|
DataMuseum.dkPresents historical artifacts from the history of: DKUUG/EUUG Conference tapes |
This is an automatic "excavation" of a thematic subset of
See our Wiki for more about DKUUG/EUUG Conference tapes Excavated with: AutoArchaeologist - Free & Open Source Software. |
top - metrics - downloadIndex: T a
Length: 6089 (0x17c9) Types: TextFile Names: »administrator.toc«
└─⟦2d1937cfd⟧ Bits:30007241 EUUGD22: P.P 5.0 └─⟦35176feda⟧ »EurOpenD22/isode/isode-6.tar.Z« └─⟦de7628f85⟧ └─⟦this⟧ »isode-6.0/doc/whitepages/administrator/administrator.toc«
\contentsline {chapter}{\numberline {1}Introduction}{1} \contentsline {section}{\numberline {1.1}Informational Model}{3} \contentsline {subsection}{\numberline {1.1.1}Naming}{3} \contentsline {subsection}{\numberline {1.1.2}How Entries and Objects are Described}{4} \contentsline {subsection}{\numberline {1.1.3}Object Classes}{8} \contentsline {subsubsection}{The top objectClass}{10} \contentsline {subsubsection}{The quipuObject objectClass}{10} \contentsline {subsubsection}{The quipuNonLeafObject objectClass}{13} \contentsline {subsubsection}{The domainRelatedObject objectClass}{14} \contentsline {subsubsection}{The friendlyCountry objectClass}{14} \contentsline {subsubsection}{The organization objectClass}{17} \contentsline {subsubsection}{The organizationalUnit objectClass}{21} \contentsline {subsubsection}{The locality objectClass}{23} \contentsline {subsubsection}{The pilotPerson objectClass}{26} \contentsline {subsubsection}{The alias objectClass}{30} \contentsline {subsubsection}{The organizationalRole objectClass}{31} \contentsline {subsubsection}{The quipuDSA objectClass}{34} \contentsline {section}{\numberline {1.2}Functional Model}{36} \contentsline {section}{\numberline {1.3}Organizational Model}{39} \contentsline {subsection}{\numberline {1.3.1}Level-0 DSAs}{40} \contentsline {subsection}{\numberline {1.3.2}Level-1 DSAs}{42} \contentsline {subsection}{\numberline {1.3.3}Level-2 DSAs}{43} \contentsline {subsection}{\numberline {1.3.4}DUAs}{44} \contentsline {section}{\numberline {1.4}Security Model}{45} \contentsline {section}{\numberline {1.5}Running your DMD}{46} \contentsline {chapter}{\numberline {2}Installation and Configuration}{47} \contentsline {section}{\numberline {2.1}Software}{47} \contentsline {subsection}{\numberline {2.1.1}Selecting a Machine}{48} \contentsline {subsection}{\numberline {2.1.2}Files}{48} \contentsline {subsection}{\numberline {2.1.3}Source Release}{50} \contentsline {subsubsection}{Configuration of the ISODE}{51} \contentsline {subsubsection}{Generation of the ISODE}{51} \contentsline {subsubsection}{Installation of the ISODE}{52} \contentsline {section}{\numberline {2.2}Starting the ISODE}{53} \contentsline {section}{\numberline {2.3}ISODE Tailoring}{54} \contentsline {section}{\numberline {2.4}Testing of the ISODE}{54} \contentsline {section}{\numberline {2.5}Configuration of DUAs}{54} \contentsline {subsection}{\numberline {2.5.1}DUA Failure}{55} \contentsline {section}{\numberline {2.6}An Important Note}{57} \contentsline {section}{\numberline {2.7}Configuring your Level-1 DSA}{57} \contentsline {subsection}{\numberline {2.7.1}Choosing a DSA Name}{58} \contentsline {subsection}{\numberline {2.7.2}Editing the DSA configuration file}{59} \contentsline {subsection}{\numberline {2.7.3}Running the DSA configuration program}{61} \contentsline {subsection}{\numberline {2.7.4}Testing the stand-alone DSA}{62} \contentsline {subsection}{\numberline {2.7.5}DSA Failure}{62} \contentsline {subsubsection}{Attribute Errors}{62} \contentsline {subsubsection}{Structure Errors}{63} \contentsline {subsubsection}{Network Errors}{63} \contentsline {subsection}{\numberline {2.7.6}Editing the DUA tailoring file}{64} \contentsline {subsection}{\numberline {2.7.7}Joining the Pilot DMD}{65} \contentsline {subsubsection}{Contact the c=US Manager}{65} \contentsline {subsubsection}{Connecting In and Checking Out}{66} \contentsline {subsubsection}{More System Administration}{67} \contentsline {section}{\numberline {2.8}Configuring the White Pages}{68} \contentsline {subsection}{\numberline {2.8.1}White Pages via TELNET}{69} \contentsline {subsubsection}{Fred-only hosts}{69} \contentsline {subsection}{\numberline {2.8.2}White Pages via WHOIS}{70} \contentsline {subsubsection}{The whitepages Command}{70} \contentsline {subsection}{\numberline {2.8.3}White Pages via mail}{71} \contentsline {subsection}{\numberline {2.8.4}An Undocumented Feature}{71} \contentsline {section}{\numberline {2.9}Other Services}{74} \contentsline {subsection}{\numberline {2.9.1}Faces}{74} \contentsline {subsubsection}{XPhoto}{74} \contentsline {subsubsection}{xwho and xface}{74} \contentsline {subsection}{\numberline {2.9.2}Mail Composition}{75} \contentsline {section}{\numberline {2.10}Tell The Users!}{76} \contentsline {chapter}{\numberline {3}Maintenance}{77} \contentsline {section}{\numberline {3.1}A file you should know about}{77} \contentsline {section}{\numberline {3.2}Nightly Maintenance}{77} \contentsline {subsection}{\numberline {3.2.1}Logs}{78} \contentsline {subsection}{\numberline {3.2.2}Limiting the size of Logs}{78} \contentsline {subsection}{\numberline {3.2.3}Reading Logs}{78} \contentsline {section}{\numberline {3.3}Adding Entries}{79} \contentsline {subsection}{\numberline {3.3.1}Using Dish}{80} \contentsline {section}{\numberline {3.4}Adding organizationalUnits}{80} \contentsline {section}{\numberline {3.5}Adding a Level-2 DSA}{81} \contentsline {subsection}{\numberline {3.5.1}Modifying the Level-1 DSA}{82} \contentsline {subsection}{\numberline {3.5.2}Configuring a Level-2 DSA}{83} \contentsline {subsubsection}{Editing the DSA tailoring file}{84} \contentsline {subsubsection}{Editing the DSA startup file}{85} \contentsline {subsubsection}{Building an Initial Database}{85} \contentsline {subsubsection}{Testing the Level-2 DSA}{85} \contentsline {subsubsection}{Editing the DUA tailoring file}{86} \contentsline {subsection}{\numberline {3.5.3}Moving portions of the Directory Tree}{87} \contentsline {subsubsection}{Editing the DUA tailoring file}{90} \contentsline {subsubsection}{System Administration}{90} \contentsline {section}{\numberline {3.6}Miscellaneous Topics}{91} \contentsline {subsection}{\numberline {3.6.1}Moving a Level-1 DSA}{91} \contentsline {subsection}{\numberline {3.6.2}Running a SLAVE Level-1 DSA}{92} \contentsline {subsection}{\numberline {3.6.3}A Final Word on DSAs and Knowledge Information}{92} \contentsline {subsection}{\numberline {3.6.4}Naming People}{93} \contentsline {subsection}{\numberline {3.6.5}Installing the Software on other hosts}{94}