[Previous] [Contents]
Index
A
- access
- anonymous 58, 71
- determining general types of 71
- precedence rule 60
- restricting by physical location 72
- access rules
- overview 55
- access-control
- branching to support 87
- planning 24
- access-control information (ACI) 59
- bind rules 64, 65, 66
- filtered rules 63, 87
- format 64-69
- in the directory tree 87
- permission 64
- target 64, 65
- usage advice 67
- where to place 62, 127
- access-control list (ACL) 59
- defined 59
- permissions 59
- ACI, See access-control information
- ACL, See access-control list
- adding object classes 47
- strategies 48
- allow permissions 61
- usage advice 61
- analyzing the site survey 34
- anonymous access 71
- for read 38
- overview 58
- API, server 143
- applications 31
- architecture 16
- attribute 42
- overview 44-46
- required and allowed 44
- values 45
- attribute-data pair 29, 42
- authentication 55, 57
- certification-based 56
- overview 55
- root DN 59
- with Directory Server NT 57
B
- base distinguished name 20
- bind DN 55
- bind rules 64, 65, 66
- binding to the directory 55
- anonymously 58
- certificate-based 56
- branch point 76
- DN attributes 82
- searching 84
- traditional 84
- for access-control 87
- for international trees 88
- for replication and referrals 86
- network names 86
- strategies 85
- usage advice 82
C
- c attribute 89
- C SDK 142
- cascading replication 97
- certificate-based authenticate 56
- changelog 103
- circular groups 71
- clients 15
- API 140
- bind algorithm 56
- referrals and 123
- SDK 142
- cn attribute 42, 43, 89, 147
- commonName attribute 42, 43, 89, 91
- consumer server 94, 95
- consumer servers 95
- consumer-initiated replication 101
- required directory entries 103
- conventions, in this book x
- country attribute 62, 89
- custom filters 139
- strategies 140
- custom LDAP clients 139
- building 141
- custom programs 139
- client SDKs 142
- clients, building 141
- customizing the directory service 139
- customizing the schema 40, 47-52
- being consistent 50
- FAQ 51
D
- data access 37
- data management
- local management example 133
- planning 24
- replication example 112
- data mastering 34
- for multiple applications 35
- for replication 35, 108
- data migration 140
- data ownership 36
- database 16
- access rules 55
- replacing 143
- with ISPs 79
- database plug-in 16, 143
- default permissions 60
- deny permissions 60
- usage advice 61
- when to use 61
- deployment advice 25
- Directory Access Protocol (DAP) 14
- directory applications 31
- browsers 31
- email 31
- directory data 27-40
- access 37
- characteristics 29
- creating 149
- entry size 107
- examples of 30
- mastering 34
- for multiple applications 35
- for replication 35
- model 45
- ownership 36
- planning 28, 31
- site survey 33-40
- representation 42
- what not to include 30
- directory deployment team 33
- directory design
- activities 24
- advice 23
- examples
- extranet 137
- international corporation 131-137
multiple suffix, local data management 134
single suffix, global replication 131
single suffix, local data management 133
- small organization 126
- state government 129
- directory entries
- creating 149
- directory information tree 17
- directory of directories 135
- directory schema 40
- directory service 12-15
- extending 139
- global 14
- LDAP 15
- n+1 problem 13
- Netscape solution 16
- uses of 13
- X.500 14, 129
- directory suffix 76
- country root point 78
- planning 78
- recommended 79, 146
- directory tree 17, 75-91
- branch point 76, 126, 129
- DN attributes 82
searching 84
traditional 84
- for access-control 87
- for international trees 88
- for replication and referrals 86
- network names 86
- strategies 85
- usage advice 82
- consumer 95
- design advice 147
- overview 76
- planning 25
- populating 149
- replicated 96
- suffix 76, 126, 129
- country root point 78
- planning 78
- recommended 79, 146
- supplier 95
- distinguished name 18
- name collision 90
- avoiding 147
- naming non-person entries 91
- naming person entries 89
- usage advice 147
- DIT 17
- DN, See distinguished name
- DNS 13, 104
- network sort 105
- round robin 104
E
- email applications 31
- enterprise 12
- examples
- directory design 125-138
- extranet 137
- international corporation 131-137
multiple suffix, local data management 134
single suffix, global replication 131
single suffix, local data management 133
- small organization 126
- state government 129
- replication
- large sites 111
- load balancing server traffic 113
- local data management 112
- messaging traffic 115
- small sites 111
- extended operations 142, 143
- extending the directory service 139
- extending the schema 47
- FAQ 51
- extranet
- example 137
- replication 99
- smart referrals 121
F
- filtered access-control rules 63
- fonts, in this book x
G
- global directory services 14
- group attribute 62
- groups
- circular 71
- examples 127
- naming 91
- nested 71
- planning 25, 69
- usage advice 71
H
- highly available directory services 103
I
- index 116
- inetOrgPerson attribute 62
- inheritance, in object classes 43
- international enterprise
- branching to support 88
- interoperating with legacy directories 140
J
- java SDK 142
L
- LDAP, See Lightweight Directory Access Protocol
- LDAP client API 140
- LDAP Data Interchange Format (LDIF) 149
- LDIF 149
- legacy directory, interoperating with 140
- Lightweight Directory Access Protocol (LDAP) 15
- client 15
- API 140
- authentication 55
anonymous 58
certificate-based 56
- custom 139
- custom, building 141
- custom operations 142
- directory service architecture 15
- directory services 15
- extended operations 142
- referral handling 123
- server 15
- load balancing
- the network 107
- the server 106
- local data management 133
M
- mail attribute 90
- mastering directory data 34
- for multiple applications 35
- for replication 35
- migrating directory data 140
- multiple suffixes 77
- with enterprises 80
- with extranets 81
- with ISPs 79
N
- n+1 directory problem 13
- name collision 90
- avoiding 147
- nested groups 71
- Netscape Directory Server 11, 15-17
- API 143
- architecture 16
- authentication 55
- anonymous 58
- certificate-based 56
- capabilities 15
- concepts 17-21
- database 16
- deployment advice 25
- extended operations 142
- extending 139, 143
- load balancing 106
- performance 105
- plug-ins 139
- security policy 54
- Netscape Messaging Server
- indexes, required 116
- replication example 115
- network names, branching to reflect 86
- network sort 105
- network, load balancing 107
- non-person entries
- naming 91
O
- object class 42
- adding new 47
- inheritance 43
- overview 43-44
- standard 43
- object class violation 44
- organization attribute 62
- organizationalPerson object class 43
- organizationalUnit attribute 62
- organizations, naming 91
P
- passwords, NT Directory Server and 57
- performance (server) 105
- permissions 60
- ACL and 59
- allow 61
- bind rules 64, 65, 66
- default 60
- deny 60
- when to use 61
- on ACIs 64
- precedence rule 60
- usage advice 61
- persistent search 142
- person entries, naming 89
- planning
- access-control 24
- data management 24
- directory contents 24
- directory data 28
- site survey 33-40
analyzing 34
documenting 39
- directory tree 25
- groups 25
- referrals 25
- replication 25
- planning directory data 31
- what to consider 32
- plug-in 16, 139
- server, writing 143
- points of access 72
- populating the directory 149
- precedence rule 60
Q
- quick deployment 145-150
R
- RDN, See relative distinguished name 89
- referrals 77, 117-124
- branching to support 86
- client handling 123
- handling by LDAP client 123
- overview 118
- planning 25
- smart referrals
- client handling 123
- how to use 121
- overview 118
- usages 121
- when returned 118
- relational database 143
- relative distinguished name (RDN) 89
- non-person entries 91
- person entries 89
- replication 93-103
- agreement 101
- architecture 94
- branching to support 86
- cascading 97
- consumer server 94, 95
- consumer-initiated 101
- directory trees 96
- examples
- large sites 111
- load balancing server traffic 113
- local data management 112
- messaging traffic 115
- small sites 111
- extranet 99
- for high availability 103
- initiating synchronization 101
- load balancing 105
- the network 107
- the server 106
- local availability 108
- modifying data 95
- multiple subtrees 99
- overview 94
- planning 25
- single master 94
- strategies 109
- example 131
- subtrees 99
- supplier server 94, 95
- supplier-initiated 101
- replication master 131
- root distinguished name 20
- root DN 20
- authentication 59
- defined 59
- password 59
- root DSE 76
- root entry 19, 126, 129
- root password 59
S
- schema 40, 41-52
- customizing 40, 47-52
- being consistent 50
- FAQ 51
- deleting standard elements 47
- extending 47
- overview 42-46
- schema checking 45
- overview 46
- SDK, See software developer kits
- secure sockets layer 21, 56
- security policy 38, 53
- creating 69-73
- overview 54
- server database 16
- server performance 105
- server plug-in 143
- site survey 33-40
- analyzing 34
- documenting 39
- multinational enterprises 33
- network capabilities 109
- smart referral 77
- client handling 123
- example 130, 136
- how to use 121
- overview 118
- usages 121
- sn attribute 43
- software developer kits (SDKs) 142
- SSL (see Secure Sockets Layer)
- standard object classes 43
- streetAddress attribute 43
- styles, in this book x
- subtree replication 99
- multiple subtrees 99
- suffix 18, 76, 126, 129
- country root point 78
- multiple 77
- with extranets 81
- with ISPs 79
- with large enterprises 80
- planning 78
- recommended 79, 146
- suitespot settings, creating 148
- supplier DN 102
- supplier servers 94, 95
- capabilities of 95
- synchronization and 101
- supplier-initiated replication 101
- required directory entries 102
- surname attribute 43
T
- telephoneNumber attribute 43
- terms, in this book x
- top object class 43
U
- uid attribute 43, 90
- user authentication 55
- user IDs 148
- userPassword attribute 43
X
- X.500 14, 51, 82, 83
- X.500, coexisting with 129
[Previous] [Contents]
Last Updated: 02/17/98 15:47:55
Copyright © 1997
Netscape Communications Corporation