presence indexAllows searches for entries that contain a specific indexed attribute.
protocolA set of rules that describes how devices on a network exchange information.
protocol data unitSee PDU.
proxy

A special form of authentication where the user requesting access to the directory does not bind

authentication

with its own DN but with a proxy DN.
proxy DN

Used with proxied authorization. The proxy DN is the DN of an entry that has access permissions

 

to the target on which the client-application is attempting to perform an operation.

PTA

Mechanism by which one Directory Server consults another to check bind credentials. Also

 

pass-through authentication.
PTA directory

In pass-through authentication (PTA), the PTA Directory Server is the server that sends (passes

serverthrough) bind requests it receives to the authenticating directory server.
PTA LDAP URL

In pass-through authentication, the URL that defines the authenticating directory server,

 

pass-through subtree(s), and optional parameters.

R

 

RAM

Random access memory. The physical semiconductor-based memory in a computer. Information

 

stored in RAM is lost when the computer is shut down.
RDN

The name of the actual entry itself, before the entry's ancestors have been appended to the string

 

to form the full distinguished name. Also relative distinguished name.
read-only replica

A replica that refers all update operations to read-write replicas. A server can hold any number

 

of read-only replicas.
read-write replica

A replica that contains a master copy of directory information and can be updated. A server

 

can hold any number of read-write replicas.
referential

Mechanism that ensures that relationships between related entries are maintained within the

integrity

directory.

referral

(1) When a server receives a search or update request from an LDAP client that it cannot process,

 

it usually sends back to the client a pointer to the LDAP sever that can process the request.

 

(2) In the context of replication, when a read-only replica receives an update request, it forwards

 

it to the server that holds the corresponding read-write replica. This forwarding process is

 

called a referral.
relativeSee RDN.

distinguished

 

name

 

replicaA database that participates in replication.
replica-initiated

Replication configuration where replica servers, either hub or consumer servers, pull directory

replication

data from supplier servers. This method is available only for legacy replication.

replication

Act of copying directory trees or subtrees from supplier servers to replica servers.

replication

Set of configuration parameters that are stored on the supplier server and identify the databases

agreement

to replicate, the replica servers to which the data is pushed, the times during which replication

 

can occur, the DN and credentials used by the supplier to bind to the consumer, and how the

 

connection is secured.
RFC

Request for Comments. Procedures or standards documents submitted to the Internet

 

community. People can send comments on the technologies before they become accepted

 

standards.
role

An entry grouping mechanism. Each role has members, which are the entries that possess the

 

role.

role-based

Attributes that appear on an entry because it possesses a particular role within an associated

attributesCoS template.
root

The most privileged user available on Unix machines. The root user has complete access

 

privileges to all files on the machine.
root suffix

The parent of one or more sub suffixes. A directory tree can contain more than one root suffix.

65