8.7.1.2 Permissions....................................................................................................................

118

8.7.1.3 Bind rules.......................................................................................................................

119

8.7.2 Setting permissions................................................................................................................

119

8.7.2.1 The precedence rule......................................................................................................

119

8.7.2.2 Allowing or denying access..........................................................................................

119

8.7.2.3 When to deny access.....................................................................................................

120

8.7.2.4 Where to place access control rules...............................................................................

120

8.7.2.5 Using filtered access control rules.................................................................................

120

8.7.3 Viewing ACIs: Get effective rights........................................................................................

121

8.7.4 Using ACIs: Some hints and tricks........................................................................................

122

8.8 Database encryption......................................................................................................................

123

8.9 Securing server to server connections...........................................................................................

124

8.10 Other security resources..............................................................................................................

124

9 Directory design examples.......................................................................................

125

9.1 Design example: A local enterprise...............................................................................................

125

9.1.1 Local enterprise data design..................................................................................................

125

9.1.2 Local enterprise schema design.............................................................................................

125

9.1.3 Local enterprise directory tree design...................................................................................

126

9.1.4 Local enterprise topology design..........................................................................................

127

9.1.4.1 Database topology.........................................................................................................

127

9.1.5 Local enterprise replication design.......................................................................................

128

9.1.5.1 Supplier architecture.....................................................................................................

128

9.1.5.2 Supplier consumer architecture....................................................................................

129

9.1.6 Local enterprise security design............................................................................................

130

9.1.7 Local enterprise tuning and optimizations...........................................................................

131

9.1.8 Local enterprise operations decisions...................................................................................

131

9.2 Design example: A multinational enterprise and its extranet.......................................................

131

9.2.1 Multinational enterprise data design....................................................................................

132

9.2.2 Multinational enterprise schema design...............................................................................

132

9.2.3 Multinational enterprise directory tree design.....................................................................

132

9.2.4 Multinational enterprise topology design.............................................................................

134

9.2.4.1 Database topology.........................................................................................................

134

9.2.4.2 Server topology.............................................................................................................

135

9.2.5 Multinational enterprise replication design..........................................................................

137

9.2.5.1 Supplier architecture.....................................................................................................

137

9.2.6 Multinational enterprise security design..............................................................................

139

10 Support and other resources..................................................................................

141

10.1 Contacting HP..............................................................................................................................

141

10.1.1 Information to collect before contacting HP........................................................................

141

10.1.2 How to contact HP technical support.................................................................................

141

10.1.3 HP authorized resellers.......................................................................................................

141

10.1.4 Documentation feedback.....................................................................................................

141

10.2 Related information.....................................................................................................................

141

10.2.1 HP-UX Directory Server documentation set.......................................................................

141

10.2.2 HP-UX documentation set...................................................................................................

142

10.2.3 Troubleshooting resources...................................................................................................

143

10.3 Typographic conventions............................................................................................................

143

Glossary.........................................................................................................................

145

Table of Contents

7