This document is the administration guide for IBM Tivoli Directory Server version 6.1. It contains information about installing, configuring, and administering the directory server. The guide includes details on using the web administration tool and command line to perform tasks such as managing the schema, server configuration, security settings, replication, and more. It is intended to help directory administrators configure and operate the IBM Tivoli Directory Server.
IBM Tivoli Netcool/OMNIbus: Administration GuideLuciano Saia
This document provides instructions and guidance for configuring various components of IBM Tivoli Netcool/OMNIbus including:
- Configuring the ObjectServer, proxy server, firewall bridge server, and process control.
- Using the Netcool/OMNIbus Administrator tool and SQL interface to configure databases, users, roles, triggers and more.
- Setting up accelerated event notification, performance tuning, and running external procedures through process control.
Detailed explanations, properties, command options and examples are given for setting up and managing the key Tivoli Netcool/OMNIbus infrastructure elements.
This document provides instructions for configuring IBM Maximo Asset Management version 7 release 5 in various ways:
1. It describes how to configure clustered and basic systems, including creating properties files, build files, and deploying EAR files for clusters in WebSphere Application Server and WebLogic Server.
2. It covers configuring the database by defining objects, attributes, views, and relationships, as well as account formats for the General Ledger.
3. Instructions are provided for supporting multiple languages in Maximo by enabling languages on objects and attributes and localizing databases.
4. Additional sections address administering the database through backups and restorations, updating the database, and optimizing system performance.
This document provides information about the database schema for IBM Security Identity Manager version 7.0.1.7, including descriptions of database tables used for workflow management, services, imports and exports, reporting, provisioning policies, role assignments, and more. It also covers the directory server schema, including classes for people, organizations, roles, services, policies, and others. Finally, it documents the auditing schema tables that track authentication, person management, delegate authority, and policy management events.
This document provides an administrator guide for IBM Security Privileged Identity Manager Version 2.1.1. It contains information on how to perform various administrative tasks in the application such as user administration, password administration, organization administration, shared access administration, session recording administration, application identity management, services administration, group administration, policy administration, workflow management, activity administration, and requests administration. The guide consists of 14 chapters that describe how to complete common administrative functions within the Privileged Identity Manager application.
This document is the phpMyAdmin documentation for version 4.8.0-dev. It provides information on installing and configuring phpMyAdmin, including supported features, requirements, different installation methods, authentication modes, and extensive configuration options. It also covers usage instructions and frequently asked questions about phpMyAdmin and common issues.
This document provides an overview and instructions for installing and configuring IBM Tivoli OMEGAMON XE for monitoring WebSphere Business Integration middleware. It discusses the OMEGAMON distributed architecture and describes how to install the Candle Management Server, OMEGAMON DE agents, and configure WebSphere MQ monitoring. The document also provides examples of using the OMEGAMON configuration tools to define WebSphere MQ resources, schedule actions, and view monitoring data.
Learn about IBM eX5 Portfolio Overview IBM System x3850 X5, x3950 X5, x3690 X5, and BladeCenter HX5. The IBM eX5 product portfolio represents the fifth generation of servers that are built upon Enterprise X-Architecture. Enterprise X-Architecture is the culmination of generations of IBM technology and innovation that is derived from our experience in high-end enterprise servers. Now, with eX5, IBM scalable systems technology for Intel processor-based servers has also come to blades. These servers can be expanded on demand and configured by using a building block approach that optimizes system design servers for your workload requirements. For more information on System x, visit http://ibm.co/Q7m3iQ.
Visit http://on.fb.me/LT4gdu to 'Like' the official Facebook page of IBM India Smarter Computing.
This document is a reference guide for IBM Security Privileged Identity Manager version 2.1.1. It contains documentation on commands that can be used to manage the virtual appliance, commands related to IBM Security Privileged Identity Manager services, usage of the Privileged Session Gateway and Privileged Access Agent, the web services API, shared access JavaScript APIs, and application identity commands. It also documents dynamic tags that can be used in mail templates to insert dynamic content.
IBM Tivoli Netcool/OMNIbus: Administration GuideLuciano Saia
This document provides instructions and guidance for configuring various components of IBM Tivoli Netcool/OMNIbus including:
- Configuring the ObjectServer, proxy server, firewall bridge server, and process control.
- Using the Netcool/OMNIbus Administrator tool and SQL interface to configure databases, users, roles, triggers and more.
- Setting up accelerated event notification, performance tuning, and running external procedures through process control.
Detailed explanations, properties, command options and examples are given for setting up and managing the key Tivoli Netcool/OMNIbus infrastructure elements.
This document provides instructions for configuring IBM Maximo Asset Management version 7 release 5 in various ways:
1. It describes how to configure clustered and basic systems, including creating properties files, build files, and deploying EAR files for clusters in WebSphere Application Server and WebLogic Server.
2. It covers configuring the database by defining objects, attributes, views, and relationships, as well as account formats for the General Ledger.
3. Instructions are provided for supporting multiple languages in Maximo by enabling languages on objects and attributes and localizing databases.
4. Additional sections address administering the database through backups and restorations, updating the database, and optimizing system performance.
This document provides information about the database schema for IBM Security Identity Manager version 7.0.1.7, including descriptions of database tables used for workflow management, services, imports and exports, reporting, provisioning policies, role assignments, and more. It also covers the directory server schema, including classes for people, organizations, roles, services, policies, and others. Finally, it documents the auditing schema tables that track authentication, person management, delegate authority, and policy management events.
This document provides an administrator guide for IBM Security Privileged Identity Manager Version 2.1.1. It contains information on how to perform various administrative tasks in the application such as user administration, password administration, organization administration, shared access administration, session recording administration, application identity management, services administration, group administration, policy administration, workflow management, activity administration, and requests administration. The guide consists of 14 chapters that describe how to complete common administrative functions within the Privileged Identity Manager application.
This document is the phpMyAdmin documentation for version 4.8.0-dev. It provides information on installing and configuring phpMyAdmin, including supported features, requirements, different installation methods, authentication modes, and extensive configuration options. It also covers usage instructions and frequently asked questions about phpMyAdmin and common issues.
This document provides an overview and instructions for installing and configuring IBM Tivoli OMEGAMON XE for monitoring WebSphere Business Integration middleware. It discusses the OMEGAMON distributed architecture and describes how to install the Candle Management Server, OMEGAMON DE agents, and configure WebSphere MQ monitoring. The document also provides examples of using the OMEGAMON configuration tools to define WebSphere MQ resources, schedule actions, and view monitoring data.
Learn about IBM eX5 Portfolio Overview IBM System x3850 X5, x3950 X5, x3690 X5, and BladeCenter HX5. The IBM eX5 product portfolio represents the fifth generation of servers that are built upon Enterprise X-Architecture. Enterprise X-Architecture is the culmination of generations of IBM technology and innovation that is derived from our experience in high-end enterprise servers. Now, with eX5, IBM scalable systems technology for Intel processor-based servers has also come to blades. These servers can be expanded on demand and configured by using a building block approach that optimizes system design servers for your workload requirements. For more information on System x, visit http://ibm.co/Q7m3iQ.
Visit http://on.fb.me/LT4gdu to 'Like' the official Facebook page of IBM India Smarter Computing.
This document is a reference guide for IBM Security Privileged Identity Manager version 2.1.1. It contains documentation on commands that can be used to manage the virtual appliance, commands related to IBM Security Privileged Identity Manager services, usage of the Privileged Session Gateway and Privileged Access Agent, the web services API, shared access JavaScript APIs, and application identity commands. It also documents dynamic tags that can be used in mail templates to insert dynamic content.
Implementing the
IBM Storwize V3700
Easily manage and deploy systems
with embedded GUI
Experience rapid and flexible
provisioning
Protect data with remote
mirroring
The document provides information about implementing the IBM Storwize V3700 storage system. It includes an overview of the hardware components and features of the Storwize V3700. The document also covers initial configuration tasks such as planning the hardware and network setup, performing the first-time setup, and configuring features like expansion enclosures, alerts, and inventory. It provides guidance on using the graphical and command-line interfaces to manage and monitor the storage system.
The IBM® System Storage® Solutions Handbook helps you solve your current and future data storage business requirements. It helps you achieve enhanced storage efficiency by design to allow managed cost, capacity of growth , greater mobility, and stronger control over storage performance and management. It describes the most current IBM storage products, including the IBM Spectrum™ family, IBM FlashSystem®, disk, and tape, as well as virtualized solutions such IBM Storage Cloud
This document provides an overview of implementing OMEGAMON XE for Messaging V6.0:
- It discusses WebSphere MQ, WebSphere Message Broker, and WebSphere InterChange Server as messaging middleware.
- It describes the architecture and deployment scenarios of OMEGAMON XE.
- It covers installing the OMEGAMON infrastructure including the Tivoli Enterprise Monitoring and Portal Servers.
- It explains how to install and configure WebSphere MQ agents on z/OS, UNIX/Linux, and Windows.
- It demonstrates using OMEGAMON XE to configure WebSphere MQ resources through its WebSphere MQ Configuration feature.
This document provides notes from a Linux system administration course. It covers topics like installing Red Hat Linux, configuring XFree86 for graphics, managing software packages, understanding the boot sequence, basic network concepts, kernel functions, configuring services, managing users and groups, working with filesystems, and basic security measures. The document contains detailed sections on partitioning and formatting disks, mounting filesystems, and using common Linux administration tools.
The IBM Flex System p260 and p460 Compute Nodes are IBM Power Systems servers optimized for virtualization, performance, and efficiency. The nodes support IBM AIX, IBM i, or Linux operating environments, and are designed to run various workloads in IBM PureFlex System. This IBM Redbooks publication is a comprehensive guide to IBM PureFlex System and the Power Systems compute nodes. We introduce the offerings and describe the compute nodes in detail. We then describe planning and implementation steps and go through some of the key the management features of the IBM Flex System Manager management node. For more information on Pure Systems, visit http://ibm.co/18vDnp6.
Visit http://bit.ly/KWh5Dx to 'Follow' the official Twitter handle of IBM India Smarter Computing.
Borland c++ version_3.0_users_guide_1991praveen188668
dfg dfgdtyth rth kljlkdfjgd
dfk
it can be also read by c language
isurp jsjjs alksdkjd ndnn tjskje kkskskso suyldkfj .
jdkfljdklfj dfdfhgklhh peyunkjhvsoivnv sdhfdh jhuijnd dfhkjhfkndfjnknvjvdv
This document provides a 3-page overview of managing WebSphere Application Server for z/OS using Tivoli products. It introduces the automation blueprint for comprehensive management of WebSphere from performance, availability, and security. The document is organized to describe the WebSphere environment, IBM Tivoli Monitoring for Web Infrastructure for inside-out monitoring, and IBM Tivoli Monitoring for Transaction Performance for outside-in monitoring.
This document is a user manual for BLAST Professional DOS, a file transfer software. It provides information on installing and using the BLAST software, including configuration options, features of the BLAST environment like environment variables and command line switches, how to use the different emulation modes and file transfer protocols in BLAST, and an introduction to automating tasks with BLASTscript, the built-in scripting language. The manual contains descriptions, examples, and instructions for common administrative and user tasks in BLAST like configuring settings, performing file transfers between local and remote systems, and automating repetitive jobs.
This document provides an overview of virtualization technologies and discusses how to set up and configure DB2 on PowerVM, VMware vSphere, and Microsoft Hyper-V. It covers the architectures and features of these virtualization platforms, including PowerVM on Power Systems, VMware vSphere, and Hyper-V. It also provides guidance on installing and configuring DB2 in virtualized environments based on these technologies.
This document provides instructions for installing and configuring IBM WebSphere MQ version 6.0 on Windows. It discusses migrating from previous versions of MQ and covers installing both the MQ server and MQ client. The document also describes verifying the installations, applying maintenance updates, uninstalling MQ, and lists the documentation available.
This document provides a step-by-step guide for deploying IBM Tivoli Monitoring 6.1 in small to large environments. It discusses planning the installation, defining the architecture, creating deployment plans, installing the various Tivoli Monitoring components, and configuring the system. The guide also covers demonstrations of a single machine proof of concept installation and a small installation using DB2 Workgroup Edition.
Learn how IBM Redpaper publication is a comprehensive guide covering the IBM Power 770 and Power 780 servers supporting IBM AIX, IBM i, and Linux operating systems.For more information visit,http://ibm.co/Lx6hfc
This document provides instructions for implementing IBM SmartCloud Entry on an IBM PureFlex System. It discusses installing and configuring the necessary IBM PureFlex System hardware including Flex System Manager, networking, storage, and compute nodes. It then covers installing and configuring VMware ESXi on the x86 compute nodes, the VMware vCenter Server, and data stores. Finally, it outlines installing and configuring IBM SmartCloud Entry and workload management.
The document provides an overview of the IBM Power 720 and Power 740 servers. It describes the key features of these midrange servers including the POWER7 processor, memory, storage, I/O options, and rack configurations. It also compares the Power 720 and Power 740 models and discusses power management features and the flexible packaging of the POWER7 processor modules.
This document provides an overview and instructions for using the Vivado IDE (Integrated Design Environment). It describes how to launch Vivado, create and manage projects, run synthesis and implementation, view and edit design files and properties, customize the Vivado environment, and use various windows like the sources window, device window, and Tcl console. The document contains revision notes and refers the reader to additional video tutorials for using Vivado.
Redbook: Running IBM WebSphere Application Server on System p and AIX: Optimi...Monty Poppe
This IBM Redbooks publication describes how to run the IBM Java Virtual Machine for AIX and WebSphere Application Server V6.1 on IBM System p and the AIX 5L Operating Systems. In terms of provisioning, tuning and maintenance, it consolidates information from all of these areas into a single resource and explains how you can implement, tune, and utilize the unique features of the IBM POWER Systems platform, AIX, and WebSphere Application Server together for maximum optimization. The book is intended for UNIX system administrators, Java developers, infrastructure designers, J2EE architects, project managers, performance testers and anyone who runs WebSphere Application Server on System p and AIX. It may contain some information which you already know, and other information that is new to you, depending on your background. AIX system administrators may be expert in configuring logical partitions and advanced virtualization, but may gain an understanding from this book about how WebSphere deployment teams may be able to exploit the features of IBM POWER Systems and AIX. WebSphere infrastructure architects may already know exactly how they want their redundant systems to work, but might learn how AIX teams can provide two or three physical servers that provide all of the different levels of application services necessary for the entire application lifecycle environment.
This document provides an installation and configuration guide for IBM Tivoli Directory Server version 6.3. It contains information about installing the server, clients, language packs, and other components across various platforms like Windows, Linux, AIX, Solaris, and HP-UX. The guide also describes how to create and administer directory server instances, configure databases, tune performance, back up and restore data, and more.
1. Create an operating system user for the database and add it to the appropriate groups.
2. Create a DB2 database instance owned by this user.
3. Use the DB2 tools to create three databases - one each for identity, single sign-on, and session recording data.
4. Configure the database instance, create a temporary tablespace, and start the instance.
5. If databases were created by an admin user, grant the necessary privileges to the instance owner.
This document provides a customization guide for AutoCAD LT 2011 that includes:
- Organizing program and support files for customization and multiple configurations.
- Customizing linetypes, hatch patterns, commands, macros, user interface elements like ribbons and toolbars.
- Managing customization files and importing/exporting custom images used for commands.
- Customizing elements like quick access toolbars, ribbons, toolbars, pull-down menus, keyboard shortcuts, and mouse buttons.
The guide covers basic and advanced customization techniques to modify the AutoCAD LT 2011 user interface and functionality.
This document is the user guide for BMC Remedy ServiceDesk: Incident Management 7.0. It provides an overview of the product and its features. The guide is intended for various users, including requesters, support staff, and incident managers. It describes how to perform common functions in ITSM applications and how to work with the different console views to log, track, assign, resolve and close service requests and incidents.
This document is the user guide for BMC Remedy Incident Management 7.0. It provides information on installing and configuring Incident Management, describes the key roles and workflows in Incident Management including the lifecycle of an incident request. It also covers common functions across the BMC Remedy IT Service Management suite such as working with records, relationships, reports and more. The guide is intended for all users of Incident Management including requesters, support staff and incident managers.
Implementing the
IBM Storwize V3700
Easily manage and deploy systems
with embedded GUI
Experience rapid and flexible
provisioning
Protect data with remote
mirroring
The document provides information about implementing the IBM Storwize V3700 storage system. It includes an overview of the hardware components and features of the Storwize V3700. The document also covers initial configuration tasks such as planning the hardware and network setup, performing the first-time setup, and configuring features like expansion enclosures, alerts, and inventory. It provides guidance on using the graphical and command-line interfaces to manage and monitor the storage system.
The IBM® System Storage® Solutions Handbook helps you solve your current and future data storage business requirements. It helps you achieve enhanced storage efficiency by design to allow managed cost, capacity of growth , greater mobility, and stronger control over storage performance and management. It describes the most current IBM storage products, including the IBM Spectrum™ family, IBM FlashSystem®, disk, and tape, as well as virtualized solutions such IBM Storage Cloud
This document provides an overview of implementing OMEGAMON XE for Messaging V6.0:
- It discusses WebSphere MQ, WebSphere Message Broker, and WebSphere InterChange Server as messaging middleware.
- It describes the architecture and deployment scenarios of OMEGAMON XE.
- It covers installing the OMEGAMON infrastructure including the Tivoli Enterprise Monitoring and Portal Servers.
- It explains how to install and configure WebSphere MQ agents on z/OS, UNIX/Linux, and Windows.
- It demonstrates using OMEGAMON XE to configure WebSphere MQ resources through its WebSphere MQ Configuration feature.
This document provides notes from a Linux system administration course. It covers topics like installing Red Hat Linux, configuring XFree86 for graphics, managing software packages, understanding the boot sequence, basic network concepts, kernel functions, configuring services, managing users and groups, working with filesystems, and basic security measures. The document contains detailed sections on partitioning and formatting disks, mounting filesystems, and using common Linux administration tools.
The IBM Flex System p260 and p460 Compute Nodes are IBM Power Systems servers optimized for virtualization, performance, and efficiency. The nodes support IBM AIX, IBM i, or Linux operating environments, and are designed to run various workloads in IBM PureFlex System. This IBM Redbooks publication is a comprehensive guide to IBM PureFlex System and the Power Systems compute nodes. We introduce the offerings and describe the compute nodes in detail. We then describe planning and implementation steps and go through some of the key the management features of the IBM Flex System Manager management node. For more information on Pure Systems, visit http://ibm.co/18vDnp6.
Visit http://bit.ly/KWh5Dx to 'Follow' the official Twitter handle of IBM India Smarter Computing.
Borland c++ version_3.0_users_guide_1991praveen188668
dfg dfgdtyth rth kljlkdfjgd
dfk
it can be also read by c language
isurp jsjjs alksdkjd ndnn tjskje kkskskso suyldkfj .
jdkfljdklfj dfdfhgklhh peyunkjhvsoivnv sdhfdh jhuijnd dfhkjhfkndfjnknvjvdv
This document provides a 3-page overview of managing WebSphere Application Server for z/OS using Tivoli products. It introduces the automation blueprint for comprehensive management of WebSphere from performance, availability, and security. The document is organized to describe the WebSphere environment, IBM Tivoli Monitoring for Web Infrastructure for inside-out monitoring, and IBM Tivoli Monitoring for Transaction Performance for outside-in monitoring.
This document is a user manual for BLAST Professional DOS, a file transfer software. It provides information on installing and using the BLAST software, including configuration options, features of the BLAST environment like environment variables and command line switches, how to use the different emulation modes and file transfer protocols in BLAST, and an introduction to automating tasks with BLASTscript, the built-in scripting language. The manual contains descriptions, examples, and instructions for common administrative and user tasks in BLAST like configuring settings, performing file transfers between local and remote systems, and automating repetitive jobs.
This document provides an overview of virtualization technologies and discusses how to set up and configure DB2 on PowerVM, VMware vSphere, and Microsoft Hyper-V. It covers the architectures and features of these virtualization platforms, including PowerVM on Power Systems, VMware vSphere, and Hyper-V. It also provides guidance on installing and configuring DB2 in virtualized environments based on these technologies.
This document provides instructions for installing and configuring IBM WebSphere MQ version 6.0 on Windows. It discusses migrating from previous versions of MQ and covers installing both the MQ server and MQ client. The document also describes verifying the installations, applying maintenance updates, uninstalling MQ, and lists the documentation available.
This document provides a step-by-step guide for deploying IBM Tivoli Monitoring 6.1 in small to large environments. It discusses planning the installation, defining the architecture, creating deployment plans, installing the various Tivoli Monitoring components, and configuring the system. The guide also covers demonstrations of a single machine proof of concept installation and a small installation using DB2 Workgroup Edition.
Learn how IBM Redpaper publication is a comprehensive guide covering the IBM Power 770 and Power 780 servers supporting IBM AIX, IBM i, and Linux operating systems.For more information visit,http://ibm.co/Lx6hfc
This document provides instructions for implementing IBM SmartCloud Entry on an IBM PureFlex System. It discusses installing and configuring the necessary IBM PureFlex System hardware including Flex System Manager, networking, storage, and compute nodes. It then covers installing and configuring VMware ESXi on the x86 compute nodes, the VMware vCenter Server, and data stores. Finally, it outlines installing and configuring IBM SmartCloud Entry and workload management.
The document provides an overview of the IBM Power 720 and Power 740 servers. It describes the key features of these midrange servers including the POWER7 processor, memory, storage, I/O options, and rack configurations. It also compares the Power 720 and Power 740 models and discusses power management features and the flexible packaging of the POWER7 processor modules.
This document provides an overview and instructions for using the Vivado IDE (Integrated Design Environment). It describes how to launch Vivado, create and manage projects, run synthesis and implementation, view and edit design files and properties, customize the Vivado environment, and use various windows like the sources window, device window, and Tcl console. The document contains revision notes and refers the reader to additional video tutorials for using Vivado.
Redbook: Running IBM WebSphere Application Server on System p and AIX: Optimi...Monty Poppe
This IBM Redbooks publication describes how to run the IBM Java Virtual Machine for AIX and WebSphere Application Server V6.1 on IBM System p and the AIX 5L Operating Systems. In terms of provisioning, tuning and maintenance, it consolidates information from all of these areas into a single resource and explains how you can implement, tune, and utilize the unique features of the IBM POWER Systems platform, AIX, and WebSphere Application Server together for maximum optimization. The book is intended for UNIX system administrators, Java developers, infrastructure designers, J2EE architects, project managers, performance testers and anyone who runs WebSphere Application Server on System p and AIX. It may contain some information which you already know, and other information that is new to you, depending on your background. AIX system administrators may be expert in configuring logical partitions and advanced virtualization, but may gain an understanding from this book about how WebSphere deployment teams may be able to exploit the features of IBM POWER Systems and AIX. WebSphere infrastructure architects may already know exactly how they want their redundant systems to work, but might learn how AIX teams can provide two or three physical servers that provide all of the different levels of application services necessary for the entire application lifecycle environment.
This document provides an installation and configuration guide for IBM Tivoli Directory Server version 6.3. It contains information about installing the server, clients, language packs, and other components across various platforms like Windows, Linux, AIX, Solaris, and HP-UX. The guide also describes how to create and administer directory server instances, configure databases, tune performance, back up and restore data, and more.
1. Create an operating system user for the database and add it to the appropriate groups.
2. Create a DB2 database instance owned by this user.
3. Use the DB2 tools to create three databases - one each for identity, single sign-on, and session recording data.
4. Configure the database instance, create a temporary tablespace, and start the instance.
5. If databases were created by an admin user, grant the necessary privileges to the instance owner.
This document provides a customization guide for AutoCAD LT 2011 that includes:
- Organizing program and support files for customization and multiple configurations.
- Customizing linetypes, hatch patterns, commands, macros, user interface elements like ribbons and toolbars.
- Managing customization files and importing/exporting custom images used for commands.
- Customizing elements like quick access toolbars, ribbons, toolbars, pull-down menus, keyboard shortcuts, and mouse buttons.
The guide covers basic and advanced customization techniques to modify the AutoCAD LT 2011 user interface and functionality.
This document is the user guide for BMC Remedy ServiceDesk: Incident Management 7.0. It provides an overview of the product and its features. The guide is intended for various users, including requesters, support staff, and incident managers. It describes how to perform common functions in ITSM applications and how to work with the different console views to log, track, assign, resolve and close service requests and incidents.
This document is the user guide for BMC Remedy Incident Management 7.0. It provides information on installing and configuring Incident Management, describes the key roles and workflows in Incident Management including the lifecycle of an incident request. It also covers common functions across the BMC Remedy IT Service Management suite such as working with records, relationships, reports and more. The guide is intended for all users of Incident Management including requesters, support staff and incident managers.
The document provides installation instructions for IBM Tivoli Storage Manager Version 7.1. Key points include:
- Tivoli Storage Manager Version 7.1 is installed with IBM DB2 Version 10.5, whereas previous versions used DB2 Version 9.7.
- New features in Version 7.1 affect the Tivoli Storage Manager server, Operations Center, Administration Center, and Tivoli Monitoring.
- Installable components include the server, language packages, licenses, devices, storage agent, and Operations Center.
- Instructions are provided for installing, upgrading, and uninstalling the server and Operations Center. Planning steps like requirements, capacities, and directories are also outlined.
This document provides copyright information and publishing details for a book about Windows PowerShell. It includes the copyright year, publisher name and address, library of congress control number, details about international editions, and notes that fictitious examples are used. The acknowledgments and table of contents pages are also reproduced.
This document provides copyright information and publishing details for a book about Windows PowerShell. It includes the copyright year, publisher name and address, library of congress control number, details about international editions, and notes that fictitious examples are used. The acknowledgments and table of contents pages are also reproduced.
This book is an introduction to web development using Node.js and Express. It covers getting started with Node.js, using Express to build web servers and applications, templating with Handlebars, routing, databases and persistence with MongoDB, security, testing, deployment and more. The book is intended for web developers looking to learn backend development with Node.js and Express.
This document provides an overview and instructions for using AutoCAD 2011. It begins with an introduction and copyright information. It then provides details on finding information using the program's InfoCenter and Help features, obtaining information from drawings, and learning about the product. Subsequent sections cover the user interface including tools in the application window, other locations for tools, and customizing the drawing environment. Later sections address starting and saving drawings, opening and repairing drawing files, and maintaining standards. The document concludes with instructions for changing views and controlling the 3D projection style.
This document provides information about a book titled "Learn Microsoft Excel 2002 VBA Programming with XML and ASP" by Julitta Korol. The book is published by Wordware Publishing, Inc. and teaches how to program Excel 2002 using Visual Basic for Applications (VBA), XML, and Active Server Pages (ASP). It includes a dedication by the author to her mother and mother-in-law for supporting her during the long hours it took to write the technical book. The book contains chapters that introduce spreadsheet automation with VBA macros, teach the basics of VBA programming, and cover topics like variables, procedures, decision making, and more.
This document is the administrator's guide for Zimbra Collaboration Server (ZCS) 8.0 Open Source Edition. It provides information on installing and configuring the core components of ZCS, including the mailbox server, LDAP service, mail transfer agent, and proxy server. It also covers using the administration console and managing configuration settings at the global, domain, and server level.
This document provides an overview and guidance on MongoDB security. It discusses authentication, role-based access control, auditing, encryption, and hardening deployments. It then details concepts like authentication mechanisms, authorization with roles and privileges, network exposure configuration, and API security. Finally it includes tutorials for security best practices, network configuration like firewalls and SSL, deployment, access control, user/role management, and auditing.
The document provides an introduction to working with the PowerDesigner Eclipse Plugin, explaining how to get started using the PowerDesigner interface within Eclipse, how to create and manage models and objects, and how to connect models to databases for reverse engineering and synchronization purposes. It outlines the key components of the PowerDesigner interface like the Model Explorer and property sheets and how to perform basic tasks like creating models, defining objects, and working with packages.
This document provides an administration guide for SuSE Linux. It covers topics like installation, updating, package management, configuration with YaST, booting, the X Window System, and printer operation. The guide contains information on performing a text-based installation with YaST, updating the system with YaST or manually, using RPM for package management, configuring GRUB and LILO boot loaders, optimizing the X configuration, and setting up printers.
Guide citrix presentation server™ - client for java administrator’sxKinAnx
This document provides an administrator's guide for Citrix Presentation Server Client for Java version 9.x. It includes instructions for deploying, configuring, and optimizing the client. The guide covers topics such as unpacking and deploying the client using sample HTML files, initial and advanced configuration options, integrating security solutions, and techniques for improving client performance. It also discusses limitations of the client for different platforms.
The document provides instructions and guidelines for installing and managing Citrix XenServer Dell Edition. It includes sections on installing and configuring XenServer, using XenCenter management software, configuring storage options like local disks and Dell storage arrays, backup and recovery procedures, best practices, and troubleshooting. The document aims to help users optimize the virtualization platform on Dell servers and storage.
This document provides an overview of MongoDB administration concepts and tutorials. It covers key topics related to operational strategies for MongoDB including backup methods, monitoring, database configuration, data management strategies, and optimization techniques. The document also outlines tutorials for tasks like configuration, maintenance, backup/recovery, and MongoDB scripting.
The document provides an overview of MongoDB administration concepts and tutorials. It covers key topics such as operational strategies, data management, optimization strategies, and administration tutorials for configuration, maintenance, backup/recovery, and scripting. The operational strategies section outlines approaches for MongoDB backups, monitoring, database configuration, importing/exporting data, and production notes. Backup methods that are described include copying underlying data files, using mongodump, and MongoDB Management Service cloud/on-prem backup software.
This document provides a complete guide to configuring the Apache web server. It discusses basic setup such as verifying installation, editing configuration files, creating documents, and starting the server. It also covers advanced topics like virtual hosts, secure connections using SSL/TLS, and various security configurations. The document is intended to guide users through all aspects of Apache server administration.
This document provides an overview and user guide for BusinessObjects 6.1 for accessing data and performing data analysis. It covers topics such as building queries on universes and other data sources, combining data from different sources, filtering and customizing report data, analyzing data in drill mode and slice-and-dice mode, and creating calculations. The document is intended to help users maximize their use of BusinessObjects for querying, reporting on, and gaining insights from their data.
Similar to Ibm tivoli directory server 6.1 administration guide (20)
The document outlines various commands used to monitor and manage the IBM Notes Traveler server. It discusses commands to check the status and health of the Traveler server such as "tell traveler status" and "tell traveler stat show". It also provides details on interpreting yellow and red status messages and suggests corrective actions. Thresholds for different health indicators that would result in yellow or red status are also specified.
Connect2013 show100 making traveler highly available_part1_traveler designa8us
The document provides information about installing IBM Lotus Traveler for high availability. It discusses preparing the Domino server, installing Traveler in standalone mode, installing DB2, and creating the initial Traveler database. Key steps include enabling Internet site documents in Domino, configuring the Traveler URL during installation, and installing the required version of DB2 to support the Traveler installation.
Connect2014 id600 ibm notes traveler 2013 & beyonda8us
IBM Notes Traveler provided several enhancements in 2013 including expanded platform support, security features, and functionality. In 2014, IBM plans to continue enhancing Notes Traveler by focusing on email, calendar and cross-application integration. New features will be added via regular updates and the roadmap includes supporting the latest mobile operating systems and addressing customer requirements. All future plans and timelines are subject to change at IBM's discretion.
Connect 2013 show101 making ibm traveler high available_part2_extending and s...a8us
This document discusses configuring IBM WebSphere Edge Components as a load balancer for IBM Notes Traveler servers. It provides steps for installing IBM Installation Manager and using it to install WebSphere Edge Components from local package files. It then outlines configuring the load balancer, including adding a cluster name, port, and backend Traveler server names. The document is presented by two consultants from a German IBM partner who specialize in Domino, mobile, and RCP development.
This document provides an overview and summary of the IBM Notes and Domino collaboration platform. It discusses key concepts like Notes clients and Domino servers, database structure and replication, search capabilities, and integrated collaboration tools like Sametime and Connections. The presentation aims to educate users on maximizing productivity within their workplace using IBM's collaboration solutions.
Connect ed2015 it must be notes, must be something elsea8us
The document provides a summary of 25 years of Lotus Notes/IBM Notes in 25 "Notes" or key points. It discusses the evolution of the software over time, including early versions of Lotus Notes in the late 1980s and 1990s, the introduction of new features and capabilities in subsequent versions, and IBM's acquisition of Lotus Development Corporation in 1995. The summary highlights some of the major milestones and innovations for the collaborative software platform over its 25 year history.
Connect ed2014 ad501_ibm worklight for ibm domino developersa8us
The document discusses a session at IBM Connect 2014 about using the Domino Data Service (DDS) to build native mobile applications with IBM Worklight. The session will cover what DDS is, how to enable it, how to use it to access data from Domino databases via REST APIs, and demonstrate building a first mobile app by installing and configuring Worklight and creating an adapter to connect to a Notes database. The session aims to show how mobile apps can be developed in just 5 minutes by leveraging DDS and Worklight.
The document discusses administration, monitoring, tuning, and troubleshooting of IBM Notes Traveler. It provides an overview of high availability configurations using a Traveler server pool with a remote database. It also describes various commands and statistics that can be used to monitor server status, SQL queries, memory usage, and device synchronization. End-to-end monitoring techniques involving external requests and mail delivery confirmations are also presented. The document stresses the importance of tuning configuration based on device counts and available resources.
Matnewman ibm notes tip of the day traveler 9.0.1.1a8us
The document describes new features in IBM Notes Traveler 9.0.1.1, including a redesigned interface with gesture-based navigation. Key updates include enhanced messaging, calendar, contacts and to-do features, along with deeper integration with IBM Connections and Sametime for improved collaboration. The new version provides a more streamlined mobile experience with additional options for interacting with contacts and accessing calendar details.
This document provides instructions for using various features of IBM Sametime Meetings. It contains tables that summarize how to perform common tasks like creating and joining meetings, sharing screens, using audio and video calls, editing meeting settings, and more. The tables list the specific steps a user would take to accomplish each task within the Sametime Meetings interface.
This document provides instructions for completing basic tasks in IBM Sametime, such as adding contacts, changing your status, and participating in chat rooms and broadcast communities. It includes tables describing how to get started with Sametime, configure client settings, manage contacts, participate in text chats, conduct instant screen sharing, find and organize chat rooms, and get involved in broadcast communities. The tables list specific tasks and the steps required to perform them in the Sametime interface.
Open mic on sametime 9 installs best practices, tips and tricksa8us
This document provides an overview and agenda for an open mic session on best practices, tips, and tricks for installing Sametime 9. It discusses the installation of the Sametime Video MCU, including prerequisites, hardware requirements, and ports. It also covers validating a Video MCU installation, uninstallation, troubleshooting, and collecting logs. The document provides detailed steps and considerations for installing, validating, uninstalling, and troubleshooting the Video MCU component of Sametime 9.
This document provides instructions for installing the Instant Chime plugin for IBM Sametime 9. It describes uninstalling any previous versions of the plugin, downloading and extracting the latest plugin files, running the installation wizard in Sametime, and configuring the plugin by specifying the URL of the Chime installation. The document also includes steps for testing the installed plugin and troubleshooting issues like an incorrectly specified Chime URL.
Ibm sametime deployment planning open mic webcasta8us
This document discusses planning for an IBM Sametime deployment. It outlines the key Sametime components including the System Console, Community Server, Proxy Server, Meeting Server, and Media Server. It also discusses additional requirements like LDAP and DB2 servers. The document then presents examples of common internal and external high availability deployment topologies and considerations for virtualization. It concludes by noting additional deployment details like recommended Sametime client versions and offering field support services to assist with planning and implementation.
IBM Sametime 9 provides social communications capabilities that are simple, smart, social and secure. It offers streamlined experiences for chat, meetings and collaborating from desktop, web or mobile. New features include continuous presence high definition video and improved integration with Microsoft Office and mobile apps. Sametime aims to make communications and collaboration more effective across organizations.
Ibm sametime 9 complete basic features installation from zero to heroa8us
This document provides an overview and agenda for implementing a proof of concept deployment of IBM Sametime 9 Complete. It describes the new features of Sametime 9 including an updated user interface, status cards, contact lists, chat rooms, and meeting rooms. It then outlines the requirements, architecture, and 9 step process for setting up a small test deployment of Sametime 9 Complete for demonstration purposes. The intended audience is technical users who want to quickly showcase the new capabilities of Sametime 9.
This document provides instructions for deploying IBM Sametime 9 on AIX 7.1, including preparing the environment, installing prerequisites like DB2 and Installation Manager, and configuring each Sametime component like Sametime Systems Console, Domino, Community Server, Proxy Server, Advanced Server, and Meetings Server. The steps provided include using SMIT to configure partitions, installing software packages and libraries, running setup/installation scripts, completing post-installation validation, and addressing common problems.
Architecting an ibm sametime 9.0 audio visual deploymenta8us
The document provides an overview of architecting an IBM Sametime 9.0 audio/visual deployment. It discusses the key components, including the SIP Proxy and Registrar, Conference Manager, Video Manager, Video MCU, TURN Server, and SIP Edge Proxy. It covers clustering concepts, deployment models, installation and planning considerations, and resource links. The presentation aims to help attendees understand how the different components work together to provide media services to end users.
This document provides instructions for making calls and video calls using IBM Sametime. It describes how to add contacts, find your phone number, set a service provider, and make various types of calls. Tables cover getting started, making calls, customizing calls and videos, and configuring preferences. The summaries explain how to perform basic call functions and customize settings.
Building RAG with self-deployed Milvus vector database and Snowpark Container...Zilliz
This talk will give hands-on advice on building RAG applications with an open-source Milvus database deployed as a docker container. We will also introduce the integration of Milvus with Snowpark Container Services.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
12. v IBM Tivoli Directory Server Version 6.1 Server Plug-ins Reference, GC32-1565-00
Contains information about writing server plug-ins.
v IBM Tivoli Directory Server Version 6.1 Programming Reference, SC23-7836-00
Contains information about writing Lightweight Directory Access Protocol
(LDAP) client applications in C and Java™
.
v IBM Tivoli Directory Server Version 6.1 Performance Tuning and Capacity Planning
Guide, SC23-7836-00
Contains information about tuning the directory server for better performance.
Describes disk requirements and other hardware needs for directories of
different sizes and with various read and write rates. Describes known working
scenarios for each of these levels of directory and the disk and memory used;
also suggests rough rules of thumb.
v IBM Tivoli Directory Server Version 6.1 Problem Determination Guide, GC32-1568-00
Contains information about possible problems and corrective actions that can be
tried before contacting IBM Software Support.
v IBM Tivoli Directory Server Version 6.1 Messages Guide, GC32-1567-00
Contains a list of all informational, warning, and error messages associated with
IBM Tivoli Directory Server 6.1.
v IBM Tivoli Directory Server Version 6.1 White Pages, SC23-7837-00
Describes the Directory White Pages application, which is provided with IBM
Tivoli Directory Server 6.1. Contains information about installing, configuring,
and using the application for both administrators and users.
Related publications
The following documents also provide useful information:
v Java Naming and Directory Interface™
1.2.1 Specification on the Sun Microsystems
Web site at http://java.sun.com/products/jndi/1.2/javadoc/index.html.
IBM Tivoli Directory Server Version 6.1 uses the Java Naming and Directory
Interface (JNDI) client from Sun Microsystems. See this document for
information about the JNDI client.
Accessing terminology online
The Tivoli Software Glossary includes definitions for many of the technical terms
related to Tivoli software. The Tivoli Software Glossary is available at the following
Tivoli software library Web site:
http://publib.boulder.ibm.com/tividd/glossary/tivoliglossarymst.htm
The IBM Terminology Web site consolidates the terminology from IBM product
libraries in one convenient location. You can access the Terminology Web site at the
following Web address:
http://www.ibm.com/software/globalization/terminology
Accessing publications online
IBM posts publications for this and all other Tivoli products, as they become
available and whenever they are updated, to the Tivoli Information Center Web
site at http://publib.boulder.ibm.com/tividd/td/link/tdprodlist.html.
In the Tivoli Information Center window, click Tivoli product manuals. Click the
letter that matches the first letter of your product name to access your product
x Administration Guide
13. library. For example, click M to access the IBM Tivoli Monitoring library or click O
to access the IBM Tivoli OMEGAMON®
library.
Note: If you print PDF documents on other than letter-sized paper, set the option
in the File → Print window that allows Adobe®
Reader to print letter-sized
pages on your local paper.
Ordering publications
You can order many Tivoli publications online at http://
www.elink.ibmlink.ibm.com/public/applications/publications/cgibin/pbi.cgi.
You can also order by telephone by calling one of these numbers:
v In the United States: 800-879-2755
v In Canada: 800-426-4968
In other countries, contact your software account representative to order Tivoli
publications. To locate the telephone number of your local representative, perform
the following steps:
1. Go to http://www.elink.ibmlink.ibm.com/public/applications/publications/
cgibin/pbi.cgi.
2. Select your country from the list and click Go.
3. Click About this site in the main panel to see an information page that
includes the telephone number of your local representative.
Accessibility
Accessibility features help users with a physical disability, such as restricted
mobility or limited vision, to use software products successfully. With this product,
you can use assistive technologies to hear and navigate the interface. You can also
use the keyboard instead of the mouse to operate all features of the graphical user
interface.
For additional information, see the IBM Tivoli Directory Server Version 6.1 Installation
and Configuration Guide.
Tivoli technical training
For Tivoli technical training information, refer to the following IBM Tivoli
Education Web site at http://www.ibm.com/software/tivoli/education.
Support information
If you have a problem with your IBM software, you want to resolve it quickly. IBM
provides the following ways for you to obtain the support you need:
v IBM Support Assistant: You can search across a large collection of known
problems and workarounds, Technotes, and other information at
http://www.ibm.com/software/support/isa.
v Obtaining fixes: You can locate the latest fixes that are already available for your
product.
v Contacting IBM Software Support: If you still cannot solve your problem, and
you need to work with someone from IBM, you can use a variety of ways to
contact IBM Software Support.
About this book xi
14. For more information about resolving problems, see the IBM Tivoli Directory Server
Version 6.1 Problem Determination Guide.
Conventions used in this book
This book uses several conventions for special terms and actions, operating
system-dependent commands and paths, and margin graphics.
Typeface conventions
This book uses the following typeface conventions:
Bold
v Lowercase commands and mixed case commands that are otherwise
difficult to distinguish from surrounding text
v Interface controls (check boxes, push buttons, radio buttons, spin
buttons, fields, folders, icons, list boxes, items inside list boxes,
multicolumn lists, containers, menu choices, menu names, tabs, property
sheets), labels (such as Tip:, and Operating system considerations:)
v Keywords and parameters in text
Italic
v Citations (examples: titles of books, diskettes, and CDs)
v Words defined in text (example: a nonswitched line is called a
point-to-point line)
v Emphasis of words and letters (words as words example: "Use the word
that to introduce a restrictive clause."; letters as letters example: "The
LUN address must start with the letter L.")
v New terms in text (except in a definition list): a view is a frame in a
workspace that contains data.
v Variables and values you must provide: ... where myname represents....
Monospace
v Examples and code examples
v File names, programming keywords, and other elements that are difficult
to distinguish from surrounding text
v Message text and prompts addressed to the user
v Text that the user must type
v Values for arguments or command options
Operating system-dependent variables and paths
This book uses the UNIX convention for specifying environment variables and for
directory notation.
When using the Windows command line, replace $variable with % variable% for
environment variables and replace each forward slash (/) with a backslash () in
directory paths. The names of environment variables are not always the same in
the Windows and UNIX environments. For example, %TEMP% in Windows
environments is equivalent to $TMPDIR in UNIX environments.
Note: If you are using the bash shell on a Windows system, you can use the UNIX
conventions.
xii Administration Guide
18. associated LDAP API for the C language and ways to access the directory from a
Java application using the Java Naming and Directory Interface (JNDI).
Directory security
A directory should support the basic capabilities needed to implement a security
policy. The directory might not directly provide the underlying security
capabilities, but it might be integrated with a trusted network security service that
provides the basic security services. First, a method is needed to authenticate users.
Authentication verifies that users are who they say they are. A user name and
password is a basic authentication scheme. After users are authenticated, it must be
determined if they have the authorization or permission to perform the requested
operation on the specific object.
Authorization is often based on access control lists (ACLs). An ACL is a list of
authorizations that may be attached to objects and attributes in the directory. An
ACL identifies what type of access each user or a group of users is allowed or
denied on a directory entry or object. In order to make ACLs shorter and more
manageable, users with the same access rights are often put into groups or the
ACLs can be filtered. See Chapter 18, “Access control lists,” on page 367 for more
information.
4 Administration Guide
20. and attributes in the directory. An ACL lists what type of access each
user or a group of users is allowed or denied. To make ACLs shorter
and more manageable, users with the same access rights are often put
into groups or the ACLs are filtered. The directory administrator can
manage access control by specifying the access rights to objects for
individual users or groups. Users can perform operations under
alternate access rights by using proxied authorization. For proxied
authorization, the user assumes the proxied identity and the ACL
restrictions for the proxied identity. For more information, see
Chapter 18, “Access control lists,” on page 367.
Auditing
The IBM Tivoli Directory Server can perform auditing of
security-relevant events, such as user authentication and modification to
the directory tree. The audit function provides a means for
accountability by generating audit records containing the time, user
identity, and additional information about the operation. The directory
administrator manages the behavior of the audit function, such as
selection of auditable events, as well as audit review and clearing of
audit files. For more information , see “Enabling the audit log and
modifying audit log settings” on page 318.
Security roles
IBM Tivoli Directory Server supports five different security roles.
Primary directory administrator
The Primary directory administrator is associated with a specific
user account. There is only one Primary directory administrator
account for the LDAP server. The Primary directory
administrator has full rights to manage the LDAP server. The
Primary directory administrator is created during product
installation and configuration. The Primary directory
administrator consists of a user ID and a password and
predefined authorization to manipulate the entire directory. The
Primary directory administrator creates the end user security
role. This is an LDAP entry with a specific distinguished name
(DN), user password, and other attributes that represent the
particular end user. The Primary directory administrator also
defines the level of authorization the end user will have over
entries.
Administrative group members
Administrative group members are users that have been
assigned a subset of administrative privileges. The
administrative group is a way for the directory administrator to
delegate a limited set of administrative tasks to one or more
individual user accounts. Server administrative group members
are explicitly assigned various roles that define the tasks that a
group member is authorized to perform. These administrative
roles include such specialized roles as Password Administrator
and Server Start/Stop Administrator. For more information, see
“Creating the administrative group” on page 174.
Global administrative group members
The global administrative group is a way for the directory
administrator to delegate administrative rights in a distributed
environment to the database backend. Global administrative
group members are users that have been assigned the same set
6 Administration Guide
21. of privileges as the administrative group with regard to
accessing entries in the database backend. Global administrative
group members have complete access to the directory server
backend. Global administrative group members do not have
access to the audit log and thus the audit log can be used by
local administrators to monitor global administrative group
member activity.
The global administrative group members have no privileges or
access rights to any data or operations that are related to the
configuration settings of the directory server. This is commonly
called the configuration backend. All global administrative group
members have the same set of privileges.
LDAP user
LDAP users are users whose privileges are determined by ACLs.
Each LDAP user is identified with an LDAP entry containing the
authentication and authorization information for that end user.
The authentication and authorization information might also
allow the end user to query and update other entries.
Depending on the type of authentication mechanism used, after
the end user ID and password are validated, the end user can
access any of the attributes of any entry to which that end user
has permissions.
Master server DN
The master server DN is a role used by replication that can
update the entries under a replica’s or a forwarding replica’s
replication context to which the DN is defined as a master server
DN. The master server DN can create a replication context entry
on a replica or forwarding replica if the DN is defined as the
master server DN to that specific replication context or as a
general master server DN.
By sending a AES bind control, a master server DN can send
AES encrypted data to a replica.
The following are some important points about the master server
DN:
– There can be several master server DNs defined in a server’s
configuration file. There is an ibm-slapdReplication object that
can contain a default or general ibm-slapdMasterDN, and
there can be multiple ibm-slapdSupplier objects, each defining
an ibm-slapdMasterDN for a specific replication context (that
is, limited to a specific subtree). The administration password
policy applies to them all.
– Any of those master server DNs can bind to the directory.
– Any of those master server DNs have access to update the
ibm-slapdSuffix attribute of the entry
cn=Directory, cn=RDBM Backends, cn=IBM Directory,
cn=schemas, cn=Configuration
in a server’s configuration file. A master server DN does not
have read or write access to any other entries in the
configuration file.
– No master server DN has access to any other part of the
configuration file.
Chapter 2. The IBM Tivoli Directory Server 7
22. – Only the general master server DN or the master server DN
for the cn=IBMpolicies context can make updates to the
schema.
– The master server DN for a specific context has full read and
write access to all entries within that context.
– The general master server DN has full read and write access
to all entries within all contexts.
Password policy
The password policy feature provided by the IBM Tivoli Directory
Server allows the administrator to define the policy used for
administrator and user passwords. The administrator places restrictions
on passwords by specifying rules for syntax, validation, and lockout in
the password policy. The administrator password policy configuration is
stored in the configuration backend and can be modified only by the
root administrator. The user password policy configuration is stored
within the LDAP tree and can be modified by the root administrator or
a member of the administrative group. The attribute values can be
changed only when binding as administrator to the IBM Tivoli Directory
Server. TDS provides three types of password policies: individual, group,
and global password policies. For more information, see “Setting
password policy” on page 148.
Password encryption
IBM Directory enables you to prevent unauthorized access to user
passwords.
The administrator can configure the server to encrypt userPassword
attribute values in either a one-way encrypting format or a two-way
encrypting format.
One-way encrypting formats:
– crypt
– MD5
– SHA-1
– Salted SHA-1
After the server is configured, any new passwords (for new users) or
modified passwords (for existing users) are encrypted before they are
stored in the directory database.
For applications that require retrieval of clear passwords, such as
middle-tier authentication agents, the directory administrator needs to
configure the server to perform either a two-way encrypting or no
encryption on user passwords.
Two-way encrypting format:
– AES
When you configure the server using Web Administration, you can select
one of the following encryption options:
None No encryption. Passwords are stored in the clear text format.
crypt Passwords are encrypted by the UNIX crypt encrypting
algorithm before they are stored in the directory.
8 Administration Guide
23. MD5 Passwords are encrypted by the MD5 Message Digest algorithm
before they are stored in the directory.
SHA-1
Passwords are encrypted by the SHA-1 encrypting algorithm
before they are stored in the directory.
Salted SHA-1
Passwords are encrypted by the Salted SHA-1 encrypting
algorithm before they are stored in the directory.
AES128
Passwords are encrypted by the AES128 algorithm before they
are stored in the directory and are retrieved as part of an entry
in the original clear format.
AES192
Passwords are encrypted by the AES192 algorithm before they
are stored in the directory and are retrieved as part of an entry
in the original clear format.
AES256
Passwords are encrypted by the AES256 algorithm before they
are stored in the directory and are retrieved as part of an entry
in the original clear format.
The default option is AES256. A change is registered in a password
encryption directive of the server configuration file:
ibm-SlapdPwEncryption: AES256
The server configuration file is located in:
<instance_directory>etcibmslapd.conf
Notes:
1. If the UNIX crypt method is used, only the first 8 characters are
effective.
2. A one-way encrypted password can be used for password matching
but it cannot be decrypted. During user login, the login password is
encrypted and compared with the stored version for matching
verification.
v Change log – Records changes made to the LDAP data and are logged in a
separate database in the LDAP server to support meta-directories or client
queries to monitor directory updates.
v Dynamic configuration – Changes using LDAP APIs provides the capability to
bind to a directory and issue a single extended operation along with any data
that makes up the extended operation value. It supports the standard host, port,
SSL, and authentication options used by all of the LDAP client utilities. In
addition, a set of options is defined to specify the operation to be performed and
the arguments for each extended operation.
v Web Administration Tool – A Graphical User Interface (GUI) that can be used to
administer and configure the IBM Directory. The administration and
configuration functions enable the administrator to:
– Perform the initial setup of the directory
– Change configuration parameters and options
– Manage the daily operations of the directory, such as adding or editing
objects, for example, object classes, attributes, and entries.
Chapter 2. The IBM Tivoli Directory Server 9
24. v Proxy server – A directory proxy server sits at the front-end of a distributed
directory and provides efficient routing of user requests thereby improving
performance in certain situations, and providing a unified directory view to the
client. It can also be used at the front-end of a server cluster for providing fail
over and load balancing.
v Administration daemon (idsdiradm) – Enables remote management of an
instance of the IBM Tivoli Directory Server. It must be installed on the machine
where the IBM Tivoli Directory Server is installed and must be running
continuously.
v Configuration only mode – Gives an administrator remote access to the server
even when errors are encountered during startup. The server does not depend
on the successful initialization of the database back end. An administrator can
use an LDAP protocol to query and update the configuration for the server.
v Attribute uniqueness controls – Can be configured to ensure that specified
attributes always have unique values within a directory on a single directory
server.
v Language tags – Enables the directory to associate natural language codes with
values held in a directory and enables clients to query the directory for values
that meet certain natural language requirements.
v Sorting on searches – Sorts the entries found by the search using the first 240
bytes of the specified attribute values.
v Paged results – Provides paging capabilities for LDAP clients that want to
receive just a subset of search results (a page) instead of the entire list.
v Transactions – Enable an application to group a set of entry updates together in
one transaction.
v Multiple instances – Enables a user to have more than one directory instance on
a server.
v Referrals – Support for LDAP referrals, allowing directories to be distributed
across multiple LDAP servers where each single server may contain only a
subset of the whole directory data.
v Attribute encryption- Enables local administrative group members who are
assigned DirDataAdmin and SchemaAdmin roles to specify attributes that are to
be encrypted in the directory database using a subset of the encryption schemes
supported for password information. For more information, see “Encrypted
Attributes” on page 51
v Pass-through authentication- A mechanism using which if a client attempts to
bind to a directory server and if the user credential is not available locally, then
the server attempts to verify the credential from another external directory
server or a pass-through server on behalf of the client. For more information, see
“Pass-through authentication” on page 168.
v SNMP for server management- The SNMP agent can be used with the IBM
Tivoli Directory Integrator (TDI) assembly line to monitor and report the
performance and wellness information of the directory server.
v Active directory synchronization- A tool for synchronizing users and groups
between an existing Microsoft®
Active Directory and an IBM Tivoli Directory
Server 6.1 directory.
10 Administration Guide
26. | "#" | ";"
<pair> ::= "" ( <special> | "" | ’"’)
<stringchar> ::= any character except <special> or "" or ’"’
<hex> ::= 2*<hexchar>
<hexchar> ::= 0-9, a-f, A-F
A semicolon (;) character can be used to separate RDNs in a distinguished name,
although the comma (,) character is the typical notation.
White-space characters (spaces) might be present on either side of the comma or
semicolon. The white-space characters are ignored, and the semicolon is replaced
with a comma.
In addition, space (’ ’ ASCII 32) characters may be present either before or after a
’+’ or ’=’. These space characters are ignored when parsing.
A value may be surrounded by double quotation (’″’ ACSII 34) characters, which
are not part of the value. Inside the quoted value, the following characters can
occur without being interpreted as escape characters:
v A space or ″#″ character occurring at the beginning of the string
v A space character occurring at the end of the string
v One of the characters ″’″, ″=″, ″+″, ″″, ″<″, ″>″, or ″;″
Alternatively, a single character to be escaped may be prefixed by a backslash (’’
ASCII 92). This method can be used to escape any of the characters listed
previously and the double quotation marks (’″’ ASCII 34) character.
This notation is designed to be convenient for common forms of names. The
following example is a distinguished name written using this notation. First is a
name containing three components. The first of the components is a multivalued
RDN. A multivalued RDN contains more than one attribute:value pair and can be
used to distinctly identify a specific entry in cases where a simple CN value might
be ambiguous:
OU=Sales+CN=J. Smith,O=Widget Inc.,C=US
DN escaping rules
A DN can contain special characters. These characters are , (comma), = (equals), +
(plus), < (less than), > (greater than), # (number sign), ; (semicolon), (backslash),
and “” (quotation marks).
To escape these special characters or other characters in an attribute value in a DN
string, use any the following methods:
v If a character to be escaped is one of special characters, precede it by a backslash
(’’ ASCII 92). This example shows a method of escaping a comma in an
organization name:
CN=L. Eagle,O=Sue, Grabbit and Runn,C=GB
This is the preferred method.
v Otherwise replace the character to be escaped by a backslash and two hex digits,
which form a single byte in the code of the character. The code of the character
must be in UTF-8 code set.
12 Administration Guide
27. CN=L. Eagle,O=Sue2C Grabbit and Runn,C=GB
v Surround the entire attribute value by “” (quotation marks) (ASCII 34) that are
not part of the value. Between the quotation character pair, all characters are
taken as is, except for the (backslash). The (backslash) can be used to escape
a backslash (ASCII 92) or quotation marks (ASCII 34), any of the special
characters previously mentioned, or hex pairs as in method 2. For example, to
escape the quotation marks in cn=xyz"qrs"abc, it becomes cn=xyz"qrs"abc or
to escape a :
"you need to escape a single backslash this way "
Another example, "Zoo" is illegal, because ’Z’ cannot be escaped in this context.
On the server end, when a DN is received in this form, the server reformats the
DN using escape mechanisms number 1 and 2 for internal processing.
Enhanced DN processing
A composite RDN of a DN may consist of multiple components connected by the
‘+’ operators. The server enhances the support for searches on entries that have
such a DN. A composite RDN can be specified in any order as the base for a
search operation.
idsldapsearch cn=mike+ou=austin,o=sample
The server accepts DN normalization extended operations. DN normalization
extended operations normalize DNs using the server schema. This extended
operation might be useful for applications that use DNs. See the IBM Tivoli
Directory Server Version 6.1 C-client Programming Reference for more information.
Chapter 3. Distinguished names (DNs) 13
32. Starting an instance of the directory administration daemon
Note: By default, the administration daemon is started when you create a
directory server instance.
To start an instance of the administration daemon do either of the following:
v For UNIX or Linux-based and Windows-based systems issue the command:
idsdiradm -I <instancename>
v For Windows-based systems, you can also use Control Panel ->Administrative
Tools->Services, select IBM Tivoli Directory Server Instance V6.1 -
<instancename> Admin Daemon, click Start.
Note: On Linux SLES systems, the Admin Daemon must not be started from
inittab. Instead, start the Admin Daemon manually from the command line.
See the idsdiradm command information in the IBM Tivoli Directory Server
version 6.1 Command Reference for more information.
Stopping an instance of the directory administration daemon
To stop an instance of the administration daemon use one of the following
methods:
v If you have already configured a directory administration DN and password,
you can use the ibmdirctl command to stop the administration daemon. This
command is not platform specific. See the ibmdirctl command information in
the IBM Tivoli Directory Server version 6.1 Command Reference for more
information.
Issue one of the commands:
ibmdirctl -D <adminDN> -w <adminPW> -h <hostname>
-p <port> admstop
The ibmdirctl command can be issued locally or remotely.
idsdiradm -I <instancename> -k
The idsdiradm command must be issued locally.
v For Windows-based systems, you can also use IBM Tivoli Directory Server
Instance V6.1 - <instancename> Admin Daemon, click Stop.
18 Administration Guide
34. Using the command line:
Specify -a or -A on server startup.
idsslapd -a -I <instancename>
or
ibmdirctl -h <hostname> -D <adminDN> -w <adminpw>-p <portnumber>
start -- -a
Note: The -n and -N options prevent the server from starting if the server is
unable to start with the database backends (not in configuration only mode).
See the ibmdirctl command information in the IBM Tivoli Directory Server
version 6.1 Command Reference for more information.
How to verify that the server is running in configuration only mode
To determine if the server is running in configuration only mode, use one of the
following methods.
Using Web Administration:
If the server has started in configuration only mode the icon, located between
the stop and start icons, is highlighted.
Using the command line:
Issue a search of the root DSE for the attribute ibm-slapdisconfigurationmode. If
set to true, the server is running in configuration only mode.
idsldapsearch -s base -b " " objectclass=* ibm-slapdisconfigurationmode
20 Administration Guide
36. Logging in to the console
Open a Web browser and type the following address: http://localhost:12100/
IDSWebApp/IDSjsp/Login.jsp or if you are using secure communications with your
Web browser https://localhost:12101/IDSWebApp/IDSjsp/Login.jsp. The IBM
Tivoli Directory Server Web Administration login page panel is displayed.
Note:
v localhost is a host name or an IP address, if you are logged on to a
browser that is not on the same machine where the Web Administration
Tool is installed.
v Initially, when no server is registered, the Console admin page is
displayed. If one or more servers are registered, the initial page to be
displayed is Directory server login page.
Logging on to the console as the console administrator
To log on as the console administrator, at the Console admin login page, do the
following:
1. In the Username field type: superadmin, if the default user name has not been
changed. See “Managing the console” on page 27.
2. In the Password field type: secret, if the default password has not been
changed. See “Managing the console” on page 27.
3. Click Login.
The IBM Tivoli Directory Server Web Administration Tool console is displayed.
Note: To log in as a registered user click the Log in to a registered LDAP server
link. This will display the Directory server login page.
Logging on to the console as the server administrator, a
member of an administrative group or an LDAP user
To log on as the server administrator, a member of the administrative group (see
“Creating the administrative group” on page 174) or an LDAP user:
v At the IBM Tivoli Directory Server login page select the LDAP host name or IP
address and port for your machine from the drop-down menu.
v Enter the administrator DN and the corresponding password for that
administrator DN (you set these up during the server configuration process). For
example, if the administrator DN which was created during the server
configuration process was cn=root, then enter the full administrator DN. Do not
just use root. Similarly, to login as an admin group member or as a normal DIT
user, enter the DN of the user and the corresponding password. For example, if
the DIT user is cn=Tom Brown, o=sample then you need to enter the login name
as cn=Tom Brown, o=sample.
v Click Login.
The IBM Tivoli Directory Server Web Administration Tool console is displayed
with various server management tasks. The server management tasks vary
depending upon the capabilities of the server and the type of user that you have
logged on as.
Note:
v The Web Administration Tool does not support logging on to a given
server using replication supplier credentials.
22 Administration Guide
37. v To log in to the console admin, click the Log in to Console Admin link.
Console layout
The IBM Tivoli Directory Server Web Administration Tool console consists of five
areas:
Banner area
The banner area located at the top of the panel contains the application
name, IBM Tivoli Directory Server Web Administration Tool, and the IBM
Logo.
Navigation area
The navigation area, located on the left side of the panel, displays
expandable categories for various console or server tasks. The tasks
available vary depending on your authority or the capabilities of the server
you are logging onto or both.
Work area
The work area displays the tasks associated with the selected task in the
navigation area. For example, if Managing server security is selected in the
navigation area, the work area displays the Server Security page and the
tabs containing tasks related to setting up server security.
Server status area
Note: If you are logged on as the console administrator, this area displays
″Console administrator″ and provides an icon link to the table of
contents for task helps.
The server status area, located at the top of the work area, indicates the
status and the name of the server being administered. It also has two icon
links, one to the Start/Stop/Restart procedure and the other to general
help information. When you select a task from the navigation area, the
name of the selected task, a link to the error log files, and a link to the task
help are also displayed.
Task status area
The task status area, located beneath the work area, displays the status of
the current task.
Logging off the console
To log off from the console, click Logout in the navigation area.
The Logout successful panel displays the message:
You have successfully been logged off the server. This action has
occurred because you hit the logout button. Please note that this
browser window and any other browser windows opened while you were
working on the server have now expired. No further interaction can
occur with the server by clicking in these windows.
You can re-login by clicking here.
Click the word here in this message to return to the IBM Tivoli Directory Server
Web Administration Login Page.
Chapter 6. Web Administration Tool graphical user interface (GUI) 23
38. Using tables in the Web Administration Tool
The IBM Tivoli Directory Server Web Administration Tool displays certain
information, such as lists of attributes and entries, in tables. Tables contain several
utilities that enable you to search for, organize, and perform actions on these table
items.
Table icons
IBM Tivoli Directory Server Web Administration Tool tables provide icons to help
you organize and find information in the table. Some icons are displayed on some
tables and not on others, depending on the current task. The following is a
comprehensive list of the icons you might encounter:
v Click the Show Filter Row icon to display filter rows for every column
in the table. See “Filtering” on page 26 for more information about filtering.
v Click the Hide Filter Row icon to display filter rows for every column in
the table. See “Filtering” on page 26 for more information about filtering.
v Click the Clear all filters icon clear all filters set for the table. See
“Filtering” on page 26 for more information about filtering .
v Click the Edit sort icon to sort the information in the table. See “Sorting”
on page 25 for more information about sorting.
v Click the Clear all sorts icon clear all sorts set for the table. See
“Sorting” on page 25 for more information about sorting.
v Click the Collapse table icon to hide the table data.
v Click the Expand table icon to display the table data.
v Click the Select all icon to select all items in the table.
v Click the Deselect all icon to deselect all selected items in the table.
Select Action drop-down menu
The Select Action drop-down menu contains a comprehensive list of all available
actions for the selected table.
For example, instead of using the icons to display and hide sorts and filters, you
can use the Select Action drop-down menu. You can also use the Select Action
drop-down menu to perform operations on the table contents; for example, on the
Manage attributes panel, actions such as View, Add, Edit, Copy, and Delete are
displayed not only as buttons on the toolbar, but also in the Select Action
drop-down menu. If the table supports it, you can also display or hide the Show
24 Administration Guide
39. find toolbar using the Select Action drop-down menu. See “Finding” for more
information on finding table items.
To perform an action using the Select Action menu:
1. Click the Select Action drop-down menu.
2. Select the action you want to perform; for example Edit sort.
3. Click Go.
Paging
To view different table pages, use the navigation controls at the bottom of the
table. You can enter a specific page number into the navigation field and click Go
to display a certain page. You can also use the Next and Previous arrows to move
from page to page.
Sorting
To change the way items in a table are sorted:
1. Do one of the following:
v Click the Edit sort icon on the table.
v Click the Select Action drop-down menu, select Edit sort and click Go. A
sorting drop-down menu is displayed for every column in the table.
2. From the first sort drop-down menu, select the column that you want to sort.
Do the same for any of the other sortable columns that you want to sort.
3. Select whether to sort in ascending or descending order by selecting Ascending
Descending from the drop-down menu. Ascending is the default sort order.
You can also sort using column headers. On every column is a small arrow. An
arrow pointing up means that column is sorted in ascending order. An arrow
pointing down means that column is sorted in descending order. To change the
sort order, simply click on the column header.
4. When you are ready to sort, click Sort.
To clear all the sorts, click the Clear all sorts icon.
Finding
To find a specific item or items in a table:
Note: The Show find toolbar option is available on some tables and not on others,
depending on the current task.
1. Select Show find toolbar from the Select Action drop-down menu and click
Go.
2. Enter your search criteria in the Search for field.
3. If desired, select a condition upon which to search from the Conditions
drop-down menu. The options for this menu are:
v Contains
v Starts with
v Ends with
v Exact match
4. Select the column upon which you want to base the search from the Column
drop-down menu.
Chapter 6. Web Administration Tool graphical user interface (GUI) 25
40. 5. Select whether to display results in descending or ascending order from the
Direction drop-down menu. Select Down to display results in descending
order. Select Up to display results in ascending order.
6. Select the Match case check box, if you want search results to match the upper
and lower case criteria in the Search for field.
7. When you have entered the desired criteria, click Find to search for the
attributes.
Filtering
To filter items in a table, do the following:
1. Do one of the following:
v Click the Show filter icon.
v Click the Select Action drop-down menu, select Show filter row and click
Go.
Filter buttons are displayed above each column.
2. Click Filter above the column you want to filter.
3. Select one of the following conditions from the Conditions drop-down menu:
v Contains
v Starts with
v Ends with
4. Enter the text you want to filter on in the field; for example, if you selected
Starts with, you might enter C.
5. If you want to match case (upper case text or lower case text) select the Match
case check box.
6. When you are ready to filter the attributes, click OK.
7. Repeat step 2 through step 6 for every column you want to filter.
To clear all the filters, click the Clear all filters icon.
To hide the filter rows, click the Show filter icon again.
26 Administration Guide
42. 2. Click Manage console servers. A table for listing of server host names and port
numbers is displayed.
3. Click Add.
4. Specify a unique name that identifies a registered IBM Tivoli Directory Server
(TDS) instance running on a specified host name or IP address and server port.
The server name is displayed in the LDAP Hostname list on the Directory
server login panel. If a name is not provided in the Server name field, the
hostname:port combination would be displayed for the server instance in the
LDAP Hostname list on the Directory server login panel.
5. Enter the host name address or the IP address of the server. For example
servername.austin.ibm.com
6. Select the Admin daemon supported check box to enable the Administration
port control.
7. Specify the port numbers or accept the defaults.
Note: For multiple server instances on the same machine, although the host
name remains the same, you must specify the correct port that was
assigned to the directory server instance.
8. Specify if the server is SSL enabled. Ensure that you complete step 5 on page 29
under Managing console properties.
9. Click OK to apply the changes or click Cancel to exit the panel without making
any changes.
Modifying a server in the console
To change the port number or SSL enablement of a server:
1. Expand Console administration in the navigation area.
2. Click Manage console servers. A listing of server host names and port numbers
is displayed.
3. Select the radio button next to the server you want to modify.
4. Click Edit.
5. You can change the port numbers.
6. You can change whether the server is SSL enabled. Ensure that you complete
step 5 on page 29 under Managing console properties, if you are enabling SSL.
7. Click OK to apply the changes or click Cancel to exit the panel without making
any changes.
Removing a server from the console
To remove a server from the console:
1. Expand Console administration in the navigation area.
2. Click Manage console servers. A listing of server host names and port numbers
is displayed.
3. Select the radio button next to the server you want to remove.
4. Click Delete.
5. A message to confirm that you want to remove the server is displayed. Click
OK to remove the server or click Cancel to exit the panel without removing the
server.
Managing console properties
To change the settings for the console properties:
1. Expand Console administration in the navigation area.
28 Administration Guide
43. 2. Click Manage console properties.
3. Click Component management - to specify the components that are enabled
for all servers in the console. By default all the components are enabled.
Note: You might not see a management component or some of its tasks, even if
it is enabled, if you do not have the correct authority on the server or the
server does not have the needed capabilities, or both.
4. Click Session properties - to set the time out limit for the console session. The
default setting is 60 minutes.
Note: A session might be valid for three to five minutes more than what you
have set. This is because the invalidations are performed by a
background thread in the application server that acts on a timer interval.
This timer interval extends the session time out duration.
5. Click SSL key database - to set up the console so that it can communicate with
other LDAP servers using the Secure Sockets Layer (SSL), if necessary. Set the
key database path and file name, the key password, the trusted database path
and file name, the trusted password in the appropriate fields. The supported
file type is jks. See “Using gsk7ikm” on page 131 and “Secure Sockets Layer”
on page 125 for information about key databases and SSL.
Manage properties for webadmin searches
Users can use the Manage properties for webadmin searches panel to configure the
search settings for web admin searches. However, if the limit number of attribute
values control is not supported then the Manage properties for webadmin searches
panel will not be displayed.
To configure the search settings for web admin searches:
1. Expand Console administration in the navigation area.
2. Click Manage properties for webadmin searches.
3. Specify the maximum number of attributes to return for each entry. If you click
Number of attributes, you must enter a number. Otherwise, click Unlimited.
4. Specify the maximum number of values to return for each attribute. If you click
Number of values, you must enter a number. Otherwise, click Unlimited.
5. Click OK to save the changes and to return to the Introduction panel.
When you have finished setting up the console, click Logout to exit. See “Logging
off the console” on page 23 for more information.
Chapter 7. Setting up the Web Administration Tool 29
46. objectclasses=( 1.3.6.1.4.1.1466.101.120.111
NAME ’extensibleObject’
SUP top AUXILIARY )
objectclasses=( 2.5.20.1
NAME ’subschema’
AUXILIARY MAY
( dITStructureRules
$ nameForms
$ ditContentRules
$ objectClasses
$ attributeTypes
$ matchingRules
$ matchingRuleUse ) )
objectclasses=( 2.5.6.1
NAME ’alias’
SUP top STRUCTURAL
MUST aliasedObjectName )
attributeTypes {
( 2.5.18.10 NAME ’subschemaSubentry’ EQUALITY distinguishedNameMatch
SYNTAX 1.3.6.1.4.1.1466.115.121.1.12 NO-USER-MODIFICATION
SINGLE-VALUE USAGE directoryOperation )
( 2.5.21.5 NAME ’attributeTypes’
EQUALITY objectIdentifierFirstComponentMatch
SYNTAX 1.3.6.1.4.1.1466.115.121.1.3 USAGE directoryOperation )
( 2.5.21.6 NAME ’objectClasses’
EQUALITY objectIdentifierFirstComponentMatch
SYNTAX 1.3.6.1.4.1.1466.115.121.1.37 USAGE directoryOperation )
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 USAGE directoryOperation )
}
ldapSyntaxes {
( 1.3.6.1.4.1.1466.115.121.1.5 DESC ’Binary’ )
( 1.3.6.1.4.1.1466.115.121.1.7 DESC ’Boolean’ )
( 1.3.6.1.4.1.1466.115.121.1.12 DESC ’DN’ )
( 1.3.6.1.4.1.1466.115.121.1.15 DESC ’Directory String’ )
( 1.3.6.1.4.1.1466.115.121.1.24 DESC ’Generalized Time’ )
( 1.3.6.1.4.1.1466.115.121.1.26 DESC ’IA5 String’ )
( 1.3.6.1.4.1.1466.115.121.1.27 DESC ’INTEGER’ )
( 1.3.6.1.4.1.1466.115.121.1.50 DESC ’Telephone Number’ )
( 1.3.6.1.4.1.1466.115.121.1.53 DESC ’UTC Time’ )
}
matchingRules {
( 2.5.13.2 NAME ’caseIgnoreMatch’
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
( 2.5.13.0 NAME ’objectIdentifierMatch’
SYNTAX 1.3.6.1.4.1.1466.115.121.1.38 )
( 2.5.13.30 NAME ’objectIdentifierFirstComponentMatch’
SYNTAX 1.3.6.1.4.1.1466.115.121.1.38 )
( 2.5.13.4 NAME ’caseIgnoreSubstringsMatch’
SYNTAX 1.3.6.1.4.1.1466.115.121.1.58 )
}
As shown in the preceding example, it is not required that all of the attribute
values of a given attribute type be provided in a single production.
The schema information can be modified through the ldap_modify API. Consult
the Client SDK Programming Reference for additional information. With the DN
″cn=schema″ you can add, delete, or replace an attribute type or an object class. To
delete a schema entity, provide the oid in parenthesis (oid). You also can provide a
full description. You can add or replace a schema entry with the LDAP Version 3
definition or with the IBM attribute extension definition or with both definitions.
32 Administration Guide