下载  >  服务器应用  >  其它  > TDS-admin_gd

TDS-admin_gd 评分:

TDS管理手册:IBM Tivoli Directory Server Version 6.3 Administration Guide describes how to perform administrator tasks through the Web Administration Tool and the command line.
IBM Tivoli Directory Server Administration guide Version 6.3 sc272749-00 Before using this information and the product it supports, read the general information under Appendix R, Notices,on Page 629 This edition applies to version 6, release 3, of the IBM Tivoli Directory Server and to all subsequent releases and modifications until otherwise indicated in new editions C Copyright IBM Corporation 2002, 2010 US Government Users Restricted Rights-Use, duplication or disclosure restricted by GSA ADP Schedule Contract with ibm c orb Contents About this book ix Chapter 6. Web Administration Tool Intended audience for this book graphical user interface (GUI).....25 Publications Starting the Web application server to use the Web IBM Tivoli Directory Server version 6.3 library.. ix administration tool Related publications Starting the Web Administration Tool Accessing terminology online Logging on to the console as the server Accessing publications online administrator, a member of an administrative Ordering publications group or an LDAP user Accessibility Console layout Tivoli technical training Logging off the console Tivoli user groups Using tables in the Web Administration Tool Support information Table icons Conventions used in this book Select Action drop-down menu Typeface conventions Paging Operating system-dependent variables and Restore default 30 paths Sorting 30 Finding Part 1. Directory overview Filtering Chapter 1. Defining a directory 3 Directory clients and servers Chapter 7. Setting up the Web Directory security Administration Tool 33 Managing the console Chapter 2. IBM Tivoli Directory Server..5 Changing the console administrator login Changing the console administration password 33 Chapter 3. Distinguished names(DNs) 13 Adding, modifying, and removing servers in the Distinguished name syntax Managing console properties DN escaping rules Manage properties for webadmin searches 35 Enhanced dn processing 15 Viewing scenario-based help files in the Web Adninistration tool Part 2, Server Administration 17 Chapter 8. Managing the IBM Directory Chapter 4. Directory administration schema 37 server 19 Common schema support Starting an instance of the directory administration Object identifier (OID) 39 server 20 Working with object classes Stopping an instance of the directory administration Defining object classes server 20 Viewing object classes Starting the directory server instance at operating Adding an object class system startu aP 20 Editing an object class Autostart on AIX, Linux, and Solaris systems..20 Autostart on Windows systems Copying an object class 21 Deleting an object class Working with attributes Chapter 5 Configuration only mode.. 23 The IBMAttribute types attribute type Minimum requirements for configuration only mode 23 Equality matching rules How to start in configuration only mode Viewing attributes 51 Using Web Administration Adding an attribute Using the command line Editing an attribute How to verify that the server is running in Copying an attribute configuration only mode 24 Using Web Administration Deleting an attribute Using the command line Encrypted Attributes Using command line 59 o Copyright IBM Corp. 2002, 2010 Attribute syntax Using the command line 117 Managing unique attributes 61 Searching the directory with paging and sorting 118 The subschema entries Sorted search control 118 The IBMsubschema object class Simple paged results 119 Schema queries Virtual list view Dynamic schema Persistent search 122 Access controls Enabling and disabling event notification 123 Re lication Enabling event notification Disallowed schema changes .65 Disabling event notification ..125 Object classes 66 Enabling and disabling transaction support 125 Attributes Enabling transaction support 125 Syntaxes 76 Disabling transaction support Matching rules 76 Adding and removing suffixes 127 Schena checking Creating or adding suffixes Checking an entry against the schema R 128 iPlanet compatibility Tombstone- Record deleted entries 129 eneralized and utc time Using Web administration 130 Using the command line 130 Chapter 9. Basic server administration Managing cache properties tasks 81 Entry cach Changing the primary administrator distinguished Filter cache 131 ACL cache 132 name and passwor Using Web Administration Group members’ cache Using the command line Adding attributes to and removing attributes from the attribute cache Starting and stopping the server .82 Using Web Administration DB2 Password monitoring Using the command line or Windows Services Using Web administration .136 ICOn. Using command line Checking server status Using Web Administration Chapter 11. Securing directory Using the command line communications 139 View cache status Configuring security settings 139 Entry cache Using Web administration Filter cache Using the command line ACL cache 99 Transaction Layer Security 41 Group members cache becure Sockets Layer Directory cached attributes Using gskcapicmd 148 Directory cache candidates 100 Using ikeyman 152 Viewing server capabilities( Root DSE)information 101 Setting the key database Using Web Administration .101 Using Web Administration Using command line 104 Using the command line 161 Managing server connections 104 PKCS#11 161 Using Web Administration 104 How to configure the server to use PKCS#11 Using the command line 105 interface 162 Managing connection properties 106 Setting the level of encryption for SSL and Tls Using Web Administration 106 communications .163 Using the command line 107 Using Web Administration 163 Using the command line ..164 Chapter 10. Setting server properties 109 Certificate revocation verification 165 Changing server ports and enabling language tags 110 Using Web Administration 165 Using Web administration Using the command line Using the command line 111 Setting performance 111 Chapter 12. Securing directory access 167 Using Web Administration 111 Password encryption 167 Using the command line 112 Using Web Administration ..170 Enforcing minimum ulimits ,112 Using the command line .170 Using Web Administration 114 Setting password policy 170 Using the command line Global Password policy Search settings 115 Group password polie 171 Using Web administration 115 Individual Password Policy 1v Administration Guide Password policy evaluation 17 Using Web Administration Password policy attributes Using the command line 247 Summary of default settings 178 Creating a master-forwarder-replica topology.. 250 Password guidelines 79 Changing the replica to a forwarding server..251 Setting the administration password and lockout Setting up a complex topology with peer 181 replication Unlocking administrative accounts 182 ing the command line 22 Setting the global password policy Unconfiguring a master/replica configuration . 263 Changing password when pwdsafemodify is set 186 Setting up a gateway topology 265 Setting Kerberos Using Web Administration 267 Using Web Administration Using the command line 26 Using the command line 189 Partial Replication Using Kerberos 189 Using Web Administration Tool Identity napping for Kerberos 189 Jsing comnand line Configuring the DIGEST-MD5 mechanism 191 Examples of replication filter .279 Using Web Administration 191 Excluding replication topology information 280 Using the command line R ry procedure 281 Pass-through authentication Required recovery information 281 Scenarios pertaining to pass-through Recovering from a single-server failure 283 authenticatio Recovering from a catastrophic failure Using Web Administration Tool 198 Multi-threaded replication 284 Using command line Replication error table 285 Creating the administrative group 201 Web Administration tasks for managing replication 286 dministrative roles 201 Replicating subtrees 286 Working with credentials 288 Chapter 13. Referrals....,... 211 Manager ng topologies 291 Setting up referrals to other LDAP directories .211 Modifying replication properties Using the referral object class and the ref Creating replication schedules attribute Managing queues 305 Binding with a distributed namespace Command line tasks tor managing replication An example of distributing the namespace Specifying a supplier DN and password for a through referrals subtree Creating default referrals 215 Viewing replication configuration information 307 Using Web administration 215 Monitoring replication status Using the command line 216 Creating gateway servers Modifying referrals 217 Using Web Administration 217 Chapter 15. Distributed directories 313 Using the command line The Proxy server Removing referrals Splitting data within a subtree based on a hash of Using Web Administration 218 the RiN using a proxy server 317 Using the command line DN Partition plug-in 318 Using the command line 319 Chapter 14. Replication .219 The distributed directory setup tool 319 Replication terminology 219 Synchronizing information Replication topology Partition entries 321 Overview of replication 222 Setting up a distributed directory with proxy Simple replication server Cascading replication Setting up the back-end servers Peer-to-peer replication 223 etting up the proxy server 324 Gateway replication 224 Schema updates in a distributed directory Partial replication Password policy in a distributed directory ..334 Replication conflict resolution Failover and load balancing Replication error handlin Auto failback ng 33 Replication agreement Health check feature Things to consider before configuring replication 233 Health Check status Interval Configuration . 337 Replicating schema and password policy updates 234 High consistency and failover when high Creating a master-replica topology consistency is configured ..337 Using Web administration 236 Weighted Prioritization of backend servers 337 Using the command line Failover between proxy servers Setting up a simple topology with peer replication 244 Setting up backup replication for a distributed directory with proxy servers 338 Content erver groups 339 Using the command line Creating an LDIF file for your data entrie Modifying DB2 log settings 381 Setting up the replication topology 341 Using Web administration Setting up a topology for global policies 342 Using the command line 382 p proxy servers Modifying lost and found log settings Partitioning the data 343 Using Web Administration 382 Loading the partitioned data 343 Using the command line Monitor search 44 Modifying the server log .384 Transactions in proxy server 347 Using Web Administration Starting replication 347 Using the command line 385 Start/stop server tracing Chapter 16 Directory Server backup Using Web Administration and restore 49 Viewing logs 386 Methods that back up complete directory server View logs using Web Administration instance information View logs using the command line ..387 391 Methods that back up database information only 350 Log integration into CBE and CARS format Enhanced backup 351 Log management tool for CBe, Cel, and Cars Using Web Administration 351 features Entries for log managenent 393 Configure directory server backup CARS Reports 393 Perform directory server backup 354 Schedule directory server backup Configuring log management attributes for CBe and cars Perform directory server restore 394 Using the command line 356 Part 3. Directory Management 399 Chapter 17. Logging Utilities.... 359 Default log paths 359 Chapter 18. Working with directory Log management tool .360 entries 401 Specifying custom location for an instances Browsing the tree idslogmgmt. log file 360 Adding an entry 402 Default log management Using Web Administration .402 Modifying global log settings USing the command line 403 Using the Web Administration Tool 362 403 Using the command line Binary data for attributes 403 Modifying administration server log settings Using Web administration 403 Using Web Administration Tool 363 Using the command line ..404 Using the command line 364 Language tags .405 Enabling the administration server audit log and Attributes that cannot have associated language modifying administration audit log settings 364 ta 406 Using Web administration Tool Searching for entries containing attributes with.407 Language tag values for attributes Using the command line Disabling the administration server audit log 367 language tags 407 Using Web Administration 367 Removing a language tag descriptor from an Using the command line entry 408 Configuring preaudit records 368 Deleting an entry 408 Enabling the server audit log and modifying server Using Web Administration 408 audit log settings Using the command line .409 Using Web Administration 372 Modifying an entry 409 Using the command line Using Web administration 409 Disabling the audit log .375 Using the command line Using Web Administration .375 Copying an entr ..410 Using the command line .375 Using Web Administration Performance profiling 376 Using the command line 411 Performance profiling through the independent Editing access control lists for an entry 412 trace facility .376 Adding an auxiliary object class 412 Auditing for performance profiling 377 Using Web Administration .412 Modifying bulkload log settings 378 Using the command line ..413 Using Web Administration Deleting an auxiliary object class 413 Using the command line Using Web administration .413 Modifying tools log settings 380 Using the command line 413 Using Web administration Searching the directory entries vi Administration guide Search filters 414 Chapter 22. Managing a proxy authorization group 463 Creating a proxy authorization group 463 Chapter 19. Access control lists .. 419 Using Web administration 419 Using the command line EntryOwner information 419 Modifying a proxy authorization group 465 Access control information 419 Using server Administration ACL type usage scenarios 421 Using the command 465 The access control attribute syntax ..... 422 Copying a proxy authorization group ±66 423 Using server administration .466 Pseudo dns Using the command line 466 Object filter 425 Removing the proxy authorization group 466 Rights 425 Using Web Administration Propagation Using the command line ,466 Access evaluation 428 Working with ACls 430 Part 4. User-related tasks 469 Using the web Administration Tool utility to manage acls 430 Using the command line utilities to manage ACLS Chapter 23 Realms, templates, users, M and groups Subtree replication considerations 440 Creating a realm 471 Creating a realm administrator Chapter 20 Groups and roles 441 Creating the realm administration grour 471 Groups 441 Creating the administrator entry 472 Static groups 441 Adding the administrator to the administration Dynamic groups 472 Nested gr Creating a template .473 Hybrid groups 443 Adding the template to a realm 475 Determining group menbership 444 Creating groups ...475 Group object classes 448 Adding a user to the realm 475 Group attribute 448 Managing realms 476 Creating a static group entry 449 adding a realm 476 Creating a dynamic group entry 450 Editing a realm 476 Creating a nested group entry 451 Removing a realm Verifying the group task Editing ACLs on the realm Managing members of group entries 453 Managing templates 477 Adding a member to a group entry .453 Adding a user template Editing a member entry in a group Editing a template ...479 Removing a member from a group entry Removing a template 479 Managing memberships for an entry 454 Editing ACLs on the template Adding a group membership Managing users 480 Removing a group membership from an entry 4155 Adding users 480 Editing a memberURL in a dynamic group 456 Finding users within the realm Roles 456 Editing a user's information 480 spying a Chapter 21. Managing search limit Removing a user 481 groups .459 Managing groups Adding groups 481 Creating a search limit group 459 Finding groups within the realm Using Web administration 459 Editing a group's information 482 Using the command line ,461 Modifying a search limit group 461 Copying a group 482 Removing a grout Using Web Administration Using the command line 461 Copying a search limit group 462 Part 5. Appendixes 483 Using server administration Using the command line 462 Appendix A Error codes 485 Removing a search limit group Using Web administration 462 Appendix B. object Identifiers (OIDs) Using the command line 462 and attributes in the root dse 。491 Contents V1l Attributes in the root dse 491 Appendix M. IBM Tivoli Directory OIDs for supported and enabled capabilities Server backup and restore .... 591 OIDs for Aci mechanisms 501 Introduction 591 OIDs for extended operations 501 OIDs for controls 505 Tivoli Directory Server directory schema and database definitions 591 Tivoli Directory Server directory schema Appendix C. LDaP data interchange Tivoli Directory Server directory database and format (LDIF 509 tablespaces ..592 LDIF example 509 Tivoli Directory Server change log database and Version 1 LDIF support 510 Version 1 LDiF examples 510 Overview of backup and restore procedures fur..595 tablespaces IANA character sets supported by platform LDAP Examples of offline backup and restore Appendix D Ascll characters from 33 procedure for a directory database to126. 515 Replication considerations .597 Overview of online backup and restore procedures for Tivoli Directory Server Appendix E IPv6 support 517 Log management .597 Using DB2 backup and restore 599 Appendix F simple Network Management Protocol agent 519 Appendix N Setting up SSL security SNMP Logging 523 SsL scenarios 609 Using the command line - idssnmp Using Https with Embedded Websphere Application server Version 7.x Appendix G. Active Directory Creating secure connections between IBM Tivoli synchronization 525 Directory Server and the IBM Tivoli Directory Steps for using Active Directory synchronization 526 Server Web Administration Tool Files used by active Directory synchronization . 527 Setting up an SSL connection between a IBM Tivoli Running Active Directory synchronization 530 Directory Srever C-based client and IBM Tivoli Configuring Active Directory synchronization to Directory Server use an SSL connection to Active Directory 531 Appendix O. High Availabilit Appendix H. Additional information on Scenarios ,,,,621 password policy 533 Password policy operational attributes 533 Appendix P Referential integrity Interoperability support for password policy plug-in 623 response control Password policy queries 534 Appendix Q. Guidelines for Overriding password policy and unlocking accounts 534 interoperability between IBM Tivoli Replicating multiple password policy attributes 536 Directory Server and z/os IBM Tivoli Replicating password policy operational attributes 536 Directory Server 625 Forcing an add or update for an entry Schena considerations Import or export of directory entries Appendix I Required attribute Functional considerations 628 definitions for IBM Tivoli Directory Server 539 Appendix R Notices ....... 629 Trademarks .631 Appendix J. Synchronizing two-way Glossary· ,633 cryptography between server instances Glossary .633 577 Index,。 639 Appendix K. Filtered ACLs and non-filtered ACLs sample LDiF file 579 Appendix L. Dynamically-changed attributes 587 v111 Administration Guide

...展开详情
2012-03-09 上传 大小:2.45MB
举报 收藏
分享
tds560usb plus driver

tds560usb plus driver

立即下载
TDS560USB驱动

闻亭TDS560USB驱动

立即下载
泰克示波器TDS1000B-SC_manual.pdf

泰克示波器TDS1000B-SC_manual.pdf

立即下载
tektronix_tds_3000_series

连接示波器,示波器驱动,很快解决示波器连接问题

立即下载
tds560usb_plus_ccs33.exe

tds560usb_plus_ccs33.exe 仿真器驱动

立即下载
TDS-PA01适配器手册

TDS-PA01适配器手册TDS-PA01适配器手册TDS-PA01适配器手册

立即下载
闻亭 TDS560usb_plus

闻亭仿真器的驱动TDS560usb_plus_ccs33_SR12

立即下载
太克示波器 TDS-350-Manual

太克示波器 TDS350操作手冊 子(英文版本)

立即下载
TDS-PA01现场总线适配器

TDS-PA01现场总线适配器,用于将爱默生系列变频器接入Profibus-DP网络

立即下载
Top-Down Shooter ToolKit TDS-TK 1.3

Top-Down Shooter ToolKit TDS-TK 1.3.unitypackage 射击类小游戏开发包,内置Demo,详情可百度查看相关内容。

立即下载
TDS-CDMA的3GPP协议规范标准

TDS-CDMA的3GPP协议规范标准

立即下载
TDS-200数字示波器用户手册

TDS-200数字示波器用户手册

立即下载
TDS-CDMA、CDMA2000与WCDMA比较

分析比较第三代移动通信TDS-CDMACDMA2000WCDMA

立即下载
EmersonCT TDS-PA01 SM-RPOFIBUS GSD 文件

艾默生 CT EV.SP.SK.ST等系列变频器PROFIBUS通讯卡的GSD文件。

立即下载
东达TDS-V8使用說明書.pdf

东达TDS-V8使用說明書.pdf 东达TDS-V8使用說明書.pdf

立即下载
TDS-100超声波流量计上位机软件

大连产的TDS-100超声波流量计应用非常广泛,为了方便于流量计于上位机的连接,发一个从上位机可以显示和修改设置的软件,有用的上的拿去。

立即下载
TDS-100系列超声波流量计产品说明书.pdf

TDS-100系列超声波流量计产品说明书pdf,TDS-100系列超声波流量计产品说明书

立即下载
最新TDS-5000系列智能温度显示控制仪说明书

最新TDS-5000系列智能温度显示控制仪说明书

立即下载
东达TDS-F8變頻器操作說明書.pdf

东达TDS-F8變頻器操作說明書.pdf 东达TDS-F8變頻器操作說明書.pdf

立即下载
论文研究-双天线发射分集TDS-OFDM系统干扰消除技术 .pdf

双天线发射分集TDS-OFDM系统干扰消除技术,昌文婷,王劲涛,在发射分集的时域同步正交频分复用(TDS-OFDM)系统中存在二种干扰:训练序列之间的干扰,训练序列和OFDM数据块之间的干扰。为了消除

立即下载