Index

A

access control ACI attribute, 169 ACI syntax, 173

allowing or denying access, 181 and replication, 241

and schema checking, 177 anonymous access, 187 bind rules, 184

access at specific time or day, 198 access based on value matching, 191 general access, 187

user and group access, 186 Boolean bind rules, 201 compatibility with earlier versions, 241 creating from console, 202 dynamic targets, 187

from specific domain, 197 from specific IP address, 196 logging information, 216 overview, 169 permissions, 180 placement of ACIs, 170 rights, 181

roles, 142

SASL authentication, 200 simple authentication, 199 SSL authentication, 200 structure of ACIs, 169 target DN

containing comma, 175 target DN containing comma, 234 targeting, 173

targeting attribute values, 179 targeting attributes, 176 targeting entries, 175 targeting using filters, 178

using the Access Control Editor, 202 value matching, 191

viewing

Access Control Editor, 210 get effective rights, 211

Access Control Editor displaying, 203

access control instruction (ACI). See ACI, 169 access log

configuring, 434 manually rotating, 438 turning off, 434 turning on, 434 viewing, 433

account inactivation, 261 from command line, 262 from console, 262

account lockout, 258 configuration

attributes, 258 configuring, 257

using command line, 258 using console, 257

disabling, 258 enabling, 258 lockout duration, 258 password failure counter, 258 replicating attributes, 331

ACI assessment, 169 attribute, 170 authmethod keyword, 199 bind rules, 173 cascading chaining, 97 creating from console, 204 dayofweek keyword, 198 deleting from console, 210 dns keyword, 197 editing from console, 209 evaluation, 170 examples of use, 216 groupdn keyword, 190 inheritance, 194

ip keyword, 196 local evaluation

cascading chaining, 98 name, 173 permissions, 173 precedence rule, 170 proxy rights example, 234 replication, 241

rights, 181

601

Page 621
Image 621
HP UX Red Hat Direry Server Software manual Index