4 | Administering |
| Services |
This chapter describes how to keep your clients running smoothly and expand your computing environment. It describes the following topics:
•“Using The
•“Integrating with Trusted Mode” on page 105
•“PAM_AUTHZ Login Authorization Enhancement” on page 109
•“Adding a Directory Replica” on page 118
•“Displaying the Proxy User’s DN” on page 119
•“Verifying the Proxy User” on page 120
•“Creating a New Proxy User” on page 120
•“Displaying the Current Profile” on page 121
•“Creating a New Profile” on page 121
•“Modifying a Profile” on page 122
•“Changing Which Profile a Client Is Using” on page 122
•“Changing from Anonymous Access to Proxy Access” on page 123
•“Changing from Proxy Access to Anonymous Access” on page 123
•“Performance Considerations” on page 125
Chapter 4 | 93 |