HP-UX Directory Server 8.1 Administrator (766147-001, March 2014)
Configuring the PTA plug-in...............................................................................................308
Configuring the servers to use a secure connection..........................................................308
Specifying the authenticating Directory Server.................................................................309
Specifying the pass-through subtree...............................................................................309
Configuring the optional parameters..............................................................................309
PTA plug-in syntax examples..............................................................................................311
Specifying one authenticating Directory Server and one subtree........................................311
Specifying multiple authenticating Directory Servers.........................................................311
Specifying one authenticating Directory Server and multiple subtrees.................................311
Using non-default parameter values...............................................................................311
Specifying different optional parameters and subtrees for different authenticating Directory
Servers......................................................................................................................312
Configuring autobind............................................................................................................312
Overview of autobind and LDAPI.......................................................................................312
Configuring autobind.......................................................................................................314
Using the account policy plug-in for inactivity limits...................................................................314
Configuring the account inactivity policy.............................................................................315
Provisioning account inactivity policies................................................................................316
Managing users covered by an account inactivity policy.......................................................316
Enabling Different Types of Binds............................................................................................316
Secure Binds...................................................................................................................316
Ability to shut off anonymous access...................................................................................316
8 Managing Replication.............................................................................318
Replication overview.............................................................................................................318
What directory units are replicated....................................................................................319
Read-write and read-only replicas......................................................................................319
Suppliers and consumers..................................................................................................319
Changelog.....................................................................................................................319
Replication identity...........................................................................................................319
Replication agreement......................................................................................................320
Replicating attributes with fractional replication....................................................................320
Compatibility with earlier versions of directory server............................................................320
Replication scenarios............................................................................................................321
Single-master replication...................................................................................................321
Multi-master replication.....................................................................................................322
Cascading replication......................................................................................................324
Creating the supplier bind DN entry.......................................................................................325
Configuring single-master replication.......................................................................................327
Configuring the read-write replica on the supplier server.......................................................327
Configuring the read-only replica on the consumer...............................................................328
Create the replication agreement.......................................................................................330
Configuring multi-master replication........................................................................................336
Configuring the read-write replicas on the supplier servers.....................................................337
Configuring the read-only replicas on the consumer servers...................................................340
Setting up the replication agreements.................................................................................341
Preventing monopolization of the consumer in multi-master replication.....................................348
Configuring cascading replication..........................................................................................349
Configuring the read-write replica on the supplier server.......................................................349
Configuring the read-only replica on the consumer server......................................................351
Configuring the read-only replica on the hub.......................................................................352
Setting up the replication agreements.................................................................................356
Configuring replication from the command line.........................................................................364
Configuring suppliers from the command line......................................................................364
Configuring consumers from the command line....................................................................366
10 Contents