eTrust Directory - CA Technologies

Transcription

eTrust Directory - CA Technologies
eTrust Directory

Getting Started Guide
4.1
This documentation and related computer software program (hereinafter referred to as the “Documentation”) is for
the end user’s informational purposes only and is subject to change or withdrawal by Computer Associates
International, Inc. (“CA”) at any time.
This documentation may not be copied, transferred, reproduced, disclosed or duplicated, in whole or in part, without
the prior written consent of CA. This documentation is proprietary information of CA and protected by the copyright
laws of the United States and international treaties.
Notwithstanding the foregoing, licensed users may print a reasonable number of copies of this documentation for
their own internal use, provided that all CA copyright notices and legends are affixed to each reproduced copy. Only
authorized employees, consultants, or agents of the user who are bound by the confidentiality provisions of the
license for the software are permitted to have access to such copies.
This right to print copies is limited to the period during which the license for the product remains in full force and
effect. Should the license terminate for any reason, it shall be the user’s responsibility to return to CA the reproduced
copies or to certify to CA that same have been destroyed.
To the extent permitted by applicable law, CA provides this documentation “as is” without warranty of any kind,
including without limitation, any implied warranties of merchantability, fitness for a particular purpose or
noninfringement. In no event will CA be liable to the end user or any third party for any loss or damage, direct or
indirect, from the use of this documentation, including without limitation, lost profits, business interruption,
goodwill, or lost data, even if CA is expressly advised of such loss or damage.
The use of any product referenced in this documentation and this documentation is governed by the end user’s
applicable license agreement.
The manufacturer of this documentation is Computer Associates International, Inc.
Provided with “Restricted Rights” as set forth in 48 C.F.R. Section 12.212, 48 C.F.R. Sections 52.227-19(c)(1) and (2) or
DFARS Section 252.227-7013(c)(1)(ii) or applicable successor provisions.
This product includes code licensed from RSA Data Security.
 2003 Computer Associates International, Inc.
All trademarks, trade names, service marks, and logos referenced herein belong to their respective companies.
Contents
Chapter 1: Welcome to eTrust Directory
The Purpose of This Guide.....................................................................
What Is a Directory? ..........................................................................
Why You Need a Directory ....................................................................
Save time.................................................................................
Increase productivity ......................................................................
Reduce risk and downtime .................................................................
Why eTrust Directory is the best solution .......................................................
Outstanding Performance ..................................................................
Industrial-Strength Database Reliability .....................................................
Robust Distribution and Replication ........................................................
Virtually Unlimited Scalability .............................................................
Powerful Security .........................................................................
Applications Integration ...................................................................
Consolidated Customer Management .......................................................
Comprehensive Management Tools and Capabilities .........................................
Leverage Investments .....................................................................
CA Services: Enabling Solutions Through Experience ............................................
CA Education Services ........................................................................
Computer Associates: The Software That Manages eBusiness .....................................
For More Information .........................................................................
1-1
1-1
1-2
1-2
1-2
1-2
1-3
1-3
1-3
1-3
1-5
1-5
1-5
1-6
1-6
1-6
1-7
1-7
1-7
1-8
Chapter 2: Installing eTrust Directory
eTrust Directory Components ..................................................................
DSML....................................................................................
DXconfig .................................................................................
Dxmanager ...............................................................................
DXserver .................................................................................
Dxtools ..................................................................................
JXplorer ..................................................................................
2-1
2-1
2-1
2-2
2-2
2-2
2-2
Contents
iii
JXweb .................................................................................... 2-2
UDDI Web Client .......................................................................... 2-2
Windows Installation .......................................................................... 2-4
Before You Start ........................................................................... 2-4
Installing eTrust Directory.................................................................. 2-4
Custom Setup ............................................................................. 2-5
UNIX Installation ............................................................................. 2-6
Before You Start ........................................................................... 2-6
Installing eTrust Directory.................................................................. 2-6
Custom Setup ............................................................................. 2-7
Upgrading from a Previous Version ............................................................. 2-8
Installation Considerations ................................................................. 2-9
Chapter 3: A Quick Tour of the Sample Directories
Democorp DSA ............................................................................... 3-2
Democorp Setup Script ..................................................................... 3-2
Windows Installation ...................................................................... 3-3
UNIX Installation .......................................................................... 3-3
UNSPSC DSA ................................................................................. 3-3
UNSPSC Setup Script ...................................................................... 3-4
Windows Installation ...................................................................... 3-5
UNIX Installation .......................................................................... 3-5
Router DSA ................................................................................... 3-5
Router Setup Script ........................................................................ 3-5
Windows Installation ...................................................................... 3-6
UNIX Installation .......................................................................... 3-6
Chapter 4: A Quick Tour of JXplorer
Starting JXplorer .............................................................................. 4-2
Windows ................................................................................. 4-2
UNIX..................................................................................... 4-2
Connecting to a DSA .......................................................................... 4-3
Searching a Directory .......................................................................... 4-4
Displaying an Entry in a Directory .............................................................. 4-5
Updating a Directory .......................................................................... 4-6
iv
eTrust Directory Getting Started
Chapter 5: A Quick Tour of JXweb
Connecting to JXweb ..........................................................................
Connecting to a Directory .....................................................................
Displaying Directory Information ..............................................................
Searching the Directory .......................................................................
Searching the Directory for Specific Attributes ...................................................
Updating an Entry ............................................................................
5-1
5-2
5-3
5-4
5-5
5-6
Chapter 6: A Quick Tour of eTrust Directory Administration
Configuring eTrust Directory ..................................................................
Types of Configuration ........................................................................
Configuration Files ...........................................................................
DXconfig.....................................................................................
Starting DXserver .............................................................................
Additional Windows Information ..........................................................
Stopping DXserver ............................................................................
DXconsole ...................................................................................
Log Files .....................................................................................
DXtools ......................................................................................
DXmanager Portal ............................................................................
6-1
6-2
6-2
6-4
6-5
6-5
6-6
6-6
6-7
6-7
6-7
Chapter 7: A Quick Tour of UDDI Registry
About UDDI Repositories ..................................................................... 7-1
What a UDDI Repository Can Do ........................................................... 7-1
About the eTrust Directory UDDI Registry .................................................. 7-1
Connecting to the UDDI Web Client ............................................................ 7-2
Connecting to the UDDI Server ................................................................ 7-2
Searching the Repository—Simple .............................................................. 7-3
Searching the Repository—Advanced ........................................................... 7-5
Publishing Information ........................................................................ 7-6
Setting Up Your Publishing User ID ........................................................ 7-6
Logging on to the Repository ............................................................... 7-7
Registering Your Business ................................................................. 7-7
Registering a Service ...................................................................... 7-9
Adding a Binding Template ............................................................... 7-10
Checking that Your Business Can Be Found ................................................ 7-10
Contents
v
Appendix A: Supported Standards
X.500 Standards ..............................................................................
Industry Standards ...........................................................................
LDAP Standards .............................................................................
Management Standards .......................................................................
Security Standards ...........................................................................
A-1
A-2
A-2
A-3
A-4
Appendix B: The LDAP and X.500 standards
The LDAP standard is widely accepted .......................................................... B-1
The X.500 standard allows directories to communicate ............................................ B-2
eTrust Directory Supports Both Standards ....................................................... B-2
vi
eTrust Directory Getting Started
Chapter
1
Welcome to eTrust Directory
Congratulations! You now have an effective way to manage and control your
directory information.
With eTrust™ Directory, no matter how your network grows and evolves, you
have a secure and reliable foundation for providing information services to users
and directory-enabled applications.
The Purpose of This Guide
This guide is designed to give you a quick introduction to eTrust Directory . By
the time you finish reading this guide you will have an overview of the wide
scope of the product and its general use. It is important to us that you feel
comfortable with eTrust Directory before you begin to use it.
What Is a Directory?
A directory stores information about people, resources, and systems. It provides
a consistent way to name, describe, locate, access, manage, and secure this
information.
A directory service makes this information available to different applications in a
network.
These applications can search the information in the directory in the same way
that we use a telephone directory.
Welcome to eTrust Directory
1–1
Why You Need a Directory
Why You Need a Directory
Directories provide a platform- and vendor-independent information service.
They avoid duplication by managing shared information such as profiles and
policies, and help provide common services such as security and resource
management.
The great benefits of directories are realized when common functions are
delegated to a directory service and directory-enabled applications then leverage
this service. The alternative can be very costly—each application having to
develop and maintain its own information base about users, customers,
suppliers, or other applications.
Banks, corporations, government agencies and OEMs rely on large-scale
directory backbone infrastructures for online financial services, intelligent
networks, public key infrastructure (PKI) and related business applications and
services.
To help ensure success for these business-critical applications, you need a
directory solution that combines the highest levels of performance, scalability,
reliability and industrial-strength security.
Save time
Directories save time for administrators by offering a single management focus
for staff, customers and resources, along with associated access and security
profiles.
Increase productivity
Directories increase productivity by providing a highly available, fast and secure
common information service.
Reduce risk and downtime
Directories reduce risk and downtime by delivering built-in fault tolerance, and
automatic recovery and failover features.
1–2
etrust Directory Getting Started Guide
Why eTrust Directory is the best solution
Why eTrust Directory is the best solution
eTrust Directory is an industrial-strength directory. It is proven in missioncritical business systems, and meets the stringent demands of Internet service
providers (ISPs) and large corporations. It supports LDAP, Secure Sockets Layer
(SSL), and X.500 protocols, and meets the industry’s highest standards for
performance, scalability, and security.
Outstanding Performance
eTrust Directory delivers thousands of searches per second on multimillion entry
databases and sub-second multi-cast searching across hundreds of distributed
servers.
Industrial-Strength Database Reliability
eTrust Directory incorporates the predictable performance, reliability and
availability of a commercial RDBMS to significantly reduce technology risk and
cost of deployment.
The RDBMS can automatically recover from power failures, perform online
backup and tuning, maintain journals and “hot” swap underlying database
images, ensure data integrity, transaction management, recovery and rollback,
disk management, indexing, and query optimization.
eTrust Directory is unique in that many international patents protect the design
and algorithms used to map directory information to a relational database.
Robust Distribution and Replication
Replication and distribution are two distinct elements of directory system design.
Both are used to improve the performance, capacity, and reliability of the system.
eTrust Directory is engineered to ensure that these performance, capacity, and
reliability functions are world-class.
eTrust Directory includes advanced replication and routing features, along with
an industry-leading replication scheme that provides a real-time multi-master
capability. Together with intelligent routing, eTrust Directory can automatically
failover between masters, perform load balancing and switch routes in the case
of network outages.
Welcome to eTrust Directory
1–3
Why eTrust Directory is the best solution
In addition, X.500 replication can provide backup copies of data. The multiwrite
capability of DXserver enables you to synchronize groups of peer DSAs while the
DSAs are still online. If one DSA fails, then a router DSA can forward requests to
another DSA in the peer group. You can also configure DXservers with multiple
network addresses to allow for network failover.
Replication
Replication occurs when the same directory entry namespace exists on different
servers.
One directory
namespace is
replicated across
three servers
Namespace 1
Namespace 2
Namespace 3
Replication is important for recovery and sometimes for performance.
Replication involves copying data. Whenever data is copied, you must ensure
that the copies are synchronized. This can make the cost of developing and
maintaining replicated systems expensive, and you should weigh it against the
benefit of recovery (in the event of failure) and performance.
Distribution
Distribution occurs when interconnected directory servers have different entry
namespaces, but they operate as one logical directory service.
Namespace 1
One directory
service is
distributed across
three namespaces
Namespace 2
1–4
etrust Directory Getting Started Guide
Namespace 3
Why eTrust Directory is the best solution
Distribution is important for scaling. Similar to the World Wide Web,
distribution lets any number of servers share and maintain their own
information. However, unlike the World Wide Web, directory servers have a
server-to-server protocol (DSP), which enables them to cooperate to provide
distributed queries and a unified view of the whole directory information tree
(DIT).
Virtually Unlimited Scalability
Each eTrust Directory server can hold more than one hundred million entries,
and as many directory servers as required can be linked together to form an
integrated directory backbone.
eTrust Directory can achieve sub-second response times in highly replicated and
distributed environments.
Powerful Security
eTrust Directory delivers powerful security through an integrated set of
authentication, access control and encryption facilities.
With an eTrust Directory backbone, Internet access to services can be secured by
strong authentication of customers with digital certificates and smart cards at
very high transaction rates. Many service provider and web-enabled applications
rely on the distributed backbone infrastructure of eTrust Directory to manage
customer identity, group and security details.
The authentication levels include password, SSL and certificate-based
authentication, as well as mutual authentication and network address validation
for servers.
eTrust Directory provides stringent access controls, which can be role-based,
rule-based and/or dynamic, and can be applied over subtrees, entries and
attributes.
DXserver implements the powerful X.500 security model. This includes mutual
authentication of DSAs to provide security between directory servers, rule-based
access controls, access-controlled routing, automatic alias management, and
credit-based controls to stop denial of service.
Applications Integration
eTrust Directory works seamlessly with many third-party applications, such as
SAP, PeopleSoft, Netegrity SiteMinder and Tivoli Access Manager.
Welcome to eTrust Directory
1–5
Why eTrust Directory is the best solution
Consolidated Customer Management
eTrust Directory provides a distributed, highly secure store of customer
information and account relationships. Information that is duplicated across
incompatible legacy systems and back-office applications can be migrated into a
unified, easily accessible directory infrastructure.
Comprehensive Management Tools and Capabilities
All aspects of eTrust Directory management can be performed dynamically. This
includes the seamless swapping of databases, changes to tracing, access controls,
and knowledge references while the DSA remains online.
Many forms of logging are provided for auditing, accounting, billing and
statistics purposes. Customers immediately realize the benefits of a truly
distributed and integrated directory service.
DXserver’s X.500 schemas are fully configurable, including attribute syntaxes
(basic directory information types), permitting you to easily define your own
custom schema. A comprehensive set of schema files is provided with eTrust
Directory.
Leverage Investments
Distributed directories provide a powerful, standards-compliant platform for
managing complex, distributed information. eTrust Directory is a true multiprotocol solution, offering the combined strengths of X.500 and LDAP V3
standards.
eTrust Directory can incorporate into a unified directory backbone any LDAPenabled desktop clients from Microsoft, Novell, Sun-Netscape, and Lotus, and
clients constructed from publicly available LDAP tool kits.
eTrust Directory also uses the power of X.500’s distributed searching, security,
and management to LDAP server administrators and users.
1–6
etrust Directory Getting Started Guide
CA Services: Enabling Solutions Through Experience
CA Services: Enabling Solutions Through Experience
When it comes to getting on the information fast track, CA Services can
recommend and install a full suite of security management solutions to keep
your business moving. Our associates have the proprietary knowledge about
custom-fitting your enterprise for solutions ranging from life cycle management,
data warehousing, and next-level business intelligence. Our experts leave you
with the technology and knowledge tools to fully collect, exploit, and leverage
your data resources and applications.
CA Education Services
Computer Associates Global Education Services (CA Education) offerings
include instructor-led and computer-based training, product certification
programs, third-party education programs, distance learning, and software
simulation. These services help to expand the knowledge base so you are better
able to use our products more efficiently, contributing to your greater success.
CA Education assists today’s technologists with everything from understanding
product capabilities to implementation and quality performance.
Because the vast community of education seekers is varied, so too are our
methods of instruction. CA Education is committed to provide a variety of
alternatives to traditional instructor-led training, including synchronous and
asynchronous distance learning and Unicenter simulation.
To extend training to a wider audience—for a fraction of the cost and logistical
hassle of sending everybody away to a class—CA Education offers excellent
distance learning options.
Computer Associates: The Software That Manages eBusiness
The next generation of eBusiness promises unlimited opportunities by leveraging
existing business infrastructures and adopting new technologies. At the same
time, extremely complicated management presents challenges—from managing
the computing devices to integrating and managing the applications, data, and
business processes in and across organizational boundaries. Look to CA for the
answers.
CA has the solutions available to help eBusinesses address these important
issues. Through industry-leading eBusiness Process Management, eBusiness
Information Management, and eBusiness Infrastructure Management offerings,
CA delivers the only comprehensive, state-of-the-art solutions, serving all
stakeholders in this extended global economy.
Welcome to eTrust Directory
1–7
For More Information
For More Information
After walking through this Getting Started guide, you can refer to the numerous
resources available to you for additional information. Your eTrust Directory CD
contains useful informational documents that showcase your software and detail
explanations about the product’s comprehensive, feature-rich components. In
addition, the online help system at supportconnect.ca.com offers procedural
information and answers to any questions you may encounter.
1–8
etrust Directory Getting Started Guide
Chapter
2
Installing eTrust Directory
This chapter describes the eTrust Directory components and the directions for
installation.
eTrust Directory Components
eTrust Directory components are designed to help you build and manage
distributed directory systems.
The major components of eTrust Directory are:
DSML
A directory services markup language (DSML) server and client for accessing
directories
This version includes a technology preview of a Directory Services Markup
Language (DSML) server, which allows you to connect to eTrust Directory’s
sample router with the DSML 2.0 protocol. To start the DSML server, you must
set it up by running setup in the %DXHOME%\..\dxwebserver\samples\dsml
directory on Windows or $DXHOME/../dxwebserver/samples/dsml directory
on UNIX. After this, you can use JXplorer to connect to this DSML server by
using the following connection settings:
■
Host: <computer name of the machine running the DSML server>
■
Port: 8080
■
Protocol: DSML v2
■
DSML Service: dsml-sample/services/DSML
DXconfig
A graphical, web-based, configuration editor
Installing eTrust Directory
2–1
eTrust Directory Components
Dxmanager
A graphical, web-based, eTrust Directory administration portal
DXserver
A high-performance directory system agent (DSA) that provides versatility and
reliability through a number of features including access (DAP and LDAP) and
server-to-server (DSP and DISP) protocols, high integrity security, distributed
operation processing, ease of management, and a reliable data store (RDBMS)
Dxtools
A flexible set of utilities that facilitates interaction with external data systems (for
importing, exporting, and synchronizing data)
JXplorer
A powerful, feature-rich, graphical, Java-based, LDAP directory browser and
editor
JXweb
A graphical, web-based, LDAP directory browser and editor
UDDI Web Client
A graphical, web-based, universal description, discovery and integration (UDDI)
registry browser and server
eTrust Directory 4.1 includes a technology preview of the Universal Description,
Discovery and Integration (UDDI) server and browser. To try the UDDI server,
you must set up its server by running setup in the
%DXHOME%\..\dxwebserver\samples\uddi directory on Windows or
$DXHOME/../dxwebserver/samples/uddi directory on UNIX.
The following diagram shows the components and protocols used by eTrust
Directory.
2–2
eTrust Directory Getting Started Guide
eTrust Directory Components
For definitions of the terms in the diagram, see the Glossary.
Installing eTrust Directory
2–3
Windows Installation
Windows Installation
Before You Start
Important! eTrust Directory comes with Advantage™ Ingres® 2.6 as its database. If an
older version of Advantage Ingres is already installed, ask Computer Associates
Technical Support whether all your applications that require Advantage Ingres work
with Advantage Ingres 2.6. You can choose to keep your existing version of Advantage
Ingres. eTrust Directory 4.1 supports Advantage Ingres 2.0 and 2.6.
The Setup Wizard sets up directory services for automatic startup. If you want to
stop a DXserver and restart it during a session, see the chapter “A Quick Tour of
eTrust Directory Administration” for more information.
eTrust Directory provides a number of directory samples to familiarize you with
eTrust Directory concepts. The installation process lets you choose whether to
install those samples. For more information, see the chapter “A Quick Tour of the
Sample Directories.”
Installing eTrust Directory
1.
Insert the eTrust Directory CD-ROM in the CD-ROM drive.
The eTrust Directory Product Explorer appears and presents you with a list
of the installable components. It tells you the system requirements for each
component. It also gives you access to the online documentation.
2.
2–4
Choose eTrust Directory, DXserver, Windows, and then click System
Requirements. Ensure that the requirements are satisfied.
eTrust Directory Getting Started Guide
Windows Installation
Note: Selecting any of the components takes you to the same general eTrust
Directory installation.
3.
When the requirements are satisfied, click Install.
4.
Follow the Setup Wizard, which guides you through the installation.
5.
At the Setup Type dialog, check Complete, and then click Next to install the
default features.
Custom Setup
For custom setup options, including silent installation instructions, see the
appendix “Installing DXserver for Windows” in the Administrator Guide.
Installing eTrust Directory
2–5
UNIX Installation
UNIX Installation
Before You Start
If you are installing eTrust Directory from a local disk, ensure that the parent
directories have rx permissions for all users so newly added users (such as dsa
and ingres) have permissions to access the tar files.
You should never run dxserver as root. After installing eTrust Directory, you
must log in as user ‘dsa’ before executing dxserver start all. Always make sure
$DXHOME is defined before running dxserver.
You can install eTrust Directory silently (or unattended), provided JRE 1.4.1 has
been installed. See the Administrator Guide for more information.
Installing eTrust Directory
1.
Log on as root and run the dxsetup.sh installation script:
# cd /cdrom/cdrom0/dxserver/unix/install
# ./dxsetup.sh
2.
Enter 1 to select express installation.
Before the installation begins, you should accept the license agreement. The
following message appears:
2–6
eTrust Directory Getting Started Guide
UNIX Installation
3.
Enter Y to continue the setup.
4.
At each of the prompts, press Enter to accept the defaults.
The installation process also installs a number of directory samples to familiarize
you with eTrust Directory concepts. For more information, see the chapter “A
Quick Tour of the Sample Directories.”
If you choose to load the samples, their DXserver processes start automatically
after installation. If you want to stop a server and restart it during a session, see
the chapter “A Quick Tour of eTrust Directory Administration” for more
information.
Custom Setup
For custom setup options, including silent installation instructions, see the
appendix “Installing DXserver for UNIX” in the Administrator Guide.
Installing eTrust Directory
2–7
Upgrading from a Previous Version
Upgrading from a Previous Version
eTrust Directory 4.1 is backward-compatible with all earlier versions.
When upgrading from a previous eTrust Directory version, the Advantage
Ingres RDBMS is also upgraded to the latest Advantage Ingres II 2.6. You can
choose to not upgrade Advantage Ingres. If you are upgrading from eTrust
Directory 3.6 SP 2 or earlier, existing databases are automatically upgraded with
the following command:
dxupgradedb database-name
where database-name is the name of the database to upgrade. This also applies if
you install eTrust Directory 4.1 after you installed any other eTrust product that
embeds a pre-4.1 version of eTrust Directory.
See http://support.ca.com/etrustdir_supp.html for detailed upgrade
information.
Advantage Ingres Upgrades
This version does not force you to upgrade any existing pre-2.6 Advantage
Ingres installation, as eTrust Directory 4.0 used to do on Windows. If you are
running Advantage Ingres 2.0 or 2.5, you must check with Computer Associates
Technical Support to find out whether your applications that use your existing
version of Advantage Ingres also support Advantage Ingres 2.6.
If you do choose to upgrade, your Advantage Ingres installation code and all
your existing databases will be converted to “ET” on Windows only. Advantage
Ingres 2.6 now allows you to have multiple installation instances on all
platforms. The eTrust Directory installation implements the following:
■
■
■
■
2–8
If you say No to the upgrade prompt, the pre-existing Advantage Ingres
installation will not be changed.
If eTrust Directory previously installed Advantage Ingres 2.6, this upgrade
will apply the latest Advantage Ingres 2.6 SP 1 upgrade but keep the
installation code that was used last time.
If the previous Advantage Ingres Installation is version 2.0 or 2.5 and you say
Yes to the upgrade prompt, the Advantage Ingres 2.6 SP 1 upgrade will be
applied. On Windows only, your Advantage Ingres installation code will be
changed to “ET.” On other platforms, Advantage Ingres will be upgraded,
but the installation code will remain the same as before.
If there is no previous Advantage Ingres installation, eTrust Directory will
install Advantage Ingres [ET].
eTrust Directory Getting Started Guide
Upgrading from a Previous Version
If you are upgrading from an earlier version of eTrust Directory, you should
back up your schema files first. The schema used by the DemoCorp sample has
changed since Version 3.6 SP 2. Therefore, it is recommended that you reinstall
the samples by running the setup script in the Router, DemoCorp, and UNSPSC
directories.
Important! If you run these scripts, any existing data in the DemoCorp and UNSPSC
databases will be lost.
Installation Considerations
eTrust Directory 4.1 requires Java Runtime Environment (JRE) 1.4.1, which must
be installed first. On Windows, you can install JRE 1.4.1 from the Supported
Products list in the eTrust Directory Product Explorer. On UNIX, the JRE is now
embedded within eTrust Directory.
The documentation for eTrust Directory is installed under \doc on Windows and
under /doc on UNIX underneath the directory you specify. The default
installation path is C:\Program Files\CA\eTrust Directory on Windows and
/opt/CA/eTrustDirectory on UNIX.
You do not have to reboot your computer after installation. If you are installing
eTrust Directory for the first time, sample directories are installed automatically.
If you are upgrading from a previous version, you have the option of running
the sample directories—Router, DemoCorp, and UNSPSC. You may want to
experiment with these sample directories by using the JXplorer browser.
Additionally, there are further samples in the subdirectories of
%DXHOME%\samples on Windows and $DXHOME/samples on UNIX. To
configure each sample, run setup.bat on Windows or setup.sh on UNIX. See the
readme.txt in the samples directory for more information.
eTrust Directory embeds Advantage Ingres II 2.6. The Advantage Ingres RDBMS
installation performs a standard tuning of the database parameters. You can
customize these parameters in some installations.
To run JXplorer, you need the Java Runtime Environment, which is provided on
the eTrust Directory product CD.
Note: Before you commence the installation you must stop all applications that
may have current open connections to an Advantage Ingres database. It is also
recommended to disable any virus-scanning software during the installation.
Installing eTrust Directory
2–9
Chapter
3
A Quick Tour of the Sample
Directories
The DXserver setup automatically installs, configures, and starts the following
sample directories: Democorp, Router, and UNSPSC.
You can use these samples to explore the eTrust Directory features before setting
up your own directory. Although the samples load automatically by using
DXtools, this chapter describes how the samples are set up, which illustrates the
different ways you can load your data.
The data files and setup scripts for these directory samples are located in the
samples directory. The corresponding configuration files are located in the config
directory.
Each subdirectory of the samples directory contains a README.TXT file,
providing more information about each sample. The Democorp, Router, and
UNSPSC sample directories collectively form a single logical view of all of the
directory information. It does not matter which directory you connect to. You see
the same data because the DSAs cooperate to resolve a query or update through
X.500 distribution.
A Quick Tour of the Sample Directories
3–1
Democorp DSA
Democorp DSA
Democorp is an example of a corporate staff directory.
Democorp Setup Script
The setup script creates a DXserver called democorp using an Advantage Ingres
database called democorp. The directory is loaded using the dxmodify tool with
the prefix O=DEMOCORP, C=AU. This is a demonstration of a front-end load in
a directory. Front-end loads are useful for loading fewer than a few thousand
entries and for loading data in already populated directories.
The data is converted from comma-separated value (CSV) format to LDAP
lightweight directory interchange format(LDIF) by using the csv2ldif tool. The
resulting LDIF file is loaded in the directory by using the dxmodify tool. After
loading, the democorp Advantage Ingres database is tuned.
The setup script performs the following steps:
1.
Creates the Democorp Advantage Ingres database called democorp.
2.
Configures the Democorp initialization file, database file, knowledge file,
and knowledge group file, and start the Democorp DXserver DSA.
3.
Converts the Democorp CSV data to LDIF.
4.
Loads the LDIF data in the Democorp directory.
5.
Tunes the democorp Advantage Ingres database.
Tip: The sample.dxg group knowledge file sources knowledge of the
Democorp, Router, and UNSPSC DSAs.
3–2
eTrust Directory Getting Started Guide
UNSPSC DSA
Windows Installation
If you need to reinstall the Democorp sample directory at any time, from the
…\dxserver\samples\democorp\ directory, run the setup.bat file.
UNIX Installation
If you need to reinstall the Democorp sample directory at any time, log on as the
user, dsa, and from the …dxserver/samples/democorp/ directory, run the
setup.sh file.
UNSPSC DSA
The United Nations Development Program and Dun & Bradstreet merged their
separate commodity classification coding schemes in 1999 to form the Universal
Standard Products and Services Classification (UNSPSC).
UNSPSC is a hierarchical classification comprising five levels. Each level contains
a two-character numeric value and a textual description as follows:
Segment
The logical aggregation of families for analytical purposes
Family
A commonly recognized group of interrelated commodity categories
Class
A group of commodities sharing a common use or function
Commodity
A group of substitutable products or services
Business Function
The function performed by an organization in support of the commodity
The levels let you search products more precisely because you confine the
searches to logical categories, thus eliminating irrelevant hits. The levels also let
managers perform expenditure analysis on categories relevant to the company’s
situation.
A Quick Tour of the Sample Directories
3–3
UNSPSC DSA
UNSPSC Setup Script
The UNSPSC directory contains more than 10,000 entries.
The setup script creates a DXserver called unspsc using Advantage Ingres. This
is an example of a back-end or bulk load by using the dxloaddb tool. Bulk loads
are very fast because they bypass the DSA and load the data directly in the
database. They are used for initial data loads or updating the entire contents of a
directory.
The data is converted from CSV format to LDIF by using the csv2ldif tool. The
resulting LDIF file is loaded in the directory by using the dxloaddb tool.
5
csv2ldif
dxloaddb
3
4
DXserver
DB
1
LDIF
CSV
config
2
The UNSPSC setup script performs the following steps:
1.
Creates the UNSPSC Advantage Ingres database called unspsc.
2.
Configures the UNSPSC initialization file, database file, knowledge file, and
the knowledge group file.
3.
Converts the UNSPSC CSV data to LDIF.
4.
Loads more than 10,000 LDIF entries in the UNSPSC directory.
5.
Starts the UNSPSC DXserver DSA.
Tip: Use the bulk load tools, ldifsort and dxloaddb, to achieve a high
performance load of the UNSPSC data by directly loading the Advantage
Ingres unspsc database.
3–4
eTrust Directory Getting Started Guide
Router DSA
Windows Installation
If you need to reinstall the UNSPSC sample directory at any time, from the
…\dxserver\samples\unspsc\ directory, run the setup.bat file.
UNIX Installation
If you need to reinstall the UNSPSC directory at any time, log on as the user, dsa,
and from the …/dxserver/samples/unspsc/ directory, run the setup.sh file.
Router DSA
This sample demonstrates how a router DSA does not require a database of its
own. It also acts as a single point of entry into multiple directories as
demonstrated with Democorp and UNSPSC.
Router Setup Script
The setup script creates a DXserver called Router with no database and starts it.
2
DXserver
config
1
The setup script performs the following steps:
1.
Configures the Router initialization file, knowledge file, and knowledge
group file.
2.
Starts the Router DXserver DSA.
A Quick Tour of the Sample Directories
3–5
Router DSA
Windows Installation
If you need to reinstall the Router directory at any time, from the
…\dxserver\samples\router\ directory, run the setup.bat file.
UNIX Installation
If you need to reinstall the Router directory at any time, log on as the user, dsa,
and from the …/dxserver/samples/router/ directory, run the setup.sh setup
script.
3–6
eTrust Directory Getting Started Guide
Chapter
4
A Quick Tour of JXplorer
The eTrust Directory contains a number of graphical user interfaces (GUIs) that
let you browse, search, configure, and update the directory. This tour
demonstrates the JXplorer directory browser.
By using the JXplorer browser, you can:
■
■
■
■
■
■
■
Connect to any directory that supports LDAP, and browse, search, and
update the directory.
Read the directory’s schema directly.
Cut, paste, and edit sub-trees in the directory visually, enabling large-scale
manipulation of directory entries.
Import and export LDIF files in or out of a directory, and manipulate them
offline.
Configure the browser, including visual appearance and logging
information.
Display directory data by using configurable HTML templates.
Optionally, use SSL to communicate securely, and simple authentication and
security layer (SASL) for secure certificate-based authentication.
After running the setup programs for the DEMOCORP, ROUTER, and UNSPSC
samples, you have a distributed directory consisting of three running DSAs. This
tour assumes that these DSAs are configured and running.
A Quick Tour of JXplorer
4–1
Starting JXplorer
Starting JXplorer
You start JXplorer from either a Windows or UNIX machine.
Windows
To start JXplorer on a Windows machine, click Start on the taskbar, and then
choose Programs, Computer Associates, eTrust, eTrust Directory, JXplorer.
UNIX
To start JXplorer on a UNIX machine, issue the following command from the
JXplorer directory:
./jxstart.sh
4–2
eTrust Directory Getting Started Guide
Connecting to a DSA
Connecting to a DSA
From the File menu, choose Connect (or click
dialog.
) to display the Connection
The following dialog shows JXplorer set to connect to the ROUTER DSA
anonymously. If JXplorer is not running on the same machine as the DSA, enter
the host ID in the Host field.
Note: The port number is specified in the router.dxc knowledge configuration
file.
Click OK to connect.
A Quick Tour of JXplorer
4–3
Searching a Directory
Searching a Directory
You can execute simple, single-attribute-value searches quickly by using the
quick search bar, which contains drop-down lists of common attribute types and
operators. The operators include:
■
■
■
■
■
Equals (=)
Starts from (>=)
Up to (<=)
Not equal to (!(=))
Approximately matches (~=)
The following dialog shows a search looking for entries with a common name
that sounds like Bernie S.
4–4
eTrust Directory Getting Started Guide
Displaying an Entry in a Directory
Displaying an Entry in a Directory
To display the contents of an entry, click the entry in either the Results tab or the
Explore tab.
The following dialog shows Bernd Stark’s entry.
Tip: You can view a photo of a person in a template when the entry has the
jpegPhoto attribute type. The photo must be in the JPEG format. To list the
attributes types in the entry, click the Table Editor tab.
A Quick Tour of JXplorer
4–5
Updating a Directory
Updating a Directory
The table editor lists all the attribute types and values contained in an entry. To
select the table editor, click its tab on the right pane. The bold attribute types are
mandatory attributes that must have values.
To change a value, click the value and enter a new one. To send the change to the
directory, click Submit .
Note: You can update the contents of an entry in the HTML view or the table
editor.
4–6
eTrust Directory Getting Started Guide
A Quick Tour of JXplorer
4–7
Chapter
5
A Quick Tour of JXweb
JXweb is a general-purpose LDAP-compliant directory browser and editor that
provide access to the DXserver directory from any machine throughout the
World Wide Web. This means that you can browse the directory while you are
out of the office!
This tour assumes that the DEMOCORP DSA is configured and running.
Connecting to JXweb
To connect to JXweb, start your web browser and enter the following uniform
resource locator (URL):
http://server:port/http://server:8080/jxweb/index.html
where server is the name of the host on which JXweb is installed.
The browser lists the JXweb Connect page, which is the gateway to the directory.
Note: You can also access JXweb from the DXmanager portal. For information
about how to access the portal, see DXmanager Portal in the chapter “A Quick
Tour of eTrust Directory Administration.”
A Quick Tour of JXweb
5–1
Connecting to a Directory
Connecting to a Directory
Connect to a directory from the JXweb Connect page as follows:
1.
Specify the name of the computer that hosts the directory's server in the Host
text box.
2.
Specify the port number of the directory's server in the Port text box.
3.
Specify the base distinguished name of the directory to which you want to
connect in the Base DN text box (for example, o=DEMOCORP,c=AU).
Important! Do not enter spaces when entering distinguished names.
4.
Click Connect.
The following dialog shows JXweb set to connect to the DEMOCORP DSA on the
COMP002 computer.
5–2
eTrust Directory Getting Started Guide
Displaying Directory Information
Displaying Directory Information
The following dialog shows the main browser connected to DEMOCORP.
Click an entry in the DIT to display the details on the right pane.
When you are connected to a directory and want to connect to another, click
Connect from the JXweb menu bar to display the JXweb Connect page.
When you exit your browser, you are automatically disconnected from the
directory.
A Quick Tour of JXweb
5–3
Searching the Directory
Searching the Directory
You want to search for entries with a common name that matches approximately
Bernie S. Proceed as follows:
5–4
1.
From the JXweb menu bar, click Search.
2.
From the Quick Search page, specify the search criteria as follows:
3.
Click Search to display the following results:
eTrust Directory Getting Started Guide
Searching the Directory for Specific Attributes
Searching the Directory for Specific Attributes
You want to refine the criteria to search for entries with a common name that
matches approximately Bernie S, and return their cn and telephoneNumber
attributes. Proceed as follows:
1.
From the JXweb menu bar, click Search.
2.
From the Quick Search page, click Advanced Search.
3.
From the Advanced Search page, specify the search criteria as follows:
For information about the Advanced Search page, click Help.
4.
Click Search to display the following results:
A Quick Tour of JXweb
5–5
Updating an Entry
Updating an Entry
You want to update the information for Bernd Stark. To add the license number
of his car. Proceed as follows:
5–6
1.
From the list of results, click the
2.
Click the
3.
On the Modify page, specify the license number (for example, CAR 001) and
click Modify.
4.
In response to the confirmation message, click OK to add the license number.
icon for Bernd Stark to display his details.
icon for the carLicense attribute.
eTrust Directory Getting Started Guide
Chapter
6
A Quick Tour of eTrust Directory
Administration
While some may only be interested in viewing and updating information in a
directory, the directory administrator is more concerned with the directory
configuration and management, and the maintenance of its reliability and
integrity.
Configuring eTrust Directory
A simple directory system consists of a directory server (DSA), which is
configured using a set of configuration files. The DSA is connected to a database
(DB) that contains the directory data. DXconsole is available to provide online
tracing and configuration options. A set of tools (DXtools) is available to search
or update the directory. Directory activity is recorded in a number of log files.
A Quick Tour of eTrust Directory Administration
6–1
Types of Configuration
Types of Configuration
A number of features in eTrust Directory let you manage the directory and the
information in it. See the Administrator Guide for more information on these
features, which include:
■
Adding security (access controls and SSL)
■
Adding new schema
■
Extending the directory knowledge and adding more DSAs
■
Including LDAP servers in a directory structure
■
Providing data copies and enhancing availability using replication
Configuration Files
You can configure eTrust directory by changing the configuration files. When a
machine has more than one DSA running, the DSAs can share the same
configuration. To transfer knowledge to another machine, you can copy the
configuration files.
The DSAs are configured in the servers subdirectory. The DEMOCORP,
ROUTER, and UNSPSC .dxi DSA initialization files source the sample.dxg file,
which in turn sources the democorp.dxc, router.dxc, and unspsc.dxc knowledge
configuration files. The UDDI DSA is a sample for the UDDI registry, which
sources the uddi.dxc knowledge configuration file.
The following window shows the subdirectory for the supplied knowledge
configuration files. The window also shows the various configuration
subdirectories.
6–2
eTrust Directory Getting Started Guide
Configuration Files
A Quick Tour of eTrust Directory Administration
6–3
DXconfig
DXconfig
If you prefer to use a GUI for your configuration files, you can modify them by
using the web-based DXconfig, which lists the details in an easy-to-use template.
The following page shows the limits file for the sample DSAs viewed by using
DXconfig:
To access DXconfig, start your web browser and enter the following URL:
http://server:8080/cocoon/dxconfig/start.html
where server is the name of the host on which DXconfig is installed.
6–4
eTrust Directory Getting Started Guide
Starting DXserver
Starting DXserver
To start a DXserver, enter the following from a command prompt:
dxserver start serverName
where serverName is the name of the DXserver (for example, DEMOCORP). The
name must match the name of the initialization file in the servers subdirectory
(for example, democorp.dxi).
DXserver carries out the following steps before it starts:
1.
Read and check the syntax in the configuration files, including the syntax in
user defined schema files.
2.
Set up the communications defined by the set dsa serverName command
in the knowledge file, providing that the communication ports are available.
3.
Check that the database name exists and that all the object identifiers (OIDs)
in the database are defined in the schema files.
4.
Check for a valid license.
Failure to start is reported to the trace and alarm logs in the logs directory.
Additional Windows Information
On Windows, the dxserver start serverName command installs a service for
the DSA, which can then be manually started from Control Panel, Administrative
Tools, Services.
The dxserver install serverName command installs the DSA as a service that
starts automatically when you restart your computer.
Note: The installation process sets up the sample DXserver instances as services
for automatic startup.
A Quick Tour of eTrust Directory Administration
6–5
Stopping DXserver
Stopping DXserver
To stop a DXserver, enter the following from a command prompt:
dxserver stop serverName
To stop DXserver DSAs on Windows, click Start on the taskbar, and then choose
Settings, Control Panel, Administrative Tools, Services. Right-click the service to
display the shortcut menu, and choose Stop.
DXconsole
A management console called DXconsole is supplied to help you manage eTrust
Directory. Use the console to examine the tracing of events as they occur or to
make changes to the DSA configuration. However, when the DSA shuts down, it
does not save changes made through the console to the DSA configuration You
can enable DXconsole either locally or remotely.
On a Windows operating system, you can start DXconsole from the Start menu.
Click Start on the taskbar, and then choose Programs, eTrust Directory,
DXconsole.
To connect to a DSA locally through DXconsole, use the command:
% telnet localhost local-port-number
where:
■
■
% is the prompt.
local-port-number is the local console port number of the DSA to which you
want to connect (specified in the knowledge configuration file).
To connect to a DSA remotely through DXconsole, use the command:
% telnet host-name remote-port-number
where:
■
■
■
% is the prompt
host-name is the name of the machine running the DSA to which you want to
connect
remote-port-number is the remote console port number of the remote DSA to
which you want to connect.
Note: You can connect to the remote DSA only when it is enabled in the remoteconsole-port parameter of the set dsa command for that DSA.
6–6
eTrust Directory Getting Started Guide
Log Files
Log Files
Open certain log files to track the operations performed on a DSA. These log files
can trace operations, gather statistics and record alarms.
For more information about log files, see the chapter “General Administration”
in the Administrator Guide.
DXtools
The DXtools provide a sophisticated set of utilities that simplify the management
of directory data and databases. These utilities are divided into the following
general categories:
Database tools
Simplify the management of the underlying Advantage Ingres databases and
tables used by the DSAs, and provide a high performance, high volume data
import and export capability.
LDIF tools
Are data conversion and manipulation tools that use a format appropriate
for importing data in a directory.
DAP tools
Provide an X.500 DAP interface for importing and exporting data in and out
of a directory.
For more information about DXtools, see the chapter “Using DXtools” in the
Administrator Guide.
DXmanager Portal
You can access most of the administrator tasks through the web-based
DXmanager portal. Use the following URL to access the portal:
http://server:8080/cocoon/dxmanager/directory.html
For information about how to use the portal, see the online help.
A Quick Tour of eTrust Directory Administration
6–7
April 2003
A Quick Tour of eTrust Directory Administration
6–8
Chapter
7
A Quick Tour of UDDI Registry
Universal Description, Discovery, and Integration (UDDI) is a rapidly emerging
standard in the Web services world. This feature enables you to set up a registry
repository using eTrust Directory.
About UDDI Repositories
A UDDI repository is a directory of all the Web services in an organization, be it
a single business enterprise or a globe-spanning multinational conglomerate.
The UDDI repository provides a central point for recording all the details about
each Web service, enabling the developers in the organization to locate other
Web services to use as building blocks to construct an application, thus saving
time and effort.
What a UDDI Repository Can Do
Because the UDDI repository contains all the details about the interfaces,
developers can more easily combine or present services developed by disparate
groups, possibly in different locations.
Moreover, the UDDI protocol provides for recovery—if a needed service fails
and is replaced by another at a different location, all those services that depend
on it can recover automatically by reloading the location and connection
parameters from the UDDI repository.
About the eTrust Directory UDDI Registry
The eTrust Directory UDDI registry provides repository services. It functions as a
business directory, permitting searches based upon categorizations and
relationships between businesses. It provides authentication and authorization of
users for inquiry and publishing.
A server provides UDDI services to requests from clients. A web-based UDDI
Web Client enables you to publish to or search the repository.
A Quick Tour of UDDI Registry
7–1
Connecting to the UDDI Web Client
Connecting to the UDDI Web Client
Use the following URL to access a UDDI Web Client:
http://web-client-host:8080/uddi-browser-sample
The browser lists the UDDI Web Client Connect page.
Connecting to the UDDI Server
To explore the supplied sample repository, connect to the UDDI server. By
default, the URL text boxes on the Connect page already include the URLs of the
server local to the UDDI Web Client.
To connect to the specified server, click Connect.
7–2
eTrust Directory Getting Started Guide
Searching the Repository—Simple
Searching the Repository—Simple
When you connect to the UDDI server, the UDDI Search page appears.
To search for businesses with names that begin with TA, irrespective of case,
proceed as follows:
1.
In the Name text box, specify TA.
Note: The search matches names that start with the specified value. For the
search to match the value exactly, select Exact Match under Find Qualifiers.
2.
For Max returned result (under Find Qualifiers), select 100. This finds as
many businesses as possible.
A Quick Tour of UDDI Registry
7–3
Searching the Repository—Simple
3.
Click Submit. The following results appear on the left pane:
Tip: To change the widths of the pane, drag the vertical split bar.
4.
7–4
Click an entry in the DIT to display the details about a business on the right
pane:
eTrust Directory Getting Started Guide
Searching the Repository—Advanced
Searching the Repository—Advanced
You want to narrow the search to include only those business entries with a:
■
■
Name that begins with TA
Category bag that contains the following tModel: uddi-org:iso-ch:3166:1999
with a value US-WA
Proceed as follows:
1.
From the UDDI Web Client menu bar, click Business Search.
2.
On the UDDI Search page, specify TA in the Name text box.
3.
For Categorization (under Advanced Options), click Select.
4.
On the CategoryBay KeyedReferences List page, proceed as follows:
a.
In the tModel Name/Key column, locate the uddi-org:iso-ch:3166:1999
tModel.
b. In its Value text box, specify US-WA.
c.
Click Select.
d. Click
to select the checked value.
The categorization text box on the UDDI Search page is filled with the
corresponding tModel key and the specified value.
5.
For Max returned result (under Find Qualifiers), select 100. This finds as
many businesses as possible.
6.
Click Submit to start the search. The results appear on the left pane.
A Quick Tour of UDDI Registry
7–5
Publishing Information
Publishing Information
When you register a service, you can publish the following information:
■
A business entity that provides information about the publisher
■
Services provided by the business entity
■
A binding template that enables you to look for further information about a
service
However, before you can start publishing, you must make yourself known to the
registry by setting up your publishing user ID.
The following sections guide you through publishing the information in the
repository. At any time, you can click Help from the UDDI Web Client menu bar
to obtain more information.
Setting Up Your Publishing User ID
Set up your user ID as follows:
1.
From the UDDI Web Client menu bar, click Publish Login.
2.
On the Publish API Login page, click the link at the bottom.
The User Register page appears:
7–6
eTrust Directory Getting Started Guide
Publishing Information
3.
Complete the User Register page, and click Submit to create your user ID.
Logging on to the Repository
On the Publish API Login page, supply your user ID (in the Name text box) and
password. Click Login to access the repository and start publishing your
information.
Registering Your Business
Before you can publish information about your services, you must register the
business that provides the services. When you log on as a publisher, the Edit
Business Entity page appears:
Register your business as follows:
1.
On the Edit Business Entity page, click Add Business to display the New
Business Entity page:
A Quick Tour of UDDI Registry
7–7
Publishing Information
2.
Complete the New Business Entity page. Provide information to make it easy
for potential customers to search for your business and find out about it.
3.
Click Submit to register the business. The Business Details page appears:
With your business registered, you can register the services provided by the
business. You can also publish contacting information that potential customers
can use to get in touch with the business. You can edit the attributes of the
business by clicking the corresponding icon.
7–8
eTrust Directory Getting Started Guide
Publishing Information
Registering a Service
Register a service provided by the business as follows:
1.
On the Business Details page, click Add Service to display the New Service
page.
2.
Complete the New Service page. Provide information to make it easy for
potential customers to search for the service.
3.
Click Submit to register the service. The Service Details page appears:
A Quick Tour of UDDI Registry
7–9
Publishing Information
Adding a Binding Template
Binding templates provide an access points that enable potential customers to
access further information about the service.
Add a binding template as follows:
1.
On the Service Details page, click Add Binding to display the New Binding
Template page.
2.
Complete the New Binding Template page, and click Submit to add the
binding. The Binding Template page appears:
To review the AccessPoint attribute, click it.
Checking that Your Business Can Be Found
Perform a search for your business to determine if it is registered.
For more information about all of the topics in this guide, see the Administrator
Guide, the User Guide, and the online help.
7–10
eTrust Directory Getting Started Guide
Appendix
A
Supported Standards
This appendix lists the standards supported by eTrust Directory.
X.500 Standards
DXserver supports all the mandatory requirements of the following standards:
Standard
Title
Recommendation X.500, ISO/IEC 9594-1
(1993)
Information technology - Open Systems Interconnection The Directory: Overview of Concepts, Models, and
Services
Recommendation X.501, ISO/IEC 9594-2
(1993)
Information technology - Open Systems Interconnection The Directory: Models
Recommendation X.511, ISO/IEC 9594-3
(1993)
Information technology - Open Systems Interconnection The Directory: Abstract Service Definition
Recommendation X.518, ISO/IEC 9594-4
(1993)
Information technology - Open Systems Interconnection The Directory: Procedures for Distributed Operation
Recommendation X.519, ISO/IEC 9594-5
(1993)
Information technology - Open Systems Interconnection The Directory: Protocol Specifications
Recommendation X.520, ISO/IEC 9594-6
(1993)
Information technology - Open Systems Interconnection The Directory: Selected Attribute Types
Recommendation X.521, ISO/IEC 9594-7
(1993)
Information technology - Open Systems Interconnection The Directory: Selected Object Classes
Recommendation X.509, ISO/IEC 9594-8
(1993)
Information technology - Open Systems Interconnection The Directory: Authentication Framework
Recommendation X.525, ISO/IEC 9594-9
(1993)
Information technology - Open Systems Interconnection The Directory: Replication
Supported Standards
A–1
Industry Standards
Industry Standards
eTrust Directory has undergone rigorous testing, and Computer Associates
recognizes the importance of the following industry standards.
Standard
Comment
ISO 9001
Computer Associates has achieved ISO9002 accreditation and is in the process of
obtaining ISO9001 accreditation.
LDAP-2000
Computer Associates is in the process of obtaining the open brand for LDAP-2000 for
eTrust Directory.
See http://www.opengroup.org/directory for more information.
BLITS
eTrust Directory has been tested against the Basic LDAP Version 3 Interoperability Test
Suite.
See http://www.opengroup.org/directory/mats/blits25/index.htm for more
information.
PROTOS
eTrust Directory has been tested against the PROTOS protocol security test suite for
LDAP (http://www.ee.oulu.fi/research/ouspg/protos/testing/
c06/ldapv3/index.html), which was made prominent by CERT
(http://www.cert.org/advisories/CA-2001-18.html).
LDAP Standards
DXserver supports all of the significant LDAP Request for Comments (RFCs) as
listed in the following table. Support for other LDAP standards will be included
as they gain industry acceptance. Currently, no LDAP controls are supported.
RFC
Title
Comment
1558
A String Representation of LDAP Search Filters
(December 1993)
Obsoleted by RFC1960
Status: INFORMATIONAL
1777
Lightweight Directory Access Protocol (March 1995)
Obsoletes RFC1487
Status: DRAFT STANDARD
1778
The String Representation of Standard Attribute
Syntaxes (March 1995)
Obsoletes RFC1488
Updated by RFC2559
Status: DRAFT STANDARD
1779
A String Representation of Distinguished Names
(March 1995)
Obsoletes RFC1485
Obsoleted by RFC2253
Status: DRAFT STANDARD
A–2
eTrust Directory Getting Started Guide
Management Standards
RFC
Title
Comment
1960
A String Representation of LDAP Search Filters (June
1996)
Obsoletes RFC1558
Obsoleted by RFC2254
Status: PROPOSED STANDARD
2251
Lightweight Directory Access Protocol (v3) (December
1997)
Status: PROPOSED STANDARD
2252
Lightweight Directory Access Protocol (v3): Attribute
Syntax Definitions (December 1997)
Status: PROPOSED STANDARD
2253
Lightweight Directory Access Protocol (v3): UTF-8
String Representation of Distinguished Names
(December 1997)
Obsoletes RFC1779
Status: PROPOSED STANDARD
2254
The String Representation of LDAP Search Filters
(December 1997)
Obsoletes RFC1960
Status: PROPOSED STANDARD
2255
The LDAP URL Format (December 1997)
Obsoletes RFC1959
Status: PROPOSED STANDARD
2256
A Summary of the X.500(96) User Schema for use with
LDAPv3 (December 1997)
Status: PROPOSED STANDARD
3377
Lightweight Directory Access Protocol (v3): Technical
Specification (September 2002)
Status: PROPOSED STANDARD
Management Standards
The eTrust Directory supports the following industry standards for
management. In addition to these standards, eTrust Directory has a powerful
management console, which is described in the Administrator Guide.
Standard
Title
Recommendation
X.711
Data communication networks: Open Systems interconnection (OSI);
Management Common Management Information Protocol Specification for
CCITT applications (1991)
Recommendation
X.720 ISO/IEC IS
10165-1
Information technology - Open Systems Interconnection - Structure of
Management Information - Part 1: Management Information Model
ISO/IEC CD 9594-10
Information technology - Open Systems Interconnection - The Directory: Use of
Systems Management for Administration of the Directory
Supported Standards
A–3
Security Standards
RFC
Title
Comment
1155
Structure and Identification of Management
Obsoletes RFC1065
Information for TCP/IP-based Internets (May Also STD0016
1990)
Status: STANDARD
1156
Management Information Base for Network
Obsoletes RFC1066
Management of TCP/IP-based internets (May Status: HISTORIC
1990)
1157
Simple network management
protocol(SNMP). (May 1990)
Obsoletes RFC1098
Also STD0015
Status: STANDARD
1212
Concise MIB Definitions (March 1991)
Also STD0016
Status: STANDARD
1213
Management Information Base for Network
Management of TCP/IP-based internets:
MIB-II (March 1991)
Obsoletes RFC1158)
Updated by RFC2011, RFC2012, RFC2013
Also STD0017
Status: STANDARD
1567
X.500 Directory Monitoring MIB (January
1994)
Obsoleted by RFC2605
Status: PROPOSED STD
Security Standards
eTrust Directory conforms to the following security standards:
IETF Internet-Draft
The SSL Protocol Version 3.0 (November 1996)
PKCS #11
PKCS #11 v2.11: Cryptographic Token Interface Standard (November 2001)
PKCS #12
PKCS 12 v1.0: Personal Information Exchange Syntax Standard (June 1999)
RFC 2246
The TLS Protocol Version 1.0 (January 1999)
A–4
eTrust Directory Getting Started Guide
Appendix
B
The LDAP and X.500 standards
To work together, you have to communicate and share information. This is
essential for organizations growing through mergers and acquisitions, and
business-to-business communication and eCommerce.
Standards-based directories let this communication take place. However, many
directory systems on the market are unable to communicate with other
directories.
eTrust Directory uses both of the major directory standards, which promotes a
global, distributed infrastructure—vital in today’s worldwide marketplace.
The LDAP standard is widely accepted
LDAP (the lightweight directory access protocol) is a simplified version of the
X.500 directory access protocol. LDAP has a simple application program
interface, can be easily embedded in applications and web browsers, and is
backed by some of the world’s largest information technology vendors.
LDAP enables a large number of applications to access the same directory. This
can allow a directory to act as an integration point for bringing systems together
and consolidating management tasks.
Because LDAP has a simple protocol, LDAP-only servers are common. However,
LDAP is not a server-to-server protocol. This means that LDAP-only servers
cannot be connected together: a group of them cannot cooperate with each other
to resolve distributed queries, and cannot have a single logical authentication
and access control regime. While these LDAP-only servers can perform useful
local functions, their inability to communicate with other LDAP servers means
that each individual server forms an “island of information.”
The LDAP and X.500 standards
B–1
The X.500 standard allows directories to communicate
The X.500 standard allows directories to communicate
The X.500 standard solves the “island of information” problem by providing
mechanisms for distributed operations, distributed management, distributed
security, and replication.
eTrust Directory Supports Both Standards
LDAP is important for clients, while X.500 is important for servers.
eTrust Directory fully applies X.500 and LDAP standards to provide a
distributed and reliable directory service. eTrust Directory uses LDAP support to
access LDAP-only directories, and the X.500 distributed directory model for
distribution.
In addition to supporting LDAP for access, eTrust Directory permits the
integration of LDAP-only servers to a directory backbone.
B–2
eTrust Directory User Guide