Novells Guide to Troubleshooting eDirectory

     
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

language actions (awk)   2nd  

latency

       replication

               reduction of   2nd  

LDAP

       (Lightweight Directory Access Protocol)   2nd  

       (v3)   2nd  

       access control   2nd  

       bind methods   2nd  

               anonymous binds  

               SASL binds   2nd  

               secure binds  

               simple binds  

       controls   2nd   3rd   4th   5th   6th   7th   8th   9th  

               ActiveX Controls for Novell Services   2nd  

       dynamic groups

               ACL rights calculation  

               advantages   2nd  

               checking for static members   2nd   3rd  

               configuring   2nd   3rd   4th   5th   6th   7th  

               creating   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th  

               disadvantages   2nd  

               management of   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th  

               search filters   2nd  

               upgrading from existing static group   2nd   3rd  

       eDirectory version support  

       extensions   2nd   3rd   4th   5th   6th  

               ICE-specific   2nd  

               persistent search  

               querying support for eDirectory   2nd   3rd   4th  

       Group object   2nd   3rd  

       resolution models

               chaining   2nd   3rd   4th   5th   6th  

               referral   2nd   3rd   4th   5th   6th  

       server error codes  

       Server object   2nd   3rd  

       versus NDS

               object attribute names   2nd   3rd   4th   5th  

               schema attribute names   2nd   3rd   4th   5th  

LDAP Data Interchange Format (LDIF)  

LDAP ICE utility

       destination handlers   2nd  

       Dirload handler   2nd  

       functional overview   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th  

       launching  

       object information

               exporting   2nd   3rd   4th   5th   6th   7th   8th  

       roots with Bulkload utility   2nd  

       source handlers   2nd  

LDAP Server for NDS

       attributes

               Base-64 Content-Transfer-Encoding mechanism   2nd  

       authentication support   2nd  

       development of  

       eDirectory versions

               feature comparisons   2nd   3rd   4th  

       entries

               manipulating  

       Event Services

               supported events   2nd   3rd  

       modules  

       Root DSE  

       schema definitions

               manipulating  

       schema mapping to eDirectory   2nd   3rd   4th  

       tools

               ice  

               ldapadd  

                ldapdelete  

                ldapmodify  

                ldapmodrdn  

               ldapsearch  

               ndsindex  

               Unix platform  

       versus eDirectory

               terminology differences   2nd   3rd   4th  

LDAP services

       proxy users

               anonymous bind settings   2nd   3rd   4th   5th  

               configuring   2nd   3rd   4th   5th  

ldapadd tool

       LDAP Server for NDS  

ldapdelete tool

       LDAP Server for NDS  

ldapmodify tool

       LDAP Server for NDS  

ldapmodrdn tool

       LDAP Server for NDS  

ldapsearch tool

       LDAP Server for NDS  

LDIF

       special ACL assignments

               management of   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  

Legato Networker for NetWare

       third-party SMS backup solutions  

Lightweight Directory Access Protocol  

Limber process (background processes)   2nd   3rd   4th  

linking

       gaps

               between tools   2nd  

Linux platforms

       time synchronization

               third-party applications  

LinuxShelf.com Web site  

listings

       A DSA Add Entry Request (6.4)  

       A DSA Add Entry Request with Failure (6.5)  

       A Sample Synchronization Process (6.2)   2nd  

       A Split Partition Operation (6.17)   2nd  

       A Successful Synchronization (6.3)   2nd  

       An awk Script That Converts the Nlist User Listing to an LDIF File (12.2)   2nd  

       An LDIF File Generated by the awk Script (12.3)   2nd  

       An NList Listing of all Users in a Specific Context (12.1)   2nd  

       An Object Resolve Name Request During Renaming Operation (6.6)   2nd  

       awk Script That Uses the [Self] ACL (12.4)   2nd  

       DSA Finish Move Operation (6.15)   2nd  

       DSA Read Entry Information for Object Being Moved (6.12)   2nd  

       DSA Read Entry Information Requests for Containers in Preparation for Object Move (6.11)   2nd   3rd  

       DSA Remove Entry Request (6.9)   2nd  

       DSA Start Move Operation (6.13)  

       DSRepair Log File Showing Obituaries Created by rename Operation (6.8)   2nd  

       DSRepair Log Showing Obituaries Created By Deletion (6.10)   2nd  

       DSTrace Messages from Join Operation (6.18)   2nd  

       Obituaries Issued Due to Move Operation (6.14)   2nd   3rd  

       Obituary State Advancement (6.1)   2nd  

locating

       DIB files   2nd   3rd  

       hidden objects

               with excessive rights   2nd   3rd   4th  

logging

       nonreplicated events

               NNA  

       replicated events

               NNA  

logging applications

       NNA auditing service component   2nd  

LogicSource for NDS/eDirectory

       information tool   2nd  

login names

       maximum lengths

               maximizing   2nd  

login scripts

       administrative accounts

               protection of   2nd   3rd   4th   5th   6th   7th  

       operating system

               checking   2nd   3rd  

logins

       maximum concurrent limit

               security risks   2nd   3rd   4th  

lost passwords

       recovering (third-party data recovery tools)   2nd  

lost user accounts

       recovering (third-party data recovery tools)   2nd   3rd  

low dirty cache   2nd   3rd  

 

Категории