Red Hat Directory Server 8.0 Administrator's Guide

cascading chaining
client ACIs, 98
configuration attributes, 99
configuring defaults, 95
configuring from command line, 97
configuring from console, 96
example, 100
local ACI evaluation, 98
loop detection, 99
overview, 93
proxy admin user ACI, 97
proxy authorization, 97
cascading replication
initializing the replicas, 305
introduction, 274
setting up, 298
certificate
mapping to a DN, 416
password, 410
certificate database
password, 393
certificate-based authentication, 415
setting up, 416
chaining
cascading, 93
component operations, from command line,
73
component operations, from console, 72
overview, 69
using SSL, 86
change operations, 33
add, 36
delete, 36
replace, 36
change type
add, 34
delete, 40
LDIF, 33
modify, 36
changelog, 268
deleting, 323
character type, 577
checkpoint interval, 467
ciphers
list of
SSLv3, 413
TLSv1, 413
none,MD5
MD5 message authentication, 415
overview, 412
selecting, 412
cl-dump.pl script, 347
class of service (CoS), 143
access control, 162
classic
example, 147
overview, 147
cosPriority attribute, 157
creating, 149
definition entry, 153
editing, 152
indirect
example, 146
overview, 146
pointer
example, 145
overview, 145
qualifiers, 154
template entry
creating, 151
overview, 145
classic CoS
example, 147
overview, 147
client
using to find entries, 551
client authentication
over SSL, 416
code page, 577
collation order
international index, 373
overview, 577
search filters and, 563
command line
providing input from, 24
command-line scripts
db2bak, 125
command-line utilities
certificate-based authentication and, 415
ldapdelete, 29
ldapmodify, 26
ldapsearch, 559
ldif, 542
ldif2db, 376
Index
604