| | Copyright |
| | Acknowledgments |
| | Preface |
| | | Who Should Use This Book |
| | | Before You Read This Book |
| | | How This Book Is Organized |
| | | Obtaining the Downloadable Files for This Book |
| | | Sun BluePrints Program |
| | | Accessing Sun Documentation Online |
| | | Typographic Conventions |
| | | Shell Prompts in Command Examples |
|
| | Chapter 1. Introducing LDAP in the Solaris Operating Environment |
| | | Introduction |
| | | The Big Picture |
| | | LDAP Terms and Concepts |
|
| | Chapter 2. Assessing Your Needs for Naming Service Transition and Consolidation |
| | | What Consolidation Means |
| | | Business Case for Transitioning to LDAP |
| | | Understanding Legacy Naming Services |
| | | Migration Planning |
|
| | Chapter 3. Defining Directory Service Security Architecture |
| | | Understanding Directory Server Security |
| | | Understanding the SASL Mechanism |
| | | GSSAPI Authentication and Kerberos v5 |
| | | TLSv1/SSL Protocol Support |
| | | Enhanced Solaris OE PAM Features |
| | | Secured LDAP Client Backport to the Solaris 8 OE |
|
| | Chapter 4. Deploying Solaris OE LDAP Naming Services |
| | | Understanding the DIT |
| | | Differentiating Server and Client Versions |
| | | Configuring Sun ONE Directory Servers and Clients |
| | | Automating Installations |
| | | Choosing High-Availability Options |
| | | Troubleshooting Tips |
|
| | Chapter 5. Migrating Legacy Data to LDAP |
| | | Mapping Naming Service Data to LDAP Entries |
| | | Running ldapaddent |
| | | Importing Other Databases |
| | | LDAP to NIS+ Gateway |
|
| | Chapter 6. Management Tools and Toolkits |
| | | Command-Line Tools |
| | | GUI-based Tools |
| | | Toolkits and LDAP APIs |
|
| | Chapter 7. Performing Administrative Tasks |
| | | Identifying Directory Management Tasks |
| | | Directory Data Backup and Recovery |
| | | Managing Client Profiles and Proxy Agent Accounts |
| | | Managing Directory Data Replication |
| | | Monitoring Directory Services |
| | | Managing Users and Groups |
| | | Extending the Directory Schema |
|
| | Chapter 8. Selecting Storage for Optimum Directory Server Performance |
| | | Software Characteristics |
| | | Survey of Sun Storage Subsystems |
| | | Introduction to the Sun StorEdge T3b Storage Array |
| | | RAID Explained for Directory Administrators |
|
| | Chapter 9. Performing Directory Server Benchmarks |
| | | Why Benchmark? |
| | | Creating a Benchmark Configuration |
| | | Creating LDIF for Benchmarks |
| | | Using SLAMD, the Distributed Load Generation Engine |
| | | Directory Server Performance Tuning |
|
| | Chapter 10. Emerging Directory Technologies |
| | | DSMLv2 Interface |
| | | Sun ONE Identity Synchronization for the Windows Technology |
| | | NIS to LDAP Gateway |
|
| | Appendix A. LDAP Standards Information |
| | | Locating RFCs and Internet Drafts |
|
| | Appendix B. LDAP v3 Result Codes |
| | Appendix C. Using snoop with LDAP |
| | | Background |
| | | What is snoop ? |
| | | How snoop Works |
| | | snoop Options |
| | | Protocol Decoders for snoop |
| | | Running snoop with LDAP in Mind |
| | | Understanding the LDAP Protocol Exchange |
| | | Examples of LDAP Enabled snoop In Action |
|
| | Appendix D. Solaris OE 9 PAM Architecture |
| | | The PAM API |
| | | The PAM SPI |
| | | Writing a PAM Service Module |
| | | Testing the PAM Module |
|
| | Glossary |