Sign In
Upload
Manuals
Brands
Red Hat Manuals
Server
DIRECTORY SERVER 7.1 - ADMINISTRATOR
Red Hat DIRECTORY SERVER 7.1 - ADMINISTRATOR Manuals
Manuals and User Guides for Red Hat DIRECTORY SERVER 7.1 - ADMINISTRATOR. We have
1
Red Hat DIRECTORY SERVER 7.1 - ADMINISTRATOR manual available for free PDF download: Administrator's Manual
Red Hat DIRECTORY SERVER 7.1 - ADMINISTRATOR Administrator's Manual (652 pages)
Brand:
Red Hat
| Category:
Server
| Size: 4 MB
Table of Contents
Table of Contents
3
Directory Server Overview
27
Introduction to this Reference Guide
27
Prerequisite Reading
28
Conventions Used in this Book
29
Related Information
30
Part 1 Administering Red hat Directory Server
31
Chapter 1 Introduction to Red hat Directory Server
33
Overview of Directory Server Management
33
Using the Directory Server Console
34
Starting Directory Server Console
34
Copying Entry Dns to the Clipboard
35
Configuring the Directory Manager
35
Binding to the Directory from Red hat Console
36
Changing Login Identity
36
Viewing the Current Bind DN from the Console
37
Starting and Stopping the Directory Server
37
Starting and Stopping the Server from the Console
37
Starting and Stopping the Server from the Command-Line
38
Configuring LDAP Parameters
38
Changing Directory Server Port Numbers
38
Placing the Entire Directory Server in Read-Only Mode
40
Tracking Modifications to Directory Entries
41
Cloning a Directory Server
42
Creating a New Directory Server Instance
42
Cloning the Directory Configuration
43
Starting the Server in Referral Mode
43
Using the Refer Command
44
Chapter 2 Creating Directory Entries
45
Managing Entries from the Directory Console
45
Creating a Root Entry
46
Creating Directory Entries
47
Table 2-1 Entry Templates and Corresponding Object Classes
47
Creating an Entry Using a Predefined Template
48
Creating Other Types of Entries
48
Modifying Directory Entries
49
Displaying the Property Editor
50
Adding an Object Class to an Entry
50
Removing an Object Class
50
Adding an Attribute to an Entry
51
Adding very Large Attributes
52
Adding Attribute Values
52
Removing an Attribute Value
53
Adding an Attribute Subtype
53
Deleting Directory Entries
55
Managing Entries from the Command-Line
55
Providing Input from the Command-Line
56
Creating a Root Entry from the Command-Line
57
Adding Entries Using LDIF
57
Adding and Modifying Entries Using Ldapmodify
58
Adding Entries Using Ldapmodify
59
Table 2-2 Description of Ldapmodify Parameters Used for Adding Entries
59
Modifying Entries Using Ldapmodify
60
Table 2-3 Description of Ldapmodify Parameters Used for Modifying Entries
60
Deleting Entries Using Ldapdelete
61
Using Special Characters
62
Table 2-4 Description of Ldapdelete Parameters Used for Deleting Entries
62
LDIF Update Statements
63
Adding an Entry Using LDIF
64
Renaming an Entry Using LDIF
66
A Note on Renaming Entries
67
Modifying an Entry Using LDIF
67
Adding Attributes to Existing Entries Using LDIF
68
Changing an Attribute Value Using LDIF
69
Deleting All Values of an Attribute Using LDIF
70
Deleting a Specific Attribute Value Using LDIF
71
Deleting an Entry Using LDIF
71
Modifying an Entry in an Internationalized Directory
72
Maintaining Referential Integrity
72
How Referential Integrity Works
73
Using Referential Integrity with Replication
73
Configuring the Supplier Server
74
Enabling/Disabling Referential Integrity
74
From the Directory Server Console
74
Recording Updates in the Changelog
75
From the Directory Server Console
75
Modifying the Update Interval
76
From the Directory Server Console
76
Modifying the Attribute List
77
From the Directory Server Console
77
Chapter 3 Configuring Directory Databases
79
Creating and Maintaining Suffixes
79
Creating Suffixes
80
Figure 3-1 a Sample Directory Tree with One Root Suffix
80
Figure 3-2 a Sample Directory Tree with Two Root Suffixes
81
Figure 3-3 a Sample Directory Tree with a Root Suffix off Limits to Search Operations
81
Creating a New Root Suffix Using the Console
82
Figure 3-4 a Sample Directory Tree with a Sub Suffix
82
Creating a New Sub Suffix Using the Console
83
Creating Root and Sub Suffixes from the Command-Line
84
Table 3-1 Suffix Attributes
85
Maintaining Suffixes
87
Using Referrals in a Suffix
87
Enabling Referrals Only During Update Operations
88
Disabling a Suffix
89
Deleting a Suffix
89
Creating and Maintaining Databases
90
Creating Databases
90
Creating a New Database for an Existing Suffix Using the Console
92
Creating a New Database for a Single Suffix from the Command-Line
93
Adding Multiple Databases for a Single Suffix
94
Adding the Custom Distribution Function to a Suffix
94
Maintaining Directory Databases
95
Placing a Database in Read-Only Mode
96
Deleting a Database
97
Configuring Transaction Logs for Frequent Database Updates
97
Database Encryption
98
Encryption Keys
99
Encryption Ciphers
99
Encrypting Pre-Existing Data
100
Configuring Database Encryption from the Console
101
Configuring Database Encryption Using the Command-Line
101
Exporting and Importing an Encrypted Database
102
Creating and Maintaining Database Links
103
Configuring the Chaining Policy
103
Chaining Component Operations
103
Table 3-2 Components Allowed to Chain
104
Chaining LDAP Controls
107
Creating a New Database Link
109
Creating a New Database Link Using the Console
109
Table 3-3 LDAP Controls and Their Oids
109
Creating a Database Link from the Command-Line
111
Table 3-4 Database Link Configuration Attributes
116
Chaining Using SSL
120
Maintaining Database Links
121
Updating Remote Server Authentication Information
121
Deleting Database Links
121
Database Links and Access Control Evaluation
122
Advanced Feature: Tuning Database Link Performance
123
Managing Connections to the Remote Server
124
Table 3-5 Database Link Connection Management Attributes
125
Detecting Errors During Normal Processing
126
Managing Threaded Operations
127
Table 3-6 Database Link Processing Error Detection Parameters
127
Advanced Feature: Configuring Cascading Chaining
128
Overview of Cascading Chaining
128
Configuring Cascading Chaining Defaults Using the Console
131
Configuring Cascading Chaining Using the Console
132
Configuring Cascading Chaining from the Command-Line
133
Summary of Cascading Chaining Configuration Attributes
136
Cascading Chaining Configuration Example
136
Table 3-7 Cascading Chaining Configuration Attributes
136
Configuring Server One
137
Configuring Server Two
139
Configuring Server Three
141
Using Referrals
143
Setting Default Referrals
143
Setting a Default Referral Using the Console
143
Setting a Default Referral from the Command-Line
144
Creating Smart Referrals
144
Creating Smart Referrals Using the Directory Server Console
145
Creating Smart Referrals from the Command-Line
146
Creating Suffix Referrals
147
Creating Suffix Referrals Using the Console
147
Creating Suffix Referrals from the Command-Line
148
Chapter 4 Populating Directory Databases
149
Importing Data
149
Importing a Database from the Console
150
Table 4-1 Import Method Comparison
150
Initializing a Database from the Console
152
Importing from the Command-Line
153
Importing Using the Ldif2Db Command-Line Script
153
Importing Using the Ldif2Db.pl Perl Script
154
Importing Using the Ldif2Ldap Command-Line Script
155
Exporting Data
156
Figure 4-1 Splitting a Database Contents into Two Databases
156
Exporting Directory Data to LDIF Using the Console
157
Exporting a Single Database to LDIF Using the Console
158
Exporting to LDIF from the Command-Line
159
Backing up and Restoring Data
159
Backing up All Databases
160
Backing up All Databases from the Server Console
160
Backing up All Databases from the Command-Line
161
Backing up the Dse.ldif Configuration File
162
Restoring All Databases
162
Restoring All Databases from the Console
162
Restoring Your Database from the Command-Line
163
Restoring a Single Database
164
Restoring Databases that Include Replicated Entries
164
Restoring the Dse.ldif Configuration File
165
Enabling and Disabling Read-Only Mode
166
Enabling Read-Only Mode
166
Disabling Read-Only Mode
166
Chapter 5 Advanced Entry Management
167
Using Groups
167
Managing Static Groups
168
Adding a New Static Group
168
Modifying a Static Group
169
Managing Dynamic Groups
169
Adding a New Dynamic Group
169
Modifying a Dynamic Group
170
Using Roles
170
About Roles
171
Managing Roles Using the Console
172
Creating a Managed Role
173
Creating a Filtered Role
174
Creating a Nested Role
174
Viewing and Editing an Entry's Roles
175
Modifying a Role Entry
176
Making a Role Inactive
176
Reactivating a Role
176
Deleting a Role
177
Managing Roles Using the Command-Line
177
Examples: Managed Role Definition
178
Table 5-1 Object Classes and Attributes for Roles
178
Example: Filtered Role Definition
179
Example: Nested Role Definition
180
Using Roles Securely
180
Assigning Class of Service
182
About Cos
182
About the Cos Definition Entry
183
About the Cos Template Entry
183
How a Pointer Cos Works
184
How an Indirect Cos Works
184
How a Classic Cos Works
185
Managing Cos Using the Console
186
Creating a New Cos
186
Creating the Cos Template Entry
188
Editing an Existing Cos
190
Deleting a Cos
190
Managing Cos from the Command-Line
190
Creating the Cos Definition Entry from the Command-Line
191
Table 5-2 Cos Definition Entry Object Classes
191
Table 5-3 Cos Definition Entry Attributes
191
Table 5-4 Cos Definitions
193
Creating the Cos Template Entry from the Command-Line
194
Example of a Pointer Cos
195
Example of an Indirect Cos
196
Example of a Classic Cos
197
Creating Role-Based Attributes
198
Access Control and Cos
199
Chapter 6 Managing Access Control
201
Access Control Principles
202
ACI Structure
202
ACI Placement
203
ACI Evaluation
203
ACI Limitations
204
Default Acis
205
Creating Acis Manually
206
The ACI Syntax
206
Example ACI
207
Defining Targets
207
Table 6-1 LDIF Target Keywords
208
Targeting a Directory Entry
209
Targeting Attributes
211
Targeting both an Entry and Attributes
212
Targeting Entries or Attributes Using LDAP Filters
212
Targeting Attribute Values Using LDAP Filters
213
Targeting a Single Directory Entry
214
Defining Permissions
215
Allowing or Denying Access
215
Assigning Rights
215
Rights Required for LDAP Operations
217
Permissions Syntax
218
Access Control and the Modrdn Operation
219
Bind Rules
219
Bind Rule Syntax
220
Table 6-2 LDIF Bind Rule Keywords
220
Defining User Access - Userdn Keyword
221
Anonymous Access (Anyone Keyword)
222
General Access (All Keyword)
222
Self Access (Self Keyword)
222
Parent Access (Parent Keyword)
222
LDAP Urls
222
Wildcards
223
Examples
223
Defining Group Access - Groupdn Keyword
225
Examples
225
Defining Access Based on Value Matching
226
Using the Userattr Keyword
227
Using the Userattr Keyword with Inheritance
230
Granting Add Permission Using the Userattr Keyword
231
Figure 6-1 Using Inheritance with the Userattr Keyword
231
Defining Role Access - Roledn Keyword
226
Defining Access from a Specific IP Address
232
Defining Access from a Specific Domain
233
Defining Access at a Specific Time of Day or Day of Week
234
Examples
234
Defining Access Based on Authentication Method
235
Examples
236
Using Boolean Bind Rules
236
Creating Acis from the Console
237
Displaying the Access Control Editor
238
Figure 6-2 Selecting an Object in the Navigation Tree to Set Access Control
239
Figure 6-3 Access Control Editor Window
239
Viewing Current Acis
240
Creating a New ACI
240
Editing an ACI
241
Deleting an ACI
242
Access Control Usage Examples
242
Granting Anonymous Access
244
ACI "Anonymous Example.com
244
ACI "Anonymous World
245
Granting Write Access to Personal Entries
246
ACI "Write Example.com
246
ACI "Write Subscribers
247
Restricting Access to Key Roles
249
ACI "Roles
249
Granting a Group Full Access to a Suffix
251
Aci "Hr
251
Granting Rights to Add and Delete Group Entries
252
ACI "Create Group
253
ACI "Delete Group
254
Granting Conditional Access to a Group or Role
255
ACI "Hostedcompany1
255
Denying Access
257
ACI "Billing Info Read
257
ACI "Billing Info Deny
258
Setting a Target Using Filtering
260
Allowing Users to Add or Remove Themselves from a Group
260
ACI "Group Members
260
Defining Permissions for Dns that Contain a Comma
261
Proxied Authorization ACI Example
262
Viewing the Acis for an Entry
263
Get Effective Rights Control
263
Using Get Effective Rights from the Command-Line
265
Table 6-3 Permissions that Can be Set on Entries
265
Table 6-4 Permissions that Can be Set on Attributes
265
Using Get Effective Rights from the Console
268
Get Effective Rights Return Codes
269
Advanced Access Control: Using Macro Acis
269
Table 6-5 Returned Result Codes
269
Macro ACI Example
270
Figure 6-4 Example Directory Tree for Macro Acis
271
Macro ACI Syntax
272
Macro Matching for ($Dn)
273
Table 6-6 Macros in ACI Keywords
273
Macro Matching for [$Dn]
274
Macro Matching for ($Attr.attrname)
275
Access Control and Replication
276
Logging Access Control Information
276
Compatibility with Earlier Releases
277
Chapter 7 User Account Management
279
Managing the Password Policy
279
Configuring the Password Policy
280
Configuring a Global Password Policy Using the Console
281
Configuring a Subtree/User Password Policy Using the Console
282
Configuring a Global Password Policy Using the Command-Line
283
Table 7-1 Password Policy Attributes
283
Configuring Subtree/User Password Policy Using the Command-Line
286
Setting User Passwords
290
Password Change Extended Operation
290
Configuring the Account Lockout Policy
292
Configuring the Account Lockout Policy Using the Console
292
Configuring the Account Lockout Policy Using the Command-Line
292
Table 7-2 Account Lockout Policy Attributes
293
Managing the Password Policy in a Replicated Environment
294
Sycnhronizing Passwords
295
Inactivating Users and Roles
296
Inactivating User and Roles Using the Console
296
Inactivating User and Roles Using the Command-Line
297
Activating User and Roles Using the Console
297
Activating User and Roles Using the Command-Line
298
Setting Resource Limits Based on the Bind DN
299
Setting Resource Limits Using the Console
299
Setting Resource Limits Using the Command-Line
300
Chapter 8 Managing Replication
301
Replication Overview
302
Read-Write Replica/Read-Only Replica
302
Supplier/Consumer
303
Changelog
303
Unit of Replication
304
Replication Identity
304
Replication Agreement
305
Compatibility with Earlier Versions of Directory Server
305
Replication Scenarios
306
Single-Master Replication
306
Multi-Master Replication
307
Figure 8-1 Single-Master Replication
307
Figure 8-2 Multi-Master Replication (Two Suppliers)
308
Figure 8-3 Multi-Master Replication (Four Suppliers)
308
Cascading Replication
310
Handling Complex Replication Configurations
312
Creating the Supplier Bind DN Entry
313
Configuring Supplier Settings
315
Configuring a Read-Write Replica
315
Configuring a Read-Only Replica
316
Configuring a Hub Supplier
317
Creating a Replication Agreement
318
Configuring Single-Master Replication
320
Configuring the Read-Only Replica on the Consumer Server
321
Configuring the Read-Write Replica on the Supplier Server
322
Initializing the Replicas for Single-Master Replication
324
Configuring Multi-Master Replication
324
Configuring 2-Way Multi-Master Replication
325
Configuring the Read-Only Replicas on the Consumer Servers
325
Configuring the Read-Write Replicas on the Supplier Servers
327
Initializing the Replicas for Multi-Master Replication
330
Configuring 4-Way Multi-Master Replication
330
Configuring the Read-Only Replicas on the Consumer Servers
330
Configuring the Read-Write Replicas on the Supplier Servers
332
Initializing the Replicas for Multi-Master Replication
335
Preventing Monopolization of the Consumer in Multi-Master Replication
336
Configuring Cascading Replication
337
Configuring the Read-Only Replica on the Consumer Server
338
Configuring the Read-Only Replica on the Hub Supplier
340
Configuring the Read-Write Replica on the Supplier Server
341
Initializing the Replicas for Cascading Replication
343
Making a Replica Updatable
343
Deleting the Changelog
343
Removing the Changelog
344
Moving the Changelog to a New Location
344
Initializing Consumers
345
When to Initialize a Consumer
345
Online Consumer Initialization Using the Console
346
Performing Online Consumer Initialization
346
Manual Consumer Initialization Using the Command-Line
347
Manual Consumer Initialization Overview
347
Exporting a Replica to LDIF
347
Importing the LDIF File to the Consumer Server
348
Filesystem Replica Initialization
348
Initializing the Consumer Replica from the Backup Files
349
Forcing Replication Updates
350
Forcing Replication Updates from the Console
351
Forcing Replication Updates from the Command-Line
351
Table 8-1 Replicate_Now Variables
353
Table 10-3 Table
353
Replication over SSL
354
Configuring Replication over SSL Using the Replication Agreement Wizard
355
Replication with Earlier Releases
355
Configuring Directory Server as a Consumer of a Legacy Directory Server
356
Using the Retro Changelog Plug-In
357
Table 8-2 Attributes of a Retro Changelog Entry
357
Enabling the Retro Changelog Plug-In
358
Searching and Modifying the Retro Changelog
359
Trimming the Retro Changelog
359
Retro Changelog and the Access Control Policy
360
Monitoring Replication Status
360
Monitoring Replication Status from the Directory Server Console
360
Monitoring Replication Status from Administration Express
361
Table 8-3 Directory Server Console - Replication Status
361
Solving Common Replication Conflicts
364
Solving Naming Conflicts
364
Renaming an Entry with a Multi-Valued Naming Attribute
365
Renaming an Entry with a Single-Valued Naming Attribute
366
Solving Orphan Entry Conflicts
367
Solving Potential Interoperability Problems
368
Troubleshooting Replication-Related Problems
368
Interpreting Error Messages and Symptoms
369
Useful Tools
373
Chapter 9 Extending the Directory Schema
375
Overview of Extending Schema
375
Managing Attributes
376
Viewing Attributes
376
Table 9-1 Attributes Tab Reference
376
Creating Attributes
377
Editing Attributes
378
Deleting Attributes
379
Managing Object Classes
379
Viewing Object Classes
380
Table 9-2 Object Classes Tab Reference
380
Creating Object Classes
381
Editing Object Classes
382
Deleting Object Classes
383
Turning Schema Checking on and off
383
Chapter 10 Managing Indexes
385
About Indexes
385
About Indexes and Indexing Performance
386
Index Types
388
About Default, System, and Standard Indexes
390
Overview of Default Indexes
390
Table 10-1 Default Indexes
390
Overview of System Indexes
391
Overview of Standard Indexes
391
Table 10-2 System Indexes
391
Overview of the Searching Algorithm
392
Idlistscanlimit
393
Phonetic Searches
394
Balancing the Benefits of Indexing
395
Creating Indexes
397
Creating Indexes from the Server Console
397
Creating Indexes from the Command-Line
398
Adding an Index Entry
399
Running the Db2Index.pl Script
401
Creating VLV Indexes from the Server Console
402
Creating VLV Indexes from the Command-Line
403
Adding a Browsing Index Entry
404
Running the Vlvindex Script
406
Setting Access Control for VLV Information
407
Deleting Indexes
407
Deleting Indexes from the Server Console
408
Deleting Indexes from the Command-Line
409
Deleting an Index Entry
409
Running the Db2Index.pl Script
411
Deleting Browsing and VLV Indexes from the Server Console
411
Deleting Browsing and VLV Indexes from the Command-Line
412
Deleting a Browsing Index Entry
413
Running the Vlvindex Script
414
Attribute Name Quick Reference Table
415
Chapter 11 Managing SSL and SASL
417
Introduction to SSL in the Directory Server
418
Enabling SSL: Summary of Steps
418
Command-Line Functions for Start TLS
419
Troubleshooting Start TLS
419
Obtaining and Installing Server Certificates
420
Step 1: Generate a Certificate Request
421
Step 2: Send the Certificate Request
422
Step 3: Install the Certificate
423
Step 4: Trust the Certificate Authority
424
Step 5: Confirm that Your New Certificates Are Installed
425
Using Certutil
425
Starting the Server with SSL Enabled
428
Enabling SSL Only in the Directory Server
429
Enabling SSL in the Directory Server, Admin Server, and Console
430
Creating a Password File
433
Setting Security Preferences
433
Using Certificate-Based Authentication
435
Setting up Certificate-Based Authentication
436
Allowing/Requiring Client Authentication
437
Configuring LDAP Clients to Use SSL
437
Introduction to SASL
439
Authentication Mechanisms
440
SASL Identity Mapping
441
Legacy Identity Mapping
442
Configuring SASL Identity Mapping from the Console
442
Configuring SASL Identity Mapping from the Command-Line
443
Configuring Kerberos
443
Table 11-1 Supported Kerberos Systems
443
Configuring the KDC Server
444
Realms
444
Example
445
Chapter 12 Monitoring Server and Database Activity
447
Viewing and Configuring Log Files
447
Defining a Log File Rotation Policy
448
Defining a Log File Deletion Policy
449
Access Log
450
Viewing the Access Log
450
Configuring the Access Log
450
Error Log
451
Viewing the Error Log
452
Configuring the Error Log
452
Audit Log
453
Viewing the Audit Log
453
Configuring the Audit Log
454
Manual Log File Rotation
455
Monitoring Server Activity
455
Monitoring Your Server from the Directory Server Console
455
Viewing the Server Performance Monitor
455
Overview of Server Performance Monitor Information
456
General Information (Server)
456
Resource Summary
457
Current Resource Usage
457
Table 12-1 Server Performance Monitoring - Resource Summary
457
Connection Status
458
Table 12-2 Server Performance Monitoring - Current Resource Usage
458
Table 12-3 Server Performance Monitoring - Connection Status
458
Global Database Cache Information
459
Table 12-4 Server Performance Monitoring - Global Database Cache
459
Monitoring Your Server from the Command-Line
460
Monitoring Database Activity
461
Monitoring Database Activity from the Server Console
462
Viewing Database Performance Monitors
462
Overview of Database Performance Monitor Information
462
General Information (Database)
462
Summary Information Table
463
Table 12-5 Database Performance Monitoring - Summary Information
463
Database Cache Information Table
464
Database File-Specific Table
464
Table 12-6 Database Performance Monitoring - Database Cache Information
464
Monitoring Databases from the Command-Line
465
Table 12-7 Database Performance Monitoring - Database File-Specific
465
Monitoring Database Link Activity
467
Table 12-8 Database Link Monitoring Attributes
467
Chapter 13 Monitoring Directory Server Using SNMP
469
About SNMP
470
Configuring the Master Agent
470
Configuring the Subagent
471
Subagent Configuration File
471
Agentx-Master
471
Agent-Logdir
471
Server
472
Starting the Subagent
472
Testing the Subagent
472
Configuring the Directory Server for SNMP
473
Using the Management Information Base
473
Operations Table
474
Table 13-1 Operations - Managed Objects and Descriptions
474
Entries Table
475
Table 13-2 Entries - Managed Objects and Descriptions
475
Interaction Table
476
Table 13-3 Interaction - Managed Objects and Descriptions
476
Chapter 14 Tuning Directory Server Performance
479
Tuning Server Performance
479
Tuning Database Performance
480
Optimizing Search Performance
481
Tuning Transaction Logging
483
Changing the Location of the Database Transaction Log
484
Changing the Database Checkpoint Interval
484
Disabling Durable Transactions
485
Specifying Transaction Batching
486
Miscellaneous Tuning Tips
486
Avoid Creating Entries under the Cn=Config Entry in the Dse.ldif File
486
Part 2 Plug-Ins Reference
487
Chapter 15 Administering Directory Server Plug-Ins
489
Server Plug-In Functionality Reference
489
7-Bit Check Plug-In
489
Table 15-1 Details of 7-Bit Check Plug-In
489
ACL Plug-In
490
Table 15-2 Details of ACI Plug-In
490
ACL Preoperation Plug-In
491
Binary Syntax Plug-In
491
Table 15-3 Details of Preoperation Plug-In
491
Table 15-4 Details of Binary Syntax Plug-In
491
Boolean Syntax Plug-In
492
Case Exact String Syntax Plug-In
492
Table 15-5 Details of Boolean Syntax Plug-In
492
Case Ignore String Syntax Plug-In
493
Table 15-6 Details of Case Exact String Syntax Plug-In
493
Table 15-7 Details of Case Ignore String Syntax Plug-In
493
Chaining Database Plug-In
494
Class of Service Plug-In
494
Country String Syntax Plug-In
495
Distinguished Name Syntax Plug-In
495
Table 15-9 Details of Class of Service Plug-In
495
Table 15-10 Details of Country String Plug-In
495
Table 15-11 Details of Distinguished Name Syntax Plug-In
495
Generalized Time Syntax Plug-In
496
Table 15-12 Details of Generalized Time Syntax Plug-In
496
Integer Syntax Plug-In
497
Table 15-13 Details of Integer Syntax Plug-In
497
Internationalization Plug-In
498
Ldbm Database Plug-In
498
Table 15-14 Details of Internationalization Plug-In
498
Table 15-15 Details of Ldbm Database Plug-In
498
Legacy Replication Plug-In
499
Table 15-16 Details of Legacy Replication Plug-In
499
Multi-Master Replication Plug-In
500
Octet String Syntax Plug-In
500
Table 15-17 Details of Multi-Master Replication Plug-In
500
Table 15-18 Details of Octet String Syntax Plug-In
500
CLEAR Password Storage Plug-In
501
CRYPT Password Storage Plug-In
501
Table 15-19 Details of CLEAR Password Storage Plug-In
501
Table 15-20 Details of CRYPT Password Storage Plug-In
501
NS-MTA-MD5 Password Storage Plug-In
502
Table 15-21 Details of NS-MTA-MD5 Password Storage Plug-In
502
SHA Password Storage Plug-In
503
SSHA Password Storage Plug-In
503
Table 15-22 Details of SHA Password Storage Plug-In
503
Table 15-23 Details of SSHA Password Storage Plug-In
503
Postal Address String Syntax Plug-In
504
Table 15-24 Details of Postal Address String Syntax Plug-In
504
PTA Plug-In
505
Referential Integrity Postoperation Plug-In
505
Table 15-25 Details of PTA Plug-In
505
Table 15-26 Details of Referential Integrity Postoperation Plug-In
505
Retro Changelog Plug-In
506
Table 15-27 Details of Retro Changelog Plug-In
506
Roles Plug-In
507
Table 15-28 Details of Roles Plug-In
507
Space Insensitive String Syntax Plug-In
508
Table 15-29 Details of Space Insensitive String Syntax Plug-In
508
State Change Plug-In
509
Telephone Syntax Plug-In
509
Table 15-30 Details of State Change Plug-In
509
Table 15-31 Details of Telephone Syntax Plug-In
509
UID Uniqueness Plug-In
510
Table 15-32 Details of UID Uniqueness Plug-In
510
URI Plug-In
511
Table 15-33 Details of URI Plug-In
511
Enabling and Disabling Plug-Ins from the Server Console
512
Chapter 16 Using the Pass-Through Authentication Plug-In
513
How Directory Server Uses PTA
513
PTA Plug-In Syntax
515
Table 16-1 PTA Plug-In Parameters
516
Configuring the PTA Plug-In
518
Turning the Plug-In on or off
518
Configuring the Servers to Use a Secure Connection
519
Specifying the Authenticating Directory Server
520
Specifying the Pass-Through Subtree
521
Configuring the Optional Parameters
522
PTA Plug-In Syntax Examples
523
Specifying One Authenticating Directory Server and One Subtree
524
Specifying Multiple Authenticating Directory Servers
524
Specifying One Authenticating Directory Server and Multiple Subtrees
525
Using Non-Default Parameter Values
525
Specifying Different Optional Parameters and Subtrees for Different Authenticating Directory
526
Servers
526
Chapter 17 Using the Attribute Uniqueness Plug-In
529
Overview of the Attribute Uniqueness Plug-In
529
Overview of the UID Uniqueness Plug-In
531
Attribute Uniqueness Plug-In Syntax
531
Table 17-1 Attribute Uniqueness Plug-In Variables
533
Creating an Instance of the Attribute Uniqueness Plug-In
534
Configuring Attribute Uniqueness Plug-Ins
535
Viewing Plug-In Configuration Information
535
Configuring Attribute Uniqueness Plug-Ins from the Directory Server Console
536
Configuring Attribute Uniqueness Plug-Ins from the Command-Line
537
Turning the Plug-In on or off
537
Specifying a Suffix or Subtree
537
Using the Markerobjectclass and Requiredobjectclass Keywords
538
Attribute Uniqueness Plug-In Syntax Examples
539
Specifying One Attribute and One Subtree
540
Specifying One Attribute and Multiple Subtrees
540
Replication and the Attribute Uniqueness Plug-In
541
Simple Replication Scenario
541
Multi-Master Replication Scenario
542
Chapter 18 Windows Sync
543
About Windows Sync
543
Figure 18-1 Active Directory - Directory Server Synchronization Process
545
Figure 18-2 Windows NT4 Server - Directory Server Synchronization Process
546
Figure 18-3 Multi-Master Directory Server - Windows Domain Synchronization
547
How Windows Sync Works
547
Installing Sync Services
549
Prerequisites for NT4
549
Installing and Configuring the Password Sync Service
550
Reconfiguring the Password Sync Service
552
Setting up SSL for the Password Sync Service
552
Installing and Configuring the NT4 LDAP Service
553
Uninstalling the Sync Services
557
Configuring Windows Sync
557
Using Windows Sync
561
Synchronized Entries
562
Table 18-1 User Entry Schema Mapping between Directory Server and Windows Servers
562
Table A-1 Table
562
Table 18-2 User Entry Schema that Is the same in Directory Server and Windows Servers
563
Groups
564
Manually Initiating Synchronization
565
Table 18-3 Group Entry Schema Mapping between Directory Server and Windows Servers
565
Table 18-4 Group Entry Schema that Are Directly Mapped between Directory Server and Windows Servers
565
The Need for Resynchronization
566
Checking Synchronization Status
566
Modifying the Synchronization Agreement
567
Active Directory Schema Compatibility
567
NT4-Specific Limitations
568
Troubleshooting
569
Part 3
571
Appendix A LDAP Data Interchange Format
573
LDIF File Format
573
Continuing Lines in LDIF
575
Representing Binary Data
575
Specifying Directory Entries Using LDIF
577
Specifying Organization Entries
577
Specifying Organizational Unit Entries
579
Table A-3 LDIF Elements in Organizational Unit Entries
579
Specifying Organizational Person Entries
580
Defining Directories Using LDIF
581
LDIF File Example
583
Storing Information in Multiple Languages
584
Appendix B Finding Directory Entries
587
Finding Entries Using the Server Console
587
Using Ldapsearch
588
Using Special Characters
588
Ldapsearch Command-Line Format
589
Commonly Used Ldapsearch Options
589
Ldapsearch Examples
592
Returning All Entries
592
Specifying Search Filters on the Command-Line
592
Searching the Root DSE Entry
592
Searching the Schema Entry
593
Using LDAP_BASEDN
593
Displaying Subsets of Attributes
593
Specifying Search Filters Using a File
594
Specifying Dns that Contain Commas in Search Filters
594
Using Client Authentication When Searching
594
LDAP Search Filters
595
Search Filter Syntax
595
Using Attributes in Search Filters
596
Using Operators in Search Filters
596
Table B-1 Search Filter Operators
596
Using Compound Search Filters
597
Table B-2 Search Filter Boolean Operators
597
Search Filter Examples
598
Searching an Internationalized Directory
599
Matching Rule Filter Syntax
599
Matching Rule Formats
600
Using Wildcards in Matching Rule Filters
602
Supported Search Types
602
International Search Examples
603
Less-Than Example
603
Table B-3 Search Types, Operators, and Suffixes
603
Less-Than or Equal-To Example
604
Equality Example
604
Greater-Than or Equal-To Example
604
Greater-Than Example
605
Substring Example
605
Appendix C LDAP Urls
607
Components of an LDAP URL
607
Table C-1 LDAP URL Components
607
Escaping Unsafe Characters
609
Examples of LDAP Urls
609
Appendix D Internationalization
613
About Locales
613
Identifying Supported Locales
614
Supported Language Subtypes
616
Table D-2 Supported Language Subtypes
617
Troubleshooting Matching Rules
618
Advertisement
Advertisement
Related Products
Red Hat DIRECTORY SERVER 7.1 - GATEWAY CUSTOMIZATION
Red Hat DIRECTORY SERVER 7.1 - PLUG-IN PROGRAMMERS
Red Hat DIRECTORY SERVER 7.1
Red Hat DIRECTORY SERVER 7.1 - DEPLOYMENT
Red Hat DIRECTORY SERVER 8.0
Red Hat DESKTOP
Red Hat 8.1
Red Hat DIRECTORY SERVER 2.0 - GATEWAY
Red Hat DIRECTORY SERVER 7.1 SP7 - S
Red Hat DIRECTORY SERVER 8.1 - 11-01-2010
Red Hat Categories
Software
Server
Desktop
Storage
More Red Hat Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL