Administrator’s Guide
Red Hat Directory Server                                                            

Previous
Contents
Index
Next

List of Tables


Table 2-1 Entry Templates and Corresponding Object Classes 49
Table 2-2 Description of ldapmodify Parameters Used for Adding Entries 61
Table 2-3 Description of ldapmodify Parameters Used for Modifying Entries 62
Table 2-4 Description of ldapdelete Parameters Used for Deleting Entries 64
Table 3-1 Suffix Attributes 87
Table 3-2 Components Allowed to Chain 105
Table 3-3 LDAP Controls and Their OIDs 110
Table 3-4 Database Link Configuration Attributes 117
Table 3-5 Database Link Connection Management Attributes 126
Table 3-6 Database Link Processing Error Detection Parameters 128
Table 3-7 Cascading Chaining Configuration Attributes 137
Table 4-1 Import Method Comparison 152
Table 5-1 Object Classes and Attributes for Roles 182
Table 5-2 CoS Definition Entry Object Classes 195
Table 5-3 CoS Definition Entry Attributes 195
Table 5-4 CoS Definitions 197
Table 6-1 LDIF Target Keywords 212
Table 6-2 LDIF Bind Rule Keywords 224
Table 6-3 Permissions That Can Be Set on Entries 269
Table 6-4 Permissions That Can Be Set on Attributes 269
Table 6-5 Returned Result Codes 273
Table 6-6 Macros in ACI Keywords 277
Table 7-1 Password Policy Attributes 287
Table 7-2 Account Lockout Policy Attributes 297
Table 8-1 Replicate_Now Variables 359
Table 8-2 Attributes of a Retro Changelog Entry 363
Table 8-3 Directory Server Console - Replication Status 367
Table 9-1 Attributes Tab Reference 382
Table 9-2 Object Classes Tab Reference 386
Table 10-1 Default Indexes 393
Table 10-2 System Indexes 394
Table 10-3 Attribute Name Quick Reference Table 422
Table 11-1 Supported Kerberos Systems 450
Table 12-1 Server Performance Monitoring - Resource Summary 463
Table 12-2 Server Performance Monitoring - Current Resource Usage 464
Table 12-3 Server Performance Monitoring - Connection Status 465
Table 12-4 Server Performance Monitoring - Global Database Cache 465
Table 12-5 Database Performance Monitoring - Summary Information 469
Table 12-6 Database Performance Monitoring - Database Cache Information 470
Table 12-7 Database Performance Monitoring - Database File-Specific 471
Table 12-8 Database Link Monitoring Attributes 474
Table 13-1 Operations - Managed Objects and Descriptions 480
Table 13-2 Entries - Managed Objects and Descriptions 482
Table 13-3 Interaction - Managed Objects and Descriptions 482
Table 15-1 Details of 7-Bit Check Plug-in 495
Table 15-2 Details of ACI Plug-in 496
Table 15-3 Details of Preoperation Plug-in 497
Table 15-4 Details of Binary Syntax Plug-in 497
Table 15-5 Details of Boolean Syntax Plug-in 498
Table 15-6 Details of Case Exact String Syntax Plug-in 498
Table 15-7 Details of Case Ignore String Syntax Plug-in 499
Table 15-8 Details of Cloning Database Plug-in 499
Table 15-9 Details of Class of Service Plug-in 500
Table 15-10 Details of Country String Plug-in 500
Table 15-11 Details of Distinguished Name Syntax Plug-in 501
Table 15-12 Details of Generalized Time Syntax Plug-in 501
Table 15-13 Details of Integer Syntax Plug-in 502
Table 15-14 Details of Internationalization Plug-in 503
Table 15-15 Details of ldbm Database Plug-in 503
Table 15-16 Details of Legacy Replication Plug-in 504
Table 15-17 Details of Multi-Master Replication Plug-in 504
Table 15-18 Details of Octet String Syntax Plug-in 505
Table 15-19 Details of CLEAR Password Storage Plug-in 505
Table 15-20 Details of CRYPT Password Storage Plug-in 506
Table 15-21 Details of NS-MTA-MD5 Password Storage Plug-in 507
Table 15-22 Details of SHA Password Storage Plug-in 507
Table 15-23 Details of SSHA Password Storage Plug-in 508
Table 15-24 Details of Postal Address String Syntax Plug-in 508
Table 15-25 Details of PTA Plug-in 509
Table 15-26 Details of Referential Integrity Postoperation Plug-in 510
Table 15-27 Details of Retro Changelog Plug-in 511
Table 15-28 Details of Roles Plug-in 511
Table 15-29 Details of Space Insensitive String Syntax Plug-in 512
Table 15-30 Details of State Change Plug-in 512
Table 15-31 Details of Telephone Syntax Plug-in 513
Table 15-32 Details of UID Uniqueness Plug-in 514
Table 15-33 Details of URI Plug-in 515
Table 16-1 PTA Plug-in Parameters 520
Table 17-1 Attribute Uniqueness Plug-in Variables 535
Table 18-1 User Entry Schema Mapping between Directory Server and Windows Servers 563
Table 18-2 User Entry Schema That Is the Same in Directory Server and Windows Servers 564
Table 18-3 Group Entry Schema Mapping between Directory Server and Windows Servers 566
Table 18-4 Group Entry Schema that are directly mapped between Directory Server and Windows Servers 566
Table A-1 LDIF Fields 576
Table A-2 LDIF Elements in Organization Entries 580
Table A-3 LDIF Elements in Organizational Unit Entries 581
Table A-4 LDIF Elements in Person Entries 583
Table B-1 Search Filter Operators 598
Table B-2 Search Filter Boolean Operators 599
Table B-3 Search Types, Operators, and Suffixes 605
Table C-1 LDAP URL Components 609
Table D-1 Supported Locales 617
Table D-2 Supported Language Subtypes 619



Previous
Contents
Index
Next

© 2001 Sun Microsystems, Inc. Used by permission. © 2005 Red Hat, Inc. All rights reserved.
Read the Full Copyright and Third-Party Acknowledgments.

last updated May 20, 2005