03.03.2015 Views

eTrust Directory Administrator Guide - CA Technologies

eTrust Directory Administrator Guide - CA Technologies

eTrust Directory Administrator Guide - CA Technologies

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Preventing Users from Re-using Passwords ................................................. 6-32<br />

Some Password Controls Require an LDAP Client ........................................... 6-32<br />

Example Password Policy ................................................................. 6-33<br />

Access Control Overview ..................................................................... 6-34<br />

Access Control Policies.................................................................... 6-34<br />

Access Control Rules...................................................................... 6-35<br />

Designing Your Access Control Scheme .................................................... 6-35<br />

Working with Access Controls ............................................................. 6-37<br />

Static Access Controls......................................................................... 6-38<br />

Overview of Static Access Control Rules .................................................... 6-38<br />

Setting Up Static Access Controls .......................................................... 6-40<br />

Defining Superusers ...................................................................... 6-42<br />

Defining Administrative Users............................................................. 6-43<br />

Defining Registered Users ................................................................. 6-45<br />

Defining Public Users ..................................................................... 6-47<br />

Protecting Items .......................................................................... 6-48<br />

Dynamic Access Controls ..................................................................... 6-51<br />

Enabling and Disabling Dynamic Access Controls ........................................... 6-51<br />

Dynamic Access Control Rules............................................................. 6-52<br />

Groups, Roles, and Proxies .................................................................... 6-53<br />

Defining Groups of Users ................................................................. 6-53<br />

Role-Based Access Controls ............................................................... 6-54<br />

Secure Proxies............................................................................ 6-56<br />

Access Controls and Aliases ............................................................... 6-57<br />

Access-Controlled Routing .................................................................... 6-58<br />

Chapter 7: Replication<br />

Replication Concepts .......................................................................... 7-2<br />

Compare Distribution and Replication....................................................... 7-2<br />

Compare Multimaster and Master–Slave Replication.......................................... 7-2<br />

Compare Real-Time and Write-Behind Replication ........................................... 7-3<br />

Compare Replay-Based and State-Based Replication .......................................... 7-3<br />

Three Types of Replication Used with <strong>eTrust</strong> <strong>Directory</strong> ....................................... 7-4<br />

Keep System Clocks Synchronized .......................................................... 7-4<br />

Multiwrite Replication ......................................................................... 7-5<br />

How Multiwrite Replication Works ......................................................... 7-5<br />

Multiwrite Can Work Asynchronously ...................................................... 7-6<br />

How Multiwrite Groups Work .............................................................. 7-7<br />

Set Up a Multiwrite System................................................................ 7-10<br />

Recovering a Multiwrite System Using Queues .............................................. 7-12<br />

viii<br />

<strong>eTrust</strong> <strong>Directory</strong> <strong>Administrator</strong> <strong>Guide</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!