Red Hat 8.1 User Manual

Page 256

Advertising
background image

Replication configuration where replica servers, either hub or consumer servers, pull directory
data from supplier servers. This method is available only for legacy replication.

replication

Act of copying directory trees or subtrees from supplier servers to replica servers.

replication agreement

Set of configuration parameters that are stored on the supplier server and identify the
databases to replicate, the replica servers to which the data is pushed, the times during which
replication can occur, the DN and credentials used by the supplier to bind to the consumer, and
how the connection is secured.

RFC

Request for Comments. Procedures or standards documents submitted to the Internet
community. People can send comments on the technologies before they become accepted
standards.

role

An entry grouping mechanism. Each role has members, which are the entries that possess the
role.

role-based attributes

Attributes that appear on an entry because it possesses a particular role within an associated
CoS template.

root

The most privileged user available on Unix machines. The root user has complete access
privileges to all files on the machine.

root suffix

The parent of one or more sub suffixes. A directory tree can contain more than one root suffix.

S

SASL

An authentication framework for clients as they attempt to bind to a directory. Also

Simple

Authentication and Security Layer

.

schema

Definitions describing what types of information can be stored as entries in the directory. When
information that does not match the schema is stored in the directory, clients attempting to
access the directory may be unable to display the proper results.

schema checking

Ensures that entries added or modified in the directory conform to the defined schema. Schema
checking is on by default, and users will receive an error if they try to save an entry that does
not conform to the schema.

Secure Sockets Layer

See

SSL

.

self access

When granted, indicates that users have access to their own entries if the bind DN matches the
targeted entry.

256

Glossary

Advertising