03.03.2015 Views

eTrust Directory Administrator Guide - CA Technologies

eTrust Directory Administrator Guide - CA Technologies

eTrust Directory Administrator Guide - CA Technologies

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Preventing Users from Re-using Passwords ................................................. 6-32<br />

Some Password Controls Require an LDAP Client ........................................... 6-32<br />

Example Password Policy ................................................................. 6-33<br />

Access Control Overview ..................................................................... 6-34<br />

Access Control Policies.................................................................... 6-34<br />

Access Control Rules...................................................................... 6-35<br />

Designing Your Access Control Scheme .................................................... 6-35<br />

Working with Access Controls ............................................................. 6-37<br />

Static Access Controls......................................................................... 6-38<br />

Overview of Static Access Control Rules .................................................... 6-38<br />

Setting Up Static Access Controls .......................................................... 6-40<br />

Defining Superusers ...................................................................... 6-42<br />

Defining Administrative Users............................................................. 6-43<br />

Defining Registered Users ................................................................. 6-45<br />

Defining Public Users ..................................................................... 6-47<br />

Protecting Items .......................................................................... 6-48<br />

Dynamic Access Controls ..................................................................... 6-51<br />

Enabling and Disabling Dynamic Access Controls ........................................... 6-51<br />

Dynamic Access Control Rules............................................................. 6-52<br />

Groups, Roles, and Proxies .................................................................... 6-53<br />

Defining Groups of Users ................................................................. 6-53<br />

Role-Based Access Controls ............................................................... 6-54<br />

Secure Proxies............................................................................ 6-56<br />

Access Controls and Aliases ............................................................... 6-57<br />

Access-Controlled Routing .................................................................... 6-58<br />

Chapter 7: Replication<br />

Replication Concepts .......................................................................... 7-2<br />

Compare Distribution and Replication....................................................... 7-2<br />

Compare Multimaster and Master–Slave Replication.......................................... 7-2<br />

Compare Real-Time and Write-Behind Replication ........................................... 7-3<br />

Compare Replay-Based and State-Based Replication .......................................... 7-3<br />

Three Types of Replication Used with <strong>eTrust</strong> <strong>Directory</strong> ....................................... 7-4<br />

Keep System Clocks Synchronized .......................................................... 7-4<br />

Multiwrite Replication ......................................................................... 7-5<br />

How Multiwrite Replication Works ......................................................... 7-5<br />

Multiwrite Can Work Asynchronously ...................................................... 7-6<br />

How Multiwrite Groups Work .............................................................. 7-7<br />

Set Up a Multiwrite System................................................................ 7-10<br />

Recovering a Multiwrite System Using Queues .............................................. 7-12<br />

viii<br />

<strong>eTrust</strong> <strong>Directory</strong> <strong>Administrator</strong> <strong>Guide</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!