HP UX Red Hat Direry Server Software manual Configuring the Chaining Policy

Models: UX Red Hat Direry Server Software

1 638
Download 638 pages 23.73 Kb
Page 91
Image 91

Configuring the Chaining Policy

Component Name

Description

Permissions

 

 

 

 

authentication can work with

 

 

a database link. To chain this

 

 

component's operations, add

 

 

the chaining component

 

 

attribute,

 

 

nsActiveChainingComponents:

 

 

cn=certificate-based

 

 

authentication,cn=components,cn=config

.

 

 

 

Referential Integrity plug-in

This plug-in ensures that

Read, write, search, and

 

updates made to attributes

compare

 

containing DNs are

 

 

propagated to all entries that

 

 

contain pointers to the

 

 

attribute. For example, when

 

 

an entry that is a member of a

 

 

group is deleted, the entry is

 

 

automatically removed from

 

 

the group. Using this plug-in

 

 

with chaining helps simplify

 

 

the management of static

 

 

groups when the group

 

 

members are remote to the

 

 

static group definition. To

 

 

chain this component's

 

 

operations, add the chaining

 

 

component attribute,

 

 

nsActiveChainingComponents:

 

 

cn=referential integrity

 

 

postoperation,cn=plugins,cn=config

.

 

 

 

Attribute Uniqueness plug-in

This plug-in checks that all

Read, search, and compare

 

the values for a specified uid

 

 

attribute are unique (no

 

 

duplicates). If this plug-in is

 

 

chained, it confirms that the

 

 

uid attribute values are

 

 

unique even on attributes

 

 

changed through a database

 

 

link. To chain this

 

 

component's operations, add

 

 

the chaining component

 

 

attribute,

 

 

nsActiveChainingComponents:

 

 

cn=attribute

 

 

uniqueness,cn=plugins,cn=config

 

 

 

 

71

Page 91
Image 91
HP UX Red Hat Direry Server Software Configuring the Chaining Policy, NsActiveChainingComponents Cn=certificate-based