Chapter 3. Configuring Directory Databases

Table 3.2. Components Allowed to Chain

NOTE

The following components cannot be chained:

Roles plug-in

Password policy component

Replication plug-ins

Referential Integrity plug-in

When enabling the Referential Integrity plug-in on servers issuing chaining requests, be sure to analyze performance, resource, and time needs as well as integrity needs. Integrity checks can be time-consuming and draining on memory and CPU. For further information on the limitations surrounding ACIs and chaining, see Section 1.4, “ACI Limitations”.

After modifying the components allowed to chain, restart the server in order for the modification to take effect.

3.1.1.1. Chaining Component Operations Using the Console

1.

In the Directory Server Console, select the Configuration tab.

2.Expand Data in the left pane, and click Database Link Settings.

3.Select the Settings tab in the right window. To add a component to the Components allowed to chain list, click Add.

The Select Components to Add dialog box displays. Select a component from the list, and click OK.

4.To delete a component from the list, select it, and click Delete.

5.Click Save.

6.Restart the server in order for the change to take effect.

After allowing the component to chain, create an ACI in the suffix on the remote server to which the operation will be chained. For example, this creates an ACI for the Referential Integrity

72

Page 92
Image 92
HP UX Red Hat Direry Server Software manual Components Allowed to Chain, Chaining Component Operations Using the Console