HP-UX Directory Server 8.1 administrator guide
7.4.3 Configuring the PTA plug-in.................................................................................................309
7.4.3.1 Configuring the servers to use a secure connection......................................................310
7.4.3.2 Specifying the authenticating Directory Server............................................................310
7.4.3.3 Specifying the pass-through subtree.............................................................................311
7.4.3.4 Configuring the optional parameters............................................................................311
7.4.4 PTA plug-in syntax examples................................................................................................312
7.4.4.1 Specifying one authenticating Directory Server and one subtree.................................312
7.4.4.2 Specifying multiple authenticating Directory Servers..................................................312
7.4.4.3 Specifying one authenticating Directory Server and multiple subtrees.......................313
7.4.4.4 Using non-default parameter values.............................................................................313
7.4.4.5 Specifying different optional parameters and subtrees for different authenticating
Directory Servers......................................................................................................................313
7.5 Configuring autobind....................................................................................................................313
7.5.1 Overview of autobind and LDAPI........................................................................................313
7.5.2 Configuring autobind............................................................................................................315
7.6 Using the account policy plug-in for inactivity limits...................................................................315
7.6.1 Configuring the account inactivity policy.............................................................................316
7.6.2 Provisioning account inactivity policies................................................................................317
7.6.3 Managing users covered by an account inactivity policy.....................................................317
8 Managing replication...............................................................................................319
8.1 Replication overview.....................................................................................................................319
8.1.1 What directory units are replicated.......................................................................................319
8.1.2 Read-write and read-only replicas........................................................................................320
8.1.3 Suppliers and consumers......................................................................................................320
8.1.4 Changelog..............................................................................................................................320
8.1.5 Replication identity...............................................................................................................320
8.1.6 Replication agreement...........................................................................................................321
8.1.7 Replicating attributes with fractional replication.................................................................321
8.1.8 Compatibility with earlier versions of directory server........................................................321
8.2 Replication scenarios.....................................................................................................................322
8.2.1 Single-master replication.......................................................................................................322
8.2.2 Multi-master replication........................................................................................................323
8.2.3 Cascading replication............................................................................................................324
8.3 Creating the supplier bind DN entry............................................................................................325
8.4 Configuring single-master replication..........................................................................................327
8.4.1 Configuring the read-write replica on the supplier server...................................................327
8.4.2 Configuring the read-only replica on the consumer.............................................................328
8.4.3 Create the replication agreement..........................................................................................330
8.5 Configuring multi-master replication...........................................................................................336
8.5.1 Configuring the read-write replicas on the supplier servers................................................337
8.5.2 Configuring the read-only replicas on the consumer servers...............................................340
8.5.3 Setting up the replication agreements...................................................................................342
8.5.4 Preventing monopolization of the consumer in multi-master replication............................349
8.6 Configuring cascading replication................................................................................................350
8.6.1 Configuring the read-write replica on the supplier server...................................................350
8.6.2 Configuring the read-only replica on the consumer server..................................................352
8.6.3 Configuring the read-only replica on the hub......................................................................353
8.6.4 Setting up the replication agreements...................................................................................357
8.7 Configuring replication from the command line..........................................................................364
8.7.1 Configuring suppliers from the command line....................................................................364
8.7.2 Configuring consumers from the command line..................................................................366
8.7.3 Configuring hubs from the command line............................................................................367
8.7.4 Configuring replication agreements from the command line..............................................368
10 Table of Contents