Chapter 3: Configuring Your Library
Using LDAP
244
Quantum Scalar i6000 User’s Guide
certificate from the LDAP servers. If you use secure LDAP,
both LDAP servers specified above MUST use the same
trusted root.
•
Port:
Enter the appropriate port in this field.
•
Retrieve TR:
Use this function to retrieve the trusted root
certificate from the primary LDAP server. An MD5 and SHA1
hash is shown to verify the LDAP’s server identity.
Note:
The first time you use
Retrieve TR
, the process can
take 5 to 10 minutes. To connect to a secure LDAP
server, you must complete the retrieval process.
Note:
This button is only enabled if the
Secure
check box
is selected. Some directory servers (for example,
Novell eDirectory
TM
) are secure only by default.
•
Search Information
section:
• Administrative user rights are not required, but the user
must have the right to search for all needed user names in
the LDAP directory.
Summary of Contents for Scalar i6000
Page 1: ...User s Guide Scalar i6000 6 66879 15 Rev B...
Page 276: ...Chapter 3 Configuring Your Library Working with Towers 258 Quantum Scalar i6000 User s Guide...
Page 344: ...Chapter 8 Encryption Key Management Using SKM 326 Quantum Scalar i6000 User s Guide...
Page 444: ...Chapter 11 Configuring Access to StorNext 426 Quantum Scalar i6000 User s Guide...
Page 450: ...Chapter 12 Partition Utilization Reporting 432 Quantum Scalar i6000 User s Guide...
Page 574: ...Chapter 15 Maintaining Your Library Maintenance Actions 556 Quantum Scalar i6000 User s Guide...
Page 730: ...Appendix A Frequently Asked Questions 684 Quantum Scalar i6000 User s Guide...