Index

Index

Symbols

.schema files, About Directory Schema

B

basic mapping
attribute mapping, Configuring Basic Mapping Manually
configuration file entry, Configuring Basic Mapping Manually
configuring, Configuring Basic Mapping
overview, Basic Mapping
source field mapping, Configuring Basic Mapping Manually
basic proxy, Using Proxy Services
Bouncy Castle, Bouncy Castle Security Provider

G

GID conflicts, Resolving UID and GID Conflicts
global repository, Creating Global Templates
linking entries, Linking Identities
resolving UID/GID conflicts, Resolving UID and GID Conflicts
unlinking entries, Linking Identities

I

identity federation, Mapping Entries and Attributes, Configuring Identity Federation
configuring mapping, Creating Advanced Mappings
differences with identity joining, About Identity Federation
example, About Identity Federation
illustrated, Joining LDAP, NIS, and Active Directory Servers through Identity Federation
linking entries, Linking Identities
seeAlso attribute, Linking Identities
local LDAP repository
Penrose Studio, Adding LDAP Local Repositories through Penrose Studio
local NIS repository
Penrose Studio, Adding NIS Local Repositories Using Penrose Studio
mapping
annotated entry, Mapping Attribute Fields and Scripts Manually
configuration entries, Mapping Attribute Fields and Scripts Manually
configuration parameters, Mapping Attribute Fields and Scripts Manually
overview, About Identity Federation
planning, Joining LDAP, NIS, and Active Directory Servers through Identity Federation
process, About Identity Federation
resolving UID/GID conflicts, Resolving UID and GID Conflicts
stacking authentication, Planning Authentication
types of sources, About Identity Federation
unlinking entries, Linking Identities
identity joining
configuration file
example, Manually Joining Entries
configuring, Joining Entities into a Single Virtual Entry
configuration file, Manually Joining Entries
Penrose Studio, Setting up Join Mapping in Penrose Studio
init scripts, Configuring Penrose Server to Run as a Service
installing
additional libraries, Installing Additional Libraries
init scripts, Configuring Penrose Server to Run as a Service
Penrose Server, Installing Penrose Server
Penrose Studio
Red Hat Enterprise Linux, Installing Penrose Studio on Red Hat Enterprise Linux
Windows, Installing Penrose Studio on Windows
security providers, Installing Additional Security Providers
Bouncy Castle, Bouncy Castle Security Provider
JCE Unlimited Strength Jurisdiction Policy Files, JCE Unlimited Strength Jurisdiction Policy Files
uninstalling Penrose Server, Uninstalling Penrose Server

L

lazy migration, Migrating from NIS Servers to LDAP Servers
migrating to Red Hat IPA, Migrating to Red Hat IPA
process, Migrating from NIS Servers to LDAP Servers
process to Red Hat IPA, Migrating to Red Hat IPA
LDAP
handling virtual views in the virtual directory, Identifying Current Data Sources
migrating from NIS, Migrating from NIS Servers to LDAP Servers
synchronizing, Synchronizing Active Directory and Other LDAP Services
LDAP proxy
creating
in configuration files, Configuring an LDAP Proxy Manually
LDAP tree, Mapping an LDAP Tree
linking entries, Linking Identities
seeAlso attribute, Linking Identities
local repository
LDAP
Penrose Studio, Adding LDAP Local Repositories through Penrose Studio
linking entries, Linking Identities
NIS
Penrose Studio, Adding NIS Local Repositories Using Penrose Studio
resolving UID/GID conflicts, Resolving UID and GID Conflicts
unlinking entries, Linking Identities
log4j.xml, Configuring and Viewing Logs, Access Logs, Error Logs, Debug Logs
configuring, Configuring Log Settings
logs, Configuring and Viewing Logs
access logs, Access Logs
configuration, Configuring Log Settings
configuring, Configuring Log Settings
debug logs, Debug Logs
error logs, Error Logs

M

mapping, Configuring the Virtual Directory, Mapping Entries and Attributes
attributes for dynamic entry sources, Adding a Dynamic Directory Entry
basic mapping
configuration file entry, Configuring Basic Mapping Manually
configuring, Configuring Basic Mapping
for identity federation, Creating Advanced Mappings
annotated entry, Mapping Attribute Fields and Scripts Manually
attribute fields, Mapping Attribute Fields
configuration entries, Mapping Attribute Fields and Scripts Manually
configuration parameters, Mapping Attribute Fields and Scripts Manually
post-scripts, Using Scripts
pre-scripts, Using Scripts
join mapping
configuring, Joining Entities into a Single Virtual Entry
merging sources, Creating a Single Subtree from Multiple Sources
example, Creating a Single Subtree from Multiple Sources
nested mapping
configuring, Configuring Nested Mapping
types overview
basic mapping, Basic Mapping
join mapping, Joined Mapping
nested mapping, Nested Mapping
mappings.xml
proxy entry, Configuring an LDAP Proxy Manually
metadirectory
definition, Explaining Virtual Directories
migration
NIS to LDAP, Migrating from NIS Servers to LDAP Servers, Synchronizing (or Migrating) NIS Data to LDAP
process, Migrating from NIS Servers to LDAP Servers
resolving UID/GID conflicts, Resolving UID and GID Conflicts
synchronizing NIS data, Synchronizing (or Migrating) NIS Data to LDAP
to Red Hat IPA, Migrating to Red Hat IPA
process, Migrating to Red Hat IPA
MINA, About Services in Penrose Virtual Directory
module.sh, module.sh
options, module.sh
modules, Configuring Modules
adding
configuration file, Adding Modules Manually
Penrose Studio, Adding Modules in Penrose Studio
configuration entry, Adding Modules Manually
configuration parameters, Adding Modules Manually
enabling and disabling, Enabling and Disabling Modules
mapping to virtual directory entries, Mapping Modules to Data Entries
modules.xml, Adding Modules Manually
annotated entry, Adding Modules Manually
cache, Using In-Memory Cache
configuration parameters, Adding Modules Manually
disabling cache, Disabling Cache
mapping modules to virtual directory entries, Mapping Modules to Data Entries
example, Mapping Modules to Data Entries
parameters, Mapping Modules to Data Entries
monitor.sh, monitor.sh
options, monitor.sh

P

partition.sh, partition.sh
importing and exporting, Exporting and Importing Partitions in the Command Line
options, partition.sh
stopping and starting, Starting and Stopping Partitions
partitions, Managing Partitions
adding custom classes, Using Custom Java Classes
connections, Creating Connections in Penrose Studio
creating, Adding Partitions
entry, Configuring a Virtual Directory through Partitions
exporting, Exporting Partitions in Penrose Studio
illustrated, Configuring a Virtual Directory through Partitions
importing, Importing Partitions in Penrose Studio
importing and exporting through the command line, Exporting and Importing Partitions in the Command Line
modules, Configuring Modules
overview, About Partitions
planning, Configuring a Virtual Directory through Partitions
proxy configuration, Configuring an LDAP Proxy Manually
sources, Configuring Data Sources
stopping and starting
command line, Starting and Stopping Partitions
Penrose Studio, Starting and Stopping Partitions
pass-through authentication, Configuring Authentication for Proxies
configuring, Configuring Authentication for Proxies
types of, Configuring Authentication for Proxies
Penrose Server
access logs, Access Logs
cache, Configuring Cache
cache performance information, About Penrose Cache Types
configuring logging, Configuring and Viewing Logs, Configuring Log Settings
configuring SSL, Configuring Penrose Virtual Directory for SSL
configuring the admin user, Editing the Admin User in Penrose Studio
debug logs, Debug Logs
disabling cache, Disabling Cache
error logs, Error Logs
in-memory cache, Using In-Memory Cache
installing, Installing Penrose Server
additional libraries, Installing Additional Libraries
Bouncy Castle, Bouncy Castle Security Provider
JCE Unlimited Strength Jurisdiction Policy Files, JCE Unlimited Strength Jurisdiction Policy Files
security providers, Installing Additional Security Providers
installing init scripts, Configuring Penrose Server to Run as a Service
Java system properties, Configuring the Host System Properties in the Configuration File
MBeans, Looking at Penrose Virtual Directory
outside firewall, Running Penrose Server Outside a Firewall
ports, Running Penrose Server Outside a Firewall
required software, Required Software
setting host properties, Configuring Penrose Server Host System Properties
supported platforms, Supported Platforms
uninstalling, Uninstalling Penrose Server
Penrose Studio, Using Penrose Studio
copying and pasting entries, Copying Entries to Another Penrose Server Instance
deleting entries, Deleting Entries
editing entries, Viewing and Editing Entries
entry editor, Looking at Penrose Studio
Java system properties for Penrose Server, Configuring the Host System Properties in the Configuration File
managing entries, Editing, Copying, and Deleting Entries
server window, Looking at Penrose Studio
starting and stopping
Red Hat Enterprise Linux, Starting Penrose Studio on Red Hat Enterprise Linux
Windows, Starting Penrose Studio on Windows
supported platforms, Supported Platforms
top navigation menu, Looking at Penrose Studio
troublshooting, Starting Penrose Studio
viewing entries, Viewing and Editing Entries
walk-through, Looking at Penrose Studio
Penrose Virtual Directory
additional libraries, Installing Additional Libraries
advantages, Explaining Virtual Directories
components, Looking at Penrose Virtual Directory
default schema, Default Schema Elements and Files
installing Penrose Server, Installing Penrose Server
pass-through authentication, Configuring Authentication for Proxies
Penrose Studio, Using Penrose Studio
planning, Planning Penrose Virtual Directory
authentication, Planning Authentication
data sources, Identifying Current Data Sources
identity federation, Joining LDAP, NIS, and Active Directory Servers through Identity Federation
migrating from NIS to LDAP, Migrating from NIS Servers to LDAP Servers
migrating to Red Hat IPA, Migrating to Red Hat IPA
partitions, Configuring a Virtual Directory through Partitions
synchronizing Active Directory and LDAP, Synchronizing Active Directory and Other LDAP Services
proxy, Using Proxy Services
required software, Required Software
schema, Customizing Schema
security providers, Installing Additional Security Providers
Bouncy Castle, Bouncy Castle Security Provider
JCE Unlimited Strength Jurisdiction Policy Files, JCE Unlimited Strength Jurisdiction Policy Files
services, Using Services with Penrose Virtual Directory
sources, Configuring Data Sources
starting and stopping, Configuring Penrose Server to Run as a Service
supported platforms, Supported Platforms
supported platforms for Penrose Studio, Supported Platforms
ports, Running Penrose Server Outside a Firewall
primary keys, Joined Mapping
for dynamic entries, Adding a Dynamic Directory Entry
for static entries, Adding a Static Directory Entry
for the root entry, Adding a Base DN (Root Entry)
proxy, Using Proxy Services
aggregated proxy, Using Proxy Services
and namespaces, Using Proxy Services
authentication, Configuring Authentication for Proxies
basic proxy, Using Proxy Services
classes
org.safehaus.penrose.directory.Entry.ProxyEntry, Adding a Base DN (Root Entry), Adding a Static Directory Entry
configuration files, Configuring an LDAP Proxy Manually
configuring authentication, Configuring Authentication for Proxies
mapping Active Directory schema, Mapping Active Directory Schema
mapping LDAP tree, Mapping an LDAP Tree
mapping root DSE, Mapping the Root DSE
sample entry, Configuring an LDAP Proxy Manually

S

schema, Customizing Schema
attribute entries, About Directory Schema
example, About Directory Schema
converting formatting to OpenDS, Converting the Schema Formatting from OpenLDAP to OpenDS
creating custom, Creating Custom Schema
default, Default Schema Elements and Files
formatting, About Directory Schema
importing custom, Importing Schema Files
LDAP syntax OIDs, Creating Custom Schema
loading custom manually, Loading a Schema File Manually
object class entries, About Directory Schema
example, About Directory Schema
overview, About Directory Schema
schema.sh, Converting the Schema Formatting from OpenLDAP to OpenDS
schema.sh, schema.sh
options, schema.sh
usage, Converting the Schema Formatting from OpenLDAP to OpenDS
scripts
cache.sh, cache.sh
connection.sh, connection.sh
locations, Tool Locations
module.sh, module.sh
monitor.sh, monitor.sh
nis.sh, nis.sh
partition.sh, partition.sh
schema.sh, schema.sh
source.sh, source.sh
security providers, Installing Additional Security Providers
Bouncy Castle, Bouncy Castle Security Provider
JCE Unlimited Strength Jurisdiction Policy Files, JCE Unlimited Strength Jurisdiction Policy Files
seeAlso attribute, Linking Identities
server.xml
configuring the admin user, Editing the Admin User in the Configuration File
Java system properties, Configuring the Host System Properties in the Configuration File
setting host properties, Configuring Penrose Server Host System Properties
SERVICE-INF/, Adding and Editing Services Manually
service.xml, Adding and Editing Services Manually
annotated, Adding and Editing Services Manually
configuration parameters, Adding and Editing Services Manually
enabling services, Enabling and Disabling Services
services, Using Services with Penrose Virtual Directory
ApacheDS, About Services in Penrose Virtual Directory
configuration entries, Adding and Editing Services Manually
configuration parameters, Adding and Editing Services Manually
custom
adding, Adding Services in Penrose Studio
requirements, About Services in Penrose Virtual Directory
default, About Services in Penrose Virtual Directory
editing, Adding Services in Penrose Studio
enabling, Enabling and Disabling Services
JMX, About Services in Penrose Virtual Directory
MINA, About Services in Penrose Virtual Directory
OpenDS, About Services in Penrose Virtual Directory
overview, About Services in Penrose Virtual Directory
source.sh, source.sh
options, source.sh
sources, Configuring Data Sources
annotated configuration file, Creating and Editing Sources Manually
configuration parameters, Creating and Editing Sources Manually
configuring pass-through authentication, Configuring Authentication for Proxies
creating
configuration files, Creating and Editing Sources Manually
Penrose Studio, Configuring Sources in Penrose Studio
example sources.xml, Creating and Editing Sources Manually
field parameters, Creating and Editing Sources Manually
fields, About Data Sources
normalizing data, About Data Sources
options, Creating and Editing Sources Manually
overview, About Data Sources
reverse mappings, About Data Sources
sources.xml
annotated, Creating and Editing Sources Manually
configuration parameters, Creating and Editing Sources Manually
configuring pass-through authentication, Configuring Authentication for Proxies
examples, Creating and Editing Sources Manually
field parameters, Creating and Editing Sources Manually
proxy entry, Configuring an LDAP Proxy Manually
SSL, Configuring Penrose Virtual Directory for SSL
stacking authentication, Planning Authentication
process, Planning Authentication
static entries, Adding a Static Directory Entry
subtree
automatically filling in ou branch entries, Adding a Base DN (Root Entry)
creating static entries, Adding a Static Directory Entry
subtrees
creating, Creating and Editing the Virtual Subtrees
base DN, Adding a Base DN (Root Entry)
Penrose Studio, Creating the Virtual Directory in Penrose Studio
dynamic entries, Adding a Dynamic Directory Entry
synchronizing
Active Directory and LDAP, Synchronizing Active Directory and Other LDAP Services
NIS to LDAP, Synchronizing (or Migrating) NIS Data to LDAP
types, Synchronizing Active Directory and Other LDAP Services

U

UID conflicts, Resolving UID and GID Conflicts
uninstalling
Penrose Server, Uninstalling Penrose Server
unlinking entries, Linking Identities

V

virtual directory, Configuring the Virtual Directory
about, About the Virtual Directory Tree and Handling Entries
access control, Setting Access Controls on the Virtual Directory
configuration file, Setting Access Controls Manually
configuring, Setting Access Controls in Penrose Studio
defaults, Default ACIs
inheritance, Placing ACIs and ACI Inheritance
parameters, Setting Access Controls Manually
required parameter, Default ACIs
adding custom classes, Using Custom Java Classes
automatically filling in ou branch entries, Adding a Base DN (Root Entry)
basic mapping
configuration file entry, Configuring Basic Mapping Manually
configuring, Configuring Basic Mapping
classes
org.safehaus.penrose.directory.Entry, Adding a Base DN (Root Entry), Adding a Static Directory Entry
org.safehaus.penrose.directory.Entry.DynamicEntry, Adding a Base DN (Root Entry), Adding a Static Directory Entry
org.safehaus.penrose.directory.Entry.ProxyEntry, Adding a Base DN (Root Entry), Adding a Static Directory Entry
org.safehaus.penrose.directory.Entry.RootEntry, Adding a Base DN (Root Entry), Adding a Static Directory Entry
org.safehaus.penrose.directory.Entry.SchemaEntry, Adding a Base DN (Root Entry), Adding a Static Directory Entry
cn=subschema, Creating Special Directory Entries
org.safehaus.penrose.directory.Entry.SchemaEntry, Adding a Base DN (Root Entry), Adding a Static Directory Entry
creating
configuration entries, Configuring the Virtual Directory Manually
creating subtrees, Creating and Editing the Virtual Subtrees
definition, Explaining Virtual Directories
dynamic entries, Adding a Dynamic Directory Entry
editing configuration, Editing the Directory Configuration
editing sources, Editing the Directory Sources
flattening namespaces, Creating a Single Subtree from Multiple Sources
example, Creating a Single Subtree from Multiple Sources
handling virtual views, Identifying Current Data Sources
illustrated, Explaining Virtual Directories
join mapping
configuring, Joining Entities into a Single Virtual Entry
mapping modules to entries, Mapping Modules to Data Entries
parameters, Mapping Modules to Data Entries
mapping types
basic mapping, Basic Mapping
join mapping, Joined Mapping
nested mapping, Nested Mapping
nested mapping
configuring, Configuring Nested Mapping
partitions, Managing Partitions
planning, Planning Penrose Virtual Directory, About the Virtual Directory Tree and Handling Entries
data sources, Identifying Current Data Sources
mapping entry attributes, Planning How to Map Entries
merging different source into single subtree, About the Virtual Directory Tree and Handling Entries
partitions, Configuring a Virtual Directory through Partitions
required entries, Creating and Editing the Virtual Subtrees
root DSE, Creating Special Directory Entries
static entries, Adding a Static Directory Entry