Installation guide
supplier server
In the context of replication, a server that holds a replica that is copied to a different server is
called a supplier for that replica.
supplier-initiated replication
Replication configuration where supplier servers replicate directory data to any replica servers.
symmetric encrypt ion
Encryption that uses the same key for both encrypting and decrypting. DES is an example of a
symmetric encryption algorithm.
system index
Cannot be deleted or modified as it is essential to Directory Server operations.
T
target
In the context of access control, the target identifies the directory information to which a
particular ACI applies.
target entry
The entries within the scope of a CoS.
TCP/IP
Transmission Control Protocol/Internet Protocol. T he main network protocol for the Internet and
for enterprise (company) networks.
template entry
See CoS template entry.
time/date format
Indicates the customary formatting for times and dates in a specific region.
TLS
The new standard for secure socket layers; a public key based protocol. Also T ransport Layer
Security.
topology
The way a directory tree is divided among physical servers and how these servers link with one
another.
Red Hat Directory Server Red Hat Directory Server 9 Installation Guide
106