Skip Headers
Oracle® Internet Directory Administrator's Guide,
10
g
Release 2 (10.1.2)
B14082-02
Home
Solution Area
Contents
Index
Previous
Next
List of Figures
1-1 Oracle Internet Directory Overview
2-1 A Typical Oracle Internet Directory Node
2-2 Oracle Directory Server Instance Architecture
2-3 A Directory Information Tree
2-4 Attributes of the Entry for Anne Smith
2-5 Correct and Incorrect Naming Contexts
2-6 A Replicated Directory
2-7 A Partitioned Directory
2-8 Using Knowledge References to Point to Naming Contexts
2-9 Oracle Identity Management Infrastructure and Other Components
2-10 Placement of Resource Access and Resource Type Information in the DIT
5-1 Directory Entry Hierarchy Showing Multiple Configuration Set Entries
5-2 Alias Entries Example
5-3 Resulting Tree when Creating the My_file.ldif
5-4 A Client Locating a Directory Server by Using DNS
7-1 Example of a Directory Information Tree
10-1 Sample Audit Log in DSE
10-2 Architecture of Oracle Internet Directory Server Manageability
12-1 Indirect Authentication
14-1 Structural Access Item: Added Object Filter Tab Page
14-2 Structural Access Item: By Whom Tab Page
14-3 Example: Structural Access Item: Access Rights Tab Page
14-4 Content Access Item: By Whom Tab Page
14-5 Content Access Item: Attribute Tab Page
14-6 Content Access Item: Access Rights Tab Page
14-7 Content Access Item: By Whom Tab Page
14-8 Content Access Item: Attribute Tab Page
14-9 Content Access Item: Access Rights Tab Page
14-10 Content Access Item: By Whom Tab Page
14-11 Content Access Item: Attribute Tab Page
14-12 Content Access Item: Access Rights Tab Page
14-13 Content Access Item: By Whom Tab Page
14-14 Content Access Item: Attribute Tab Page
14-15 Content Access Item: Access Rights Tab Page
15-1 Location of Password Policy Entries
16-1 Location of the Password Verifier Profile Entry
16-2 Authentication Model
16-3 How Password Verification Works
17-1 Delegation Flow in an Oracle Application Server Environment
19-1 Planning the Directory Information Tree
19-2 Example of an Identity Management Realm
19-3 Enterprise Use Case: Single Identity Management Realm
19-4 Enterprise Use Case: Multiple Identity Management Realms
19-5 Hosted Deployment Use Case
19-6 Default Identity Management Realm
20-1 Usage Analysis of Current E-mail System
22-1 Example: Garbage Collection of Change Log Entries
22-2 Garbage Collection Entries in the DIT
23-1 Using an LDIF File and bulkload
23-2 Using dipassistant Directly
23-3 Using an LDIF File and dipassistant
23-4 Using dipassistant, bulkload, and LDIF Files
23-5 Using the Oracle Directory Integration and Provisioning Server
23-6 Structure of the Intermediate User File
24-1 Example of Partial Replication
24-2 Example of Single-Master Replication
24-3 Example of Multimaster Replication
24-4 Example of Fan-Out Replication
24-5 Example of Multimaster Replication with Fan-Out
24-6 Example of a Naming Context Container and Its Objects
24-7 Example: Multimaster Replication and Fan-Out Replication
24-8 Example: Replication Configuration Entries for Node C
24-9 Example: Replication Configuration Entries for Node D
24-10 The Multimaster Replication Process on the Supplier Side
24-11 The Multimaster Replication Process on the Consumer Side
24-12 The Fan-Out Replication Process
24-13 A Sample Naming Context
24-14 Naming Context Object #1
24-15 Naming Context Object #2
24-16 Result of Combining Naming Context Objects #1 and #2
24-17 Naming Context Object #3
24-18 Naming Context Object #4
24-19 Result of Combining Naming Context Objects #3 and #4
24-20 Naming Context Object #5
24-21 Naming Context Object #6
24-22 Naming Context Object #7
25-1 Example of Fan-Out Replication
26-1 Oracle Internet Directory Plug-in Framework