Show Table of Contents
Index
A
- access control
- and directory manager, Setting Access Controls on Directory Manager
- compatibility with earlier versions, Compatibility with Previous Releases
- logging information, Logging Access Control Information
- roles, Using Roles Securely
- viewing
- get effective rights, Checking Access Rights on Entries (Get Effective Rights)
- Access Control
- access log
- changing location and name
- in the command line, Changing the Log Location in the Command Line
- in the Console, Changing the Log Name in the Console
- configuring
- deletion policy, Defining a Log File Deletion Policy
- disabling time stamps, Disabling High-resolution Log Time Stamps
- rotation policy, Defining a Log File Rotation Policy
- defined, Viewing Logs
- manually rotating, Manual Log File Rotation
- viewing, Displaying Log Files
- viewing in command line, Viewing Logs in the Command Line
- viewing in Console, Viewing the Logs through the Console
- access settings
- for Administration Server, Changing the Admin User's Name and Password
- account inactivation, Manually Inactivating Users and Roles
- from command line, Inactivating and Activating Users and Roles Using the Command Line
- from console, Activating and Inactivating Users and Roles Using the Console
- PAM pass-through authentication, Setting PAM PTA Mappings
- account lockout, Configuring the Account Lockout Policy Using the Console
- configuration
- configuring
- using command line, Configuring the Account Lockout Policy Using the Command Line
- using console, Configuring the Account Lockout Policy Using the Console
- configuring password-based, Configuring a Password-Based Account Lockout Policy
- configuring time-based, Configuring Time-Based Account Lockout Policies
- disabling, Configuring the Account Lockout Policy Using the Console
- enabling, Configuring the Account Lockout Policy Using the Console
- lockout duration, Configuring the Account Lockout Policy Using the Console
- password failure counter, Configuring the Account Lockout Policy Using the Console
- replicating attributes, Replicating Account Lockout Attributes
- replication, Managing the Account Lockouts and Replication
- account policy
- configuring, Configuring Time-Based Account Lockout Policies
- ACI
- and directory manager, Setting Access Controls on Directory Manager
- cascading chaining, Configuring Cascading Chaining from the Command Line
- local evaluation
- cascading chaining, Configuring Cascading Chaining from the Command Line
- using macro ACIs, Advanced Access Control: Using Macro ACIs
- ACL, Access Control Principles
- activating accounts
- from command line, Inactivating and Activating Users and Roles Using the Command Line
- from console, Activating and Inactivating Users and Roles Using the Console
- Active Directory
- schema differences between Directory Server, User Schema Differences between Red Hat Directory Server and Active Directory, Group Schema Differences between Red Hat Directory Server and Active Directory
- AD DN Plug-in, Using Active Directory-formatted User Names for Authentication
- admin domain
- creating, Creating and Editing an Admin Domain
- Admin Express
- configuring, Configuring Admin Express
- directives, Admin Express Directives
- file locations, Admin Express File Locations
- files, Admin Express Configuration Files
- for replication status, Files for the Replication Status Appearance
- for server information page, Files for the Server Information Page
- for the server logs page, Files for the Server Logs Page
- for the welcome page, Files for the Administration Server Welcome Page
- opening, Opening Admin Express
- replication monitoring, Monitoring Replication from Admin Express
- starting and stopping servers, Starting and Stopping Servers
- viewing server information, Viewing Server Information
- viewing server logs, Viewing Server Logs
- administration domain
- defined, The Servers and Applications Tab
- removing, Removing an Admin Domain
- Administration Server
- Administration Server Administrator
- changing user name or password for, Changing the Admin Password
- defined, Changing the Admin User's Name and Password, Changing Administrator Entries
- Administration Server
- access settings for, Changing the Admin User's Name and Password
- and replication, Replicating o=NetscapeRoot for Administration Server Failover
- defined, Introduction to Red Hat Administration Server
- directory settings for, Changing Directory Server Settings
- enabling TLS, Enabling TLS
- encryption settings for, Working with TLS
- logging options for, Viewing Logs
- login, Opening the Administration Server Console
- password file, Creating a Password File for the Administration Server
- port number, Changing the Port Number
- in the command line, Changing the Port Number in the Command Line
- in the Console, Changing the Port Number in the Console
- removing, Removing a Directory Server Instance and Administration Server
- requesting a certificate, Managing Certificates for Administration Server
- starting and stopping, Starting and Stopping the Directory Server Administration Server Service
- starting and stopping servers, Starting and Stopping Servers
- starting the Console, Opening the Administration Server Console
- viewing logs, Viewing Server Logs
- viewing server information, Viewing Server Information
- Administration Server Console
- administrators
- changing user name, Changing the Admin User's Name and Password
- resetting passwords, Changing the Admin User's Name and Password
- administrators, overview of, Changing Administrator Entries
- algorithm
- metaphone phonetic algorithm, Approximate Searches
- search, Overview of the Searching Algorithm
- anonymous binds
- disabling, Disabling Anonymous Binds
- resource limits, Setting Resource Limits on Anonymous Binds
- approximate index, About Index Types
- query string codes, Approximate Searches
- approximate search, Using Operators in Search Filters
- attribute
- adding multiple values, Adding Attribute Values
- adding to entry, Adding an Attribute to an Entry
- creating, Creating Attributes
- defining in schema, Creating Attributes, Creating Custom Schema Files
- deleting, Deleting Schema
- editing, Editing Custom Schema Elements
- nsslapd-schemacheck, Turning Schema Checking On and Off Using the Command Line
- ref, Creating Smart Referrals from the Command Line
- removing a value, Adding Attribute Values
- searching for, Using Attributes in Search Filters
- standard, Overview of Schema
- very large, Adding Very Large Attributes
- viewing, Viewing Attributes and Object Classes
- attribute encryption, Configuring Attribute Encryption
- importing and exporting encrypted databases, Exporting and Importing an Encrypted Database
- attribute subtypes, Adding an Attribute Subtype
- adding, Adding an Attribute Subtype
- binary, Adding an Attribute Subtype
- language, Adding an Attribute Subtype
- pronunciation, Adding an Attribute Subtype
- attribute type field (LDIF), About the LDIF File Format
- attribute uniqueness plug-in, Enforcing Attribute Uniqueness
- uniqueness-subtree-entries-oc, Configuring Attribute Uniqueness over Object Classes
- uniqueness-top-entry-oc, Configuring Attribute Uniqueness over Object Classes
- attribute value field (LDIF), About the LDIF File Format
- attributes
- allowed, Object Classes
- defined, Attributes
- linked attributes, Linking Attributes to Manage Attribute Values
- about, About Linking Attributes
- creating instance, Configuring Attribute Links
- syntax, Looking at the Linking Attributes Plug-in Syntax
- linking
- fixup-linkedattrs.pl, Regenerating Linked Attributes Using fixup-linkedattrs.pl
- managing, Managing Attributes and Values
- required, Object Classes
- syntax, Directory Server Attribute Syntaxes
- unique number assignments, Assigning and Managing Unique Numeric Attribute Values
- audit fail log
- configuring
- deletion policy, Defining a Log File Deletion Policy
- disabling time stamps, Disabling High-resolution Log Time Stamps
- rotation policy, Defining a Log File Rotation Policy
- viewing, Displaying Log Files
- audit log
- configuring
- deletion policy, Defining a Log File Deletion Policy
- disabling time stamps, Disabling High-resolution Log Time Stamps
- rotation policy, Defining a Log File Rotation Policy
- disabling, Enabling or Disabling Logs
- enabling, Enabling or Disabling Logs
- viewing, Displaying Log Files
- authentication, Opening the Administration Server Console
- autobind
- configuring, Configuring Autobind
- overview, Overview of Autobind and LDAPI
- certificate-based, Using Certificate-based Client Authentication
- for database links, Using Different Bind Mechanisms
- LDAP URLs, Examples of LDAP URLs
- SASL, Setting up SASL Identity Mapping
- SASL mechanisms, Authentication Mechanisms for SASL in Directory Server
- using PAM, Using PAM for Pass-Through Authentication
- autobind
- configuring, Configuring Autobind
- overview, Overview of Autobind and LDAPI
B
- backing up data, Backing up and Restoring Data
- bak2db script, Using the bak2db Command-Line Script
- bak2db.pl perl script, Using bak2db.pl Perl Script
- base 64 encoding, Representing Binary Data
- base DN, ldapsearch and, Using LDAP_BASEDN
- binary data, LDIF and, Representing Binary Data
- binary subtype, Adding an Attribute Subtype
- bind credentials
- for database links, Providing Bind Credentials
- binds
- anonymous, Disabling Anonymous Binds
- requiring secure, Requiring Secure Binds
- special types, Enabling Different Types of Binds
- unauthenticated, Allowing Unauthenticated Binds
- Boolean operators, in search filters, Using Compound Search Filters
- browsing index, About Index Types
- browsing indexes
- creating
C
- cascading chaining
- client ACIs, Configuring Cascading Chaining from the Command Line
- configuration attributes, Summary of Cascading Chaining Configuration Attributes
- configuring from command line, Configuring Cascading Chaining from the Command Line
- configuring from console, Configuring Cascading Chaining Using the Console
- example, Cascading Chaining Configuration Example
- local ACI evaluation, Configuring Cascading Chaining from the Command Line
- loop detection, Detecting Loops
- overview, Overview of Cascading Chaining
- proxy admin user ACI, Configuring Cascading Chaining from the Command Line
- proxy authorization, Configuring Cascading Chaining from the Command Line
- cascading replication
- initializing the replicas, Setting up the Replication Agreements
- introduction, Cascading Replication
- setting up, Configuring Cascading Replication
- certificate group, Groups
- certificate-based authentication, Using Certificate-based Client Authentication
- certificates, Managing Certificates for Administration Server
- chaining
- cascading, Overview of Cascading Chaining
- component operations, from command line, Chaining Component Operations from the Command Line
- component operations, from console, Chaining Component Operations Using the Console
- overview, Creating and Maintaining Database Links
- using TLS, Creating a New Database Link Using the Console, Providing an LDAP URL
- changelog, Changelog
- deleting, Removing the Changelog
- trimming, Trimming the Replication Changelog
- character type, About Locales
- ciphers, Setting Encryption Ciphers
- overview, Setting Encryption Ciphers
- selecting, Setting Encryption Ciphers
- cl-dump.pl script, Troubleshooting Replication-Related Problems
- class of service (CoS), Assigning Class of Service
- access control, Access Control and CoS
- classic
- example, How a Classic CoS Works
- overview, How a Classic CoS Works
- cosPriority attribute, Handling Multi-valued Attributes with CoS
- creating, Creating a New CoS
- definition entry, Creating the CoS Definition Entry from the Command Line
- editing, Creating the CoS Template Entry
- indirect
- example, How an Indirect CoS Works
- overview, How an Indirect CoS Works
- pointer
- example, How a Pointer CoS Works
- overview, How a Pointer CoS Works
- qualifiers
- merge-scheme, Handling Multi-valued Attributes with CoS
- override, Handling Physical Attribute Values
- template entry
- creating, Creating the CoS Template Entry
- overview, About the CoS Template Entry
- classic CoS
- example, How a Classic CoS Works
- overview, How a Classic CoS Works
- client
- using to find entries, Finding Directory Entries
- cn=fixup linked attributes task, Regenerating Linked Attributes Using ldapmodify
- cn=memberof task, Initializing and Regenerating memberOf Attributes Using ldapmodify
- cn=schema reload task, Reloading Schema Using ldapmodify
- cn=task
- cn=schema reload task, Reloading Schema Using ldapmodify
- cn=tasks
- cn=backup, Backing up the Database through the cn=tasks Entry
- cn=export, Manually Creating an Export Task
- cn=fixup linked attributes, Regenerating Linked Attributes Using ldapmodify
- cn=import, Importing through the cn=tasks Entry
- cn=memberof task, Initializing and Regenerating memberOf Attributes Using ldapmodify
- cn=restore, Restoring the Database through the cn=tasks Entry
- creating browsing indexes, Using a cn=tasks Entry to Create a Browsing Index
- creating indexes, Using a cn=tasks Entry to Create an Index
- code page, About Locales
- collation order
- international index, Creating Indexes from the Server Console
- overview, About Locales
- search filters and, Searching an Internationalized Directory
- command-line scripts
- db2bak, Backing up All Databases from the Command Line
- db2bak.pl, Backing up All Databases from the Command Line
- fixup-linkedattrs.pl, Regenerating Linked Attributes Using fixup-linkedattrs.pl
- fixup-memberof.pl, Initializing and Regenerating memberOf Attributes Using fixup-memberof.pl
- schema-reload.pl, Reloading Schema Using schema-reload.pl
- command-line utilities
- certificate-based authentication and, Using Certificate-based Client Authentication
- ldapsearch, LDAP Search Filters
- ldif, Base-64 Encoding
- ldif2db, Running the db2index.pl Script
- commas, in DNs
- using ldapsearch with, Specifying DNs That Contain Commas in Search Filters
- compatibility
- compound search filters, Using Compound Search Filters
- Configuration Administrator
- changing user name or password for, Changing Administrator Entries
- defined, Changing the Admin User's Name and Password, Changing Administrator Entries
- Configuration Administrators group
- adding users to, Adding Users to the Configuration Administrators Group
- configuration attributes
- account lockout, Configuring the Account Lockout Policy Using the Command Line
- cascading chaining, Summary of Cascading Chaining Configuration Attributes
- password policy, Configuring a Global Password Policy Using the Command Line
- configuration directory
- changing settings for, Changing the Configuration Directory Host or Port
- defined, Overview of the Directory Server Console
- overview, Changing the Configuration Directory Host or Port
- connection restrictions, Setting Host Restrictions
- setting in the command line, Setting Host Restrictions in the Command Line
- setting in the Console, Setting Host Restrictions in the Console
- connections
- LDAPI (Unix sockets), Overview of Autobind and LDAPI
- configuring, Enabling LDAPI
- monitoring, Monitoring the Server from the Directory Server Console
- requiring secure, Requiring Secure Connections
- viewing number of, Monitoring the Server from the Directory Server Console
- consumer server, Suppliers and Consumers
- continued lines
- in LDIF, Continuing Lines in LDIF
- CoS (class of service), Assigning Class of Service
- CoS definition entry
- attributes, Creating the CoS Definition Entry from the Command Line
- object classes, Creating the CoS Definition Entry from the Command Line
- CoS qualifiers
- default, Handling Physical Attribute Values
- merge-scheme, Handling Multi-valued Attributes with CoS
- override, Handling Physical Attribute Values
- CoS template entry, About the CoS Template Entry
- creating, Creating the CoS Template Entry
- cosPriority attribute, Handling Multi-valued Attributes with CoS
- counter, password failures, Configuring the Account Lockout Policy Using the Console
- country code, Supported Locales
- creating a database
- from the command line, Creating a New Database for a Single Suffix from the Command Line
- from the console, Creating a New Database for an Existing Suffix Using the Console
- creating a virtual DIT, About Views
- creating the directory, Defining Directories Using LDIF
- custom distribution function
- adding to suffix, Adding Multiple Databases for a Single Suffix
- custom distribution logic
- adding databases, Adding Multiple Databases for a Single Suffix
- adding to suffix, Adding Multiple Databases for a Single Suffix
- custom schema files, Creating Custom Schema Files
- custom views, Changing the Console Appearance
- changing to, Switching to a Custom View
- creating, Creating Custom Views
- editing, Creating Custom Views
- removing, Creating Custom Views
- setting ACIs on, Setting Access Permissions for a Public View
- using, Working with Custom Views
D
- data consistency
- using referential integrity, Maintaining Referential Integrity
- database
- and associated suffix, Creating and Maintaining Suffixes
- backing up
- backup, Backing up and Restoring Data
- backup files, Backing up All Databases from the Console
- backup from console, Backing up All Databases
- creating from command line, Creating a New Database for a Single Suffix from the Command Line
- creating from console, Creating a New Database for an Existing Suffix Using the Console
- creating multiple, Adding Multiple Databases for a Single Suffix
- creating using LDIF, Defining Directories Using LDIF
- deleting, Deleting a Database
- export, Exporting Data
- cn=tasks, Manually Creating an Export Task
- db2ldif, Exporting a Database Using the db2ldif.pl Script
- db2ldif.pl, Exporting a Database Using the db2ldif.pl Script
- encrypted database, Exporting and Importing an Encrypted Database
- export from console, Exporting Directory Data to LDIF Using the Console
- import, Importing Data
- cn=tasks, Importing through the cn=tasks Entry
- encrypted database, Exporting and Importing an Encrypted Database
- ldif2db, Importing Using the ldif2db Command-Line Script
- ldif2db.pl, Importing Using the ldif2db.pl Perl Script
- ldif2ldap, Importing Using the ldif2ldap Command-Line Script
- initialization, Initializing a Database from the Console
- making read-only, Placing a Database in Read-Only Mode
- monitoring from command line, Monitoring Databases from the Command Line
- monitoring from server console, Monitoring Database Activity from the Directory Server Console
- overview, Creating and Maintaining Databases
- read-only mode, Placing a Database in Read-Only Mode
- replication, What Directory Units Are Replicated
- restore, Backing up and Restoring Data
- restoring
- bak2db, Using the bak2db Command-Line Script
- bak2db.pl, Using bak2db.pl Perl Script
- cn=tasks, Restoring the Database through the cn=tasks Entry
- restoring from console, Restoring All Databases from the Console
- selecting for monitoring, Monitoring Database Activity
- viewing backend information, Monitoring Database Activity
- database link
- cascading
- configuring from command line, Configuring Cascading Chaining from the Command Line
- configuring from console, Configuring Cascading Chaining Using the Console
- overview, Overview of Cascading Chaining
- chaining with TLS, Creating a New Database Link Using the Console, Providing an LDAP URL
- configuration, Creating a New Database Link
- configuration attributes, Summary of Database Link Configuration Attributes
- configuration example, Summary of Database Link Configuration Attributes
- configuring bind and authentication, Using Different Bind Mechanisms
- configuring bind credentials, Providing Bind Credentials
- configuring defaults, Configuring Database Link Defaults
- configuring failover servers, Providing a List of Failover Servers
- configuring LDAP URL, Providing an LDAP URL
- configuring suffix, Creating a Database Link from the Command Line
- creating from command line, Creating a Database Link from the Command Line
- creating from console, Creating a New Database Link Using the Console
- deleting, Deleting Database Links
- maintaining remote server info, Maintaining Database Links
- overview, Creating and Maintaining Database Links
- database server parameters
- databases
- in Directory Server, Configuring Directory Databases
- date format, About Locales
- db2bak script, Backing up All Databases from the Command Line
- db2bak utility, Backing up All Databases from the Command Line
- db2bak.pl script, Backing up All Databases from the Command Line
- db2ldif utility, Exporting a Database Using the db2ldif.pl Script
- db2ldif.pl, Exporting a Database Using the db2ldif.pl Script
- debug
- and replication timeouts, Setting Replication Timeout Periods
- default CoS qualifier, Handling Physical Attribute Values
- default referrals
- setting, Setting Default Referrals
- setting from console, Setting a Default Referral Using the Console
- settings from command line, Setting a Default Referral from the Command Line
- defining
- attributes, Creating Attributes
- object classes, Creating Object Classes
- deleting
- attributes, Deleting Schema
- database link, Deleting Database Links
- object classes, Deleting Schema
- deleting schema elements, Deleting Schema
- directives, Admin Express Directives
- directory
- changing the search directory, Searching for Users and Groups
- directory creation, Defining Directories Using LDIF
- directory entries
- creating, Creating Directory Entries, Creating Directory Entries
- deleting, Deleting Directory Entries
- managing from console, Managing Entries Using the Directory Console
- modifying, Modifying Directory Entries
- removing, Removing an Entry from the Directory
- searching for, Searching for Users and Groups
- directory manager
- and access control, Setting Access Controls on Directory Manager
- Directory Manager
- directory trees
- finding entries in, Using ldapsearch
- Directory Server
- basic administration, Basic Red Hat Directory Server Settings, Setting up Content Synchronization
- configuration, Changing Directory Server Port Numbers
- configuration subtree, Overview of the Directory Server Console
- configuring SASL authentication at startup, Configuring SASL Authentication at Directory Server Startup
- connecting over LDAPI (Unix sockets), Overview of Autobind and LDAPI
- creating a root entry, Creating a Root Entry
- creating content, Populating Directory Databases
- creating entries, Creating Directory Entries
- data, Populating Directory Databases
- databases, Configuring Directory Databases
- deleting entries, Deleting Directory Entries
- file locations, File Locations
- importing data, Importing Data
- international charactersets, Internationalization
- managing attributes, Managing Attributes and Values
- managing entries, Managing Directory Entries
- MIB, Using the Management Information Base
- modifying entries, Modifying Directory Entries
- monitoring, Types of Directory Server Log Files
- monitoring from command line, Monitoring the Directory Server from the Command Line
- monitoring with SNMP, Monitoring Directory Server Using SNMP
- overview, Basic Red Hat Directory Server Settings
- performance counters, Monitoring Server Activity, Enabling and Disabling Counters
- reloading schema, Dynamically Reloading Schema
- cn=schema reload task, Reloading Schema Using ldapmodify
- schema-reload.pl, Reloading Schema Using schema-reload.pl
- removing a single instance, Removing a Directory Server Instance Using the Command Line
- removing Directory Server and Administration Server, Removing a Directory Server Instance and Administration Server
- removing instance, Removing a Directory Server Instance Using the Console
- replication monitoring, Monitoring Replication from Admin Express
- role in managing resources and users, Overview of the Directory Server Console
- starting and stopping, Starting and Stopping a Directory Server Instance Using the Command Line
- starting and stopping servers, Starting and Stopping Servers
- suffixes, Configuring Directory Databases
- supported languages, Supported Locales
- user subtree, Overview of the Directory Server Console
- viewing information, Viewing Server Information
- viewing logs, Viewing Server Logs
- Directory Server Console
- managing certificates, Managing Certificates Used by the Directory Server Console
- disabling suffixes, Disabling a Suffix
- disk space
- access log and, Enabling or Disabling Logs
- log files and, Manual Log File Rotation
- distributed number assignment, Assigning and Managing Unique Numeric Attribute Values
- about ranges, About Dynamic Number Assignments
- basic example, Looking at the DNA Plug-in Syntax
- complete example, Looking at the DNA Plug-in Syntax
- configuring, Configuring Unique Number Assignments, Editing the DNA Plug-in in the Console
- Directory Server behavior, Assigning and Managing Unique Numeric Attribute Values
- for attributes, Ranges and Assigning Numbers
- overview, Assigning and Managing Unique Numeric Attribute Values
- scope, Filters, Searches, and Target Entries
- syntax, Looking at the DNA Plug-in Syntax
- distribution function, Adding Multiple Databases for a Single Suffix
- dn field (LDIF), About the LDIF File Format
- DNs
- validating syntax, Enabling Strict Syntax Validation for DNs
- dse.ldif file
- backing up, Backing up the dse.ldif Configuration File
- restoring, Restoring the dse.ldif Configuration File
- dynamic group, Groups
- dynamic groups, Creating Dynamic Groups in the Console
- creating, Creating Dynamic Groups in the Console
- modifying, Creating Dynamic Groups in the Console
E
- editing
- attributes, Editing Custom Schema Elements
- object classes, Editing Custom Schema Elements
- encryption
- attribute, Configuring Attribute Encryption
- database, Configuring Attribute Encryption
- settings for Administration Server, Working with TLS
- entity table, Entity Table
- entries
- adding an object class, Adding or Removing an Object Class to an Entry
- adding attributes, Adding an Attribute to an Entry
- adding very large attributes, Adding Very Large Attributes
- creating, Creating Directory Entries
- using LDIF, Specifying Directory Entries Using LDIF
- deleting, Deleting Directory Entries
- deleting and replication, Managing Deleted Entries with Replication
- distribution, Creating Databases
- finding, Using ldapsearch
- managing, Managing Directory Entries
- managing from console, Managing Entries Using the Directory Console
- modifying, Modifying Directory Entries
- removing an object class, Adding or Removing an Object Class to an Entry
- root, Defining Directories Using LDIF
- entry distribution, Creating Databases
- entryUSN
- import operations, Setting EntryUSN Initial Values During Import
- initializing replicas and databases, Setting EntryUSN Initial Values During Import
- entryUSN:
- import operations, Setting EntryUSN Initial Values During Import
- environment variables
- LDAP_BASEDN, Using LDAP_BASEDN
- equality index, About Index Types
- required for referential integrity, How Referential Integrity Works
- equality search, Using Operators in Search Filters
- example, Using Attributes in Search Filters
- international example, Equality Example
- error log
- access control information, Logging Access Control Information
- changing location and name
- in the command line, Changing the Log Location in the Command Line
- in the Console, Changing the Log Name in the Console
- configuring
- deletion policy, Defining a Log File Deletion Policy
- disabling time stamps, Disabling High-resolution Log Time Stamps
- rotation policy, Defining a Log File Rotation Policy
- defined, Viewing Logs
- manually rotating, Manual Log File Rotation
- viewing, Displaying Log Files
- viewing in command line, Viewing Logs in the Command Line
- viewing in Console, Viewing the Logs through the Console
- example
- cascading chaining, Cascading Chaining Configuration Example
- exporting data, Exporting Data
- cn=tasks, Manually Creating an Export Task
- db2ldif, Exporting a Database Using the db2ldif.pl Script
- db2ldif.pl, Exporting a Database Using the db2ldif.pl Script
- encrypted database, Exporting and Importing an Encrypted Database
- using console, Exporting Directory Data to LDIF Using the Console
- extending the directory schema, Managing the Directory Schema
F
- failover servers
- for database links, Providing a List of Failover Servers
- File locations, File Locations
- files
- database backup, Backing up All Databases from the Console
- Filesystem Hierarchy Standard, File Locations
- filtered role
- creating, Creating a Filtered Role
- example, Creating a Filtered Role through the Command Line
- finding
- attributes, Using Attributes in Search Filters
- entries, Using ldapsearch
- fixup-linkedattrs.pl, Regenerating Linked Attributes Using fixup-linkedattrs.pl
- fixup-memberof.pl, Initializing and Regenerating memberOf Attributes Using fixup-memberof.pl
- fonts
- changing, Changing Console Fonts
- format, LDIF, LDAP Data Interchange Format
- fractional replication, Replicating a Subset of Attributes with Fractional Replication
G
- get effective rights, Checking Access Rights on Entries (Get Effective Rights)
- return codes, Get Effective Rights Return Codes
- global password policy, Configuring the Global Password Policy
- glue entries, Solving Orphan Entry Conflicts
- greater than or equal to search
- international example, Greater-Than or Equal-to Example
- overview, Using Operators in Search Filters
- groups
- configuring the memberOf plug-in, Configuring an Instance of the MemberOf Plug-in, Editing the MemberOf Plug-in from the Console, Editing the MemberOf Plug-in from the Command Line
- creating, Groups
- differences between Directory Server and Active Directory, Group Schema Differences between Red Hat Directory Server and Active Directory
- dynamic, Creating Dynamic Groups in the Console
- creating, Creating Dynamic Groups in the Console
- modifying, Creating Dynamic Groups in the Console
- editing, Editing Entries
- fixup-memberof.pl, Initializing and Regenerating memberOf Attributes Using fixup-memberof.pl
- locating, Searching for Users and Groups
- memberOf
- cn=memberof task, Initializing and Regenerating memberOf Attributes Using ldapmodify
- overview, Using Groups
- removing, Removing an Entry from the Directory
- static, Creating Static Groups in the Console
- creating, Creating Static Groups in the Console
- modifying, Creating Static Groups in the Console
- types, Groups
- GSS-API, Authentication Mechanisms for SASL in Directory Server
H
- host information, modifying, Editing Domain, Host, Server Group, and Instance Information
- host restriction, Setting Host Restrictions
- setting in the command line, Setting Host Restrictions in the Command Line
- setting in the Console, Setting Host Restrictions in the Console
- hub, Suppliers and Consumers
I
- id field (LDIF), About the LDIF File Format
- identity mapping
- importing data, Importing Data
- cn=tasks, Importing through the cn=tasks Entry
- encrypted database, Exporting and Importing an Encrypted Database
- from console, Importing a Database from the Console
- ldif2ldap, Importing Using the ldif2ldap Command-Line Script
- using ldif2db, Importing Using the ldif2db Command-Line Script
- using ldif2db.pl, Importing Using the ldif2db.pl Perl Script
- inactivating accounts, Manually Inactivating Users and Roles
- inactivating roles, Making a Role Inactive or Active
- index types, About Index Types
- approximate index, About Index Types
- browsing index, About Index Types
- equality index, About Index Types
- international index, About Index Types
- presence index, About Index Types
- substring index, About Index Types
- virtual list view index, About Index Types
- indexes
- creating
- creating dynamically, Creating Indexes from the Command Line
- dynamic changes to, Creating Indexes from the Command Line
- matching rules, Using Matching Rules
- required for referential integrity, How Referential Integrity Works
- indexing, About Index Types
- creating indexes from console, Creating Indexes from the Server Console
- indirect CoS
- example, How an Indirect CoS Works
- overview, How an Indirect CoS Works
- init scripts
- configuring SASL authentication, Configuring SASL Authentication at Directory Server Startup
- initialization
- and entryUSN values, Setting EntryUSN Initial Values During Import
- and suppliers in MMR, Setting EntryUSN Initial Values During Import
- manual consumer creation, Manual Consumer Initialization Using the Command Line
- online consumer creation, Online Consumer Initialization Using the Console
- initializing databases, Initializing a Database from the Console
- initializing replicas
- cascading replication, Setting up the Replication Agreements
- interaction table, Interaction Table
- international charactersets, Internationalization
- international index, About Index Types
- collation order, Creating Indexes from the Server Console
- international searches, Searching an Internationalized Directory
- equality, Equality Example
- examples, International Search Examples
- greater than, Greater-Than Example
- greater than or equal to, Greater-Than or Equal-to Example
- less than, Less-Than Example
- less than or equal to, Less-Than or Equal-to Example
- substring, Substring Example
- using OIDs, Matching Rule Formats
- internationalization
- character type, About Locales
- collation order, About Locales
- country code, Supported Locales
- date format, About Locales
- language tag, Supported Locales
- locales and, About Locales
- location of files, About Locales
- monetary format, About Locales
- object identifiers and, Supported Locales
- of LDIF files, Storing Information in Multiple Languages
- search filters and, Searching an Internationalized Directory
- supported locales, Supported Locales
- time format, About Locales
J
- jpeg images, Representing Binary Data
K
L
- language code
- in LDIF entries, Storing Information in Multiple Languages
- list of supported, Supported Locales
- language subtype, Adding an Attribute Subtype
- language support
- language tag, Supported Locales
- searching and, Searching an Internationalized Directory
- specifying using locales, Supported Locales
- language tags
- described, Supported Locales
- in international searches, Using a Language Tag for the Matching Rule
- LDAP clients
- certificate-based authentication and, Using Certificate-based Client Authentication
- monitoring database with, Monitoring Databases from the Command Line
- monitoring server with, Monitoring the Directory Server from the Command Line
- using to find entries, Finding Directory Entries
- LDAP search filters
- DNs with commas and, Specifying DNs That Contain Commas in Search Filters
- LDAP URLs
- components of, Components of an LDAP URL
- examples, Examples of LDAP URLs
- for database links, Providing an LDAP URL
- security, Examples of LDAP URLs
- syntax, Components of an LDAP URL
- ldapcompare command-line utility
- examples, Comparing Entries
- LDAPI
- enabling, Enabling LDAPI
- overview, Overview of Autobind and LDAPI
- ldappasswd command-line utility
- changing user password, Changing Passwords
- generating user password, Changing Passwords
- prompting for new password, Changing Passwords
- ldapsearch command-line utility
- extended operations, Running Extended Operations
- ldapsearch utility
- base DN and, Using LDAP_BASEDN
- commonly used options, Commonly Used ldapsearch Options
- DNs with commas and, Using Special Characters
- example of use, Examples of Common ldapsearches
- format, ldapsearch Command-Line Format
- international searches, Searching an Internationalized Directory
- limiting attributes returned, Displaying Subsets of Attributes
- search filters, LDAP Search Filters
- specifying files, Displaying Subsets of Attributes
- using, Using ldapsearch
- LDAP_BASEDN environment variable, Using LDAP_BASEDN
- LDIF
- binary data, Representing Binary Data
- entry format, LDAP Data Interchange Format
- organization, Specifying Domain Entries
- organizational person, Specifying Organizational Person Entries
- organizational unit, Specifying Organizational Unit Entries
- example, Defining Directories Using LDIF
- internationalization and, Storing Information in Multiple Languages
- line continuation, Continuing Lines in LDIF
- specifying entries
- organization, Specifying Domain Entries
- organizational person, Specifying Organizational Person Entries
- organizational unit, Specifying Organizational Unit Entries
- using to create directory, Defining Directories Using LDIF
- LDIF entries
- binary data in, Representing Binary Data
- creating, Specifying Directory Entries Using LDIF
- organizational person, Specifying Organizational Person Entries
- organizational units, Specifying Organizational Unit Entries
- organizations, Specifying Domain Entries
- internationalization and, Storing Information in Multiple Languages
- LDIF files
- continued lines, Continuing Lines in LDIF
- creating directory using, Defining Directories Using LDIF
- example, Defining Directories Using LDIF
- internationalization and, Storing Information in Multiple Languages
- LDIF format, LDAP Data Interchange Format
- ldif utility
- converting binary data to LDIF, Base-64 Encoding
- ldif2db utility, Importing Using the ldif2db Command-Line Script
- options, Running the db2index.pl Script
- ldif2db.pl perl script, Importing Using the ldif2db.pl Perl Script
- ldif2ldap utility, Importing Using the ldif2ldap Command-Line Script
- less than or equal to search
- international example, Less-Than or Equal-to Example
- syntax, Using Operators in Search Filters
- less than search
- international example, Less-Than Example
- syntax, Using Operators in Search Filters
- linked attributes, Linking Attributes to Manage Attribute Values
- about, About Linking Attributes
- and replication, About Linking Attributes
- attribute requirements, About Linking Attributes
- creating, Configuring Attribute Links
- data consistency and ACIs, About Linking Attributes
- scope, About Linking Attributes
- syntax, Looking at the Linking Attributes Plug-in Syntax
- local password policy, Configuring a Local Password Policy
- locales
- defined, About Locales
- location of files, About Locales
- supported, Supported Locales
- locked accounts, Configuring the Account Lockout Policy Using the Console
- lockout duration, Configuring the Account Lockout Policy Using the Console
- log files, Types of Directory Server Log Files
- access log, Types of Directory Server Log Files
- audit fail log, Types of Directory Server Log Files
- audit log, Types of Directory Server Log Files
- deletion policy, Defining a Log File Deletion Policy
- disabling time stamps, Disabling High-resolution Log Time Stamps
- error log, Types of Directory Server Log Files
- location of, Manual Log File Rotation
- manually rotating, Manual Log File Rotation
- rotation policy, Defining a Log File Rotation Policy
- viewing, Displaying Log Files
- logging
- for Windows Synchronization, Troubleshooting
- logs
- changing location and name
- in the command line, Changing the Log Location in the Command Line
- in the Console, Changing the Log Name in the Console
- transaction
- viewing access, Viewing the Logs through the Console, Viewing Logs in the Command Line
- viewing error, Viewing the Logs through the Console, Viewing Logs in the Command Line
- loop detection
- cascading chaining, Detecting Loops
M
- macro ACIs
- example, Macro ACI Example
- overview, Advanced Access Control: Using Macro ACIs
- syntax, Macro ACI Syntax
- managed device
- overview, About SNMP
- managed object, About SNMP
- managed role
- creating, Creating a Managed Role
- example, Creating Managed Roles through the Command Line
- manually rotating log files, Manual Log File Rotation
- matching rules, Using Matching Rules
- international formats, Matching Rule Formats
- list of supported, Using Matching Rules
- matchingRule format
- using language tag, Using a Language Tag for the Matching Rule
- using language tag and suffix, Using a Language Tag and Suffix for the Matching Rule
- using OID, Matching Rule Formats
- using OID and suffix, Using an OID and Suffix for the Matching Rule
- memberOf plug-in
- configuring, Configuring an Instance of the MemberOf Plug-in
- from the command line, Editing the MemberOf Plug-in from the Command Line
- from the console, Editing the MemberOf Plug-in from the Console
- menus, in Red Hat Management Console, Red Hat Management Console Menus
- metaphone phonetic algorithm, Approximate Searches
- MIB
- Directory Server, Using the Management Information Base
- redhat-directory.mib, Using the Management Information Base
- entity table, Entity Table
- entries table, Entries Table
- interaction table, Interaction Table
- operations table, Operations Table
- monetary format, About Locales
- monitoring
- database from command line, Monitoring Databases from the Command Line
- database from server console, Monitoring Database Activity from the Directory Server Console
- Directory Server, Types of Directory Server Log Files
- from console, Monitoring Server Activity
- log files, Types of Directory Server Log Files
- replication status, Monitoring Replication Status
- threads, Monitoring the Server from the Directory Server Console
- with SNMP, Monitoring Directory Server Using SNMP
- monitoring from console, Monitoring Server Activity
- multi-master replication
- introduction, Multi-Master Replication
- preventing monopolization of a consumer, Preventing Monopolization of a Consumer in Multi-Master Replication
- setting up, Configuring Multi-Master Replication
- multiple search filters, Using Compound Search Filters
N
- naming conflicts
- in replication, Solving Naming Conflicts
- navigation tree
- overview, The Servers and Applications Tab
- setting access permissions to, Granting Admin Privileges to Users for Directory Server and Administration Server
- nested role
- creating, Creating a Nested Role
- example, Creating Nested Role through the Command Line
- NetscapeRoot
- and replication, Replicating o=NetscapeRoot for Administration Server Failover
- nsds5ReplicaBusyWaitTime, Preventing Monopolization of a Consumer in Multi-Master Replication
- nsds5ReplicaReleaseTimeout, Preventing Monopolization of a Consumer in Multi-Master Replication
- nsds5ReplicaSessionPauseTime, Preventing Monopolization of a Consumer in Multi-Master Replication
- nsslapd-maxbersize, Adding Very Large Attributes
- nsslapd-schemacheck attribute, Turning Schema Checking On and Off Using the Command Line
- nsview, About Views
- nsviewfilter, About Views
O
- object class
- adding to an entry, Adding or Removing an Object Class to an Entry
- allowed attributes, Object Classes
- creating, Creating Object Classes
- defined, Object Classes
- defining in schema, Creating Object Classes, Creating Custom Schema Files
- deleting, Deleting Schema
- editing, Editing Custom Schema Elements
- inheritance, Object Classes
- parent object class, Object Classes
- referral, Creating Smart Referrals from the Command Line
- removing from an entry, Adding or Removing an Object Class to an Entry
- required attributes, Object Classes
- standard, Overview of Schema
- user-defined, Viewing Attributes and Object Classes
- viewing, Viewing Attributes and Object Classes
- object identifier, Managing Object Identifiers
- object identifier (OID), Supported Locales
- in matchingRule, Matching Rule Formats
- matching rule, Using Matching Rules
- objectClass field (LDIF), About the LDIF File Format
- OID
- getting and assigning, Managing Object Identifiers
- OID, See object identifier, Supported Locales
- operations, Monitoring the Server from the Directory Server Console
- operations table, Operations Table
- operators
- Boolean, Using Compound Search Filters
- international searches and, Supported Search Types
- search filters and, Using Operators in Search Filters
- suffix, Supported Search Types
- organization, specifying entries for, Specifying Domain Entries
- organizational person, specifying entries for, Specifying Organizational Person Entries
- organizational unit, specifying entries for, Specifying Organizational Unit Entries
- organizational units
- creating, Organizational Units
- removing, Removing an Entry from the Directory
- override CoS qualifier, Handling Physical Attribute Values
P
- PAM pass-through authentication, Using PAM for Pass-Through Authentication
- and account inactivation, Setting PAM PTA Mappings
- and password policies, Using PAM for Pass-Through Authentication
- configuration options, PAM Pass-Through Authentication Configuration Options
- configuring, Configuring PAM Pass-Through Authentication
- entry mapping methods, Setting PAM PTA Mappings
- example, Configuring PAM Pass-Through Authentication
- general settings, Configuring General PAM PTA Settings
- target suffixes, Specifying the Suffixes to Target for PAM PTA
- parent object class, Object Classes
- pass-through authentication
- pass-through authentication (PTA), Using Pass-Through Authentication
- password
- changing for a user or administrator, Editing Entries
- password change extended operation, Changing Passwords Stored Externally
- password file
- Administration Server, Creating a Password File for the Administration Server
- password policy
- account lockout, Configuring the Account Lockout Policy Using the Console
- attributes, Configuring a Global Password Policy Using the Command Line
- configuring
- using command line, Configuring a Global Password Policy Using the Command Line
- using console, Configuring a Global Password Policy Using the Console
- configuring global, Configuring the Global Password Policy
- configuring local, Configuring a Local Password Policy
- global, Configuring the Global Password Policy
- lockout duration, Configuring the Account Lockout Policy Using the Console
- managing, Managing the Password Policy
- password failure counter, Configuring the Account Lockout Policy Using the Console
- replicating account lockout attributes, Replicating Account Lockout Attributes
- replication, Managing the Account Lockouts and Replication
- subtree-level, Configuring a Local Password Policy
- user-level, Configuring a Local Password Policy
- Password Sync, Managing the Password Sync Service
- modifying, Modifying Password Sync
- setting up TLS, Step 5: Configure the Password Sync Service
- starting and stopping, Starting and Stopping the Password Sync Service
- uninstalling, Uninstalling Password Sync Service
- passwords, Changing the Admin User's Name and Password
- account lockout, Configuring the Account Lockout Policy Using the Console
- changing, Changing Passwords Stored Externally
- Directory Manager, Resetting the Directory Manager Password
- failure counter, Configuring the Account Lockout Policy Using the Console
- lockout duration, Configuring the Account Lockout Policy Using the Console
- policy
- differences between Directory Server and Active Directory, Password Policies
- setting, Setting User Passwords
- synchronizing, Synchronizing Passwords
- syncing with Active Directory, Managing the Password Sync Service
- PDUs, About SNMP
- performance counters, Monitoring Database Activity from the Directory Server Console
- configuring 64-bit, Monitoring Server Activity, Monitoring Database Activity, Using the Management Information Base
- configuring 64-bit integers, Enabling and Disabling Counters
- monitoring the server with, Monitoring Server Activity
- server attributes, Enabling and Disabling Counters
- PKCS#11 modules, Using Hardware Security Modules
- plug-ins
- directory manager ACI, Setting Access Controls on Directory Manager
- disabling, Enabling Plug-ins in the Command Line, Enabling Plug-ins in the Directory Server Console
- displaying details in the Console, Enabling Plug-ins in the Directory Server Console
- distributed number assignment, Assigning and Managing Unique Numeric Attribute Values
- dynamic plug-ins, Enabling Plug-ins Dynamically
- enabling, Enabling Plug-ins in the Command Line, Enabling Plug-ins in the Directory Server Console
- linked attributes, Linking Attributes to Manage Attribute Values
- about, About Linking Attributes
- creating instance, Configuring Attribute Links
- scope, About Linking Attributes
- syntax, Looking at the Linking Attributes Plug-in Syntax
- setting precedence, Setting the Plug-in Precedence
- pointer CoS
- example, How a Pointer CoS Works
- overview, How a Pointer CoS Works
- port number, Changing Standard Port Numbers, Changing the Port Number
- changing in the command line, Changing the Port Number in the Command Line
- changing in the Console, Changing the Port Number in the Console
- Directory Server configuration, Changing Directory Server Port Numbers
- for TLS communications, Changing the LDAPS Port Numbers
- preferences, Changing the Console Appearance
- font, Changing Console Fonts
- UI permissions, Changing the Console Appearance
- presence index, About Index Types
- required for referential integrity, How Referential Integrity Works
- presence search
- example, Using Attributes in Search Filters
- syntax, Using Operators in Search Filters
- preventing monopolization of the consumer in multi-master replication, Preventing Monopolization of a Consumer in Multi-Master Replication
- pronunciation subtype, Adding an Attribute Subtype
- Property Editor
- displaying, Modifying Directory Entries
- protocol data units. See PDUs, About SNMP
- proxy authorization
- with cascading chaining, Configuring Cascading Chaining from the Command Line
- PTA plug-in
- configuring, Configuring the PTA Plug-in
- examples, PTA Plug-in Syntax Examples
- syntax, PTA Plug-in Syntax
- use in Directory Server, Using Pass-Through Authentication
R
- read-only mode, Monitoring Database Activity from the Directory Server Console
- database, Placing a Database in Read-Only Mode
- read-only replica, Read-Write and Read-Only Replicas
- read-write replica, Read-Write and Read-Only Replicas
- redhat-directory.mib, Using the Management Information Base
- entity table, Entity Table
- entries table, Entries Table
- interaction table, Interaction Table
- operations table, Operations Table
- Red Hat Console
- overview of, Overview of the Directory Server Console
- Red Hat Management Console
- defined, Overview of the Directory Server Console
- information panel, The Servers and Applications Tab
- menus, Red Hat Management Console Menus
- tabs, Red Hat Management Console Tabs
- ref attribute, Creating Smart Referrals from the Command Line
- refer command, Starting the Server in Referral Mode
- referential integrity
- attributes, How Referential Integrity Works
- disabling, Enabling and Disabling Referential Integrity in the Console
- enabling, Enabling and Disabling Referential Integrity in the Console
- log file, How Referential Integrity Works
- modifying attributes, Modifying the Attribute List Using the Console
- overview, Maintaining Referential Integrity
- required indexes, How Referential Integrity Works
- with replication, Using Referential Integrity with Replication
- referral mode, Starting the Server in Referral Mode
- referral object class, Creating Smart Referrals from the Command Line
- referrals
- creating smart referrals, Creating Smart Referrals
- creating suffix, Creating Suffix Referrals
- on update, Creating Suffix Referrals Using the Console
- setting default, Setting Default Referrals
- suffix, Creating Suffix Referrals Using the Console
- reloading schema, Dynamically Reloading Schema
- cn=schema reload task, Reloading Schema Using ldapmodify
- schema-reload.pl, Reloading Schema Using schema-reload.pl
- removing
- Directory Server instance, Removing a Directory Server Instance Using the Console
- Removing Directory Server
- and the Administration Server, Removing a Directory Server Instance and Administration Server
- single instance, Removing a Directory Server Instance Using the Command Line
- replica
- exporting to LDIF, Exporting a Replica to LDIF
- read-only, Read-Write and Read-Only Replicas
- read-write, Read-Write and Read-Only Replicas
- replication
- account lockout attributes, Replicating Account Lockout Attributes
- and ou=NetscapeRoot, Replicating o=NetscapeRoot for Administration Server Failover
- and password policy, Managing the Account Lockouts and Replication
- and referential integrity, Using Referential Integrity with Replication
- and the Administration Server, Replicating o=NetscapeRoot for Administration Server Failover
- and TLS, Replication over TLS
- cascading, Configuring Cascading Replication
- changelog, Changelog
- configuring from the command line, Configuring Replication from the Command Line
- configuring TLS, Replication over TLS
- consumer server, Suppliers and Consumers
- creating the supplier bind DN, Creating the Supplier Bind DN Entry
- forcing synchronization, Forcing Replication Updates
- fractional, Replicating a Subset of Attributes with Fractional Replication
- hub, Suppliers and Consumers
- managing, Managing Replication
- monitoring status, Monitoring Replication Status
- multi-master, Configuring Multi-Master Replication
- overview, Replication Overview
- purging RUV, Resolving Errors for Obsolete or Missing Suppliers
- removing supplier and RUV, Removing a Supplier from the Replication Topology
- replication manager entry, Replication Identity
- single-master, Configuring Single-Master Replication
- solving conflicts, Solving Common Replication Conflicts
- supplier bind DN, Replication Identity
- supplier server, Suppliers and Consumers
- supplier-initiated, Suppliers and Consumers
- suspending, Temporarily Suspending Replication
- timeout periods, Setting Replication Timeout Periods
- tombstone entries
- troubleshooting, Troubleshooting Replication-Related Problems
- unit of, What Directory Units Are Replicated
- using cl-dump.pl script, Troubleshooting Replication-Related Problems
- replication agreement, Replication Agreement
- replication agreements
- suspending replication, Temporarily Suspending Replication
- replication manager, Replication Identity
- replication monitoring, Monitoring Replication from Admin Express
- resource limits
- setting
- for anonymous binds, Setting Resource Limits on Anonymous Binds
- using command line, Setting User and Global Resource Limits Using the Command Line
- using console, Setting Resource Limits on a Single User
- Resource Summary
- resource use
- restoring data, Backing up and Restoring Data
- bak2db, Using the bak2db Command-Line Script
- bak2db.pl, Using bak2db.pl Perl Script
- cn=tasks, Restoring the Database through the cn=tasks Entry
- dse.ldif, Restoring the dse.ldif Configuration File
- from console, Restoring All Databases from the Console
- replicated entries, Restoring Databases That Include Replicated Entries
- retro changelog
- and access control, Retro Changelog and the Access Control Policy
- attributes, Using the Retro Changelog Plug-in
- object class, Using the Retro Changelog Plug-in
- searching, Retro Changelog and the Access Control Policy
- trimming, Trimming the Retro Changelog
- retro changelog plug-in
- enabling, Enabling the Retro Changelog Plug-in
- roles, Using Roles
- access control, Using Roles Securely
- activating, Activating and Inactivating Users and Roles Using the Console
- assigning, Editing and Assigning Roles to an Entry
- filtered
- creating, Creating a Filtered Role
- example, Creating a Filtered Role through the Command Line
- inactivating, Making a Role Inactive or Active
- managed
- creating, Creating a Managed Role
- example, Creating Managed Roles through the Command Line
- nested
- creating, Creating a Nested Role
- example, Creating Nested Role through the Command Line
- overview, About Roles
- root DSE, Searching the Root DSE Entry
- root entry creation, Defining Directories Using LDIF
- root suffix, Creating Suffixes
- creating from command line, Creating Root and Sub Suffixes using the Command Line
- creating from console, Creating a New Root Suffix Using the Console
- RUV
- purging old supplier entries, Resolving Errors for Obsolete or Missing Suppliers
S
- SASL, Setting up SASL Identity Mapping
- configuring
- KDC server, About the KDC Server and Keytabs
- configuring authentication at startup, Configuring SASL Authentication at Directory Server Startup
- configuring server to server mappings, About SASL Identity Mapping
- identity mapping, About SASL Identity Mapping
- configuring form the Console, Configuring SASL Identity Mapping from the Console
- configuring from the command line, Configuring SASL Identity Mapping from the Command Line
- default, Default SASL Mappings for Directory Server
- Kerberos, Using Kerberos GSS-API with SASL
- Kerberos realms, About Principals and Realms
- mechanisms, Authentication Mechanisms for SASL in Directory Server
- CRAM-MD5, Authentication Mechanisms for SASL in Directory Server
- DIGEST-MD5, Authentication Mechanisms for SASL in Directory Server
- EXTERNAL, Authentication Mechanisms for SASL in Directory Server
- GSS-API, Authentication Mechanisms for SASL in Directory Server
- PLAIN, Authentication Mechanisms for SASL in Directory Server
- overview, Setting up SASL Identity Mapping
- password change extended operation, Changing Passwords Stored Externally
- requiring for connections, Requiring Secure Connections
- requiring secure binds, Requiring Secure Binds
- using with ldapsearch, Using SASL with LDAP Clients
- schema
- adding new attributes, Creating Attributes, Creating Custom Schema Files
- assigning OIDs, Managing Object Identifiers
- checking, Turning Schema Checking On and Off
- creating new attributes, Creating Attributes
- creating new object classes, Creating Object Classes
- custom files, Creating Custom Schema Files
- deleting attributes, Deleting Schema
- deleting elements, Deleting Schema
- deleting object classes, Deleting Schema
- differences between Directory Server and Active Directory, User Schema Differences between Red Hat Directory Server and Active Directory, Group Schema Differences between Red Hat Directory Server and Active Directory
- cn, Values for cn Attributes
- initials, Constraints on the initials Attribute
- street and streetAddress, Values for street and streetAddress
- editing attributes, Editing Custom Schema Elements
- editing object classes, Editing Custom Schema Elements
- extending, Managing the Directory Schema
- nsslapd-schemacheck attribute, Turning Schema Checking On and Off Using the Command Line
- reloading, Dynamically Reloading Schema
- cn=schema reload task, Reloading Schema Using ldapmodify
- schema-reload.pl, Reloading Schema Using schema-reload.pl
- standard, Managing the Directory Schema
- viewing attributes, Viewing Attributes and Object Classes
- viewing object classes, Viewing Attributes and Object Classes
- schema checking
- overview, Turning Schema Checking On and Off
- turning on or off, Turning Schema Checking On and Off
- turning on or off in the command line, Turning Schema Checking On and Off Using the Command Line
- schema-reload.pl, Reloading Schema Using schema-reload.pl
- scripts
- cl-dump.pl, Troubleshooting Replication-Related Problems
- search filters, LDAP Search Filters
- Boolean operators, Using Compound Search Filters
- contained in file, Displaying Subsets of Attributes
- examples, LDAP Search Filters
- matching rule, Using Matching Rules
- operators in, Using Operators in Search Filters
- specifying attributes, Using Attributes in Search Filters
- syntax, LDAP Search Filters
- using compound, Using Compound Search Filters
- using multiple, Using Compound Search Filters
- Search Performance, Search Performance and Resource Limits
- search types
- list of, Using Operators in Search Filters
- searches
- approximate, Using Operators in Search Filters
- equality, Using Operators in Search Filters
- example, Examples of Common ldapsearches
- greater than or equal to, Using Operators in Search Filters
- international, Searching an Internationalized Directory
- international examples, International Search Examples
- less than, Less-Than Example
- less than or equal to, Using Operators in Search Filters
- of directory tree, Using ldapsearch
- presence, Using Operators in Search Filters
- specifying scope, Commonly Used ldapsearch Options
- substring, Using Operators in Search Filters
- searching
- changing the search directory, Searching for Users and Groups
- for directory entries, Searching for Users and Groups
- searching algorithm
- overview, Overview of the Searching Algorithm
- security
- LDAP URLs, Examples of LDAP URLs
- setting encryption ciphers, Setting Encryption Ciphers
- security strength factor, Requiring Secure Connections
- server
- defined, The Servers and Applications Tab
- server group
- defined, The Servers and Applications Tab
- modifying information for, Editing Domain, Host, Server Group, and Instance Information
- server instance
- modifying information for, Editing Domain, Host, Server Group, and Instance Information
- server parameters
- database
- setting passwords, Setting User Passwords
- Simple Authentication and Security Layer, Setting up SASL Identity Mapping
- simple binds
- requiring secure connections, Requiring Secure Binds
- Simple Network Management Protocol. See SNMP, About SNMP
- single-master replication
- introduction, Single-Master Replication
- setting up, Configuring Single-Master Replication
- smart referrals
- creating, Creating Smart Referrals
- creating from command line, Creating Smart Referrals from the Command Line
- creating from console, Creating Smart Referrals Using the Directory Server Console
- SNMP
- configuring
- Directory Server, Configuring the Directory Server for SNMP
- managed device, About SNMP
- managed objects, About SNMP
- master agent, About SNMP
- MIB
- entity table, Entity Table
- entries table, Entries Table
- interaction table, Interaction Table
- operations table, Operations Table
- monitoring the Directory Server, Monitoring Directory Server Using SNMP
- overview, About SNMP
- subagent, About SNMP
- SSF, Requiring Secure Connections
- and SASL, Setting a Minimum Strength Factor
- and StartTLS, Setting a Minimum Strength Factor
- setting minimum, Setting a Minimum Strength Factor
- standard
- attributes, Overview of Schema
- object classes, Overview of Schema
- schema, Managing the Directory Schema
- starting and stopping
- Directory Server and Administration Server, Starting and Stopping a Directory Server Instance
- Starting and stopping
- Administration Server Console, Opening the Administration Server Console
- starting and stopping servers, Starting and Stopping Servers
- static group, Groups
- static groups, Creating Static Groups in the Console
- creating, Creating Static Groups in the Console
- modifying, Creating Static Groups in the Console
- sub suffix, Creating Suffixes
- creating from command line, Creating Root and Sub Suffixes using the Command Line
- creating from console, Creating a New Sub Suffix Using the Console
- substring index, About Index Types
- required for referential integrity, How Referential Integrity Works
- substring index limitation, About Index Types
- substring search, Using Operators in Search Filters
- international example, Substring Example
- subtree-level password policy, Configuring a Local Password Policy
- subtypes
- of attributes, Adding an Attribute Subtype
- suffix
- and associated database, Creating and Maintaining Suffixes
- creating, Creating a Root Entry
- creating from command line, Creating Root and Sub Suffixes using the Command Line
- creating root suffix, Creating a New Root Suffix Using the Console
- creating sub suffix, Creating a New Sub Suffix Using the Console
- custom distribution function, Adding Multiple Databases for a Single Suffix
- custom distribution logic, Adding Multiple Databases for a Single Suffix
- disabling, Disabling a Suffix
- in Directory Server, Configuring Directory Databases
- using referrals, Creating Suffix Referrals Using the Console
- on update only, Creating Suffix Referrals Using the Console
- with multiple databases, Adding Multiple Databases for a Single Suffix
- suffix referrals
- creating, Creating Suffix Referrals
- creating from command line, Creating Suffix Referrals from the Command Line
- creating from console, Creating Suffix Referrals Using the Console
- supplier bind DN, Replication Identity
- supplier server, Suppliers and Consumers
- suppliers
- purging old entries from the RUV, Resolving Errors for Obsolete or Missing Suppliers
- sycnronization
- POSIX attributes
- configuring sync for, Synchronizing POSIX Attributes for Users and Groups
- not syncing object classes, Synchronizing POSIX Attributes for Users and Groups
- symbols
- '', in ldapsearch, Using Special Characters
- ::, in LDIF statements, Base-64 Encoding
- <, in LDIF statements, Standard LDIF Notation
- synchronization
- subtree scope and deleting entries, Handling Entries That Move Out of the Synchronized Subtree
- synchronization agreement
- synchronization options
- enabling, Allowing Sync Attributes for Entries
- overview, Allowing Sync Attributes for Entries
- synchronizing
- passwords, Synchronizing Passwords
- syntax
- LDAP URLs, Components of an LDAP URL
- ldapsearch, ldapsearch Command-Line Format
- matching rule filter, Using Matching Rules
- search filter, LDAP Search Filters
- syntax validation, Using Syntax Validation
- and error logging, Enabling Syntax Validation Warnings (Logging)
- and warnings, Enabling Syntax Validation Warnings (Logging)
- command-line perl script, Validating the Syntax of Existing Attribute Values
- enabling and disabling, Enabling or Disabling Syntax Validation
- enforcing DNs, Enabling Strict Syntax Validation for DNs
- related RFCs, About Syntax Validation
- syntax-validate.pl, Validating the Syntax of Existing Attribute Values
- system connections
- system resources
T
- tables
- changing column position in, Reordering Table Columns
- tabs, in Red Hat Management Console, Red Hat Management Console Tabs
- tasks
- purging old entries from the RUV, Resolving Errors for Obsolete or Missing Suppliers
- template entry. See CoS template entry., About the CoS Template Entry
- thread
- time format, About Locales
- timeout period
- for replication, Setting Replication Timeout Periods
- TLS, Working with TLS
- Administration Server password file, Creating a Password File for the Administration Server
- and replication, Replication over TLS
- CA certificate error messages, Managing Certificates Used by the Directory Server Console
- certificate-based authentication, Using Certificate-based Client Authentication
- certificates, Managing Certificates for Administration Server
- chaining with, Creating a New Database Link Using the Console, Providing an LDAP URL
- loading PKCS#11 modules, Using Hardware Security Modules
- managing certificates for the Directory Server Console, Managing Certificates Used by the Directory Server Console
- port number, Changing the LDAPS Port Numbers
- requiring for connections, Requiring Secure Connections
- requiring secure binds, Requiring Secure Binds
- setting encryption ciphers, Setting Encryption Ciphers
- using hardware security modules, Using Hardware Security Modules
- using with Administration Server, Enabling TLS
- tombstone entries
- topology
- defined, The Servers and Applications Tab
- transaction logs
U
- unauthenticated binds, Allowing Unauthenticated Binds
- uniqueness-top-entry-oc keyword, Configuring Attribute Uniqueness over Object Classes
- user and group management
- referential integrity, Maintaining Referential Integrity
- user directory
- settings, Changing the User Directory Host or Port
- user entries
- changing passwords for, Editing Entries
- creating, Directory and Administrative Users
- editing, Editing Entries
- locating, Searching for Users and Groups
- removing, Removing an Entry from the Directory
- user passwords, Setting User Passwords
- user-defined object classes, Viewing Attributes and Object Classes
- user-level password policy, Configuring a Local Password Policy
- users
- activating, Activating and Inactivating Users and Roles Using the Console
- inactivating, Manually Inactivating Users and Roles
- Users and Groups tab, changing the search directory for, Searching for Users and Groups
- UTF-8, Internationalization
V
- viewing
- access control
- get effective rights, Checking Access Rights on Entries (Get Effective Rights)
- attributes, Viewing Attributes and Object Classes
- object classes, Viewing Attributes and Object Classes
- viewing server information, Viewing Server Information
- viewing server logs, Viewing Server Logs
- virtual list view index, About Index Types
- vlvindex command-line tool, About Index Types
W
- wildcards
- in matching rule filters, LDAP Search Filters
- Windows Synchronization, Synchronizing Red Hat Directory Server with Microsoft Active Directory
- about, About Windows Synchronization
- changing the sync agreement, Modifying the Synchronization Agreement, Adding and Editing the Synchronization Agreement in the Command Line
- checking sync status, Checking Synchronization Status
- Command Line
- configuring multiple subtrees and filters, Configuring Multiple Subtrees and Filters in Windows Synchronization
- configuring, Steps for Configuring Windows Synchronization
- deleting entries, Deleting and Resurrecting Entries
- groups, Synchronizing Groups
- logging levels, Troubleshooting
- manually updating, Sending Synchronization Updates
- Password Sync service, Managing the Password Sync Service
- modifying, Modifying Password Sync
- setting up TLS, Step 5: Configure the Password Sync Service
- starting and stopping, Starting and Stopping the Password Sync Service
- uninstalling, Uninstalling Password Sync Service
- resurrecting deleted entries, Resurrecting Entries
- schema differences, User Schema Differences between Red Hat Directory Server and Active Directory, Group Schema Differences between Red Hat Directory Server and Active Directory
- troubleshooting, Troubleshooting
- users, Synchronizing Users

Where did the comment section go?
Red Hat's documentation publication system recently went through an upgrade to enable speedier, more mobile-friendly content. We decided to re-evaluate our commenting platform to ensure that it meets your expectations and serves as an optimal feedback mechanism. During this redesign, we invite your input on providing feedback on Red Hat documentation via the discussion platform.