
86
Glossary
symmetric encryption
Encryption that uses the same key for both encrypting and decrypting. DES is an example of a
symmetric encryption algorithm.
system index
Cannot be deleted or modified as it is essential to Directory Server operations.
T
target
In the context of access control, the target identifies the directory information to which a partic-
ular ACI applies.
target entry
The entries within the scope of a CoS.
TCP/IP
Transmission Control Protocol/Internet Protocol. The main network protocol for the Internet and
for enterprise (company) networks.
template entry
See
CoS template entry
.
time/date format
Indicates the customary formatting for times and dates in a specific region.
TLS
Also Transport Layer Security. The new standard for secure socket layers; a public key based
protocol.
topology
The way a directory tree is divided among physical servers and how these servers link with one
another.
Summary of Contents for DIRECTORY SERVER 7.1
Page 1: ...Red Hat Directory Server 7 1 Red Hat Directory Server Installation Guide ...
Page 28: ...22 Chapter 2 Computer System Requirements ...
Page 36: ...30 Chapter 3 Using Express and Typical Installation ...
Page 48: ...42 Chapter 4 Silent Installation and Instance Creation DisableSchemaChecking No ...
Page 64: ...58 Chapter 6 Migrating from Previous Versions ...
Page 70: ...64 Chapter 7 Troubleshooting ...
Page 94: ...88 Glossary ...