Critical Path™ Directory Server Training
Contents at a Glance
Module 1 – Directory Server Overview and Installation
§ What is a Directory?
§ Examples of Directory Applications
§ Directory Standards
§ Standard Directory Components and Protocols
§ Directory Server 4.1 Overview
§ Directory Server Management Tools
§ Activity 1A – Installing Directory Server 4.1
§ Installing Directory Server 4.1 on UNIX
Module 2 – Creating a Directory System Agent
§ DIT – Directory Information Tree
§ Schema Elements
§ Entry Names – RDNs and DNs
§ Sample Directory Structures
§ Activity 2A – Designing a Directory
§ iCon Introduction
§ Activity 2B – Configuring iCon
§ Activity 2C – Creating a Directory
§ DSA Process Architecture
§ Activity 2D – Using the DAC
§ DSA Files and Directories
§ DSA Logs
§ Management Commands
§ Configuring the Data Store
§ Tuning a DSA
§ MIB – Management Information Base
Module 3 – Modifying the Directory Schema
§ Modifying Schema Elements
§ Managing Attributes
§ Activity 3A – Creating an Attribute
§ More about Object Classes
§ More about Name Bindings
§ Activity 3B – Creating an Auxiliary Object Class
§ Activity 3C – Loading Schema Elements from an LDIF File
Module 4 – Adding Data to the Directory
§ Assuring Unique Names
§ Activity 4A – Adding Entries Using the DIT Admin
§ WebDM Overview
§ Activity 4B – Adding Entries Using WebDM
§ Backup and Recovery Using icon
§ LDAP Commands
§ Activity 4C – Adding Entries Using ldapmodify
§ Directory Server Data Management Commands
§ Activity 4D – Managing DSA Data Using Commands
Module 5 – Distribution and Shadowing
§ Distributed Directories
§ Chaining
§ Knowledge References
§ Activity 5A – Creating a Distributed Subtree Using iCon
§ Chaining Information in the DAC
§ Shadowing
§ Shadow Updates
§ Activity 5B – Creating a Shadow Agreement Using iCon
§ Shadowing Information in the DAC
§ Removing a Shadowing Agreement
§ Troubleshooting Shadowing Problems
Module 6 – Securing the Directory
§ Types of Security
§ Administrative Authority Agents
§ Authentication Policy
§ Access Types
§ Password Encryption
§ Strong Authentication
§ Activity 6A – Setting a DSA's Authentication Policy
§ Access Control
§ ACI Perspectives
§ ACDF – Access Control Decision Function
§ Access Control Permissions
§ Subtree Specification
§ Activity 6B - Creating Access Control Items
|