DataMuseum.dk

Presents historical artifacts from the history of:

DKUUG/EUUG Conference tapes

This is an automatic "excavation" of a thematic subset of
artifacts from Datamuseum.dk's BitArchive.

See our Wiki for more about DKUUG/EUUG Conference tapes

Excavated with: AutoArchaeologist - Free & Open Source Software.


top - metrics - download
Index: T a

⟦7cb0fcef8⟧ TextFile

    Length: 6089 (0x17c9)
    Types: TextFile
    Names: »administrator.toc«

Derivation

└─⟦2d1937cfd⟧ Bits:30007241 EUUGD22: P.P 5.0
    └─⟦35176feda⟧ »EurOpenD22/isode/isode-6.tar.Z« 
        └─⟦de7628f85⟧ 
            └─⟦this⟧ »isode-6.0/doc/whitepages/administrator/administrator.toc« 

TextFile

\contentsline {chapter}{\numberline {1}Introduction}{1}
\contentsline {section}{\numberline {1.1}Informational Model}{3}
\contentsline {subsection}{\numberline {1.1.1}Naming}{3}
\contentsline {subsection}{\numberline {1.1.2}How Entries and Objects are Described}{4}
\contentsline {subsection}{\numberline {1.1.3}Object Classes}{8}
\contentsline {subsubsection}{The top objectClass}{10}
\contentsline {subsubsection}{The quipuObject objectClass}{10}
\contentsline {subsubsection}{The quipuNonLeafObject objectClass}{13}
\contentsline {subsubsection}{The domainRelatedObject objectClass}{14}
\contentsline {subsubsection}{The friendlyCountry objectClass}{14}
\contentsline {subsubsection}{The organization objectClass}{17}
\contentsline {subsubsection}{The organizationalUnit objectClass}{21}
\contentsline {subsubsection}{The locality objectClass}{23}
\contentsline {subsubsection}{The pilotPerson objectClass}{26}
\contentsline {subsubsection}{The alias objectClass}{30}
\contentsline {subsubsection}{The organizationalRole objectClass}{31}
\contentsline {subsubsection}{The quipuDSA objectClass}{34}
\contentsline {section}{\numberline {1.2}Functional Model}{36}
\contentsline {section}{\numberline {1.3}Organizational Model}{39}
\contentsline {subsection}{\numberline {1.3.1}Level-0 DSAs}{40}
\contentsline {subsection}{\numberline {1.3.2}Level-1 DSAs}{42}
\contentsline {subsection}{\numberline {1.3.3}Level-2 DSAs}{43}
\contentsline {subsection}{\numberline {1.3.4}DUAs}{44}
\contentsline {section}{\numberline {1.4}Security Model}{45}
\contentsline {section}{\numberline {1.5}Running your DMD}{46}
\contentsline {chapter}{\numberline {2}Installation and Configuration}{47}
\contentsline {section}{\numberline {2.1}Software}{47}
\contentsline {subsection}{\numberline {2.1.1}Selecting a Machine}{48}
\contentsline {subsection}{\numberline {2.1.2}Files}{48}
\contentsline {subsection}{\numberline {2.1.3}Source Release}{50}
\contentsline {subsubsection}{Configuration of the ISODE}{51}
\contentsline {subsubsection}{Generation of the ISODE}{51}
\contentsline {subsubsection}{Installation of the ISODE}{52}
\contentsline {section}{\numberline {2.2}Starting the ISODE}{53}
\contentsline {section}{\numberline {2.3}ISODE Tailoring}{54}
\contentsline {section}{\numberline {2.4}Testing of the ISODE}{54}
\contentsline {section}{\numberline {2.5}Configuration of DUAs}{54}
\contentsline {subsection}{\numberline {2.5.1}DUA Failure}{55}
\contentsline {section}{\numberline {2.6}An Important Note}{57}
\contentsline {section}{\numberline {2.7}Configuring your Level-1 DSA}{57}
\contentsline {subsection}{\numberline {2.7.1}Choosing a DSA Name}{58}
\contentsline {subsection}{\numberline {2.7.2}Editing the DSA configuration file}{59}
\contentsline {subsection}{\numberline {2.7.3}Running the DSA configuration program}{61}
\contentsline {subsection}{\numberline {2.7.4}Testing the stand-alone DSA}{62}
\contentsline {subsection}{\numberline {2.7.5}DSA Failure}{62}
\contentsline {subsubsection}{Attribute Errors}{62}
\contentsline {subsubsection}{Structure Errors}{63}
\contentsline {subsubsection}{Network Errors}{63}
\contentsline {subsection}{\numberline {2.7.6}Editing the DUA tailoring file}{64}
\contentsline {subsection}{\numberline {2.7.7}Joining the Pilot DMD}{65}
\contentsline {subsubsection}{Contact the c=US Manager}{65}
\contentsline {subsubsection}{Connecting In and Checking Out}{66}
\contentsline {subsubsection}{More System Administration}{67}
\contentsline {section}{\numberline {2.8}Configuring the White Pages}{68}
\contentsline {subsection}{\numberline {2.8.1}White Pages via TELNET}{69}
\contentsline {subsubsection}{Fred-only hosts}{69}
\contentsline {subsection}{\numberline {2.8.2}White Pages via WHOIS}{70}
\contentsline {subsubsection}{The whitepages Command}{70}
\contentsline {subsection}{\numberline {2.8.3}White Pages via mail}{71}
\contentsline {subsection}{\numberline {2.8.4}An Undocumented Feature}{71}
\contentsline {section}{\numberline {2.9}Other Services}{74}
\contentsline {subsection}{\numberline {2.9.1}Faces}{74}
\contentsline {subsubsection}{XPhoto}{74}
\contentsline {subsubsection}{xwho and xface}{74}
\contentsline {subsection}{\numberline {2.9.2}Mail Composition}{75}
\contentsline {section}{\numberline {2.10}Tell The Users!}{76}
\contentsline {chapter}{\numberline {3}Maintenance}{77}
\contentsline {section}{\numberline {3.1}A file you should know about}{77}
\contentsline {section}{\numberline {3.2}Nightly Maintenance}{77}
\contentsline {subsection}{\numberline {3.2.1}Logs}{78}
\contentsline {subsection}{\numberline {3.2.2}Limiting the size of Logs}{78}
\contentsline {subsection}{\numberline {3.2.3}Reading Logs}{78}
\contentsline {section}{\numberline {3.3}Adding Entries}{79}
\contentsline {subsection}{\numberline {3.3.1}Using Dish}{80}
\contentsline {section}{\numberline {3.4}Adding organizationalUnits}{80}
\contentsline {section}{\numberline {3.5}Adding a Level-2 DSA}{81}
\contentsline {subsection}{\numberline {3.5.1}Modifying the Level-1 DSA}{82}
\contentsline {subsection}{\numberline {3.5.2}Configuring a Level-2 DSA}{83}
\contentsline {subsubsection}{Editing the DSA tailoring file}{84}
\contentsline {subsubsection}{Editing the DSA startup file}{85}
\contentsline {subsubsection}{Building an Initial Database}{85}
\contentsline {subsubsection}{Testing the Level-2 DSA}{85}
\contentsline {subsubsection}{Editing the DUA tailoring file}{86}
\contentsline {subsection}{\numberline {3.5.3}Moving portions of the Directory Tree}{87}
\contentsline {subsubsection}{Editing the DUA tailoring file}{90}
\contentsline {subsubsection}{System Administration}{90}
\contentsline {section}{\numberline {3.6}Miscellaneous Topics}{91}
\contentsline {subsection}{\numberline {3.6.1}Moving a Level-1 DSA}{91}
\contentsline {subsection}{\numberline {3.6.2}Running a SLAVE Level-1 DSA}{92}
\contentsline {subsection}{\numberline {3.6.3}A Final Word on DSAs and Knowledge Information}{92}
\contentsline {subsection}{\numberline {3.6.4}Naming People}{93}
\contentsline {subsection}{\numberline {3.6.5}Installing the Software on other hosts}{94}