Creating and Maintaining Database Links

The server does not attempt to protect unencrypted data stored in memory. This data may be copied into a system page file by the operating system. For this reason, ensure that any page or swap files are adequately protected.

3.Creating and Maintaining Database Links

Chaining means that a server contacts other servers on behalf of a client application and then returns the combined results. Chaining is implemented through a database link, which points to data stored remotely. When a client application requests data from a database link, the database link retrieves the data from the remote database and returns it to the client.

Section 5, “Monitoring Database Link Activity” covers how to monitor database link activity.

Section 3.1, “Configuring the Chaining Policy”

Section 3.2, “Creating a New Database Link”

Section 3.3, “Chaining Using SSL”

Section 3.4, “Maintaining Database Links”

Section 3.5, “Database Links and Access Control Evaluation”

Section 3.6, “Advanced Feature: Tuning Database Link Performance”

Section 3.7, “Advanced Feature: Configuring Cascading Chaining”

3.1. Configuring the Chaining Policy

These procedures describe configuring how Directory Server chains requests made by client applications to Directory Servers that contain database links. This chaining policy applies to all database links created on Directory Server.

3.1.1. Chaining Component Operations

A component is any functional unit in the server that uses internal operations. For example, plug-ins are considered to be components, as are functions in the front-end. However, a plug-in may actually be comprised of multiple components (for example, the ACI plug-in).

Some components send internal LDAP requests to the server, expecting to access local data only. For such components, control the chaining policy so that the components can complete their operations successfully. One example is the certificate verification function. Chaining the LDAP request made by the function to check certificates implies that the remote server is trusted. If the remote server is not trusted, then there is a security problem.

69

Page 89
Image 89
HP UX Red Hat Direry Server Software manual Creating and Maintaining Database Links, Configuring the Chaining Policy