Red Hat Directory Server 8.0

9.5. Granting Rights to Add and Delete Group Entries

225

9.6. Granting Conditional Access to a Group or Role

227

9.7. Denying Access

229

9.8. Setting a Target Using Filtering

232

9.9. Allowing Users to Add or Remove Themselves from a Group

232

9.10. Defining Permissions for DNs That Contain a Comma

234

9.11. Proxied Authorization ACI Example

234

10. Advanced Access Control: Using Macro ACIs

235

10.1. Macro ACI Example

235

10.2. Macro ACI Syntax

237

11. Access Control and Replication

241

12. Compatibility with Earlier Releases

241

7. Managing User Accounts and Passwords

243

1. Managing the Password Policy

243

1.1. Configuring the Password Policy

243

1.2. Setting User Passwords

255

1.3. Password Change Extended Operation

255

1.4. Configuring the Account Lockout Policy

257

1.5. Managing the Password Policy in a Replicated Environment

259

1.6. Synchronizing Passwords

260

2. Inactivating Users and Roles

261

2.1. Inactivating User and Roles Using the Console

262

2.2. Inactivating User and Roles Using the Command-Line

262

2.3. Activating User and Roles Using the Console

263

2.4. Activating User and Roles Using the Command-Line

263

3. Setting Resource Limits Based on the Bind DN

264

3.1. Setting Resource Limits Using the Console

264

3.2. Setting Resource Limits Using the Command-Line

265

8. Managing Replication

267

1. Replication Overview

267

1.1. What Directory Units Are Replicated

267

1.2. Read-Write and Read-Only Replicas

267

1.3. Suppliers and Consumers

268

1.4. Changelog

268

1.5. Replication Identity

268

1.6. Replication Agreement

269

1.7. Compatibility with Earlier Versions of Directory Server

269

2. Replication Scenarios

270

2.1. Single-Master Replication

270

2.2. Multi-Master Replication

271

2.3. Cascading Replication

274

3. Creating the Supplier Bind DN Entry

275

4. Configuring Single-Master Replication

276

4.1. Configuring the Read-Write Replica on the Supplier Server

277

4.2. Configuring the Read-Only Replica on the Consumer

278

4.3. Create the Replication Agreement

280

5. Configuring Multi-Master Replication

285

viii

Page 8
Image 8
HP UX Red Hat Direry Server Software manual Red Hat Directory Server