Red Hat Directory Server 8.0 Administrator's Guide

The server does not attempt to protect unencrypted data stored in memory.
This data may be copied into a system page file by the operating system. For
this reason, ensure that any page or swap files are adequately protected.
3. Creating and Maintaining Database Links
Chaining means that a server contacts other servers on behalf of a client application and then
returns the combined results. Chaining is implemented through a database link, which points to
data stored remotely. When a client application requests data from a database link, the
database link retrieves the data from the remote database and returns it to the client.
Section 5, “Monitoring Database Link Activity” covers how to monitor database link activity.
Section 3.1, “Configuring the Chaining Policy”
Section 3.2, “Creating a New Database Link”
Section 3.3, “Chaining Using SSL”
Section 3.4, “Maintaining Database Links”
Section 3.5, “Database Links and Access Control Evaluation”
Section 3.6, “Advanced Feature: Tuning Database Link Performance”
Section 3.7, “Advanced Feature: Configuring Cascading Chaining”
3.1. Configuring the Chaining Policy
These procedures describe configuring how Directory Server chains requests made by client
applications to Directory Servers that contain database links. This chaining policy applies to all
database links created on Directory Server.
3.1.1. Chaining Component Operations
A component is any functional unit in the server that uses internal operations. For example,
plug-ins are considered to be components, as are functions in the front-end. However, a plug-in
may actually be comprised of multiple components (for example, the ACI plug-in).
Some components send internal LDAP requests to the server, expecting to access local data
only. For such components, control the chaining policy so that the components can complete
their operations successfully. One example is the certificate verification function. Chaining the
LDAP request made by the function to check certificates implies that the remote server is
trusted. If the remote server is not trusted, then there is a security problem.
Creating and Maintaining Database Links
69