
7
Chapter 7 UserAccountManagement...........................................257
ManagingthePasswordPolicy.......................................................... 257
ConfiguringthePasswordPolicy ..................................................... 258
ConfiguringthePasswordPolicyUsingtheConsole.................................. 258
ConfiguringthePasswordPolicyUsingtheCommand-Line ........................... 260
SettingUserPasswords ............................................................. 262
ConfiguringtheAccountLockoutPolicy .............................................. 263
ConfiguringtheAccountLockoutPolicyUsingtheConsole ........................... 263
ConfiguringtheAccountLockoutPolicyUsingtheCommandLine .................... 264
ManagingthePasswordPolicyinaReplicatedEnvironment ............................. 265
InactivatingUsersandRoles............................................................ 266
InactivatingUserandRolesUsingtheConsole ......................................... 267
InactivatingUserandRolesUsingtheCommandLine .................................. 267
ActivatingUserandRolesUsingtheConsole .......................................... 268
ActivatingUserandRolesUsingtheCommandLine.................................... 269
SettingResourceLimitsBasedontheBindDN ............................................ 269
SettingResourceLimitsUsingtheConsole............................................. 270
SettingResourceLimitsUsingtheCommandLine ...................................... 270
Chapter 8 Managing Replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273
ReplicationOverview.................................................................. 274
Read-WriteReplica/Read-OnlyReplica ............................................... 274
Supplier/Consumer ................................................................ 274
ChangeLog........................................................................ 275
UnitofReplication.................................................................. 275
ReplicationIdentity................................................................. 276
ReplicationAgreement.............................................................. 277
Compatibility with Earlier Versions of Directory Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277
ReplicationScenarios .................................................................. 278
Single-MasterReplication ........................................................... 278
Multi-MasterReplication ............................................................ 279
CascadingReplication............................................................... 281
SummaryofStepsforComplexReplicationConfigurations................................. 283
DetailedReplicationTasks ............................................................. 284
ConfiguringSingle-MasterReplication................................................... 290
ConfiguringMulti-MasterReplication ................................................... 294
ConfiguringCascadingReplication...................................................... 300
DeletingtheChangeLog ............................................................... 306
InitializingConsumers................................................................. 307
ForcingReplicationUpdates............................................................ 310
ReplicationoverSSL................................................................... 314
ReplicationwithEarlierReleases ........................................................ 316
UsingtheRetroChangeLogPlug-In..................................................... 318