Administration Guide
vi
6.10.2. Macro ACI Syntax ........................................................................................ 202
6.11. Access Control and Replication ............................................................................... 205
6.12. Compatibility with Earlier Releases .......................................................................... 205
7. Managing User Accounts and Passwords 207
7.1. Managing the Password Policy .................................................................................. 207
7.1.1. Configuring the Password Policy ..................................................................... 207
7.1.2. Setting User Passwords ................................................................................. 217
7.1.3. Password Change Extended Operation ........................................................... 217
7.1.4. Configuring the Account Lockout Policy ........................................................... 219
7.1.5. Managing the Password Policy in a Replicated Environment ............................. 221
7.1.6. Synchronizing Passwords ............................................................................... 222
7.2. Inactivating Users and Roles ..................................................................................... 222
7.2.1. Inactivating User and Roles Using the Console ................................................ 223
7.2.2. Inactivating User and Roles Using the Command-Line ..................................... 223
7.2.3. Activating User and Roles Using the Console .................................................. 224
7.2.4. Activating User and Roles Using the Command-Line ........................................ 224
7.3. Setting Resource Limits Based on the Bind DN .......................................................... 224
7.3.1. Setting Resource Limits Using the Console ..................................................... 225
7.3.2. Setting Resource Limits Using the Command-Line ........................................... 225
8. Managing Replication 227
8.1. Replication Overview ................................................................................................ 227
8.1.1. What Directory Units Are Replicated ............................................................... 227
8.1.2. Read-Write and Read-Only Replicas ............................................................... 227
8.1.3. Suppliers and Consumers .............................................................................. 227
8.1.4. Changelog ..................................................................................................... 228
8.1.5. Replication Identity ......................................................................................... 228
8.1.6. Replication Agreement ................................................................................... 229
8.1.7. Replicating Attributes with Fractional Replication .............................................. 229
8.1.8. Compatibility with Earlier Versions of Directory Server ...................................... 229
8.2. Replication Scenarios ............................................................................................... 230
8.2.1. Single-Master Replication ............................................................................... 230
8.2.2. Multi-Master Replication ................................................................................. 231
8.2.3. Cascading Replication .................................................................................... 233
8.3. Creating the Supplier Bind DN Entry .......................................................................... 235
8.4. Configuring Single-Master Replication ........................................................................ 236
8.4.1. Configuring the Read-Write Replica on the Supplier Server ............................... 236
8.4.2. Configuring the Read-Only Replica on the Consumer ....................................... 238
8.4.3. Create the Replication Agreement .................................................................. 240
8.5. Configuring Multi-Master Replication .......................................................................... 246
8.5.1. Configuring the Read-Write Replicas on the Supplier Servers ........................... 246
8.5.2. Configuring the Read-Only Replicas on the Consumer Servers ......................... 249
8.5.3. Setting up the Replication Agreements ............................................................ 251
8.5.4. Preventing Monopolization of the Consumer in Multi-Master Replication ............. 257
8.6. Configuring Cascading Replication ............................................................................ 258
8.6.1. Configuring the Read-Write Replica on the Supplier Server ............................... 258
8.6.2. Configuring the Read-Only Replica on the Consumer Server ............................ 260
8.6.3. Configuring the Read-Only Replica on the Hub ................................................ 262
8.6.4. Setting up the Replication Agreements ............................................................ 265
8.7. Configuring Replication from the Command Line ........................................................ 271
8.7.1. Configuring Suppliers from the Command Line ................................................ 271
Содержание DIRECTORY SERVER 8.0
Страница 18: ...xviii ...
Страница 29: ...Configuring the Directory Manager 11 6 Enter the new password and confirm it 7 Click Save ...
Страница 30: ...12 ...
Страница 112: ...94 ...
Страница 128: ...110 ...
Страница 190: ...Chapter 6 Managing Access Control 172 4 Click New to open the Access Control Editor ...
Страница 224: ...206 ...
Страница 324: ...306 ...
Страница 334: ...316 ...
Страница 358: ...340 ...
Страница 410: ...392 ...
Страница 420: ...402 ...
Страница 444: ...426 ...
Страница 454: ...436 ...
Страница 464: ...446 ...
Страница 484: ...466 ...
Страница 512: ...494 ...
Страница 522: ...504 ...