NetWare Directory Services

8-7
Implementing NetWare Directory Services
Completing General Tasks and Guidelines for All Networks
For example, a NetWare server object that stores a replica of each partition
on the network can be placed in an Organization object for more efficient
network management. Other servers and print queues can be placed in
Organizational Units with the users or groups that utilize them.
Profile objects. Create Profile objects that provide organization or
department login scripts in the appropriate container objects for groups of
users who need similar work environments but who are not located in the
same container object.
Implementing objects this way allows for easy, centralized control at the top
of the tree and local control of the lower levels. At each container level, a
User object with supervisory rights has authority over the objects within that
container object.
6 Add new servers to appropriate contexts.
To add a new server, use the DS Install utility to install and set the appropriate
context within the Directory tree.
7 Set the appropriate container and property rights.
Security features can be set up in NetWare Administrator or NETADMIN.
8 Configure time synchronization by specifying time synchronization parameters
for each NetWare server process.
The number and location of container objects, partitions, and replicas determine
the type of time servers you should create for your network.
Time synchronization is set up and managed with SAM or nwcm.
9 Make considerations for, and enable, bindery services by setting bindery
contexts.
For security, optimum performance, and reliability, it is a good idea to group
servers within container objects, depending on department or site. If, for
example, your organization is spread over three cities, specify a site-specific
container object as a bindery context for the following reasons:
To provide local control over bindery services at each site
This allows the network supervisors to control local administration—
updating local servers, adding or deleting users, installing new equipment,
and performing other tasks that are often best handled on a local basis.
To improve security