74
Configuring Error Logging
74
Linux and UNIX
74
Windows
75
Netware
76
Dstrace Messages
78
Netware, Linux, and UNIX
78
Windows
79
Imonitor Message Filtering
80
SAL Message Filtering
81
Configuring the Severity Levels
81
Setting the Log File Path
82
Advertisement
NOVELL EDIRECTORY 8.8 SP5 Tuning Manual (30 pages)
for UNIX Platforms
Brand:
NOVELL
| Category:
Software
| Size: 0 MB
Table of Contents
Table of Contents
7
About this Guide
5
Table of Contents
7
1 Overview
9
Prerequisites
9
2 Edirectory Subsystems
11
FLAIM Database
11
Checkpoint
11
Indexes
12
Roll-Forward Log
12
Thread Pool
12
3 Analyzing System Bottlenecks
15
Disk I/O Subsystem
15
CPU Subsystem
16
Memory Subsystem
16
Network Subsystem
17
4 Tuning Edirectory Subsystems
19
FLAIM Database
19
Section 4.1, "FLAIM Database
19
Choosing Indexes
20
Tuning for Updates
20
Section 4.2, "Thread Pool
20
Thread Pool
20
Acls
21
Improving Edirectory Searches and Reads
21
Section 4.3, "Acls
21
Disabling ACL Templates
22
Replication
23
Section 4.4, "Replication
23
64-Bit Versus 32-Bit
24
Section 4.5, "SSL Overhead
24
Section 4.6, "64-Bit Versus 32-Bit
24
SSL Overhead
24
Import Convert and Export (ICE)
25
Ldif2Dib
25
Section 4.7, "Import Convert and Export (ICE)
25
Section 4.8, "Ldif2Dib
25
5 Edirectory Configuration
27
Configuring the FLAIM Subsystem
27
Hard Cache Limit
27
Dynamically Adjusting the Limit
27
Modifying FLAIM Cache Settings
27
Modifying FLAIM Cache Settings through Imonitor
28
Modifying FLAIM Cache Settings through
29
NOVELL EDIRECTORY 8.8 SP5 Tuning Manual (30 pages)
for UNIX Platforms
Brand:
NOVELL
| Category:
Software
| Size: 0 MB
Table of Contents
Table of Contents
7
About this Guide
5
Table of Contents
7
1 Overview
9
Prerequisites
9
2 Edirectory Subsystems
11
FLAIM Database
11
Checkpoint
11
Indexes
12
Roll-Forward Log
12
Thread Pool
12
3 Analyzing System Bottlenecks
15
Disk I/O Subsystem
15
CPU Subsystem
16
Memory Subsystem
16
Network Subsystem
17
4 Tuning Edirectory Subsystems
19
FLAIM Database
19
Section 4.1, "FLAIM Database
19
Choosing Indexes
20
Tuning for Updates
20
Section 4.2, "Thread Pool
20
Thread Pool
20
Acls
21
Improving Edirectory Searches and Reads
21
Section 4.3, "Acls
21
Disabling ACL Templates
22
Replication
23
Section 4.4, "Replication
23
64-Bit Versus 32-Bit
24
Section 4.5, "SSL Overhead
24
Section 4.6, "64-Bit Versus 32-Bit
24
SSL Overhead
24
Import Convert and Export (ICE)
25
Ldif2Dib
25
Section 4.7, "Import Convert and Export (ICE)
25
Section 4.8, "Ldif2Dib
25
5 Edirectory Configuration
27
Configuring the FLAIM Subsystem
27
Hard Cache Limit
27
Dynamically Adjusting the Limit
27
Modifying FLAIM Cache Settings
27
Modifying FLAIM Cache Settings through Imonitor
28
Modifying FLAIM Cache Settings through
29
Advertisement
Related Products
NOVELL EDIRECTORY 8.8 - GUIDE
NOVELL EDIRECTORY 8.8 SP1
NOVELL EDIRECTORY 8.8 SP2
NOVELL EDIRECTORY 8.8 SP3
NOVELL GROUPWISE 8 - MONITOR
NOVELL GROUPWISE 8 - POST OFFICES
NOVELL ZENWORKS APPLICATION VIRTUALIZATION 8.0 - 04-12-2010
NOVELL ZENWORKS APPLICATION VIRTUALIZATION 8.0.1 - 8-20-2010
NOVELL GROUPWISE 8 - USERS
Novell ZENworks Application Virtualization 8.0.2
NOVELL Categories
Software
Server
Print Server
Gateway
Desktop
More NOVELL Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL