517
SSL
A software library establishing a secure connection between two
parties (client and server) used to implement HTTPS, the secure
version of HTTP. Also called
Secure Sockets Layer
.
standard index
index maintained by default.
sub suffix
A branch underneath a root suffix.
subagent
See
SNMP subagent
.
substring index
Allows for efficient searching against substrings within entries.
Substring indexes are limited to a minimum of two characters for each
entry.
suffix
The name of the entry at the top of the directory tree, below which
data is stored. Multiple suffixes are possible within the same directory.
Each database only has one suffix.
superuser
The most privileged user available on Unix machines. The superuser
has complete access privileges to all files on the machine. Also called
root
.
supplier
Server containing the master copy of directory trees or subtrees that
are replicated to replica servers.
supplier server
In the context of replication, a server that holds a replica that is copied
to a different server is called a supplier for that replica.
supplier-initiated replication
Replication configuration where
supplier
servers replicate directory
data to any replica servers.
symmetric encryption
Encryption that uses the same key for both encrypting and decrypting.
DES is an example of a symmetric encryption algorithm.
system index
Cannot be deleted or modified as it is essential to Directory Server
operations.
T
target
In the context of access control, the target identifies the directory
information to which a particular ACI applies.
target entry
The entries within the scope of a CoS.
TCP/IP
Transmission Control Protocol/Internet Protocol. The main network
protocol for the Internet and for enterprise (company) networks.
template entry
See
CoS template entry
.
time/date format
Indicates the customary formatting for times and dates in a specific
region.
TLS
The new standard for secure socket layers; a public key based
protocol. Also
Transport Layer Security
.
Summary of Contents for DIRECTORY SERVER 8.0
Page 18: ...xviii ...
Page 29: ...Configuring the Directory Manager 11 6 Enter the new password and confirm it 7 Click Save ...
Page 30: ...12 ...
Page 112: ...94 ...
Page 128: ...110 ...
Page 190: ...Chapter 6 Managing Access Control 172 4 Click New to open the Access Control Editor ...
Page 224: ...206 ...
Page 324: ...306 ...
Page 334: ...316 ...
Page 358: ...340 ...
Page 410: ...392 ...
Page 420: ...402 ...
Page 444: ...426 ...
Page 454: ...436 ...
Page 464: ...446 ...
Page 484: ...466 ...
Page 512: ...494 ...
Page 522: ...504 ...