Installation guide

symmetric encryption
Encryption that uses the same key for both encrypting and decrypting. DES is an example of a
symmetric encryption algorithm.
system index
Cannot be deleted or modified as it is essential to Directory Server operations.
T
target
In the context of access control, the target identifies the directory information to which a
particular ACI applies.
target entry
The entries within the scope of a CoS.
TCP/IP
Transmission Control Protocol/Internet Protocol. The main network protocol for the Internet and
for enterprise (company) networks.
template entry
See CoS template entry.
time/date format
Indicates the customary formatting for times and dates in a specific region.
TLS
The new standard for secure socket layers; a public key based protocol. Also T ransport Layer
Security.
topology
The way a directory tree is divided among physical servers and how these servers link with one
another.
Transport Layer Security
See TLS.
U
uid
Glossary
125