Red Hat Directory Server 8.0 Administrator's Guide
Table 3.2. Components Allowed to Chain
NOTE
The following components cannot be chained:
• Roles plug-in
• Password policy component
• Replication plug-ins
• Referential Integrity plug-in
When enabling the Referential Integrity plug-in on servers issuing chaining
requests, be sure to analyze performance, resource, and time needs as well as
integrity needs. Integrity checks can be time-consuming and draining on memory
and CPU. For further information on the limitations surrounding ACIs and
chaining, see Section 1.4, “ACI Limitations”.
After modifying the components allowed to chain, restart the server in order for the modification
to take effect.
3.1.1.1. Chaining Component Operations Using the Console
1.
In the Directory Server Console, select the Configuration tab.
2. Expand Data in the left pane, and click Database Link Settings.
3. Select the Settings tab in the right window. To add a component to the Components
allowed to chain list, click Add.
The Select Components to Add dialog box displays. Select a component from the list, and
click OK.
4. To delete a component from the list, select it, and click Delete.
5. Click Save.
6. Restart the server in order for the change to take effect.
After allowing the component to chain, create an ACI in the suffix on the remote server to which
the operation will be chained. For example, this creates an ACI for the Referential Integrity
Chapter 3. Configuring Directory Databases
72