Sign In
Upload
Manuals
Brands
Red Hat Manuals
Server
DIRECTORY SERVER 8.0
Red Hat DIRECTORY SERVER 8.0 Manuals
Manuals and User Guides for Red Hat DIRECTORY SERVER 8.0. We have
3
Red Hat DIRECTORY SERVER 8.0 manuals available for free PDF download: Administration Manual, Command Reference Manual, Installation Manual
Red Hat DIRECTORY SERVER 8.0 Administration Manual (552 pages)
Brand:
Red Hat
| Category:
Software
| Size: 5.5 MB
Table of Contents
Directory Server
1
Table of Contents
3
Preface
13
Directory Server Overview
13
Examples and Formatting
14
Additional Reading
15
Giving Feedback
15
Document History
16
General Red hat Directory Server Usage
19
Directory Server File Locations
19
LDAP Tool Locations
21
Starting and Stopping Servers
22
Starting and Stopping Directory Server from the Console
22
Starting and Stopping Directory Server from the Command Line
23
Starting and Stopping Administration Server
23
Starting the Directory Server Console
24
Logging into Directory Server
24
Changing Login Identity
25
Viewing the Current Console Bind DN
26
Changing Directory Server Port Numbers
26
Creating a New Directory Server Instance
27
Configuring the Directory Manager
28
Creating Directory Entries
31
Managing Entries from the Directory Console
31
Creating a Root Entry
31
Creating Directory Entries
32
Creating Other Types of Entries
33
Modifying Directory Entries
34
Adding an Attribute to an Entry
35
Adding very Large Attributes
35
Adding Attribute Values
36
Removing an Attribute Value
36
Adding an Attribute Subtype
37
Deleting Directory Entries
38
Managing Entries from the Command-Line
38
Providing Input from the Command-Line
39
Creating a Root Entry from the Command-Line
40
Adding Entries Using LDIF
40
Adding and Modifying Entries Using Ldapmodify
40
Adding Entries Using Ldapmodify
41
Modifying Entries Using Ldapmodify
42
Deleting Entries Using Ldapdelete
43
Using Special Characters
44
Tracking Modifications to Directory Entries
44
LDIF Update Statements
45
Adding an Entry Using LDIF
46
Renaming an Entry Using LDIF
47
Modifying an Entry Using LDIF
48
Adding Attributes to Existing Entries Using Ldif
49
Changing an Attribute Value Using Ldif
50
Deleting All Values of an Attribute Using Ldif
51
Deleting a Specific Attribute Value Using Ldif
51
Deleting an Entry Using LDIF
52
Modifying an Entry in an Internationalized Directory
52
Maintaining Referential Integrity
52
How Referential Integrity Works
53
Using Referential Integrity with Replication
53
Enabling/Disabling Referential Integrity
54
Modifying the Update Interval
54
Modifying the Attribute List
55
Configuring Directory Databases
57
Creating and Maintaining Suffixes
57
Creating Suffixes
57
Creating a New Root Suffix Using the Console
59
Creating a New Sub Suffix Using the Console
60
Maintaining Suffixes
62
Using Referrals in a Suffix
63
Enabling Referrals Only During Update Operations
63
Creating and Maintaining Databases
64
Creating Databases
64
Creating a New Database for an Existing Suffix Using the Console
66
Adding Multiple Databases for a Single Suffix
67
Maintaining Directory Databases
68
Deleting a Database
70
Configuring Transaction Logs for Frequent Database Updates
71
Database Encryption
72
Encryption Ciphers
73
Configuring Database Encryption from the Console
73
Exporting and Importing an Encrypted Database
74
Creating and Maintaining Database Links
75
Configuring the Chaining Policy
75
Chaining Component Operations
76
Chaining Ldap Controls
79
Creating a New Database Link
80
Creating a Database Link from the Command Line
82
Chaining Using SSL
89
Maintaining Database Links
89
Database Links and Access Control Evaluation
90
Advanced Feature: Tuning Database Link Performance
91
Managing Connections to the Remote Server
92
Detecting Errors During Normal Processing
93
Managing Threaded Operations
94
Advanced Feature: Configuring Cascading Chaining
95
Configuring Cascading Chaining Defaults Using the Console
97
Configuring Cascading Chaining Using the Console
98
Configuring Cascading Chaining from the Command Line
98
Summary of Cascading Chaining Configuration Attributes
100
Cascading Chaining Configuration Example
101
Configuring Server One
102
Configuring Server Two
103
Configuring Server Three
105
Using Referrals
106
Starting the Server in Referral Mode
106
Setting Default Referrals
107
Creating Smart Referrals
108
Creating Suffix Referrals
109
Creating Suffix Referrals Using the Console
110
Creating Suffix Referrals from the Command Line
110
Populating Directory Databases
113
Importing Data
113
Importing Entries with Large Attributes
113
Importing a Database from the Console
113
Initializing a Database from the Console
115
Importing from the Command-Line
115
Exporting Data
118
Exporting Directory Data to LDIF Using the Console
120
Exporting a Single Database to LDIF Using the Console
120
Exporting to LDIF from the Command-Line
121
Backing up and Restoring Data
122
Backing up All Databases
123
Backing up the Dse.ldif Configuration File
124
Restoring All Databases
124
Restoring a Single Database
126
Restoring Databases that Include Replicated Entries
126
Restoring the Dse.ldif Configuration File
127
Managing Entries with Roles, Classes of Service, and Views
129
Using Roles
129
About Roles
129
Managing Roles Using the Console
131
Creating a Filtered Role
132
Creating a Nested Role
133
Modifying a Role Entry
134
Making a Role Inactive
134
Managing Roles Using the Command-Line
135
Using Roles Securely
138
Assigning Classes of Service
139
About Cos
139
About the Cos Definition Entry
140
About the Cos Template Entry
140
How a Pointer Cos Works
141
How an Indirect Cos Works
141
How a Classic Cos Works
142
Managing Cos Using the Console
144
Creating the Cos Template Entry
145
Editing an Existing Cos
146
Managing Cos from the Command-Line
147
Example of a Pointer Cos
150
Example of an Indirect Cos
151
Example of a Classic Cos
151
Creating Role-Based Attributes
154
Access Control and Cos
155
Using Views
155
Creating Views in the Console
156
Deleting Views from the Directory Server Console
157
Creating Views from the Command Line
157
Deleting Views from the Command Line
157
Using Groups
158
Managing Static Groups
158
Managing Dynamic Groups
159
Modifying a Dynamic Group
160
Managing Access Control
161
Access Control Principles
161
ACI Structure
161
ACI Placement
161
ACI Evaluation
162
ACI Limitations
162
Default Acis
163
Creating Acis Manually
164
The ACI Syntax
164
Defining Targets
165
Targeting a Directory Entry
166
Targeting Attributes
167
Targeting both an Entry and Attributes
168
Targeting Entries or Attributes Using Ldap Filters
168
Targeting Attribute Values Using Ldap Filters
169
Defining Permissions
170
Allowing or Denying Access
171
Assigning Rights
171
Rights Required for Ldap Operations
172
Permissions Syntax
173
Access Control and the Modrdn Operation
173
Bind Rules
174
Bind Rule Syntax
174
Defining User Access - Userdn Keyword
175
Ldap Urls
176
Defining Group Access - Groupdn Keyword
178
Defining Role Access - Roledn Keyword
179
Defining Access Based on Value Matching
179
Using the Userattr Keyword with Inheritance
182
Granting Add Permission Using the Userattr Keyword
183
Defining Access from a Specific IP Address
184
Defining Access from a Specific Domain
185
Defining Access at a Specific Time of Day or Day of Week
185
Defining Access Based on Authentication Method
187
Using Boolean Bind Rules
188
Creating Acis from the Console
188
Displaying the Access Control Editor
189
Creating a New ACI
191
Editing an ACI
196
Deleting an ACI
197
Viewing Acis
197
Get Effective Rights Control
197
Using Get Effective Rights from the Command-Line
199
Using Get Effective Rights from the Console
201
Get Effective Rights Return Codes
201
Logging Access Control Information
202
Access Control Usage Examples
202
Granting Anonymous Access
203
Granting Write Access to Personal Entries
205
Restricting Access to Key Roles
207
Granting a Group Full Access to a Suffix
209
Granting Rights to Add and Delete Group Entries
210
Granting Conditional Access to a Group or Role
212
Denying Access
213
Setting a Target Using Filtering
215
Allowing Users to Add or Remove Themselves from a Group
216
Defining Permissions for Dns that Contain a Comma
217
Proxied Authorization ACI Example
217
Advanced Access Control: Using Macro Acis
218
Macro ACI Example
218
Macro ACI Syntax
220
Access Control and Replication
223
Compatibility with Earlier Releases
223
Managing User Accounts and Passwords
225
Managing the Password Policy
225
Configuring the Password Policy
225
Configuring a Global Password Policy Using the Console
226
Setting User Passwords
235
Password Change Extended Operation
235
Configuring the Account Lockout Policy
237
Managing the Password Policy in a Replicated Environment
239
Synchronizing Passwords
240
Inactivating Users and Roles
240
Inactivating User and Roles Using the Console
241
Inactivating User and Roles Using the Command-Line
241
Activating User and Roles Using the Console
242
Activating User and Roles Using the Command-Line
242
Setting Resource Limits Based on the Bind DN
242
Setting Resource Limits Using the Console
243
Setting Resource Limits Using the Command-Line
243
Managing Replication
245
Replication Overview
245
What Directory Units Are Replicated
245
Read-Write and Read-Only Replicas
245
Suppliers and Consumers
245
Changelog
246
Replication Identity
246
Replication Agreement
247
Replicating Attributes with Fractional Replication
247
Compatibility with Earlier Versions of Directory Server
247
Replication Scenarios
248
Single-Master Replication
248
Multi-Master Replication
249
Cascading Replication
251
Creating the Supplier Bind DN Entry
253
Configuring Single-Master Replication
254
Configuring the Read-Write Replica on the Supplier Server
254
Configuring the Read-Only Replica on the Consumer
256
Create the Replication Agreement
258
Configuring Multi-Master Replication
264
Configuring the Read-Write Replicas on the Supplier Servers
264
Configuring the Read-Only Replicas on the Consumer Servers
267
Setting up the Replication Agreements
269
Preventing Monopolization of the Consumer in Multi-Master Replication
275
Configuring Cascading Replication
276
Configuring the Read-Write Replica on the Supplier Server
276
Configuring the Read-Only Replica on the Consumer Server
278
Configuring the Read-Only Replica on the Hub
280
Setting up the Replication Agreements
283
Configuring Replication from the Command Line
289
Configuring Suppliers from the Command Line
289
Configuring Consumers from the Command Line
292
Configuring Hubs from the Command Line
293
Configuring Replication Agreements from the Command Line
294
Initializing Consumers Online from the Command Line
297
Making a Replica Updatable
298
Deleting the Changelog
298
Removing the Changelog
298
Moving the Changelog to a New Location
299
Initializing Consumers
299
When to Initialize a Consumer
300
Online Consumer Initialization Using the Console
300
Initializing Consumers Online Using the Command Line
301
Manual Consumer Initialization Using the Command Line
301
Filesystem Replica Initialization
302
Initializing the Consumer Replica from the Backup Files
303
Forcing Replication Updates
304
Forcing Replication Updates from the Console
304
Forcing Replication Updates from the Command-Line
305
Replicating Account Lockout Attributes
306
Configuring Directory Server to Replicate Password Policy Attributes
306
Configuring Fractional Replication for Password Policy Attributes
307
Replication over SSL
307
Replicating O=Netscaperoot for Administration Server Failover
308
Replication with Earlier Releases
309
Using the Retro Changelog Plug-In
310
Enabling the Retro Changelog Plug-In
311
Trimming the Retro Changelog
312
Searching and Modifying the Retro Changelog
312
Retro Changelog and the Access Control Policy
312
Monitoring Replication Status
313
Monitoring Replication Status from the Directory Server Console
313
Monitoring Replication Status from Administration Express
314
Solving Common Replication Conflicts
316
Solving Naming Conflicts
316
Solving Orphan Entry Conflicts
318
Solving Potential Interoperability Problems
319
Troubleshooting Replication-Related Problems
319
Extending the Directory Schema
325
Overview of Extending Schema
325
Managing Attributes
325
Viewing Attributes
325
Creating Attributes
327
Editing Attributes
327
Deleting Attributes
328
Managing Object Classes
328
Viewing Object Classes
328
Creating Object Classes
330
Editing Object Classes
331
Deleting Object Classes
332
Turning Schema Checking on and off
332
Managing Indexes
335
About Indexes
335
About Index Types
335
About Default, System, and Standard Indexes
336
Overview of System Indexes
338
Overview of Standard Indexes
338
Overview of the Searching Algorithm
339
Approximate Searches
340
Balancing the Benefits of Indexing
340
Creating Indexes
342
Creating Indexes from the Server Console
342
Creating Indexes from the Command-Line
343
Creating Browsing Indexes from the Server Console
346
Creating Browsing Indexes from the Command-Line
346
Running the Vlvindex Script
348
Deleting Indexes
349
Deleting Indexes from the Server Console
350
Deleting Indexes from the Command-Line
350
Deleting an Index Entry
351
Deleting Browsing Indexes from the Server Console
352
Deleting Browsing Indexes from the Command-Line
352
Deleting a Browsing Index Entry
353
Managing Indexes
354
Indexing Performance
355
Search Performance
355
Backwards Compatibility and Migration
356
Attribute Name Quick Reference Table
357
Managing SSL
359
Introduction to TLS/SSL in the Directory Server
359
Enabling SSL: Summary of Steps
359
Command-Line Functions for Start TLS
360
Obtaining and Installing Server Certificates
361
Step 1: Generate a Certificate Request
362
Step 2: Send the Certificate Request
365
Step 3: Install the Certificate
366
Step 4: Trust the Certificate Authority
367
Step 5: Confirm that the New Certificates Are Installed
367
Using Certutil
368
Creating Directory Server Certificates through the Command Line
368
Certutil Usage
370
Starting the Server with TLS/SSL Enabled
371
Enabling TLS/SSL Only in the Directory Server
371
Enabling TLS/SSL in the Directory Server, Administration Server, and Console
373
Creating a Password File for the Directory Server
375
Creating a Password File for the Administration Server
375
Setting Security Preferences
376
Available Ciphers
376
Selecting the Encryption Cipher
378
Using Certificate-Based Authentication
378
Setting up Certificate-Based Authentication
379
Allowing/Requiring Client Authentication
380
Configuring LDAP Clients to Use SSL
380
Managing SASL
383
Authentication Mechanisms
383
SASL Identity Mapping
384
Configuring SASL Identity Mapping from the Console
385
Configuring SASL Identity Mapping from the Command-Line
387
Configuring Kerberos
387
Realms
387
Configuring the KDC Server
388
Example: Configuring an Example KDC Server
389
Configuring SASL Authentication at Directory Server Startup
389
Monitoring Server and Database Activity
391
Viewing and Configuring Log Files
391
Defining a Log File Rotation Policy
391
Defining a Log File Deletion Policy
392
Access Log
393
Error Log
394
Configuring the Error Log
395
Audit Log
396
Manual Log File Rotation
397
Monitoring Server Activity
397
Monitoring the Server from the Directory Server Console
397
Monitoring the Directory Server from the Command Line
401
Monitoring Database Activity
403
Monitoring Database Activity from the Directory Server Console
403
Monitoring Databases from the Command Line
406
Monitoring Database Link Activity
408
Monitoring Directory Server Using SNMP
411
About SNMP
411
Configuring the Master Agent
412
Configuring the Subagent
412
Subagent Configuration File
412
Starting the Subagent
413
Testing the Subagent
413
Configuring SNMP Traps
414
Configuring the Directory Server for SNMP
414
Using the Management Information Base
415
Operations Table
415
Entries Table
417
Entity Table
417
Interaction Table
418
Tuning Directory Server Performance
421
Tuning Server Performance
421
Tuning Database Performance
422
Optimizing Search Performance
422
Tuning Transaction Logging
423
Changing the Location of the Database Transaction Log
424
Changing the Database Checkpoint Interval
424
Disabling Durable Transactions
425
Specifying Transaction Batching
425
Miscellaneous Tuning Tips
426
Avoid Creating Entries under the Cn=Config Entry in the Dse.ldif File
426
Administering Directory Server Plug-Ins
427
Server Plug-In Functionality Reference
427
7-Bit Check Plug-In
427
ACL Plug-In
427
ACL Preoperation Plug-In
428
Binary Syntax Plug-In
428
Boolean Syntax Plug-In
428
Case Exact String Syntax Plug-In
429
Case Ignore String Syntax Plug-In
429
Chaining Database Plug-In
430
Class of Service Plug-In
430
Country String Syntax Plug-In
430
Distinguished Name Syntax Plug-In
431
Generalized Time Syntax Plug-In
431
Integer Syntax Plug-In
432
Internationalization Plug-In
432
Ldbm Database Plug-In
433
Legacy Replication Plug-In
433
Multi-Master Replication Plug-In
434
Octet String Syntax Plug-In
434
CLEAR Password Storage Plug-In
434
CRYPT Password Storage Plug-In
435
NS-MTA-MD5 Password Storage Plug-In
435
SHA Password Storage Plug-In
436
SSHA Password Storage Plug-In
437
Postal Address String Syntax Plug-In
437
PTA Plug-In
437
Referential Integrity Postoperation Plug-In
438
Retro Changelog Plug-In
439
Roles Plug-In
440
Space Insensitive String Syntax Plug-In
440
State Change Plug-In
441
Telephone Syntax Plug-In
441
UID Uniqueness Plug-In
441
URI Plug-In
442
Enabling and Disabling Plug-Ins
443
Using the Pass-Through Authentication Plug-In
445
How Directory Server Uses PTA
445
PTA Plug-In Syntax
446
Configuring the PTA Plug-In
448
Turning the Plug-In on or off
449
Configuring the Servers to Use a Secure Connection
449
Specifying the Authenticating Directory Server
449
Specifying the Pass-Through Subtree
450
Configuring the Optional Parameters
451
PTA Plug-In Syntax Examples
451
Specifying One Authenticating Directory Server and One Subtree
452
Specifying Multiple Authenticating Directory Servers
452
Specifying One Authenticating Directory Server and Multiple Subtrees
452
Using Non-Default Parameter Values
453
Specifying Different Optional Parameters and Subtrees for Different Authenticating Directory Servers
453
Using the Attribute Uniqueness Plug-In
455
Overview of the Attribute Uniqueness Plug-In
455
Attribute Uniqueness Plug-In Syntax
456
Creating an Instance of the Attribute Uniqueness Plug-In
457
Configuring Attribute Uniqueness Plug-Ins
458
Viewing Plug-In Configuration Information
458
Configuring Attribute Uniqueness Plug-Ins from the Directory Server Console
459
Configuring Attribute Uniqueness Plug-Ins from the Command-Line
459
Specifying a Suffix or Subtree
460
Attribute Uniqueness Plug-In Syntax Examples
461
Specifying One Attribute and One Subtree
462
Specifying One Attribute and Multiple Subtrees
462
Replication and the Attribute Uniqueness Plug-In
462
Simple Replication Scenario
463
Multi-Master Replication Scenario
463
Synchronizing Red hat Directory Server with Microsoft Active Directory
465
About Windows Sync
465
Configuring Windows Sync
467
Step 1: Configure SSL on Directory Server
467
Step 2: Configure the Active Directory Domain
468
Step 3: Select or Create the Sync Identity
469
Step 4: Install and Configure the Password Sync Service
469
Step 5: Configure the Password Sync Service
471
Step 6: Configure the Directory Server Database for Synchronization
472
Step 7: Create the Synchronization Agreement
473
Step 7: Begin Synchronization
475
Using Windows Sync
475
Synchronizing Users
475
Synchronizing Groups
478
Deleting Entries
479
Resurrecting Entries
479
Manually Updating and Resynchronizing Entries
480
Checking Synchronization Status
480
Modifying the Sync Agreement
480
Schema Differences
481
Password Policies
481
Groups
481
Values for Street and Streetaddress
481
Contraints on the Initials Attribute
482
Password Sync Service
482
Modifying Password Sync
482
Starting and Stopping the Password Sync Service
482
Uninstalling Password Sync Service
482
Troubleshooting
483
LDAP Data Interchange Format
485
About the LDIF File Format
485
Continuing Lines in LDIF
486
Representing Binary Data
486
Standard LDIF Notation
487
Base-64 Encoding
487
Specifying Directory Entries Using LDIF
488
Specifying Domain Entries
488
Specifying Organizational Unit Entries
489
Specifying Organizational Person Entries
490
Defining Directories Using LDIF
491
LDIF File Example
492
Storing Information in Multiple Languages
493
Finding Directory Entries
495
Finding Entries Using the Directory Server Console
495
Using Ldapsearch
496
Using Special Characters
497
Ldapsearch Command-Line Format
497
Commonly Used Ldapsearch Options
498
Ldapsearch Examples
499
LDAP Search Filters
502
Search Filter Syntax
502
Searching an Internationalized Directory
505
Matching Rule Filter Syntax
506
Supported Search Types
508
International Search Examples
509
LDAP Urls
513
Components of an LDAP URL
513
Escaping Unsafe Characters
514
Examples of LDAP Urls
515
Internationalization
517
About Locales
517
Identifying Supported Locales
518
Supported Language Subtypes
519
Troubleshooting Matching Rules
520
Glossary
523
Index
537
Advertisement
Red Hat DIRECTORY SERVER 8.0 Command Reference Manual (278 pages)
Brand:
Red Hat
| Category:
Software
| Size: 2.18 MB
Table of Contents
Table of Contents
3
Command Reference
1
About this Reference
7
Directory Server Overview
7
Examples and Formatting
7
Additional Reading
8
Giving Feedback
9
Document History
9
Introduction
11
Directory Server Configuration
11
Directory Server Instance File Reference
11
Using Directory Server Command-Line Utilities
11
Using Directory Server Command-Line Scripts
11
Core Server Configuration Reference
13
Server Configuration - Overview
13
LDIF and Schema Configuration Files
14
How the Server Configuration Is Organized
16
Configuration of Databases
17
Configuration of Indexes
17
Accessing and Modifying Server Configuration
18
Access Control for Configuration Entries
18
Changing Configuration Attributes
18
Modifying Configuration Entries Using Ldap
19
Restrictions to Modifying Configuration Entries and Attributes
19
Core Server Configuration Attributes Reference
20
Cn=Config
21
Disk Space
32
Password Policy
52
Cn=Changelog5
72
Cn=Encryption
75
2.3.3.4. Nsssl3
76
Cn=Features
77
Cn=Mapping Tree
77
Suffix Configuration Attributes under Cn="Suffixname
77
Default Value
78
Entry DN
78
Replication Attributes under Cn=Replicationagreementname, Cn=Replica, Cn="Suffixname", Cn=Mapping Tree, Cn=Config
84
Example
78
Parameter Entry DN Valid Values
78
Replication Attributes under Cn=Replica, Cn="Suffixdn", Cn=Mapping Tree, Cn=Config
78
Syntax
78
Valid Values
78
Description
84
Synchronization Attributes under Cn=Syncagreementname, Cn=Windowsreplica,Cn="Suffixname", Cn=Mapping Tree, Cn=Config
93
On | off
94
Cn=Monitor
95
Cn=Replication
97
Cn=Snmp
97
Directorystring Nsssl2: off
97
Description
97
On | off
97
Directorystring
97
SNMP Statistic Attributes
99
Cn=Tasks
101
Cn=Uniqueid Generator
101
Plug-In Implemented Server Functionality Reference
103
Server Plug-In Functionality Reference
103
7-Bit Check Plug-In
103
ACL Plug-In
104
ACL Preoperation Plug-In
104
Attribute Uniqueness Plug-In
105
Binary Syntax Plug-In
105
Boolean Syntax Plug-In
106
Case Exact String Syntax Plug-In
106
Case Ignore String Syntax Plug-In
107
Chaining Database Plug-In
107
Class of Service Plug-In
107
Country String Syntax Plug-In
108
Distinguished Name Syntax Plug-In
108
Generalized Time Syntax Plug-In
109
HTTP Client Plug-In
109
Integer Syntax Plug-In
109
Internationalization Plug-In
110
JPEG Syntax Plug-In
110
Ldbm Database Plug-In
111
Legacy Replication Plug-In
111
Multi-Master Replication Plug-In
112
Octet String Syntax Plug-In
112
OID Syntax Plug-In
112
CLEAR Password Storage Plug-In
113
CRYPT Password Storage Plug-In
113
NS-MTA-MD5 Password Storage Scheme Plug-In
114
SHA Password Storage Scheme Plug-In
114
SSHA Password Storage Scheme Plug-In
115
Postal Address String Syntax Plug-In
115
PTA Plug-In
116
Referential Integrity Postoperation Plug-In
116
Retro Changelog Plug-In
117
Roles Plug-In
118
Space Insensitive String Syntax Plug-In
118
State Change Plug-In
119
Telephone Syntax Plug-In
119
URI Syntax Plug-In
120
Views Plug-In
120
List of Attributes Common to All Plug-Ins
121
Nsslapd-Pluginpath
121
Nsslapd-Plugininitfunc
121
Nsslapd-Plugintype
121
Nsslapd-Pluginenabled
122
Nsslapd-Pluginid
122
Nsslapd-Pluginversion
122
Nsslapd-Pluginvendor
122
Nsslapd-Plugindescription
123
Attributes Allowed by Certain Plug-Ins
123
Nsslapd-Pluginloadnow
123
Nsslapd-Pluginloadglobal
123
Nsslapd-Plugin-Depends-On-Type
123
Nsslapd-Plugin-Depends-On-Named
124
Database Plug-In Attributes
124
Cn=Config
137
Database Attributes under Cn=Netscaperoot, Cn=Ldbm Database, Cn=Plugins Cn=Config and Cn=Userroot, Cn=Ldbm Database, Cn=Plugins, Cn=Config
138
Database Attributes under Cn=Database, Cn=Monitor, Cn=Ldbm Database Cn=Plugins, Cn=Config
141
Database Attributes under Cn=Default Indexes, Cn=Config, Cn=Ldbm Database Cn=Plugins, Cn=Config
143
Cn=Plugins, Cn=Config
145
Database Attributes under Cn=Attributename, Cn=Encrypted Attributes Cn=Database_Name, Cn=Ldbm Database, Cn=Plugins, Cn=Config
146
Database Link Plug-In Attributes (Chaining Attributes)
147
Cn=Config
148
Database, Cn=Plugins, Cn=Config
150
Database, Cn=Plugins, Cn=Config
154
Cn=Chaining Database, Cn=Plugins, Cn=Config
155
Retro Changelog Plug-In Attributes
156
Nsslapd-Changelogdir
157
Nsslapd-Changelogmaxage (Max Changelog Age)
157
Overview of Directory Server Files
159
Backup Files
160
Configuration Files
161
Database Files
161
LDIF Files
162
Lock Files
162
Log Files
163
PID Files
163
Tools
163
Scripts
164
Access Log Content
165
Access Logging Levels
166
Default Access Logging Content
166
Connection Number
167
File Descriptor
167
Method Type
167
Operation Number
167
Slot Number
167
Error Number
168
Tag Number
168
Version Number
168
Elapsed Time
169
Ldap Request Type
169
Ldap Response Type
169
Number of Entries
169
Unindexed Search Indicator
170
Extended Operation Oid
171
Search Scope
171
Abandon Message
172
Change Sequence Number
172
Access Log Content for Additional Access Logging Levels
173
Common Connection Codes
174
LDAP Result Codes
175
Using Special Characters
177
Command-Line Utilities Quick Reference
178
Ldapsearch
178
Additional Ldapsearch Options
189
Ldapmodify
192
Ssl Options
194
Ldapdelete
198
Ldappasswd
203
Ldif
209
Dbscan
210
Command-Line Scripts Quick Reference
213
Shell Scripts
215
Bak2Db (Restores a Database from Backup)
216
Cl-Dump (Dumps and Decodes the Changelog)
216
Dbverify (Checks for Corrupt Databases)
217
Db2Bak (Creates a Backup of a Database)
218
Db2Ldif (Exports Database Contents to LDIF)
218
Db2Index (Reindexes Database Index Files)
219
Ldif2Db (Import)
220
Ldif2Ldap (Performs Import Operation over LDAP)
222
Pwdhash (Prints Encrypted Passwords)
222
Monitor (Retrieves Monitoring Information)
223
Repl-Monitor (Monitors Replication Status)
223
Configuration File Format
224
Restart-Slapd (Restarts the Directory Server)
225
Restoreconfig (Restores Administration Server Configuration)
226
Saveconfig (Saves Administration Server Configuration)
226
Start-Slapd (Starts the Directory Server)
227
Stop-Slapd (Stops the Directory Server)
227
Suffix2Instance (Maps a Suffix to a Backend Name)
228
Vlvindex (Creates Virtual List View Indexes)
228
Perl Scripts
229
Bak2Db.pl (Restores a Database from Backup)
229
Cl-Dump.pl (Dumps and Decodes the Changelog)
230
Db2Bak.pl (Creates a Backup of a Database)
231
Db2Index.pl (Creates and Generates Indexes)
231
Db2Ldif.pl (Exports Database Contents to LDIF)
232
Ldif2Db.pl (Import)
233
Logconv.pl (Log Converter)
234
Ns-Accountstatus.pl (Establishes Account Status)
237
Ns-Activate.pl (Activates an Entry or Group of Entries)
238
Ns-Inactivate.pl (Inactivates an Entry or Group of Entries)
238
Ns-Newpwpolicy.pl (Adds Attributes for Fine-Grained Password Policy)
239
Repl-Monitor.pl (Monitors Replication Status)
240
Verify-Db.pl (Check for Corrupt Databases)
242
A.2. Finding and Executing the Ns-Slapd Command-Line Utilities
245
A.3. Utilities for Exporting Databases: Db2Ldif
245
A.4. Utilities for Restoring and Backing up Databases: Ldif2Db
247
A.5. Utilities for Restoring and Backing up Databases: Archive2Db
248
A.6. Utilities for Restoring and Backing up Databases: Db2Archive
249
A.7. Utilities for Creating and Regenerating Indexes: Db2Index
249
Red Hat DIRECTORY SERVER 8.0 Installation Manual (128 pages)
Brand:
Red Hat
| Category:
Server
| Size: 0.8 MB
Table of Contents
Installation Guide
1
Table of Contents
3
Preface
5
Examples and Formatting
5
Additional Reading
7
Giving Feedback
7
Document History
8
Preparing for a Directory Server Installation
9
Directory Server Components
9
Considerations before Setting up Directory Server
9
Port Numbers
9
Directory Server User and Group
10
Directory Manager
11
Directory Administrator
11
Administration Server User
12
Directory Suffix
12
Configuration Directory
12
Administration Domain
12
About the Setup-Ds-Admin.pl Script
13
Overview of Setup
16
System Requirements
21
Hardware Requirements
21
Operating System Requirements
21
Using Dsktune
22
Red hat Enterprise Linux 4 and 5
23
Red hat Enterprise Linux System Configuration
24
HP-UX 11I
25
Kernel Parameters
26
Sun Solaris 9
28
File Descriptors
31
Setting up Red hat Directory Server on Red hat Enterprise Linux
33
Installing the JRE
34
Installing the Directory Server Packages
34
Express Setup
36
Typical Setup
38
Custom Setup
41
Setting up Red hat Directory Server on HP-UX 11I
47
Installing the JRE
47
Installing the Directory Server Packages
48
Express Setup
48
Typical Setup
51
Custom Setup
54
Setting up Red hat Directory Server on Sun Solaris
59
Installing the JRE
59
Installing the Directory Server Packages
60
Installing Individual Packages
60
Installing from an ISO Image
62
Express Setup
62
Typical Setup
65
Custom Setup
68
Advanced Setup and Configuration
73
Working with Administration Server Instances
73
Configuring IP Authorization on the Administration Server
73
Configuring Proxy Servers for the Administration Server
74
Working with Directory Server Instances
74
Creating a New Directory Server Instance
74
Alternate) Installing Directory Server with Setup-Ds
75
Registering an Existing Directory Server Instance with the Configuration Directory Server
75
Updating and Re-Registering Directory Server Instances
75
Silent Setup
75
Silent Setup for Directory Server and Administration Server
76
Silent Directory Server Instance Creation
77
Sending Parameters in the Command Line
78
Using the Configfile Parameter to Configure the Directory Server
80
About .Inf File Parameters
81
Uninstalling Directory Server
87
Removing a Single Directory Server Instance
87
Uninstalling Directory Server
88
General Usage Information
91
Directory Server File Locations
91
LDAP Tool Locations
92
Starting the Directory Server Console
93
Getting the Administration Server Port Number
93
Starting and Stopping Servers
94
Starting and Stopping Directory Server
94
Starting and Stopping Administration Server
94
Resetting the Directory Manager Password
94
Troubleshooting
95
Running Dsktune
95
Common Installation Problems
96
Migrating from Previous Versions
99
Migration Overview
99
About Migrate-Ds-Admin.pl
100
Before Migration
103
Backing up the Directory Server Configuration
103
Configuring the Directory Server Console
103
Migration Scenarios
104
Migrating a Server or Single Instance
104
Migrating Replicated Servers
105
Migrating a Directory Server from One Machine to Another
107
Migrating a Directory Server from One Platform to Another
108
Glossary
111
Advertisement
Advertisement
Related Products
Red Hat DIRECTORY SERVER 7.1 - GATEWAY CUSTOMIZATION
Red Hat DIRECTORY SERVER 7.1 - PLUG-IN PROGRAMMERS
Red Hat DIRECTORY SERVER 7.1
Red Hat DIRECTORY SERVER 7.1 - DEPLOYMENT
Red Hat DIRECTORY SERVER 7.1 - ADMINISTRATOR
Red Hat DIRECTORY SERVER 8.1 - 11-01-2010
Red Hat DESKTOP
Red Hat 8.1
Red Hat DIRECTORY SERVER 2.0 - GATEWAY
Red Hat DIRECTORY SERVER 7.1 SP7 - S
Red Hat Categories
Software
Server
Storage
Desktop
More Red Hat Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL