544
Novell eDirectory 8.8 Administration Guide
no
vd
ocx (
E
NU)
01
F
ebr
ua
ry
200
6
• All user secrets stored in Novell SecretStore
®
on the source tree must be deleted.
• All NMAS login methods in the source tree must be deleted and reinstalled in the target
tree.
• All NMAS users that were in the source tree must be re-enrolled when the trees are
merged.
• All users and servers that were in the source tree must have new certificates created for
them when the trees are merged.
• All users that were in the source tree must have their secrets reinstalled into SecretStore.
If neither the source tree nor the target tree has a container named Security under the root of the tree,
or if only one of the trees has the Security container, no further action is required. Otherwise,
continue with the remaining procedures in this section.
A.2.1 Product-Specific Operations to Perform prior to Tree
Merge
This section contains the following information:
•
“Novell Certificate Server” on page 544
•
“Novell Single Sign-on” on page 545
•
“NMAS” on page 546
•
“Novell Security Domain Infrastructure” on page 546
•
“Other Security-Specific Operations” on page 547
Novell Certificate Server
If Novell Certificate Server (previously known as Public Key Infrastructure Services, or PKIS) has
been installed on any server in the source tree, you should complete the following steps.
NOTE:
Depending on how the product was used, the objects and items referred to might or might
not be present. If the objects and items referred to in a given step are not present in the source tree,
you can skip the step.
1
Any Trusted Root certificates in the source tree should be installed in the target tree.
Trusted Root certificates are stored in Trusted Root objects, which are contained by Trusted
Root containers. Trusted Root containers can be created anywhere within the tree; however,
only the Trusted Root certificates that are in the Trusted Root containers within the Security
container must be moved manually from the source tree to the target tree.
2
Install the Trusted Root certificates in the target tree.
2a
Pick a Trusted Root container in the Security container in the source tree.
2b
Create a Trusted Root container in the Security container of the target tree with the exact
name used in the source tree (Step 2a).
2c
In the source tree, open a Trusted Root object in the selected Trusted Root container and
export the certificate.
Summary of Contents for EDIRECTORY 8.8 - GUIDE
Page 4: ...novdocx ENU 01 February 2006...
Page 16: ...16 Novell eDirectory 8 8 Administration Guide novdocx ENU 01 February 2006...
Page 68: ...68 Novell eDirectory 8 8 Administration Guide novdocx ENU 01 February 2006...
Page 90: ...90 Novell eDirectory 8 8 Administration Guide novdocx ENU 01 February 2006...
Page 116: ...116 Novell eDirectory 8 8 Administration Guide novdocx ENU 01 February 2006...
Page 128: ...128 Novell eDirectory 8 8 Administration Guide novdocx ENU 01 February 2006...
Page 184: ...184 Novell eDirectory 8 8 Administration Guide novdocx ENU 01 February 2006...
Page 249: ...250 Novell eDirectory 8 8 Administration Guide novdocx ENU 01 February 2006...
Page 307: ...308 Novell eDirectory 8 8 Administration Guide novdocx ENU 01 February 2006...
Page 333: ...334 Novell eDirectory 8 8 Administration Guide novdocx ENU 01 February 2006...
Page 371: ...372 Novell eDirectory 8 8 Administration Guide novdocx ENU 01 February 2006...
Page 439: ...440 Novell eDirectory 8 8 Administration Guide novdocx ENU 01 February 2006...
Page 519: ...520 Novell eDirectory 8 8 Administration Guide novdocx ENU 01 February 2006...
Page 529: ...530 Novell eDirectory 8 8 Administration Guide novdocx ENU 01 February 2006...
Page 555: ...556 Novell eDirectory 8 8 Administration Guide novdocx ENU 01 February 2006...