
Release 7.0.1 Server Administration Guide Notice PingDirectory™ Product Documentation © Copyright 2004-2018 Ping Identity® Corporation. All rights reserved. Trademarks Ping Identity, the Ping Identity logo, PingFederate, PingAccess, and PingOne are registered trademarks of Ping Identity Corporation ("Ping Identity"). All other trademarks or registered trademarks are the property of their respective owners. Disclaimer The information provided in these documents is provided "as is" without warranty of any kind. Ping Identity disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Ping Identity or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Ping Identity or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. Support https://support.pingidentity.com/ PingDirectory | Contents | 5 Contents Chapter 1: Introduction.........................................................................................13 Overview of the PingDirectoryProxy Server Features.......................................................................................14 Overview of the Directory Proxy Server Components and Terminology..........................................................14 About Locations......................................................................................................................................15 About LDAP External Servers...............................................................................................................15 About LDAP Health Checks..................................................................................................................15 About Load-Balancing Algorithms........................................................................................................ 16 About Proxy Transformations................................................................................................................ 17 About Request Processors...................................................................................................................... 17 About Server Affinity Providers............................................................................................................ 18 About Subtree Views..............................................................................................................................18 About the Connection Pools...................................................................................................................18 About Client Connection Policies.......................................................................................................... 18 About Entry Balancing........................................................................................................................... 19 Server Component Architecture......................................................................................................................... 19 Architecture of a Simple Directory Proxy Server Deployment............................................................. 19 Architecture of an Entry-Balancing Directory Proxy Server Deployment............................................ 20 Directory Proxy Server Configuration Overview.............................................................................................. 20 Chapter 2: Installing the Directory Proxy Server...............................................23 Before You Begin............................................................................................................................................... 24 Defining a Naming Strategy for Server Locations................................................................................ 24 Software Requirements: Java................................................................................................................. 24 Preparing the Operating System.........................................................................................................................24 Configuring the File Descriptor Limits..................................................................................................24 Enabling the Server to Listen on Privileged Ports (Linux)....................................................................25 To Set the Filesystem Flushes................................................................................................................26 Disable Filesystem Swapping.................................................................................................................26 About Editing OS-Level Environment Variables...................................................................................26 Install sysstat and pstack (Red Hat).......................................................................................................26 Install dstat (SUSE Linux)..................................................................................................................... 26 Omit vm.overcommit_memory...............................................................................................................27 Managing System Entropy..................................................................................................................... 27 Getting the Installation Packages....................................................................................................................... 27 To Unpack the Build Distribution..........................................................................................................27 PingDirectoryProxy Server License Keys..........................................................................................................27 About the RPM Package.................................................................................................................................... 28 To Install the RPM Package...................................................................................................................28 Installing the Directory Proxy Server................................................................................................................ 28 About the setup Tool.............................................................................................................................. 28 Installing the First Directory Proxy Server in Interactive Mode........................................................... 29 Installing the First Directory Proxy Server in Non-Interactive Mode................................................... 31 To Install Additional Directory Proxy Server in Non-Interactive Mode............................................... 32 Installing the Directory Proxy Server with a Truststore in Non-Interactive Mode................................ 32 About the Layout of the Directory Proxy Server Folders................................................................................. 32 Running the Server.............................................................................................................................................33 To Start the Directory Proxy Server...................................................................................................... 34 To Run the Server as a Foreground Process..........................................................................................34 PingDirectory | Contents | 6 To Start the Server at Boot Time...........................................................................................................34 Logging into the Administrative Console..............................................................................................34 Stopping the Directory Proxy Server.................................................................................................................35 To Stop the Server..................................................................................................................................35 To Schedule a Server Shutdown............................................................................................................ 35 To Restart the Server..............................................................................................................................35 Run the Server as a Microsoft Windows Service..............................................................................................35 To Register the Server as a Windows Service.......................................................................................35 To Run Multiple Service Instances........................................................................................................ 36 To Deregister and Uninstall Services.....................................................................................................36 Log Files for Services............................................................................................................................ 36 Uninstalling the Server....................................................................................................................................... 36 To Uninstall the Server in Interactive Mode..........................................................................................36
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages275 Page
-
File Size-