Sign In
Upload
Manuals
Brands
Red Hat Manuals
Server
DIRECTORY SERVER 7.1 - DEPLOYMENT
Red Hat DIRECTORY SERVER 7.1 - DEPLOYMENT Manuals
Manuals and User Guides for Red Hat DIRECTORY SERVER 7.1 - DEPLOYMENT. We have
1
Red Hat DIRECTORY SERVER 7.1 - DEPLOYMENT manual available for free PDF download: Deployment Manual
Red Hat DIRECTORY SERVER 7.1 - DEPLOYMENT Deployment Manual (230 pages)
Brand:
Red Hat
| Category:
Server
| Size: 1 MB
Table of Contents
Table of Contents
3
About this Guide
11
Directory Server Overview
11
Purpose of this Guide
11
Conventions Used in this Guide
13
Related Information
13
Chapter 1 Introduction to Directory Server
15
What Is a Directory Service
15
About Global Directory Services
16
About LDAP
17
Introduction to Directory Server
17
Overview of Directory Server Architecture
18
Overview of the Server Front-End
19
Server Plug-Ins Overview
19
Overview of the Basic Directory Tree
19
Directory Server Data Storage
21
About Directory Entries
22
Distributing Directory Data
23
Directory Design Overview
23
Design Process Outline
23
Deploying Your Directory
25
Piloting Your Directory
25
Putting Your Directory into Production
25
Other General Directory Resources
26
Chapter 2 How to Plan Your Directory Data
27
Introduction to Directory Data
27
What Your Directory Might Include
28
What Your Directory Should Not Include
29
Defining Your Directory Needs
29
Performing a Site Survey
30
Identifying the Applications that Use Your Directory
31
Identifying Data Sources
33
Characterizing Your Directory Data
33
Determining Level of Service
34
Considering a Data Master
35
Data Mastering for Replication
35
Data Mastering for Synchronization
35
Data Mastering Across Multiple Applications
35
Determining Data Ownership
37
Determining Data Access
38
Documenting Your Site Survey
39
Repeating the Site Survey
40
Chapter 3 How to Design the Schema
43
Schema Design Process Overview
43
Standard Schema
44
Schema Format
44
Standard Attributes
46
Standard Object Classes
47
Mapping Your Data to the Default Schema
48
Viewing the Default Directory Schema
48
Matching Data to Schema Elements
49
Customizing the Schema
50
When to Extend Your Schema
51
Getting and Assigning Object Identifiers
51
Naming Attributes and Object Classes
52
Strategies for Defining New Object Classes
52
Strategies for Defining New Attributes
54
Deleting Schema Elements
54
Creating Custom Schema Files
55
Custom Schema Best Practices
56
Maintaining Consistent Schema
57
Schema Checking
58
Selecting Consistent Data Formats
58
Maintaining Consistency in Replicated Schema
59
Other Schema Resources
60
Chapter 4 Designing the Directory Tree
61
Introduction to the Directory Tree
61
Designing Your Directory Tree
62
Choosing a Suffix
62
Suffix Naming Conventions
63
Naming Multiple Suffixes
64
Creating Your Directory Tree Structure
64
Branching Your Directory
65
Identifying Branch Points
66
Replication Considerations
68
Access Control Considerations
70
Naming Entries
71
Naming Person Entries
72
Naming Group Entries
73
Naming Organization Entries
74
Naming Other Kinds of Entries
74
Grouping Directory Entries
75
About Roles
75
Deciding between Roles and Groups
76
About Class of Service
77
Directory Tree Design Examples
78
Directory Tree for an International Enterprise
78
Directory Tree for an ISP
79
Virtual Directory Information Tree Views
80
Overview
81
Introduction to Virtual DIT Views
82
Advantages of Using Virtual DIT Views
85
Example of Virtual DIT Views
86
Views and Other Directory Features
87
Effects of Virtual Views on Performance
88
Compatibility with Existing Applications
88
Other Directory Tree Resources
89
Chapter 5 Designing the Directory Topology
91
Topology Overview
91
Distributing Your Data
92
About Using Multiple Databases
93
About Suffixes
94
About Knowledge References
96
Using Referrals
97
The Structure of an LDAP Referral
97
About Default Referrals
98
Smart Referrals
99
Tips for Designing Smart Referrals
101
Using Chaining
102
Deciding between Referrals and Chaining
104
Usage Differences
104
Evaluating Access Controls
104
Using Indexes to Improve Database Performance
108
Overview of Directory Index Types
108
Evaluating the Costs of Indexing
109
Chapter 6 Designing the Replication Process
111
Introduction to Replication
111
Replication Concepts
112
Unit of Replication
113
Read-Write Replica/Read-Only Replica
113
Supplier/Consumer
113
Changelog
114
Replication Agreement
114
Data Consistency
115
Common Replication Scenarios
116
Single-Master Replication
116
Multi-Master Replication
117
Cascading Replication
121
Mixed Environments
123
Defining a Replication Strategy
125
Replication Survey
126
Replication Resource Requirements
127
Fractional Replication
127
Replication Across a Wide-Area Network
128
Using Replication for High Availability
129
Using Replication for Local Availability
130
Using Replication for Load Balancing
130
Example of Network Load Balancing
131
Example of Load Balancing for Improved Performance
133
Example Replication Strategy for a Small Site
134
Example Replication Strategy for a Large Site
134
Using Replication with Other Directory Features
135
Replication and Access Control
135
Replication and Directory Server Plug-Ins
135
Replication and Database Links
136
Schema Replication
137
Replication and Synchronization
138
Chapter 7 Designing Synchronization
139
Windows Sync Overview
139
Designing Windows Sync
144
Resource Requirements
146
Services to Install
146
Considering a Data Master
147
Interaction with a Replicated Environment
147
Characterizing Your Directory Data
148
Chapter 8 Designing a Secure Directory
153
About Security Threats
154
Unauthorized Access
154
Unauthorized Tampering
155
Denial of Service
155
Analyzing Your Security Needs
155
Determining Access Rights
156
Ensuring Data Privacy and Integrity
157
Conducting Regular Audits
157
Example Security Needs Analysis
157
Overview of Security Methods
158
Selecting Appropriate Authentication Methods
159
Anonymous Access
159
Simple Password
160
Certificate-Based Authentication
161
Simple Password over TLS
162
Proxy Authentication
162
Preventing Authentication by Account Inactivation
163
Designing a Password Policy
163
How Password Policy Works
164
Password Policy Attributes
169
Password Change after Reset
170
User-Defined Passwords
170
Password Expiration
171
Expiration Warning
171
Grace Login Limit
171
Password Syntax Checking
172
Password Length
172
Password Minimum Age
172
Password History
172
Password Storage Scheme
173
Designing an Account Lockout Policy
173
Designing a Password Policy in a Replicated Environment
173
Designing Access Control
174
About the ACI Format
175
Targets
176
Permissions
176
Bind Rules
177
Setting Permissions
178
The Precedence Rule
178
Allowing or Denying Access
178
When to Deny Access
179
Where to Place Access Control Rules
180
Using Filtered Access Control Rules
180
Viewing Acis: Get Effective Rights
181
Using Acis: some Hints and Tricks
182
Database Encryption
184
Securing Connections with SSL and Start TLS
185
Securing Connections with SASL
185
Other Security Resources
186
Chapter 9 Directory Design Examples
187
An Enterprise
187
Data Design
188
Schema Design
188
Directory Tree Design
189
Topology Design
190
Database Topology
191
Server Topology
191
Replication Design
193
Supplier Architecture
193
Supplier Consumer Architecture
194
Security Design
195
Tuning and Optimizations
196
Operations Decisions
196
A Multinational Enterprise and Its Extranet
196
Data Design
197
Schema Design
198
Directory Tree Design
198
Topology Design
200
Database Topology
200
Server Topology
202
Replication Design
204
Supplier Architecture
205
Security Design
207
Advertisement
Advertisement
Related Products
Red Hat DIRECTORY SERVER 7.1 - GATEWAY CUSTOMIZATION
Red Hat DIRECTORY SERVER 7.1 - PLUG-IN PROGRAMMERS
Red Hat DIRECTORY SERVER 7.1
Red Hat DIRECTORY SERVER 7.1 - ADMINISTRATOR
Red Hat DIRECTORY SERVER 8.0
Red Hat DESKTOP
Red Hat 8.1
Red Hat DIRECTORY SERVER 2.0 - GATEWAY
Red Hat DIRECTORY SERVER 7.1 SP7 - S
Red Hat DIRECTORY SERVER 8.1 - 11-01-2010
Red Hat Categories
Software
Server
Desktop
Storage
More Red Hat Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL