A DSA entity enables you to manage a DSA for a given node. A DSA entity must be created and enabled before it can receive connections from directory applications or other DSAs. There is only one DSA entity per node. A DSA entity has four subentities, illustrated below: DSA entity | +--------------+-------+------+--------------+ | | | | Naming Subordinate Superior Accessor Context Reference Reference entity entity entity entity
1 – Accessor
An Accessor entity can be used to represent a user of the DSA such that the DSA can verify the user's identity when they attempt to connect. Normally, a DSA verifies the identity of a directory user by reference to directory information. However, an Accessor entity provides a way of giving a DSA information about a user without having to represent that user in the directory. This might be useful in some problem solving situations. However, it is not the recommended way to represent users of the DSA. Note that the Accessor entity is a volatile entity. If you delete the DSA entity for a given system, then all Accessor entities for that system are deleted permanently. Note also that an Accessor entity only permits a user to identify themselves to this DSA. If the user wants identify themselves to another DSA, then that DSA also needs an Accessor entity.
1.1 – Characteristics
An Accessor entity has only one characteristic attribute: Password. You can use the SET directive on this attribute. Syntax: SET DSA ACCESSOR <name> PASSWORD <value> where <name> is the name of the user whose password you want to set a new value, and <value> is the new value for the password. Specify the password as a Latin1 string. There is no default value. The name and the password must both be quoted. The password is a case sensitive attribute.
1.2 – Directives
You can use the CREATE, DELETE, SET and SHOW directives with the Accessor entity. The CREATE and DELETE directives are used to create and delete an Accessor entity. The SET and SHOW directives are used to set and show attributes, respectively.
1.2.1 – CREATE
Use this directive to create an Accessor entity of the specified name. Syntax: CREATE DSA ACCESSOR <name> PASSWORD <value> You must quote the name and password. For example: > CREATE DSA ACCESSOR "/C=US/O=Abacus/CN=Manager" PASSWORD "mumble"
1.2.1.1 – Arguments
The CREATE directive has an identifier and one argument. The argument is mandatory. The argument is: - PASSWORD The identifier specifies the name of a directory user. This is in the form of a distinguished name or AE title. The PASSWORD argument identifies the password for the user. Specify this argument in the following format: PASSWORD <value> where <value> is the password is a Latin1 string of between 1 and 128 characters long. The password value must be quoted.
1.2.1.2 – Errors
The CREATE directive can return one of the following errors: REASON: Wrong State DESCRIPTION: The DSA entity is not in the correct state. This means that the DSA is in one of the transitional states UPDATING, CREATING, ENABLING, or DISABLING. The DSA must be in state ON or OFF when you create an Accessor entity. The response indicates what state the DSA is in. REASON: Already Exists DESCRIPTION: This Accessor entity already exists. This means that the name you specified is already the name of an Accessor entity. REASON: Invalid Name DESCRIPTION: The entity name is not a valid directory name. This means that the name you specified is not in the distinguished name format. The response displays the invalid name component.
1.2.2 – DELETE
Use this directive to delete an Accessor entity. Syntax: DELETE DSA ACCESSOR <name>
1.2.2.1 – Errors
The DELETE directive can return the following error: REASON: Wrong State DESCRIPTION: The DSA entity is not in the correct state. This means that the DSA is in one of the transitional states UPDATING, CREATING, ENABLING, or DISABLING. The DSA must be in state ON or OFF when you delete an Accessor entity. The response indicates what state the DSA is in.
1.2.3 – Examples
> CREATE DSA ACCESSOR "/C=US/O=Abacus/CN=Jon Smith" - _> PASSWORD "mumble" > SHOW DSA ACCESSOR "/C=US/O=Abacus/CN=Jon Smith" The first command creates an Accessor entity and the second command displays it. Note you cannot use the SHOW directive to display the Password attribute of an Accessor entity, because it is a read-only attribute. > DELETE DSA ACCESSOR "/C=US/O=Abacus/CN=Jon Smith" This command deletes the Accessor entity.
1.2.4 – SET
Use the SET directive to change the value of the Accessor Password attribute. Syntax: SET DSA ACCESSOR <name> PASSWORD <value> where <value> is the value you want to set for the Password attribute. The value must be quoted.
1.2.5 – SHOW
Use the SHOW directive to display an Accessor entity. The Password characteristic attribute is not displayed. Syntax: SHOW DSA ACCESSOR <name> You can also use the wildcard "*" in a SHOW directive, to display a list of all Accessor entities, for example: SHOW DSA ACCESSOR *
1.3 – Identifier
Each Accessor entity is uniquely identified by a name. This is the name of the user that you want to give access to the DSA, and must be in same format as a distinguished name or an AE title. For example, "/C=US/O=Abacus/CN=Jon Smith". Refer to DSA Common_Datatypes for more information on how to specify an AE title. Refer to the CREATE directive for more information on how to create an Accessor entity.
2 – Common Datatypes
Many of the management directives of the DSA entity and its subentities require you to specify AE titles, distinguished names, and presentation addresses. The syntaxes of these commonly used datatypes are described in the subtopics listed below.
2.1 – AE Title
An AE title is a unique name used in many management directives of the Directory Module to identify a DSA. The syntax for AE titles supported by the management directives of the Directory Module is the same as the distinguished name syntax supported by HP's X.500 Information Manager (DXIM). For example: AE Title = "/C=US/O=Abacus/OU=Sales/CN=dsa" Note that the AE title is quoted. Refer to Distinguished_Name for more information on how to specify an AE title or distinguished name in a management directive.
2.2 – Distinguished Name
A distinguished name uniquely identifies a directory user. The syntax of a distinguished name is exactly the same as the syntax of an AE title. A distinguished name is a sequence of one or more relative distinguished names (RDNs) each preceded by a / character. Each RDN is a sequence of one or more attribute value statements, such as commonName=John. Usually an RDN contains only one attribute value statement, but it is possible to specify a sequence of attribute value statements separated by commas, for example: commonName=John,organizationalUnitName=Sales Many of the attribute types, such as commonName and organizationalUnitName, can be abbreviated. For example, the commonName can be abbreviated to cn, and organizationalUnitName can be abbreviated to ou. In management directives, a distinguished name (or AE title) must always be enclosed in quotation marks, for example: Distinguished Name = "/C=US/O=Abacus" Values in a distinguished name can include commas, equals signs, and backslash characters, in which case the value must be quoted. For example, commonName='Smith,' The following is an example of a distinguished name that has three RDNs, the last of which is quoted because it contains an equals character: Distinguished Name = "/C=US/O=Abacus/CN='sales=toys'" Note the use of two types of quotation mark, "..." to enclose the entire distinguished name, and '...' to enclose the value sales=toys, which contains an equals sign.
2.3 – Presentation Address
The PresentationAddress datatype defines the format that should be used for all presentation addresses in OSI applications. It is also the format in which presentation addresses are displayed by OSI network management. This datatype is a Latin1 string. Its values must conform to the following syntax (shown in BNF). This syntax is an extension of the Internet standard for representing OSI presentation addresses. Note that the numbers 1 to 12 shown to the right of this syntax description are not part of the syntax. They refer to explanations which are provided at the end of this syntax description. <presentation-address> ::= [[[ <psel> "/" ] <ssel> "/" ] <tsel> "/" ] <network-address-list> <psel> ::= <selector> <ssel> ::= <selector> <tsel> ::= <selector> <selector> ::= '"' <otherstring> '"' 1 | "#" <digitstring> 2 | "'" <hexstring> "'H" | "" <network-address-list> ::= <network-addr> [ "|" <network-addr> ] | <network-addr> <network-addr> ::= <network-address> ["," <network-type> ] <network-type> ::= "CLNS" | "CONS" | "RFC1006" 3 <network-address> ::= "NS" "+" <dothexstring> 4 | <afi> "+" <idi> ["+" <dsp>] | <idp> "+" <hexstring> 5 | RFC1006 "+" <ip> ["+" <port>] 6 <idp> ::= <digitstring> <dsp> ::= "d" <digitstring> 7 | "x" <dothexstring> 8 | "l" <otherstring> 9 | "RFC1006" "+" <prefix> "+" <ip> ["+" <port> ["+" <tset>]] | "X.25(80)" "+" <prefix> "+" <dte> [ "+" <cudf-or-pid> "+" <hexstring> ] | "ECMA-117-Binary" "+" <hexstring> "+" <hexstring> "+" <hexstring> | "ECMA-117-Decimal" "+" <digitstring> "+" <digitstring> "+" <digitstring> <idi> ::= <digitstring> <afi> ::= "X121" | "DCC" | "TELEX" | "PSTN" | "ISDN" | "ICD" | "LOCAL" <prefix> ::= <digit> <digit> <ip> ::= <domainstring> 10 <port> ::= <digitstring> 11 <tset> ::= "TCP" | "IP" | <digitstring> 12 <dte> ::= <digitstring> <cudf-or-pid> ::= "CUDF" | "PID" <decimaloctet> ::= <digit> | <digit> <digit> | <digit> <digit> <digit> <digit> ::= [0-9] <digitstring> ::= <digit> <digitstring> | <digit> <domainchar> ::= [0-9a-zA-Z-.] <domainstring> ::= <domainchar> <otherstring> | <domainchar> <dotstring> ::= <decimaloctet> "." <dotstring> | <decimaloctet> "." <decimaloctet> <dothexstring> ::= <dotstring> | <hexstring> <hexdigit>:: ::= [0-9a-fA-F] <hexoctet> ::= <hexdigit> <hexdigit> <hexstring> ::= <hexoctet> <hexstring> | <hexoctet> <other> ::= [0-9a-zA-Z+-.] <otherstring> ::= <other> <otherstring> | <other> 1 Value restricted to printed characters 2 US GOSIP requirement 3 Network type identifier (the default is CLNS) 4 Concrete binary representation of network (NSAP) address value 5 ISO 8348 compatibility 6 RFC 1006 preferred format 7 Abstract decimal format for domain specific part (DSP) 8 Abstract binary for DSP 9 Printable character format for DSP (for local use only) 10 Dotted decimal notation (e.g. 10.0.0.6) or domain name (e.g. twg.com) 11 TCP port number (the default is 102) 12 Internet transport protocol identifier (1 = TCP and 2 = UDP) Keywords can be specified in either upper case or lower case. However, selector values are case sensitive. Spaces are significant.
2.3.1 – Examples
The following examples illustrate the syntax of presentation addresses. Note that some types of presentation address are applicable only to specific operating systems. When specifying a presentation address in a management directive, always enclose it in '' quotation marks. Note that the easiest way to set a DSA's presentation address is to use the DSA configuration procedure. 1. "DSA"/"DSA"/"DSA"/NS+490001aa000400d90621,CLNS This is a typical presentation address for an HP DSA. In a management command, this must be quoted, as follows: '"DSA"/"DSA"/"DSA"/NS+490001aa000400d90621,CLNS' 2. "my_psel"/"my_ssel"/"my_tsel"/LOCAL++x0001aa000400d90621 "my_psel"/"my_ssel"/"my_tsel"/NS+490001aa000400d90621,CLNS These examples both specify the same presentation address. The first example uses the LOCAL authority and format identifier (AFI), which does not have an initial domain identifier (IDI). The two plus signs (++) indicate that the IDI is missing. By default, the network type is CLNS. The second example uses the value of the LOCAL AFI, which is 49. 3. "256"/NS+a433bb93c1,CLNS|NS+aa3106,CONS This is a presentation address which has a transport selector, (no presentation or session selector), and two network addresses. The first network address is CLNS (for a connectionless network) and the second is CONS (for a connection-oriented network). These network addresses are specified in concrete binary form. This form can be used only when the concrete binary representation of the network address is known. 4. #63/#41/#12/X121+234219200300,CONS This presentation address has presentation, session and transport selectors, and a single network address which consists of an AFI (X121) and an IDI (234219200300). There is no domain specific part. 5. '3a'H/TELEX+00728722+X.25(80)+02+00002340555+CUDF+"892796" This is an network address for X.25. Note that, because CONS is not specified, the network type defaults to CLNS. 6. RFC1006+10.0.0.6519,RFC1006 This is an RFC1006 address. The address is not an ISO network address but the combination of an IP address and a TCP port number, which is 519 in this example. The IP address can be specified as either a DNS domain name or an IP address. For an RFC1006 address, the network type can be omitted.
3 – Characteristics
Each DSA characteristic attribute is listed below. You can assign values (using the SET directive) to all of these attributes except for the Version attribute. You can display the current value of all of the attributes using the SHOW directive. Syntax: SET DSA <attr> <value> [, ...] SHOW DSA <attr> [, ...] where <attr> is the attribute name and <value> is the value. You can specify more than one attribute in a single directive by separating the attributes with a comma. For example: SET DSA AE TITLE="/C=US/CN=DSA3", PASSWORD="mumble" SHOW DSA AE TITLE, PASSWORD You can use the ALL CHARACTERISTICS keywords in a SHOW directive, for example: SHOW DSA ALL CHARACTERISTICS Characteristic attributes can be reset to their default values by specifying the characteristic attribute without a value in a SET directive. For example, the following command resets the DSA AE Title attribute to its default value (no value): SET DSA AE TITLE
3.1 – Accounting Facility
The Accounting Facility characteristic attribute controls whether the accounting facility is enabled on a DSA. (Note that previous versions of the DSA used an Accounting State attribute. The Accounting State attribute has been withdrawn.) Syntax: SET DSA ACCOUNTING FACILITY <ON/OFF> SHOW DSA ACCOUNTING FACILITY When you enable the accounting facility, the DSA generates the Accounting Enabled event. If the accounting facility cannot be started, the DSA generates the Accounting Start Failure event. When you disable the accounting facility, the DSA generates the Accounting Disabled event. The setting of this attribute is maintained when you disable and re-enable the DSA, and also when you delete and recreate the DSA.
3.2 – Accounting Options
The Accounting Options characteristic attribute controls the amount of information included in Operation records in the accounting file. If this attribute is not set, the DSA provides a summary of user requests. The information included in Operation records is described in HP Enterprise Directory - Problem Solving. If you set this attribute, in addition to summary information, the DSA can include the protocol data unit (PDU) of the user request and/or the error returned to the user if the operation is not successful. The error PDU and request PDU are described in ITU-T Recommendation X.511. You can set the attribute such that the DSA includes either the PDU of a successful user request, the PDU of an error returned in response to a user request, both, or neither. Syntax: SET DSA ACCOUNTING OPTIONS {REQUESTPDU} SET DSA ACCOUNTING OPTIONS {ERRORPDU} SET DSA ACCOUNTING OPTIONS {REQUESTPDU, ERRORPDU} SET DSA ACCOUNTING OPTIONS {} SHOW DSA ACCOUNTING OPTIONS To stop the DSA including either the request PDU or the error PDU in Operation records, enter the following command: > SET DSA ACCOUNTING_OPTIONS {} This attribute has no effect if the Accounting Facility status attribute is set to OFF.
3.3 – Accounting Rollover Interval
The Accounting Rollover Interval characteristic attribute controls how often the DSA closes the current accounting file and creates a new one, that is, rolls over the accounting file. The interval uses the accounting rollover start time as its starting point. For example, if you set the accounting rollover interval to 6 hours, the first accounting file rollover will take place at the time specified by the Accounting Rollover Start Time attribute, and the second rollover six hours later. Syntax: SET DSA ACCOUNTING ROLLOVER INTERVAL <time> SHOW DSA ACCOUNTING ROLLOVER INTERVAL where <time> is the required interval specified in binary relative time. For example, to make the DSA rollover the accounting file every twelve and a half hours, enter the following: > SET DSA ACCOUNTING ROLLOVER INTERVAL 12:30:00 When the DSA rolls over the accounting file, it generates the Accounting File Rollover event. You can then process the closed accounting files using your decoding and billing utility. On Tru64 UNIX systems, accounting files are stored in the /var/dxd/accounting directory. On OpenVMS systems, accounting files are stored in the directory pointed to by the DXD$ACCOUNTING logical. Note that accounting files are neither purged nor deleted automatically by the DSA. The default setting for this characteristic attribute is 12 hours. This attribute has no effect if the Accounting Facility characteristic attribute is set to OFF.
3.4 – Accounting Rollover Last Time
This characteristic attribute is read only. It indicates the most recent time at which the accounting file was rolled over, that is, the time at which the previous accounting file was closed and the current accounting file created. Syntax: SHOW DSA ACCOUNTING ROLLOVER LAST TIME The time is displayed in binary absolute time. If a rollover has not occurred since the DSA was created, then this attribute shows the time that the DSA was created.
3.5 – Accounting Rollover Start Time
This characteristic attribute indicates the first time at which the accounting file is to be rolled over, that is, the time at which the accounting file is to be closed and a new one created for the first time. Syntax: SET DSA ACCOUNTING ROLLOVER START TIME <time> SHOW DSA ACCOUNTING ROLLOVER START TIME where <time> is the required time specified in binary absolute time. For example, if you want the accounting file to be rolled over for the first time at 12:00, enter the following: > SET DSA ACCOUNTING ROLLOVER START TIME 12:00:00 Subsequent accounting file rollovers occur at the interval specified by the Accounting Rollover Interval attribute. This attribute has no effect if the Accounting Facility characteristic attribute is set to OFF.
3.6 – Accounting Rollover Window
The Accounting Rollover Window characteristic attribute defines the window for closing the current accounting file and creating a new one, that is, for rolling over the accounting file. If the accounting facility cannot roll over the accounting file within the time specified by the accounting rollover window, it continues to use the current accounting file until the next scheduled or unscheduled accounting file rollover. Syntax: SET DSA ACCOUNTING ROLLOVER WINDOW <time> SHOW DSA ACCOUNTING ROLLOVER WINDOW For example, assume the Accounting Rollover Window is set to 30 minutes, the Accounting Rollover Interval to 6 hours, and the Accounting Rollover Start Time to 12:00:00. The accounting facility tries to rollover the accounting file at 12:00. If this rollover is not started by 12:30:00, the accounting facility abandons the attempt and continues to use the current accounting file until the next scheduled rollover at 18:00:00. When the accounting facility performs a scheduled rollover, that is a rollover required by the Accounting Rollover Interval characteristic attribute, it checks that no unscheduled rollover has been performed within the accounting rollover window. If one has, the scheduled rollover is not performed. For example, assume there is a scheduled rollover of the accounting file at 12:00:00. Before the scheduled rollover is performed, there is an unscheduled rollover at 12:10:00. Consequently, the scheduled rollover is not performed. The default setting for this characteristic attribute is 1 hour. This attribute has no effect if the Accounting Facility characteristic attribute is set to OFF.
3.7 – Accounting Rollover Unscheduled Time
You can use this characteristic attribute to force the accounting facility to immediately rollover the accounting file, that is, close the current accounting file and create a new one. Alternatively, by specifying the required time as the qualifier to this characteristic attribute, you can force the accounting facility to rollover the accounting file at any required time. In either case, this is called an unscheduled accounting file rollover. Syntax: SET DSA ACCOUNTING ROLLOVER UNSCHEDULED TIME <time> SHOW DSA ACCOUNTING ROLLOVER UNSCHEDULED TIME where <time> is the time at which you want the unscheduled accounting file rollover to take place in binary absolute time. If you do not specify a time the DSA performs accounting file rollover immediately. This attribute has no effect if the Accounting Facility characteristic attribute is set to OFF.
3.8 – AE Title
The AE Title attribute specifies the application entity title of the DSA. The AE Title is unique to this DSA. You specify the AE Title using the SET directive. You cannot enable the DSA until it has an AE title. You must make sure that the AE Title attribute is the same as the distinguished name of the directory entry that represents this DSA in the DIT. Refer to HP Enterprise Directory - Management for further details. The DSA must be in state OFF when you set the AE Title attribute. Syntax: SET DSA AE TITLE "<name>" SHOW DSA AE TITLE Refer to DSA Common_Datatypes for information on the syntax of an AE Title.
3.9 – Archived Update Log Number
By default, the DSA will not keep prior versions of the Update Log File that it no longer needs. These log files are also used for incremenetal shadowing, so removal of earlier update log files may cause some shadowing agreements to perform a total update. The Archived Update Log Number attribute prevents the DSA from deleting the Update Log File. If this attribute is set to a number greater than zero, then all update logs files beyond this number will be preserved. Syntax: SET DSA ARCHIVED UPDATE LOG NUMBER <value> SHOW DSA ARCHIVED UPDATE LOG NUMBER
3.10 – DIT Check Interval
The DIT Check Interval attribute defines how often the DSA writes its database to disk. When you modify directory entries, the DSA applies the modifications to the copy of the database that it holds in memory. It also keeps a log of all modifications in an update log file. After every DIT check interval, the DSA writes the database to disk. It then opens a new update log file for the next interval. In the event of a system problem, the DSA can recover its database by reading it from disk and applying the changes logged in the most recent update log file. Syntax: SET DSA DIT CHECK INTERVAL "<time>" SHOW DSA DIT CHECK INTERVAL The full syntax for specifying a time is as follows: DDD-HH:MM:SS where DDD is days, HH is hours, MM is minutes, and SS is seconds. If you specify more than 366 days, the DSA uses 366 days as its DIT check interval. The DSA displays the value you specified if you use the SHOW directive. The default value is "12:00:00", indicating 12 hours. If you have a DSA that handles a lot of modifications, then you might want to specify a shorter interval. This prevents the update log file from becoming too large.
3.11 – DIT Check Last Time
This attribute records the time of the last DIT check, that is, the last time that the DSA wrote its database to disk and created a new update log. This is a read-only attribute. Syntax: SHOW DSA DIT CHECK LAST TIME
3.12 – DIT Check Window
This attribute specifies the duration of the DIT check window. If the DSA fails to write its database to disk within this window, the attempt is delayed until the next scheduled DIT check. Syntax: SET DSA DIT CHECK WINDOW "<time>" SHOW DSA DIT CHECK WINDOW The full syntax for specifying a time is as follows: DDD-HH:MM:SS where DDD is days, HH is hours, MM is minutes, and SS is seconds. If you specify more than 366 days, the DSA uses 366 days as its DIT check window. The DSA displays the value you specified if you use the SHOW directive. The default value is 01:00:00, or one hour.
3.13 – DIT Check Unscheduled Time
Use this attribute to specify a time when the DSA must write its database to disk and create a new update log file. If you specify no time or a time in the past, the DSA writes its database immediately. This attribute has no effect on the normal schedule. Syntax: SET DSA DIT CHECK UNSCHEDULED TIME "<time>" SHOW DSA DIT CHECK UNSCHEDULED TIME For example: > SET DSA DIT CHECK UNSCHEDULED TIME "1995-01-05-01:12:00"
3.14 – DIT Check Start Time
This characteristic attribute indicates the first time at which the DSA is to write its database to disk and open a new update log file. Syntax: SET DSA DIT CHECK START TIME "<time>" SHOW DSA DIT CHECK START TIME where <time> is the required time specified in binary absolute time. For example, if you want the DSA to write the database for the first time at midday, enter the following: > SET DSA DIT CHECK START TIME "12:00" The DSA then writes the database to disk at regular intervals after the specified start time. The intervals are defined by the DIT Check Interval attribute.
3.15 – Dereference Aliases On Modify
The Dereference Aliases on Modify attribute specifies whether alias names can be used in modification requests, such as the DXIM CREATE ENTRY, MODIFY ENTRY, DELETE ENTRY and RENAME ENTRY commands. If this attribute is set to TRUE, then alias names can be used in modifications if the user so desires. For example, a DXIM command line user can use the Dereference Aliases control to indicate that they want alias names dereferenced for a particular command. This means that the user can refer to the entry that they want to modify by means of its distinguished name or any valid alias name for that entry. If the attribute is set to FALSE, then alias names are never dereferenced for modifications, regardless of user specification. This means that a user must refer to the entry they want to modify by means of its distinguished name. If they use an alias name, even a valid one, the command fails. The default value is FALSE. (Note that when displaying entries, the default behaviour is to dereference aliases.) Syntax: SET DSA DEREFERENCE ALIASES ON MODIFY <TRUE/FALSE>
3.16 – Examples
> SET DSA PRESENTATION ADDRESS - _> '"DSA"/"DSA"/"DSA"/NS+49002aaa0004000aaaaa,CLNS' > SHOW DSA PRESENTATION ADDRESS The first command assigns a presentation address to the DSA and the second command displays this address. > SET DSA AE TITLE "/C=US/O=Abacus/CN=DSA1" > SHOW DSA AE TITLE The first command assigns an AE title to the DSA and the second command displays it. > SHOW DSA VERSION, AE TITLE, SIZE LIMIT This command displays the value of three characteristic attributes. > SHOW DSA ALL CHARACTERISTICS This command displays the value of all characteristic attributes.
3.17 – Idle Disconnect Timer
The Idle Disconnect Timer attribute specifies how long a connection can remain unused before timing out. The value is specified in seconds. This ensures that system resources are not being consumed by inactive associations. The default value is 300 seconds. Syntax: SET DSA IDLE DISCONNECT TIMER <seconds> SHOW DSA IDLE DISCONNECT TIMER A value of 0 seconds indicates that idle connections are never disconnected by the DSA. This is not advisable.
3.18 – Password
The Password attribute contains the password of the DSA. This is used by the DSA to identify itself to another DSA when it needs to contact that DSA. The Password must match the userPassword attribute of the directory entry representing this DSA. If you change the password of the DSA, you must do so in both places. The password must be between 1 and 128 characters long. There is no default value. If a DSA does not have a password, it cannot replicate information, and might have difficulty passing user requests on to other DSAs. Syntax: SET DSA PASSWORD <value>
3.19 – LDAP Cipher Suites
The LDAP Cipher Suites attribute specifies which SSL Cipher Suites will be available for SSL connections. If this attribute is not set, then the DSA will accept any of the ciphersuites in the SSL default list. This attribute allows you to restrict the DSA to a subset of the ciphersuites available in SSL. The value is a quoted string, listing each ciphersuite to be allowed, separated by a ':'. The DSA must be in state OFF for you to set this attribute. Syntax: SET DSA LDAP CIPHERSUITE "<value>:<value>..." SHOW DSA LDAP CIPHERSUITE
3.20 – LDAP Port
The LDAP Port attribute is the port number that the DSA listens on for LDAP protocol, when you enable the DSA. You must set the LDAP Port to a non-zero integer, while the DSA is in the OFF state. If the port number is set to zero, the DSA does not listen for LDAP requests. Syntax: SET DSA LDAP PORT <value> SHOW DSA LDAP PORT
3.21 – LDAP Security Protocol
Specify the security protocol to be used on this port. The DSA must be in state OFF, before you can set this attribute. Syntax: SET DSA LDAP SECURITY PROTOCOL <"SSLv2"/"SSLv3"/"SSLv23"/"TLSv1"> SHOW DSA LDAP SECURITY PROTOCOL
3.22 – Presentation Address
You cannot enable the DSA until it has a valid presentation address. The DSA must be in the OFF state when you set its Presentation Address attribute. Note that the easiest way to set a DSA's presentation address is to use the DSA configuration procedure. Syntax: SET DSA PRESENTATION ADDRESS <address> SHOW DSA PRESENTATION ADDRESS Quote the entire presentation address using the ' character. Do not attempt to break the presentation address across multiple command lines. Either use a wide window, or simply allow the presentation address to wrap. Refer to HP Enterprise Directory - Management for details of how to use the DSA configuration procedure to set a DSA's presentation address. Refer to DSA Common_Datatypes for further information on the syntax of the Presentation Address attribute.
3.23 – Private Key Passphrase
If you want use SSL on LDAP connections to protect the security of the authentication phase, you need to obtain a certificate for the DSA. The certificate will have a Private Key that the DSA can use to validate the certificate exchange. This Private Key is usually encrypted using a pass phrase chosen by the user. If you are using SSL, you need to obtain a certificate and private key for the DSA in PEM format, either from a Certificate Authority or from SSL and store these in the DSA's directory area as DSA-certificate.pem and DSA-private-key.pem. You also need to tell the DSA what is the passphrase for the private key, by setting the PRIVATE KEY PASSPHRASE attribute. This is a password attribute, so you cannot SHOW it. Syntax: SET DSA PRIVATE KEY PASSPHRASE "<value>"
3.24 – Prohibit Chaining
The Prohibit Chaining attribute specifies whether the DSA is allowed to communicate with other DSAs when attempting to satisfy user requests. Communication between DSAs is called chaining. The DSA must be in state OFF when you set this attribute. Syntax: SET DSA PROHIBIT CHAINING <TRUE/FALSE> To prohibit chaining, specify the value TRUE; otherwise the value specified by the user or the user application is used. For example, a user of the DXIM command line interface can use the No Chaining control. If a DSA is prohibited from communicating with other DSAs, then it provides the user or the application with a "continuation reference" or a "referral" instead. These identify which DSA(s) would have been contacted, and provide the user with the information they require to make the connection(s) directly if they want to. For ease of use, it is usually preferable not to prohibit chaining. Note that prohibiting chaining does not prevent DSAs from connecting to other DSAs for other reasons, such as replication.
3.25 – Prohibit DECnet Transport
The Prohibit DECnet Transport attribute specifies whether the DSA can use the DECnet OSI Transport protocol to communicate with DUAs and other DSAs. If the use of DECnet OSI Transport protocol is prohibited, then all communication will use the DSA's private RFC1006 implementation rather than DECnet's transports. If DECnet is running you will most likely not be able to use TCP/IP port 102 as DECnet will have allocated it. The DSA must be in state OFF when you set this attribute. Syntax: SET DSA PROHIBIT DECNET TRANSPORT <TRUE/FALSE> SHOW DSA PROHIBIT DECNET TRANSPORT
3.26 – Read Only DSA NSAPs
The Read Only DSA NSAPs attribute identifies one or more DSAs that are allowed to contact this DSA and perform interrogations on behalf of their users. Each DSA is represented by the NSAP value of its presentation address. Syntax: SET DSA READ ONLY DSA NSAPS {<address>, ....} where <address> is the NSAP address, for example: SET DSA READ ONLY DSA NSAPS {%x49002aaa00040008aa21} You can specify the leading characters of an NSAP to indicate that read-only access is allowed for any DSA using an NSAP beginning with that sequence of characters. For example: SET DSA READ ONLY DSA NSAPS {%x49002a} The default value is an empty list of NSAP addresses, indicating that all NSAPs are allowed. If the attribute specifies one or more NSAPs, then only DSAs using those NSAPs are allowed to perform interrogations of this DSA. Note that the DSA refers to the value of this attribute whenever it receives a new connection. Once a connection is established, the caller is treated as a read-only DSA for as long as the connection lasts. Changing the value of the attribute has no effect on existing connections, only on subsequent connections.
3.27 – Read Only DSA Names
The Read Only DSA Names attribute lists the AE title of each DSA allowed to access this DSA to perform interrogations on behalf of their users. Syntax: SET DSA READ ONLY DSA NAMES {<aetitle>, ....} where <aetitle> is the AE title of a DSA. For example: "/C=US/O=Abacus/OU=Sales/CN=DSA1" Refer to DSA Common_Datatypes for more information on how to specify an AE title. The default value is an empty list of AE titles, indicating that any DSA is allowed to interrogate this DSA (subject to other controls). If one or more AE titles are specified in this attribute, then only those DSAs are allowed to interrogate this DSA. Note also that the DSA refers to the value of this attribute whenever it receives a new connection. Once a connection is established, the caller is treated as a read-only DSA for as long as the connection lasts. Changing the value of the attribute has no effect on existing connections, only on subsequent connections.
3.28 – Reader NSAPs
The Reader NSAPs attribute lists the NSAP addresses that directory applications can use to access the DSA and perform interrogations. Note that this is not the recommended way to implement controls on user access to directory information. Refer to HP Enterprise Directory - Management for access control advice. Syntax: SET DSA READER NSAPS {<address>, ....} where <address> is the NSAP address, for example: SET DSA READER NSAPS {%x49002aaa00040008aa21} You can specify the leading characters of an NSAP to indicate that read-only access is allowed for any application using an NSAP beginning with that sequence of characters. For example: SET DSA READER NSAPS {%x49002a} The default value is an empty set of NSAP addresses, indicating that applications can use any NSAP. Note that the DSA refers to the value of this attribute whenever it receives a new connection. Once a connection is established, the caller is allowed read access for as long as the connection lasts. Changing the value of the attribute has no effect on existing connections, only on subsequent connections.
3.29 – Reader Names
The Reader Names attribute lists the distinguished names of users permitted to access the DSA and perform interrogations. Note that this is not the recommended way to implement controls on user access to directory information. Refer to HP Enterprise Directory - Management for access control advice. Syntax: SET DSA READER NAMES {<name>, ....} where <name> is the distinguished name of a user, for example: "/C=US/O=Abacus/OU=Sales/CN='Jon Smith'" Refer to DSA Common_Datatypes for more information on how to specify a distinguished name. If the attribute contains no names, then all users can interrogate the DSA (subject to access controls, and to the setting of the Reader NSAPs and the Writer Names and Writer NSAPs attributes). The default value is an empty list of distinguished names, allowing all users to read information, subject to other attributes and access controls. Note that the DSA refers to the value of this attribute whenever it receives a new connection. Once a connection is established, the caller is allowed read access for as long as the connection lasts. Changing the value of the attribute has no effect on existing connections, only on subsequent connections.
3.30 – Schema Check On Modify
The Schema Check on Modify attribute specifies whether the DSA checks modifications for conformance with the schema. Syntax: SET DSA SCHEMA CHECK ON MODIFY <TRUE/FALSE> If you do not want the DSA to use the schema to ensure that modifications are valid, set this attribute to FALSE. Note that if directory modifications are not checked against the schema, you can easily corrupt your directory information. It is not advisable to set this attribute to FALSE unless you are sure that all requests for modification will be valid. One reason to set this attribute to FALSE temporarily might be because you want to use a script file to execute a large number of commands which you are sure are all valid. The DSA can process such a file more quickly, but you must be confident that the file contains no invalid commands. For example, if the file contains a request to add an attribute to an entry for which it is not allowed, then you will have created an invalid entry.
3.31 – Size Limit
The Size Limit attribute specifies the maximum number of entries that can be returned when satisfying a user request. Most directory operations only return one entry, but some, such as searches, can return many entries. Syntax: SET DSA SIZE LIMIT <number> The limit specified using this characteristic attribute overrides the value specified by the user application, if the application requests a larger number. The default value is 0, indicating that there is no limit on the number of entries that can be returned unless the application specifies one.
3.32 – SSL LDAP Cipher Suites
The SSL LDAP Cipher Suites attribute specifies which SSL Cipher Suites will be available for SSL connections through the dedicated SSL LDAP port. If this attribute is not set, then the DSA will accept any of the ciphersuites in the SSL default list. This attribute allows you to restrict the DSA to a subset of the ciphersuites available in SSL. The value is a quoted string, listing each ciphersuite to be allowed, separated by a ':'. The DSA must be in state OFF for you to set this attribute. Syntax: SET DSA SSL LDAP CIPHERSUITES "<value>:<value>..." SHOW DSA SSL LDAP CIPHERSUITES
3.33 – SSL LDAP Port
The SSL LDAP Port attribute is the port number of the dedicated SSL LDAP port that the DSA listens on for SSL messages, when you enable the DSA. Unlike the LDAP port, which can establish LDAP connections with or without SSL, the SSL_LDAP_port will refuse all LDAP connections that do not specify SSL. You must set the SSL LDAP Port to a non-zero integer, while the DSA is in the OFF state. If the port number is zero, the DSA does not listen for SSL requests. Syntax: SET DSA SSL LDAP PORT <value> SHOW DSA SSL LDAP PORT
3.34 – SSL LDAP Security Protocol
Specify the security protocol to be used on the SSL LDAP port. The DSA must be in state OFF, when you set this attribute. Syntax: SET DSA SSL LDAP SECURITY PROTOCOL <"SSLv2"/"SSLv3"/"SSLv23"/"TLSv1"> SHOW DSA SSL LDAP SECURITY PROTOCOL
3.35 – SSL State
The overall policy for SSL is controlled by the setting of the DSA characteristic SSL STATE. Syntax: SET DSA SSL STATE <state> SHOW DSA SSL STATE Values for this characteristic are: "On" SSL is enabled. "Off" SSL is not enabled. SSL negotiation on the LDAP port will be refused. "Mandatory" SSL is enabled and SSL must be negotiated on the LDAP port before any authenticated bind operation. Only unauthenticated operations can be performed on the normal LDAP port before SSL negotiation.
3.36 – Time Limit
The Time Limit attribute specifies the time, in seconds, within which a directory request must be completed. The value specified using this characteristic attribute limits the ability of user applications to specify a time limit. Syntax: SET DSA TIME LIMIT <seconds> The default value is 0, indicating that there is no time limit unless the application specifies one. The DSA makes frequent checks to see whether it has exceeded the time limit, and stops processing a request as soon as one of these checks indicates that the time limit has been exceeded. Any results that have been found within the time limit are presented to the user, with a Partial Results Displayed message.
3.37 – Trusted DSA NSAPs
The Trusted DSA NSAPs attribute contains a list of NSAP addresses through which DSAs can contact this DSA and perform chained read and chained modify operations. Syntax: SET DSA TRUSTED DSA NSAPS {<address>, ....} where <address> is the NSAP address, for example: SET DSA TRUSTED DSA NSAPS {%x49002aaa00040008aa21} The default value is an empty set of NSAP addresses, indicating that all NSAPs are allowed. You can specify the leading characters of an NSAP to indicate that trusted access is allowed for any DSA using an NSAP beginning with that sequence of characters. For example: SET DSA TRUSTED DSA NSAPS {%x49002a} The default value is an empty set of NSAP addresses, indicating that DSAs can use any NSAP. Trusted access is required by DSAs that are attempting to chain a requested for an authenticated user. This DSA must decide whether the calling DSA is to be trusted when it claims to have authenticated the user satisfactorily. Note that this attribute has no effect on DSA communications for other purposes, such as replication. Note also that the DSA refers to the value of this attribute whenever it receives a new connection. Once a connection is established, the caller is treated as a trusted DSA for as long as the connection lasts. Changing the value of the attribute has no effect on existing connections, only on subsequent connections.
3.38 – Trusted DSA Names
The Trusted DSA Names attribute can contain a list of trusted DSAs. Syntax: SET DSA TRUSTED DSA NAMES {<aetitle>, ....} where <aetitle> is the AE title of a DSA that is to be trusted, for example: "/C=US/O=Abacus/OU=Sales/CN=DSA1" The list contains the AE title of each trusted DSA. Refer to DSA Common_Datatypes for more information on how to specify an AE title. The default value is an empty list of AE titles, which means that this DSA trusts no other DSAs. Trust enables this DSA to accept another DSA's claim that a user has authenticated satisfactorily. This enables chained requests to be satisfied, rather than requiring a user to authenticate specifically to the DSA that holds the information they want to access. Note that this attribute is not the recommended way to implement trust between DSAs. Refer to the management guide for details of how to create directory entries to represent trusted DSAs. Note also that this attribute has no effect on DSA communications for other purposes, such as replication. Note also that the DSA refers to the value of this attribute whenever it receives a new connection. Once a connection is established, the caller is treated as a trusted DSA for as long as the connection lasts. Changing the value of the attribute has no effect on existing connections, only on subsequent connections.
3.39 – Version
The Version attribute displays the version number of the DSA. The value is read-only. Syntax: SHOW DSA VERSION
3.40 – Volatile Modifications
The Volatile Modifications attribute specifies whether the DSA writes all modifications to disk immediately, or delays writing modifications to disk. Syntax: SET DSA VOLATILE MODIFICATIONS <TRUE/FALSE> If the attribute is set to FALSE, then the DSA always writes modifications to disk immediately after applying them to its in-memory database. This ensures that modifications are never lost, but reduces DSA performance for modification operations. If the attribute is set to TRUE, then modifications are written to memory immediately, but may not be written to disk for up to fifteen seconds. This means it is possible that some modifications may be lost if a DSA exits abnormally. However, the DSA can process volatile modifications much faster than non-volatile modifications. The default value is FALSE. HP suggests that you set the attribute to TRUE, unless you have a strong requirement to ensure that modifications are never lost. The attribute can be set at any time, regardless of the state of the DSA.
3.41 – Writer NSAPs
This attribute lists the NSAP addresses that directory applications can use to communicate with this DSA and modify directory information. Any application attempting to use an unlisted NSAP is not allowed to modify information held by this DSA. It might be able to read information, subject to the Reader_NSAPs attribute. Having write access automatically gives read access as well. Note that this attribute is not the recommended way to implement access control. Refer to HP Enterprise Directory - Management for access control advice. Syntax: SET DSA WRITER NSAPS {<address>, ....} where <address> is the NSAP address, for example: SET DSA WRITER NSAPS {%x49002aaa00040008aa21} You can specify the leading characters of an NSAP to indicate that access is allowed for any application using an NSAP beginning with that sequence of characters. For example: SET DSA WRITER NSAPS {%x49002a} The default value is an empty set of NSAP addresses, indicating that an application can use any NSAP. Note also that the DSA refers to the value of this attribute whenever it receives a new connection. Once a connection is established, the caller is allowed write access for as long as the connection lasts. Changing the value of the attribute has no effect on existing connections, only on subsequent connections.
3.42 – Writer Names
The Writer Names attribute lists the distinguished names of users permitted to modify information held by this DSA. Having write access automatically gives read access as well. Syntax: SET DSA WRITER NAMES {<name>, ....} where <name> is the distinguished name of a user, for example: "/C=US/O=Abacus/OU=Sales/CN='Jon Smith'" Refer to DSA Common_Datatypes for more information on how to specify a distinguished name. Note that this is not the recommended way to implement controls on user access to directory information. Refer to HP Enterprise Directory - Management for access control advice. If the attribute specifies no names, then the DSA places no restriction on access, (subject to access controls, and to the settings of Writer NSAPs, Reader Names, and Reader NSAPs characteristic attributes). However, if any names are listed, then only those users have access to information. The default value is an empty set of distinguished names, allowing all users to access information, subject to other attributes and access controls. Note also that the DSA refers to the value of this attribute whenever it receives a new connection. Once a connection is established, the caller is allowed write access for as long as the connection lasts. Changing the value of the attribute has no effect on existing connections, only on subsequent connections.
4 – Counters
Counter attributes provide statistical information concerning the activities of the DSA. Typical counters show the number of reads and modifies that the DSA has processed and the number of errors reported by the DSA. All counters are listed below and each described individually. All the counters are read-only. You can use the SHOW directive to display counters. For example: SHOW DSA <counter> You can specify a list of counters to display. For example: SHOW DSA <counter1>, <counter2> You can use the ALL COUNTERS keyword to display all counter attributes with one directive. For example: SHOW DSA ALL COUNTERS
4.1 – Abandon Failures
This counter displays the number of Abandon Failed Errors generated by the DSA. The Abandon service enables a user to indicate that they are no longer interested in the request that they sent to the DSA, perhaps because the request is taking too long. Syntax: SHOW DSA ABANDON FAILURES
4.2 – Abandon Operations
This counter displays the number of directory ABANDON operations performed by the DSA. A directory ABANDON operation is used only to cancel a Read, Compare, List or Search operation. Syntax: SHOW DSA ABANDON OPERATIONS
4.3 – Accounting Disabled
This counter displays the number of Accounting Disabled events generated by the DSA. Syntax: SHOW DSA ACCOUNTING DISABLED
4.4 – Accounting Enabled
This counter displays the number of Accounting Enabled events generated by the DSA. Syntax: SHOW DSA ACCOUNTING ENABLED
4.5 – Accounting File Access Failures
This counter displays the number of Accounting File Access Failure events generated by the DSA. The Accounting File Access Failure event indicates why the DSA could not access the accounting file, and what type of access the DSA was trying to gain. Syntax: SHOW DSA ACCOUNTING FILE ACCESS FAILURES
4.6 – Accounting File Rollover
This counter displays the number of Accounting File Rollover events generated by the DSA. Each rollover can be either scheduled or unscheduled. Accounting file rollover involves closing the current accounting file and creating a new accounting file. Syntax: SHOW DSA ACCOUNTING FILE ROLLOVER
4.7 – Accounting Records Discarded
This counter displays the total number of accounting records that have been discarded by the DSA accounting facility. Syntax: SHOW DSA ACCOUNTING RECORDS DISCARDED
4.8 – Accounting Start Failures
This counter displays the number of Accounting Start Failure events generated by the DSA. The Accounting Start Failure event indicates that the DSA could not start the accounting facility when requested. Syntax: SHOW DSA ACCOUNTING START FAILURES
4.9 – Add Entry Operations
This counter displays the number of directory add entry operations requested of the DSA. A directory add entry operation is used to add a new entry to the directory information base. For example, this counter increases with each DXIM CREATE ENTRY command. The counter does not distinguish between operations performed by this DSA, and operations that this DSA passed on to another DSA for processing. Syntax: SHOW DSA ADD ENTRY OPERATIONS
4.10 – Attribute Errors
This counter displays the number of Attribute Errors generated by the DSA. This counter increases when, for example, a user attempts to violate an attribute constraint, or attempts to show an attribute that does not exist. Syntax: SHOW DSA ATTRIBUTE ERRORS
4.11 – Authentication Failures
This counter displays the number of Authentication Failure events (see EVENTS) generated by the DSA. Syntax: SHOW DSA AUTHENTICATION FAILURES An Authentication Failure event is issued when the DSA fails to authenticate the originator of a Bind request. This typically means that the originator specified the wrong password, or the password could not be verified by the DSA.
4.12 – Chained Abandon Operations
This counter displays the number of CHAINED ABANDON operations requested of the DSA. A CHAINED ABANDON requests the DSA to cancel a CHAINED READ, CHAINED SEARCH, CHAINED COMPARE or CHAINED LIST operation that was requested of it previously. Syntax: SHOW DSA CHAINED ABANDON OPERATIONS
4.13 – Chained Add Entry Operations
This counter displays the number of CHAINED ADD ENTRY operations requested of the DSA. A CHAINED ADD ENTRY operation involves the local DSA receiving an ADD ENTRY operation from another DSA. See Add_Entry_Operations for a description of the ADD ENTRY operation. Syntax: SHOW DSA CHAINED ADD ENTRY OPERATIONS
4.14 – Chained Binds Accepted
This counter displays the number of bind requests from other DSAs that have been accepted by the DSA. A chained bind enables communication between two DSAs. Syntax: SHOW DSA CHAINED BINDS ACCEPTED
4.15 – Chained Binds Rejected
This counter displays the number of Bind requests from other DSAs that have been rejected by the DSA. A chained bind enables communication between two DSAs. A DSA can reject a chained bind if it is not ready for communication. Syntax: SHOW DSA CHAINED BINDS REJECTED
4.16 – Chained Compare Operations
This counter displays the number of CHAINED COMPARE operations requested of the DSA. A CHAINED COMPARE operation involves the local DSA receiving a COMPARE operation from another DSA. See Compare_Operations for a description of the COMPARE operation. Syntax: SHOW DSA CHAINED COMPARE OPERATIONS
4.17 – Chained List Operations
This counter displays the number of CHAINED LIST operations requested the DSA. A CHAINED LIST operation involves the local DSA receiving a LIST operation from another DSA. See List_Operations for a description of the LIST operation. Syntax: SHOW DSA CHAINED LIST OPERATIONS
4.18 – Chained Modify Entry Operations
This counter displays the number of CHAINED MODIFY ENTRY operations requested of the DSA. A CHAINED MODIFY ENTRY operation involves the local DSA receiving a MODIFY ENTRY operation from another DSA. See Modify_Entry_Operations for a description of the MODIFY ENTRY operation. Syntax: SHOW DSA CHAINED MODIFY ENTRY OPERATIONS
4.19 – Chained Modify RDN Operations
This counter displays the number of CHAINED MODIFY RDN operations requested of the DSA. A CHAINED MODIFY RDN operation involves the local DSA receiving a MODIFY RDN operation from another DSA. See Modify_RDN_Operations for a description of the MODIFY RDN operation. Syntax: SHOW DSA CHAINED MODIFY RDN OPERATIONS
4.20 – Chained Operation Referrals
This counter displays the number of times the DSA has sent a referral to another DSA. The referral contains information about one or more DSAs that might have the information that satisfies a user request. Syntax: SHOW DSA CHAINED OPERATION REFERRALS
4.21 – Chained Read Operations
This counter displays the number of CHAINED READ operations requested of the DSA. A CHAINED READ operation involves the local DSA receiving a READ operation from another DSA. See Read_Operations for a description of the READ operation. Syntax: SHOW DSA CHAINED READ OPERATIONS
4.22 – Chained Remove Entry Operations
This counter displays the number of CHAINED REMOVE ENTRY operations requested of the DSA. A CHAINED REMOVE ENTRY operation involves the local DSA receiving a REMOVE ENTRY operation, from another DSA. See Remove_Entry_Operations for a description of the REMOVE ENTRY operation. Syntax: SHOW DSA CHAINED REMOVE ENTRY OPERATIONS
4.23 – Chained Search Operations
This counter displays the number of CHAINED SEARCH operations requested the DSA. A CHAINED SEARCH operation involves the local DSA receiving a SEARCH operation from another DSA. See Search_Operations for a description of the SEARCH operation. Syntax: SHOW DSA CHAINED SEARCH OPERATIONS
4.24 – Changes of State
This counter displays the number of State Change events (see EVENTS) generated by the DSA. The event is generated when, for example, you use the ENABLE DSA directive. In this case, the DSA changes from state OFF to state ENABLING and then to state ON, causing two State Change events. Syntax: SHOW DSA CHANGES OF STATE
4.25 – Compare Operations
This counter displays the number of directory COMPARE operations performed by the DSA. A directory COMPARE operation is used to compare a given entry with a specified directory entry. Syntax: SHOW DSA COMPARE OPERATIONS
4.26 – Communication Failures
This counter displays the number of communication failures since the DSA was created. Syntax: SHOW DSA COMMUNICATION FAILURES
4.27 – Create Failures
This counter displays the number of Create Failure events (see EVENTS) generated by the DSA. A Create Failure event is generated when the DSA fails to create the DSA entity. However, because a successful creation is required before you can see the counter, the value of this counter is always 0. Syntax: SHOW DSA CREATE FAILURES
4.28 – Creation Time
This counter displays the time and date at which the DSA was created. Syntax: SHOW DSA CREATION TIME
4.29 – DISP Binds Accepted
This counter displays the number of DISP binds the DSA has accepted from other DSAs. The DISP protocol is used by DSAs to replicate information. Syntax: SHOW DSA DISP BINDS ACCEPTED
4.30 – DISP Binds Rejected
This counter displays the number of DISP binds the DSA has rejected. The DISP protocol is used by DSAs to replicate information. A DISP bind can be rejected due to, for example, authentication failure. Syntax: SHOW DSA DISP BINDS REJECTED
4.31 – DOP Binds Accepted
This counter displays the number of DOP binds the DSA has accepted from other DSAs. The DOP protocol is used by the DSAs to manage shadowing agreements. Syntax: SHOW DSA DOP BINDS ACCEPTED
4.32 – DOP Binds Rejected
This counter displays the number of DOP binds the DSA has rejected from other DSAs. The DOP protocol is used by the DSAs to manage shadowing agreements. A DOP bind can be rejected due to, for example, authentication failure. Syntax: SHOW DSA DOP BINDS REJECTED
4.33 – DUA Binds Accepted
This counter displays the number of Bind requests from directory applications that have been accepted by the DSA. For example, each successful DXIM BIND command causes this counter to increase by one. Syntax: SHOW DSA DUA BINDS ACCEPTED
4.34 – DUA Binds Rejected
This counter displays the number of Bind requests from directory user applications (DUAs) that have been rejected by the DSA. For example, each unsuccessful DXIM BIND command causes this counter to increase by one. A DSA can reject a Bind request if, for example, it cannot authenticate the user of the application. Syntax: SHOW DSA DUA BINDS REJECTED
4.35 – Distributed Operation Failures
This counter displays the number of Distributed Operation Failure events (see EVENTS) generated by the DSA. A DSA generates a Distributed Operation Failure event when it fails to establish communication with another DSA for any reason. For example, network problems or authentication problems might cause the DSA to generate this event. Syntax: SHOW DSA DISTRIBUTED OPERATION FAILURES
4.36 – LDAP Binds Accepted
This counter displays the number of LDAP Binds that the DSA has accepted. Syntax: SHOW DSA LDAP BINDS ACCEPTED
4.37 – LDAP Binds Rejected
This counter displays the number of LDAP Binds that the DSA has rejected. Syntax: SHOW DSA LDAP BINDS REJECTED
4.38 – Examples
> SHOW DSA CHAINED BINDS This command displays the current value of the CHAINED BIND counter. > SHOW DSA CHAINED BINDS ACCEPTED, CHAINED BINDS REJECTED This command displays the current values of the CHAINED BINDS ACCEPTED and the CHAINED BINDS REJECTED counters. > SHOW DSA ALL COUNTERS This command displays the current value of all DSA counters.
4.39 – Exhausted Resource
This counter displays the number of Resource Exhausted events (see EVENTS) generated by the DSA. A Resource Exhausted event is generated when a DSA detects that a critical resource is exhausted, preventing it from processing a requested operation. Syntax: SHOW DSA EXHAUSTED RESOURCE
4.40 – Internal Errors
This counter displays the number of Internal Error events (see EVENTS) generated by the DSA. An Internal Error event is generated when the DSA detects an internal error. Syntax: SHOW DSA INTERNAL ERRORS
4.41 – List Operations
This counter displays the number of directory LIST operations performed by the DSA. A directory LIST operation is used to obtain a list of the immediate subordinates of a specified directory entry. For example, this counter increases with each DXIM SHOW SUBORDINATES command. Syntax: SHOW DSA LIST OPERATIONS
4.42 – Listen Failures
This counter displays the number of Listen Failure events (see EVENTS) generated by the DSA. The DSA generates this event when something prevents it from setting up its own presentation access point for receiving communications. Syntax: SHOW DSA LISTEN FAILURES
4.43 – Modify Entry Operations
This counter displays the number of directory modify entry operations performed by the DSA. A directory modify entry operation is used to amend an existing directory entry. For example, this command increases with each DXIM MODIFY ENTRY and DXIM SET ENTRY command. The counter does not distinguish between operations performed by this DSA, and operations that this DSA passed on to another DSA for processing. Syntax: SHOW DSA MODIFY ENTRY OPERATIONS
4.44 – Modify RDN Operations
This counter displays the number of directory modify RDN operations requested of the DSA. A directory modify RDN operation is used to modify the relative distinguished name (RDN) of a directory entry. For example, this counter increases with each DXIM RENAME ENTRY command. The counter does not distinguish between operations performed by this DSA, and operations that this DSA passed on to another DSA for processing. Syntax: SHOW DSA MODIFY RDN OPERATIONS
4.45 – Name Errors
This counter displays the number of Name Errors generated by the DSA. This counter increases when, for example, a user specifies a name which is not the name of an entry. Syntax: SHOW DSA NAME ERRORS
4.46 – Read Operations
This counter displays the number of directory READ operations performed by the DSA. A directory READ operation is used to extract information from a specified directory entry. For example, this counter increases with each DXIM SHOW ENTRY command. Syntax: SHOW DSA READ OPERATIONS
4.47 – Referrals
This counter displays the number of Referrals generated by the DSA. A referral occurs when a DSA cannot satisfy an operation itself and therefore returns to the application, a reference to another DSA which it believes can process the operation. Syntax: SHOW DSA REFERRALS
4.48 – Remove Entry Operations
This counter displays the number of directory remove entry operations requested of the DSA. A directory remove entry operation is used to remove a specified entry from the directory information base. For example, this counter increases with each DXIM DELETE ENTRY command. The counter does not distinguish between operations performed by this DSA, and operations that this DSA passed on to another DSA for processing. Syntax: SHOW DSA REMOVE ENTRY OPERATIONS
4.49 – Results
This counter displays the number of results generated by the DSA. A result is the successful completion of a directory operation. Syntax: SHOW DSA RESULTS
4.50 – Search Operations
This counter displays the number of directory SEARCH operations performed by the DSA. A directory SEARCH operation is used to search a section of the directory information base for specific information. Syntax: SHOW DSA SEARCH OPERATIONS
4.51 – Security Errors
This counter displays the number of security errors detected by the DSA. A security error occurs when for example, an end user tries to perform an operation for which they are not authorized. Syntax: SHOW DSA SECURITY ERRORS
4.52 – Service Errors
This counter displays the number of Service Errors generated by the DSA. A Service Error is issued when an error occurs related to the provision of a service (Read, Compare, and so on). Syntax: SHOW DSA SERVICE ERRORS
4.53 – Shadow Agreement Update Failures
This counter displays the number of Shadow Agreement Update Failure events generated by the DSA. The event is generated when a DSA fails to create, modify, or delete a shadowing agreement. Syntax: SHOW DSA SHADOW AGREEMENT UPDATE FAILURES
4.54 – Shadow Agreement Updates Completed
This counter displays the number of Shadow Agreement Update Complete events generated by the DSA. The event is generated every time a DSA successfully creates, modifies, or deletes a shadowing agreement. Syntax: SHOW DSA SHADOW AGREEMENT UPDATES COMPLETED
4.55 – Shadow Update Failures
This counter displays the number of Shadow Update Failure events (see EVENTS) generated by the DSA. The Shadow Update Failure event is generated when the DSA fails to update its copy of a naming context. If the DSA fails to copy two or more naming contexts from another DSA, then the failure to copy each naming context causes an event. Syntax: SHOW DSA SHADOW UPDATE FAILURES
4.56 – Shadow Updates Completed
This counter displays the number of Shadow Update Complete events (see EVENTS) generated by the DSA. The DSA generates the Shadow Update Complete event when it succeeds in copying or updating a naming context from another DSA. If the DSA copies two or more naming contexts from another DSA, then the successful copying of each naming context causes an event. Syntax: SHOW DSA SHADOW UPDATES COMPLETED
4.57 – Update Errors
This counter displays the number of Update Errors generated by the DSA. This counter increase when, for example, a user attempts to create an entry that already exists. Syntax: SHOW DSA UPDATE ERRORS
5 – Directives
You can use the ADD, CREATE, DELETE, ENABLE, DISABLE, REMOVE, SET, SHOW and UPDATE directives with the DSA entity. The CREATE and DELETE directives are used to create and delete a DSA. The ENABLE and DISABLE directives are used to enable or disable the DSA for communication with directory applications and other DSAs. The SET, SHOW, ADD and REMOVE directives are used to manage DSA attributes. The UPDATE directive is used to initiate replication between DSAs. To use any directives other than the SHOW directive, you require privileges.
5.1 – ADD
Use the ADD directive to add additional values to a DSA multi-valued characteristic attribute. The DSA multi-valued characteristic attributes are: - READ ONLY DSA NSAPS - READ ONLY DSA NAMES - WRITER NAMES - WRITER NSAPS - READER NAMES - READER NSAPS - TRUSTED DSA NAMES - TRUSTED DSA NSAPS Syntax: ADD DSA <characteristic> {<value>,...} where <characteristic> is the name of the Characteristic attribute and <value> is the value you want to add to the attribute. Note the use of {} to enclose the values of a multivalued attribute. These must be used even if only one value is actually specified.
5.2 – CREATE
Use this directive to create a DSA. On completion of this directive, the state of the DSA is OFF. You can then create subentities of the DSA entity, and manage the attributes of the DSA entity and its subentities. Syntax: CREATE DSA When the DSA is being created, it reads its database into memory. If the DSA does not have a database yet, it creates a new one automatically. DSAs on Tru64 UNIX systems use memory image files instead of the snapshot files since V3.0. The DSA can read and write memory image files much faster, especially for large databases. By default, the DSA always reads a memory image file, if a valid one is available. If not, it reads a snapshot file, if one is available, or creates a new database if not. You can use arguments to the CREATE DSA command to specify which type of database file you want the DSA to read during creation. If you use these arguments, the DSA only attempts to read the specified type of database file, and does not fallback to the other type or create a new database. See the Arguments topic for further details. After you have created the DSA for the first time, using the CREATE DSA command with no arguments, you must set values for the AE Title and Presentation Address attributes of the DSA entity. You cannot enable a DSA that does not have these two attributes set. This version provides a DSA configuration utility that simplifies the setting of these attributes. After creation for the first time you are also advised to set the Volatile Modifications attribute to TRUE. Refer to the help for this characteristic attribute for further details. During subsequent DSA creations, the DSA refers to its own database and configures itself automatically.
5.2.1 – Arguments
DSAs on Tru64 UNIX systems support arguments to the CREATE DSA directive. The arguments are as follows: Syntax: CREATE DSA [FROM MEMORY IMAGE | FROM SNAPSHOT] If you use the FROM MEMORY IMAGE argument, the DSA attempts to read a memory image file, and returns a DSA Information Tree Corrupt error if none is available. The DSA does not attempt to read a snapshot file or create a new database. If the DSA can find a valid memory image file, it returns a message indicating that is has successfully read the memory image file. The memory image file contains a copy of the schema. This means that the DSA does not read the schema during creation. However, the DSA displays a warning message if its copy of the schema is not the same as the schema file. If the schema has been changed, use the following commands to force the DSA to read it: > DELETE DSA TO SNAPSHOT > CREATE DSA FROM SNAPSHOT If you use the FROM SNAPSHOT argument, the DSA attempts to read a snapshot file, as in previous versions, and returns a DSA Information Tree Corrupt error if none is available. The DSA does not attempt to read a memory image file or create a new database. If the DSA can find a valid snapshot file, it returns a message indicating that is has successfully read the snapshot file. Do not use the FROM SNAPSHOT argument unless a management tasks specifically requires it. A snapshot file is significantly less efficient than a memory image file, and if you create a snapshot file that is more recent than a memory image file, you invalidate the memory image file. The FROM SNAPSHOT argument is supported for a small number of management tasks only. Forcing the DSA to read a new schema is one of those tasks.
5.2.2 – Responses
The CREATE DSA directive can return one of the following responses: New DSA database created. Configure the DSA. This means that the DSA has been created for the first time. Use the DSA configuration utility to give the DSA a basic configuration. DSA created successfully from memory image file. This means that the DSA has been created from a valid memory image file. DSA created successfully from memory image file. Schema Warning: The memory image file does not use the current schema. This means that the DSA has been created from a valid memory image file. However, the DSA detected that the copy of the schema in its memory image file is not the same as the one in /var/dxd. If the schema has been customized, you should force the DSA to read the new schema. Use the following commands: > DELETE DSA TO SNAPSHOT > CREATE DSA FROM SNAPSHOT This forces the DSA to read the schema during creation. DSA created successfully from snapshot file. This means that the DSA has been created from a valid snapshot file. On Tru64 UNIX systems, you should only use a snapshot file for management tasks that specifically require it. On the first occasion that you start the DSA after an upgrade, the DSA reads the existing snapshot file. After the first DIT check interval, or when you delete the DSA, the DSA creates a memory image file. It then reads and writes memory image files unless specifically instructed to read or write a snapshot file.
5.2.3 – Errors
The CREATE directive can return one of the following errors: REASON: Already Exists DESCRIPTION: The DSA entity already exists. REASON: Communication Failure DESCRIPTION: There has been a failure in communication. This means that communication has not been successful. The response gives more information about the failure. REASON: DSA Information Tree Corrupt DESCRIPTION: The DSA Information Tree is corrupt. The copy of the DSA database stored on disk is corrupt and consequently not loaded into memory. On Tru64 UNIX systems, this error is also used if you specify the FROM MEMORY IMAGE or FROM SNAPSHOT argument on the CREATE DSA command, but there is no memory image or snapshot file available. If this is the case, repeat the command without the argument. REASON: DSA Information Tree Incompatible DESCRIPTION: The DSA Information Tree is incompatible with this version of the DSA. This can only happen after an upgrade of the Enterprise Directory software. REASON: DSA Information Tree Schema Incompatible DESCRIPTION: The DSA Information Tree and Schema are incompatible. The DSA Information Tree contains information that is not defined in the schema. The missing definition is identified in a supplementary message. REASON: License Check Failed DESCRIPTION: The license check has failed for this product. A valid HP X.500 Directory Server license has not been installed. REASON: Schema Corrupt DESCRIPTION: The schema file is unreadable. Recompile the schema. REASON: Schema Incompatible DESCRIPTION: The schema file is of a different version from the DSA. Recompile the schema. REASON: Database Loading DESCRIPTION: The DSA is currently being created. Two CREATE directives have been issued in quick succession. No action is necessary.
5.3 – DELETE
Use this directive to delete a DSA. The DSA must be in state OFF when you delete it. For more information on a DSA's state, refer to STATUS attributes. Syntax: DELETE DSA [TO MEMORY IMAGE | TO SNAPSHOT] The DSA writes its directory information to disk when you use the DELETE directive. This means that all DSA information is saved, with the exception of any Accessor entities. When you next create the DSA, it will reconfigure itself automatically by reading its database files. The DELETE DSA options are only available on Tru64 UNIX. On OpenVMS systems, the directive DELETE DSA always produces a snapshot file. DSAs on Tru64 UNIX systems use memory image files instead of the snapshot files, by default. The DSA can read memory image files much faster, especially for large databases. Snapshot files are only supported on Tru64 UNIX systems for a small number of management tasks. These are documented in HP Enterprise Directory - Management. You are advised not to use the TO SNAPSHOT argument unless performing one of the tasks that specifically requires it.
5.3.1 – Errors
The DELETE directive can return the following error: REASON: Wrong State DESCRIPTION: The DSA entity is not in the correct state. The DSA is not in state OFF. The error indicates what state the DSA is in.
5.4 – DISABLE
Use this directive to disable a DSA. This means the DSA is unable to accept communications from DUAs or other DSAs. On completion of this directive, the DSA is in state OFF. For more information on the state of a DSA, refer to STATUS attributes. Syntax: DISABLE DSA
5.4.1 – Errors
The DISABLE directive can return the following error: REASON: Wrong State DESCRIPTION: The DSA entity is not in the correct state. The error indicates what state the DSA is in. The DSA must be in state ON for the ENABLE directive to succeed.
5.5 – ENABLE
Use this directive to enable the DSA for communication with directory applications and other DSAs. On completion of this directive, the DSA is set to state ON. The DSA listens for DOP, DSP, DAP, and DISP bind requests, depending on your setting for Presentation Address. In addition, if you have set LDAP Port to a non-zero value, the DSA listens for LDAP requests. For more information on a DSA's state, refer to STATUS attributes. Syntax: ENABLE DSA
5.5.1 – Errors
The ENABLE directive can return one of the following errors: REASON: Wrong State DESCRIPTION: The DSA entity is not in the correct state. If the DSA is in state CREATING, ENABLING or UPDATING, wait for the DSA to complete the relevant task. The response indicates the current state of the DSA. REASON: No AE Title DESCRIPTION: The DSA's AE Title attribute has not been set. Use the SET DSA AE TITLE directive to set a valid AE Title. Refer to DSA Common_Datatypes for details of how to specify a valid AE Title attribute. Remember that the AE Title attribute should match the distinguished name of the directory entry that represents this DSA. REASON: No Presentation Address DESCRIPTION: The DSA's Presentation Address attribute has not been set. Use the DSA configuration procedure to set a presentation address. See HP Enterprise Directory - Management for details of how to use the DSA configuration procedure.
5.6 – Examples
> CREATE DSA > SET DSA AE TITLE "/C=US/O=Abacus/CN=DSA" > SET DSA PRESENTATION ADDRESS - _> '"DSA"/"DSA"/"DSA"/NS+48909090AA001122,CLNS' > SHOW DSA ALL ATTRIBUTES > ENABLE DSA This command enables the DSA for communication with directory applications and other DSAs. > DISABLE DSA > DELETE DSA The first command disables the DSA from communication. This means that it cannot communicate with a DUA or another DSA. The state of the DSA changes from ON to OFF and it is no longer available for communication. The DSA can now be deleted. This is performed by the second command. > UPDATE DSA SUPPLIER - _> '"DSA"/"DSA"/"DSA"/NS+48909100aa006712121,CLNS' This command starts the replication of naming contexts from the DSA with the specified presentation address to this DSA. DSAs only require the UPDATE DSA command to be used once. Subsequent replication should be automatic, if you follow HP's recommendations, as documented in HP Enterprise Directory - Management. By default, DSAs communicate with their shadowing partners every 12 hours to make sure that shadow copies of information are up to date.
5.7 – REMOVE
Use the REMOVE directive to remove a value from a DSA multi-valued characteristic attribute. The DSA multi-valued characteristic attributes are: - READ ONLY DSA NSAPS - READ ONLY DSA NAMES - WRITER NAMES - WRITER NSAPS - READER NAMES - READER NSAPS - TRUSTED DSA NAMES - TRUSTED DSA NSAPS Syntax: REMOVE DSA <characteristic> {<value>,...} where <characteristic> is the name of the Characteristic attribute and <value> is the value you want to remove from the attribute.
5.8 – SET
Use the SET directive to set the value of an attribute. You can set all the characteristic attributes of the DSA entity with the exception of the Version attribute. This attribute is a read-only characteristic attribute. Syntax: SET DSA <attr> <value> where <attr> is the name of the attribute and <value> is the value you want to assign to the attribute. When you use the SET directive, any existing value of the attribute is removed, leaving only the value that you now specify. To specify a new value in addition to any existing values, use the ADD directive.
5.9 – SHOW
Use the SHOW directive to display the attributes of a DSA entity. You can use the SHOW directive on all Characteristic, Status and Counter attributes of the DSA entity. Syntax: SHOW DSA <attr> where <attr> is the name of the Characteristic, Status or Counter attribute you want to display. You can display the values of multiple attributes using one SHOW directive by separating the attributes with a comma, for example: SHOW DSA <attribute1>, <attribute2> You can also show all attributes, or all attributes of a given type, as follows: SHOW DSA ALL ATTRIBUTES SHOW DSA ALL CHARACTERISTICS SHOW DSA ALL STATUS SHOW DSA ALL COUNTERS
5.10 – UPDATE
Use the UPDATE directive to initiate replication. On issuing this directive, the DSA specified in the SUPPLIER argument provides copies of one or more naming contexts (see the Naming Context entity) to this DSA. You can only use the UPDATE directive when the DSA is in state ON. Syntax: UPDATE DSA SUPPLIER <supplier> Refer to Arguments for details of <supplier>. You should only need to use the UPDATE DSA directive when you implement replication for the first time. Once replication has been established, the DSAs continue to replicate automatically according to a 12 hour schedule. This assumes you follow HP's recommendations, as documented in HP Enterprise Directory - Management.
5.10.1 – Arguments
The UPDATE directive has one argument: SUPPLIER. The SUPPLIER argument specifies either the AE title or the presentation address of the DSA which will supply copies of naming contexts. If you use the AE title argument, the directive only succeeds if a directory entry of the same name is accessible to this DSA and contains a valid presentation address for the supplier DSA. Specify the argument as follows: UPDATE DSA SUPPLIER '<ae title>' UPDATE DSA SUPPLIER '<presentation address>' Refer to DSA Common_Datatypes for information on how to specify an AE title or a presentation address.
5.10.2 – Errors
The UPDATE directive can return one of the following errors: REASON: Wrong State DESCRIPTION: The DSA entity is not in the correct state. The error indicates what state the DSA is in. The DSA must be in state ON when you use the UPDATE DSA directive. REASON: Invalid Address DESCRIPTION: The Supplier argument is not a valid presentation address. Check the presentation address of the DSA that is to be the supplier DSA, and specify that address correctly. REASON: Invalid Supplier Name DESCRIPTION: The Supplier argument is not a valid directory name. Check the AE title of the DSA that is to be the supplier DSA, and specify that AE title correctly. REASON: Supplier Unavailable DESCRIPTION: The Supplier DSA is unavailable. This error usually means that the supplier DSA cannot verify the identity of the consumer DSA. Refer to HP Enterprise Directory - Management for details of replication, and its prerequisite tasks. The error can also mean that the supplier DSA is unavailable temporarily, and a later attempt to replicate will succeed. The error can also mean that the supplier DSA has insufficient diskspace to write the shadow information to disk before sending it to the consumer DSA. Check the events generated on the supplier DSA to see whether they explain the failure of replication. REASON: Schema Incompatible DESCRIPTION: Supplied update incompatible with the DSA. The two DSAs have different schema, and the information in the supplied naming context does not conform to the schema of this DSA. The consumer DSA needs schema that supports all of the attribute types, syntaxes, and structure rules used in the shadowed naming context. HP recommends that all of your DSAs have identical schema files. REASON: DIT Incompatible DESCRIPTION Supplied update incompatible with the DSA. The consumer naming context clashes with the DIT of the consumer DSA. For example, the consumer DSA might have a naming context that overlaps with the consumed naming context. This indicates that you have a problem with your DSA configuration, and you should check all DSAs to ensure that they have a consistent understanding of the division of your DIT. REASON: Update Incompatible DESCRIPTION: Supplied update incompatible with the DSA. The supplied naming context contains information that is incompatible with this DSA. REASON: Insufficient Resources DESCRIPTION: There are insufficient resources to perform the update. This usually means that the consumer DSA has insufficient diskspace to write the shadow information to disk before applying it to its database. It can also mean that the consumer DSA has insufficient memory to add the shadow information to whatever information it already holds. REASON: Insufficient Resources DSA Deleted DESCRIPTION: Failed in performing the Update due to insufficient resources. DSA deleted. This is similar to the Insufficient Resources problem, but the DSA has already made changes to its database. It therefore deletes itself to prevent corruption of its existing data. When you recreate the DSA, it recovers the data that it held prior to the failed update. REASON: No Address DESCRIPTION: Cannot read address for specified DSA. You specified an AE title for the supplier DSA. The consumer DSA looked the AE title up in the directory, but found that the entry representing the supplier DSA does not have a presentation address attribute, or that it could not read the presentation address attribute. Check that the entry representing the supplier DSA has a presentation address attribute, and that it is accessible to the consumer DSA. Otherwise specify the presentation address of the supplier DSA on the UPDATE command, so that a lookup is not required. REASON: Bad Update DESCRIPTION: Invalid data received from Supplier. This means that there is a problem with the protocol passed between the supplier DSA and consumer DSA. The consumer DSA therefore does not apply any changes to its database. Try the update again, to see whether the error recurs. If so, report this error to HP. REASON: Bad Update DSA Deleted DESCRIPTION: Invalid data received from Supplier. DSA deleted. This is similar to the Bad Update error. However, the consumer DSA has already started applying changes to its database before detecting the error. It therefore deletes itself to prevent corruption of its data. When you recreate the consumer DSA, it recovers the database that it held prior to the failed update. REASON: Unexpected Failure DESCRIPTION: Unexpected failure. Check the events generated by the supplier DSA and the consumer DSA to see whether they explain the failure. REASON: Comms Failure DESCRIPTION: The update failed due to a communications problem. See HP Enterprise Directory - Problem Solving for information about fixing communications problems.
6 – Events
When an event occurs, the DSA sends a description of the event to the event sink. The events are described below.
6.1 – Accounting Disabled
This event is generated when the DSA disables the accounting facility. When the DSA disables the accounting facility, it closes the accounting file. The event contains the filename of the closed accounting file.
6.2 – Accounting Enabled
This event is generated when the DSA successfully enables the accounting facility. The event contains the filename of the accounting file.
6.3 – Accounting File Rollover
This event is generated when the DSA rolls over the accounting file, that is, closes the current accounting file and creates a new accounting file. The event contains the following information: - The filename of the closed accounting file. - The filename of the new accounting file.
6.4 – Accounting File Access Failure
The event contains the following information: - What type of access the DSA was trying to make to the accounting file. This can be one of WRITE, OPEN, or CLOSE access. - A system message that indicates why the DSA failed to access the accounting file. The system messages are described in the documentation for your operating system. - The filename of the accounting file that the DSA failed to open.
6.5 – Accounting Records Discarded
This event is generated when the DSA is forced to discard records without writing them in the accounting file. The reasons why the DSA may be forced to discard accounting files are described in HP Enterprise Directory - Problem Solving. The event indicates the number of records discarded since the last record was successfully written in the accounting file.
6.6 – Authentication Failure
This event is generated when the DSA fails to authenticate the originator of a Bind request. The event returns the following information: - The reason why authentication failed. This may be one of the following: - Unknown User. The distinguished name supplied in the Bind request does not identify an entry within the directory. - Incorrect Password. The password supplied in the Bind request does not match the password stored in the directory entry identified by the supplied distinguished name. - Inaccessible Password. The DSA could not verify the supplied password because the DSA containing the directory entry is not accessible. This might be a temporary problem, for example, the connection to that DSA cannot be made, or it might be a more permanent problem, where the DSA holding the directory entry is not a trusted DSA. - Password Verification Loop. When a DSA attempts to verify a password, it might need to communicate with another DSA to access the directory entry that contains the password. This communication might also require the specification of a password, which must be verified by the second DSA. It is therefore possible that two DSAs will find themselves in a situation where each is waiting for the other to verify a password. If this happens, one of the DSAs detects the problem, and the authentication fails. - Information on the application or user that requested the operation. This comprises: - The application entity title of the DSA from which the Bind request was received. - The presentation address of the DSA from which the Bind request was received. - The distinguished name that was supplied in the Bind request, if any. - The directory protocol in use, that is DAP, DSP, DISP, or DOP. The DAP protocol is used by directory applications to bind to the DSA. The DSP protocol is used by other DSAs to chain requests to the DSA. The DOP protocol is used by other DSAs to manage shadowing agreements. The DISP protocol is used by other DSAs to replicate information to or from this DSA.
6.7 – Create Failure
This event is generated when the DSA fails to create the DSA entity in response to the CREATE DSA directive. The event provides the following information: - The reason why the DSA entity could not be created. This is one of the following: - Database already in use by another DSA. The DSA is trying to connect to a database that is being used by another DSA. - DIT Incompatible. The DSA database is incompatible with this version of the DSA. This can only occur after an upgrade of the DSA software. - DIT Corrupt. The DSA database is corrupt. - DIT and Schema Incompatible The DIT contains information that is not defined in the schema. Fix your schema files, recompile them, and restart the DSA. - Schema Incompatible. The directory schema is incompatible with this version of the DSA. Both the schema compiler and the DSA contain internal revision numbers that define the revision level of the software. The most likely cause of this event message is that an old version of the schema compiler has been used to compile the schema files. This can only happen after an upgrade of the DSA software. - Schema Corrupt. The directory schema is corrupt. Recompile the schema. - License Check Failure. The license check for the product has failed. - System Error. An unexpected system error has occurred. - Additional information that assists in diagnosing the reason for the failure. For example, if the reason is set to System Error, the diagnostic string might provide the actual reason, such as insufficient memory.
6.8 – Distributed Operation Failure
A Distributed Operation Failure event is issued when the DSA cannot connect to another DSA. The event returns the following information: - Reason. This is one of the following: - Communications Failure. The DSA could not establish an association for one of the following reasons stated in the event: - Fatal Interface Error - Insufficient Resources - Network Unavailable - Address Already In Use - Invalid AEI - Transport Error - System Error - Invalid Transport Template - Unknown Error - DSA Not Trusted The target DSA does not trust this DSA, and considers that the connection requires trust. - Authentication Failure. The target DSA could not verify this DSA's password. Refer to HP Enterprise Directory - Problem Solving. - Invalid Reference. The target DSA does not hold the part of the DIT that this DSA expects it to. The knowledge information of this DSA is wrong. See HP Enterprise Directory - Problem Solving. - Remote Operation Rejected. The target DSA has rejected the remote operation. This is normally due to a protocol error. - Diagnostic. This may be, for example, an internal system error code. - Target DSA. The access point of the target DSA with which this DSA was attempting to communicate when the failure occurred. - Requestor. Information on the application or user that requested the operation. This comprises: - The application entity title of the DSA from which the Bind request was received. - The presentation address of the DSA from which the Bind request was received. - The distinguished name that was supplied in the Bind request, if any. - The directory protocol in use, that is, DAP, DSP or the DEC Shadow Protocol.
6.9 – Failure To Start Accounting Facility
The event indicates the reason why the DSA failed to start the accounting facility. The reason can be either of the following: - There was insufficient disk space for the accounting facility. In this case, you need to release extra disk space on the disk that the accounting facility uses, and then start the accounting facility. Moving or deleting accounting files might be the simplest solution. HP recommends that you store accounting files on a different disk to the DSA files, as follows: - On Tru64 UNIX systems, create a softlink in the /var/dxd directory so that the /var/dxd/accounting directory is on a different disk. - On OpenVMS systems, define the logical DXD$ACCOUNTING to point to a directory on a different disk to the one that contains DXD$DIRECTORY. - The DSA failed to create an accounting thread. Restart the accounting facility. If this problem happens frequently, report it to HP.
6.10 – Internal Error
An Internal Error event is generated when the DSA detects an internal error. Report this error to HP. Each occurrence of this event results in the Internal Errors counter being incremented by 1.
6.11 – Listen Failure
This event is generated when the DSA fails to set up its own presentation address for receiving communications. The event provides a diagnostic message, and one of the following reasons: - Fatal Interface Error - Insufficient Resources - Network Unavailable - Address Already In Use - Invalid AEI - Transport Error - System Error - Invalid Transport Template - Unknown Error
6.12 – Resource Exhausted
A Resource Exhausted event is generated when the DSA detects that a critical resource is exhausted, preventing it from performing an operation. Each occurrence of this event results in the Exhausted Resource counter being incremented by 1. The event identifies the resource which is exhausted. This is one of the following: - Insufficient Memory. Insufficient memory remains to process the operation. - Fatal Memory Exhaustion The DSA has run out of memory during an essential operation. The DSA exits to avoid corrupting the database. The event indicates how many bytes of memory were not available. You should take steps to increase the amount of memory available to the DSA. - Insufficient License Capacity. The DSA contains more entries than its licenses permit. Reduce the DSA's entry count, or load more licenses. - Insufficient Associations. Insufficient resources are available to process a BIND operation. - Insufficient Disk Space. Insufficient disk space remains to perform a backup of the DSA's DIB fragment. - Insufficient Threads. Insufficient processor threads remain to perform the requested operation. - Miscellaneous Resource Exhausted. A miscellaneous resource is exhausted.
6.13 – Shadow Agreement Update Complete
This event is generated when a DSA successfully creates, modifies, or deletes a shadowing agreement. A shadowing agreement describes how and when a DSA must replicate a given naming context to or from another DSA. The event provides the following information: - The name of the naming context to which the agreement applies - Whether this DSA is the supplier or consumer DSA - The access point of the other DSA that the agreement applies to - The identifier of the agreement that was successfully updated Note that updating an agreement does not mean that replication has taken place. The success or failure of replication is indicated by the Shadow Update Complete and Shadow Update Failure events. This event indicates only that the DSA has successfully managed an agreement, for example, to reschedule replication.
6.14 – Shadow Agreement Update Failure
This event is generated when a DSA fails to create, modify, or delete a shadowing agreement. The event provides the following information: - One of the following Shadowing Agreement Problems: - Communications Problem - DOP error received - DOP error sent - The name of the naming context to which the agreement applies - Whether this DSA is consumer of supplier DSA - The access point of the other DSA that the agreement applies to - If the Shadowing Agreement Problem was a Communications Problem, a diagnostic message is provided, and one of the following reasons; - Fatal Interface Error - Insufficient Resources - Network Unavailable - Address Already In Use - Invalid AEI - Transport Error - System Error - Invalid Transport Template - Unknown Error - ACSE User Reject - If the Shadowing Agreement Problem was either DOP error received or DOP error sent, one of the following reasons; - Invalid ID - Duplicate ID - Unsupported Binding Type - Not Allowed For Role - Parameter Missing - Role Assignment - Invalid Start Time - Invalid End Time - Invalid Agreement - Currently Not Decidable - Modification Not Allowed - The identifier of the agreement that was not updated. Most of the DOP problems are self correcting. For example, the Duplicate ID problem leads to the proposal of a different agreement identifier. The Invalid Agreement and the Currently Not Decidable problems may require manual intervention. See HP Enterprise Directory - Problem Solving for details of how to handle those problems.
6.15 – Shadow Update Complete
This event is generated when the DSA has successfully updated a shadow naming context. Either the consumer DSA or the supplier DSA, or both, may generate this event. The event provides the following information: - The name of the naming context that was updated. - Whether this DSA is the supplier DSA or the consumer DSA. - The access point of the other DSA. - The identifier of the shadowing agreement relating to the replication that completed successfully. - The type of update that took place, which is one of: - No changes - Incremental - Total
6.16 – Shadow Update Failure
This event is generated when the DSA fails to update a shadow naming context. This event can be generated by both the supplier and the consumer of the naming context. The event provides the following information: - The reason for the failure, which is one of the following: - Supplier DSA Unavailable - Cannot Save Updates - Update Incompatible - Failed to Apply Updates - Invalid Arguments - Cannot Read Supplier Address - Invalid Protocol - Unexpected Failure - Consumer Not Authenticated - Communications Failure - DISP error received - DISP error sent - Schema incompatible - DIT incompatible - The name of each naming context that failed to be updated. - Whether the DSA generating the event was the supplier DSA or the consumer DSA. - The access point of the DSA with which the update was processed. - If the reason was DISP error received or DISP error sent, then the agreement identifier is displayed, and one of the following problems: - Invalid Agreement ID - Inactive Agreement - Invalid Information Received - Unsupported Strategy - Missed Previous - Full Update Required - Unwilling To Perform - Unsuitable Timing - Update Already Received - Invalid Sequencing Most of the DISP problems are self correcting. In some cases, a DISP problem causes a total (or full) update to occur. This makes sure that the consumer DSA has a complete, up-to-date copy of the relevant naming context. Some of the DISP problems can only be generated if an HP DSA is interworking with another vendor's DSA. If any of these problems happen frequently, refer to HP Enterprise Directory - Problem Solving.
6.17 – State Change
This event is generated when the state of the DSA changes, either as a result of a management directive, or as a result of an operational problem. The event provides the following information: - The old state of the DSA - The new state of the DSA
7 – Naming Context
A Naming Context entity represents a part of the directory information tree which is held by this DSA. A naming context is a subtree of the DIT. It extends from the entry that has the same name as the Naming Context entity, down to a subordinate reference, or to entries that have no subordinates.
7.1 – Characteristics
A Naming Context entity has three characteristic attributes: - Master Access Point - Supplier Access Point - Consumer Access Point You can use the ADD, SET, and REMOVE directives on the Consumer Access Point attribute only. The remaining two attributes are read-only attributes and have values set for them during replication (see HP Enterprise Directory - Management). You can display the current value of all attributes by specifying them in a SHOW directive. Syntax: ADD DSA NAMING CONTEXT <name> <attr> {<value>,...} REMOVE DSA NAMING CONTEXT <name> <attr> {<value>,...} SET DSA NAMING CONTEXT <name> <attr> {<value>,...} SHOW DSA NAMING CONTEXT <name> <attr> where <name> is the name of the naming context, specified in quotes, <attr> is a characteristic attribute name and <value> is the value. You can display the values of many attributes in one SHOW directive by separating the attributes with a comma, for example: SHOW DSA NAMING CONTEXT <name> <attribute1>, <attribute2> Also, you can use the ALL CHARACTERISTICS qualifier with the SHOW directive, for example: SHOW DSA NAMING CONTEXT <name> ALL CHARACTERISTICS You can also use the wildcard "*" in a SHOW directive, to show details of all naming contexts; for example: SHOW DSA NAMING CONTEXT * ALL CHARACTERISTICS
7.1.1 – Consumer Access Point
The Consumer Access Point attribute contains the access point of the DSA to which this DSA can supply a copy of this naming context. You can set the Consumer Access Point attribute using the SET directive, add new values using the ADD directive, or remove values using the REMOVE directive. You can also display the current contents of the attribute using the SHOW directive. There is no default value. Syntax: ADD DSA NAMING CONTEXT <name> CONSUMER ACCESS POINT {<value>,...} SET DSA NAMING CONTEXT <name> CONSUMER ACCESS POINT {<value>,...} REMOVE DSA NAMING CONTEXT <name> CONSUMER ACCESS POINT {<value>,...} SHOW DSA NAMING CONTEXT <name> CONSUMER ACCESS POINT where <value> is the access point of the DSA and is specified as follows: [ae title = "<distinguished name of DSA>", presentation address = '<presentation address>'] The AE Title and Presentation Address attributes are both mandatory. Note that you must specify the AE Title and Presentation Address in the order shown above. Specify all valid NSAPs for a consumer DSA. This improves the network efficiency of this DSA, because it ensures that any existing connection to that DSA will be re-used. It also ensures the success of the documented method of implementing replication for the first time. Refer to DSA Common_Datatypes for more information on how to specify an AE Title and a Presentation Address.
7.1.2 – Master Access Point
The Master Access Point attribute contains the access point of the DSA which holds the master of this naming context. If the attribute has a value, then the naming context is a shadow naming context, that is, a naming context that has been replicated to this DSA. If the attribute has no value, then this DSA is the master DSA for the naming context. The Master Access Point attribute is read-only and single-valued. Syntax: SHOW DSA NAMING CONTEXT <name> MASTER ACCESS POINT where <name> is the identifier of a Naming Context entity.
7.1.3 – Supplier Access Point
The Supplier Access Point attribute contains the access point of the DSA which supplied a copy of this naming context to this DSA. If the attribute has a value, it indicates which DSA supplied the shadow naming context. The Supplier Access Point attribute is read-only and single-valued. Syntax: SHOW DSA NAMING CONTEXT <name> SUPPLIER ACCESS POINT where <name> is the identifier of a Naming Context entity.
7.2 – Directives
You can use the ADD, CREATE, DELETE, REMOVE, SET, and SHOW directives with the Naming Context entity. The CREATE and DELETE directives are used to create and delete a Naming Context entity. The SET and SHOW directives are used to set or display Naming Context attributes, respectively. The ADD and REMOVE directives are used to add or remove additional values to a Naming Context characteristic attribute.
7.2.1 – ADD
Use the ADD directive to add value(s) to a Naming Context characteristic attribute. You can use the ADD directive on the Consumer Access Point characteristic attribute only. The other attributes of this entity are read-only. Syntax: ADD DSA NAMING CONTEXT <name> CONSUMER ACCESS POINT {<value>,...} where <value> is the value you want to add to the attribute.
7.2.2 – CREATE
Use this directive to create a Naming Context entity of the specified name at the specified position in the DIT. Syntax: CREATE DSA NAMING CONTEXT <name> <argument> <value>
7.2.2.1 – Arguments
The CREATE directive has an identifier and one argument: - CONSUMER ACCESS POINT The identifier specifies the name of this Naming Context entity. This is in the form of a distinguished name. The CONSUMER ACCESS POINT argument is optional and identifies the DSA to which this DSA can supply a copy of this naming context. Specify this argument in the following format: CONSUMER ACCESS POINT <access point> where <access point> is the access point of the DSA and is specified as follows: {[ae title = "<distinguished name of DSA>", presentation address = '<presentation address>']} You can specify multiple access points as follows: {[ae title = "<distinguished name of DSA>", presentation address = '<presentation address>'] , [ae title = "<distinguished name of DSA>", presentation address = '<presentation address>']} The AE Title and Presentation Address attributes are both mandatory. Note that you must specify the AE Title and Presentation Address in the order shown above. Specify all valid NSAPs for a consumer DSA. This improves the network efficiency of this DSA, because it ensures that any existing connection to that DSA will be re-used. It also ensures the success of the documented method of implementing replication for the first time. Refer to DSA Common_Datatypes for more information on how to specify an AE Title and a Presentation Address.
7.2.2.2 – Errors
The CREATE directive can return the following errors: REASON: Already Exists DESCRIPTION: This Naming Context entity already exists. A Naming Context entity already exists at this position in the DIT. You cannot create a Naming Context entity where one already exists. REASON: Cannot open the database DESCRIPTION: The DSA cannot open the database as it is being used by another DSA. REASON: Invalid Name DESCRIPTION: The entity name is not a valid directory name. The name must be in the form of a distinguished name. The response shows the invalid name component. REASON: Has Subordinates DESCRIPTION: The DSA already holds entries or entities subordinate to the entity being created. You cannot create a Naming Context entity at this position in the DIT because the name you have specifed has subordinates. You must create entities in a hierarchical order (top down). REASON: Incomplete Naming Context DESCRIPTION: A superior Naming Context that is not correctly terminated by a Subordinate Reference prevents creation. The DSA failed to create the Naming Context entity because a superior master Naming Context entity has not been terminated. A Naming Context must be terminated by a Subordinate Reference entity if want to create a further Naming Context entity beneath it. The response shows the name of the incomplete naming context. REASON: Incomplete Shadow Naming Context DESCRIPTION: A superior shadow Naming Context that has not been correctly terminated by a Subordinate Reference prevents creation. The DSA failed to create the Naming Context entity because a superior shadow Naming Context entity has not been terminated. A Naming Context must be terminated by a Subordinate Reference entity if you want to create a further Naming Context entity beneath it. Because the superior entity is a shadow, you need to create a Subordinate Reference entity on the master DSA for the superior naming context, and then initiate replication so that this DSA has a copy of the new Subordinate Reference entity. The response shows the name of the incomplete naming context, and the name of the master DSA for that naming context. REASON: DIT Root DESCRIPTION: Cannot create a Naming Context at the root of the DIT. You cannot create a Naming Context entity directly on the root entry of the DIT (/). A Naming Context entity must have a distinguished name that contains at least one relative distinguished name. REASON: Entry Already Exists DESCRIPTION: The DSA already holds an entry of the same name. An entry already exists with the same name. You cannot create a Naming Context entity where a directory entry already exists. That entry must already be part of a naming context, so it would be inappropriate to create one at this point in the DIT. REASON: Alias Entry Already Exists DESCRIPTION: The DSA already holds an alias entry of the same name. An alias entry already exists with the same name. You cannot create a Naming Context entity where an alias entry already exists. That alias entry must already be part of a naming context. REASON: Alias Entry DESCRIPTION: Alias entry prevents creation. The identifier you specified for the Naming Context entity is an alias name, not a distinguished name. The DSA does not support the use of alias names when managing entities. Specify the distinguished name of the entry that is to be at the top of the new naming context. The response shows the name of the alias entry. REASON: Wrong State DESCRIPTION: The DSA entity is not in the correct state. The DSA must be in state ON, OFF, ENABLING, or DISABLING when you create a Naming Context entity. The response shows the current state of the DSA.
7.2.3 – DELETE
Use this directive to delete a Naming Context entity. Syntax: DELETE DSA NAMING CONTEXT <name>
7.2.3.1 – Errors
The DELETE directive can return one of the following errors: REASON: Has Subordinates DESCRIPTION: The DSA has entries or entities subordinate to the entity being deleted. You cannot remove a Naming Context entity if it contains directory entries or further entities, such as Subordinate Reference entities. You must delete everything beneath the Naming Context entity first. REASON: Not Empty DESCRIPTION: You cannot delete a Naming Context that contains entries. The Naming Context entity coexists with a directory entry. You cannot delete the entity until you have deleted the directory entry. REASON: Contains Alias DESCRIPTION: The alias entry with the same name must be deleted before the Naming Context can be deleted. The Naming Context entity coexists with an alias entry. You cannot delete the entity until you have deleted the alias entry using DXIM, or another directory application. REASON: Alias Entry DESCRIPTION: Alias entry prevents deletion. The identifier you specified for the Naming Context entity is an alias name, not a distinguished name. The DSA does not support the use of alias names when deleting entities. Specify the distinguished name of the entry that is at the top of the naming context. The response indicates the name of the alias entry. REASON: Wrong State DESCRIPTION: The DSA entity is not in the correct state. The DSA entity must be in state ON or OFF when you delete a Naming Context entity. If the DSA is in any other state, such as ENABLING or UPDATING, the command fails. The response indicates the current state of the DSA.
7.2.4 – Examples
> CREATE DSA NAMING CONTEXT "/C=US/O=Abacus/OU=Sales" - _> CONSUMER ACCESS POINT - _> {[AE Title = "/C=US/O=Abacus/CN=DSA4", - _> Presentation Address = - _> '"DSA"/"DSA"/"DSA"/NS+11002aaa00040008aa21']} > SHOW DSA NAMING CONTEXT "/C=US/O=Abacus/OU=Sales" - _> ALL ATTRIBUTES The first command creates a Naming Context entity and the second command displays the Naming Context entity. > DELETE DSA NAMING CONTEXT - _> "/C=US/O=Abacus/OU=Sales" This command deletes the Naming Context entity.
7.2.5 – REMOVE
Use the REMOVE directive to remove a value from a characteristic attribute. You can use the REMOVE directive on the Consumer Access Point characteristic attribute only. The other characteristic attributes of this entity are read-only. Syntax: REMOVE DSA NAMING CONTEXT <name> CONSUMER ACCESS POINT {<value>,...} where <value> is the value you want to remove from the attribute.
7.2.6 – SET
Use the SET directive to change the value of a Naming Context characteristic attribute. You can use the SET directive on the Consumer Access Point characteristic attribute only. The remaining attributes are read-only characteristic attributes. Syntax: SET DSA NAMING CONTEXT <name> CONSUMER ACCESS POINT {<value>,...} where <value> is the value you want to set for the Consumer Access Point attribute. Specify all valid NSAPs for a consumer DSA. This improves the efficiency of the DSA, and ensures the success of the documented method of implementing replication.
7.2.7 – SHOW
Use the SHOW directive to display the characteristic attributes of a Naming Context entity. You can use the SHOW directive on all Characteristic attributes of the Naming Context entity. Syntax: SHOW DSA NAMING CONTEXT <name> <attr> where <attr> is the name of the Characteristic attribute you want to display. You can display the values of multiple attributes using one SHOW directive by separating the attributes with a comma, for example: SHOW DSA NAMING CONTEXT <name> <attribute1>, <attribute2> You can also use the wildcard "*" in a SHOW directive, to show details of all naming contexts; for example: SHOW DSA NAMING CONTEXT * <attr>
7.3 – Identifier
Each Naming Context entity is uniquely identified by the distinguished of the highest entry within the naming context, for example, "/C=US/O=Abacus/OU=Sales/CN=accounts". Refer to DSA Common_Datatypes for more information on how to specify a distinguished name. Refer to the CREATE directive for more information on how to create a Naming Context entity.
8 – Status
Status attributes provide you with information about a specified DSA. Status attributes are read only. All status attributes can be displayed using the SHOW directive. Syntax: SHOW DSA <attr> You can display the value of multiple status attributes as part of one SHOW directive by separating the attributes with a comma. For example: SHOW DSA <attribute1>, <attribute2> Similarly, you can display all status attributes using the ALL STATUS qualifier. For example: SHOW DSA ALL STATUS
8.1 – Accounting State
The Accounting State status attribute is no longer used by the DSA. Refer to the help for the Accounting Facility characteristic attribute.
8.2 – Attribute Count
The Attribute Count status attribute specifies the total number of attributes in all of the entries in the DSA's database. This attribute is set by the DSA. Syntax: SHOW DSA ATTRIBUTE COUNT By dividing the number of attributes by the Entry Count, you can estimate the number of attributes per entry.
8.3 – DIT Memory Occupancy
The DIT Memory Occupancy attribute specifies approximately the number of bytes of memory currently needed to hold the DSA database. This attribute is set by the DSA. Syntax: SHOW DSA DIT MEMORY OCCUPANCY By dividing the DIT memory occupancy by the Entry Count, you can estimate the amount of memory required by a typical entry. This may enable you to estimate how many more entries the DSA could hold before memory resources are exhausted. It may also indicate how much memory would be required by a DSA that takes a shadow copy of this DSA's information. Memory occupancy may vary for different operating systems.
8.4 – Entry Count
The Entry Count status attribute specifies the number of entries in this DSA's database. This attribute is set and maintained by the DSA. The number is the total number of entries and shadow entries held by the DSA. Syntax: SHOW DSA ENTRY COUNT
8.5 – Entry Limit
The Entry Limit status attribute specifies the number of entries that the DSA's license allows you to create. If the DSA exceeds its entry limit, the Resource Exhausted event is generated stating Insufficient License Capacity. As long as the entry limit is exceeded, you will be unable to create new entries in the DSA. However, if the DSA is a consumer DSA, its ability to receive entries from its supplier DSAs is unaffected. Refer to HP Enterprise Directory - Problem Solving for details of the entry limit.
8.6 – Examples
> SHOW DSA ALL STATUS This command displays the value of all status attributes. > SHOW DSA DIT MEMORY OCCUPANCY This command displays the amount of memory in bytes, currently used to store the DSA database.
8.7 – State
The State status attribute indicates the current state of a DSA entity. A DSA may be in one of the following states at any one time: - CREATING The DSA has received a CREATE directive, and is in the process of creating. - OFF The DSA has either been disabled or just created. It is unavailable for communication with applications or other DSAs. It is available for most management directives. - ENABLING An ENABLE directive has been issued and the DSA is making itself available for communication. It is the transition between the OFF and ON states. - ON The DSA has been enabled and is ready for use. The DSA can now communicate with applications and other DSAs. - DISABLING A DISABLE directive has been issued and the DSA is disabling itself from service. It is the transition between the ON and OFF states. - UPDATING The DSA is in the processing of replicating information with another DSA. The DSA is either supplying or consuming naming contexts. Syntax: SHOW DSA STATE
8.8 – UID
The UID status attribute contains the unique identifier of a DSA entity. The UID is created and assigned when the DSA entity is created (See the CREATE directive). Use of this attribute is deprecated, and the attribute will be removed in a future version. Syntax: SHOW DSA UID
8.9 – Unique Value Count
The Unique Value Count status attribute specifies the number of unique attribute values present in the DSA's database. This attribute is set by the DSA. A DSA stores a given attribute value only once, to save space and improve the performance of user requests. Syntax: SHOW DSA UNIQUE VALUE COUNT
9 – Subordinate Reference
A Subordinate Reference entity provides a reference to a Naming Context entity that is beneath a Naming Context entity held by this DSA. The subordinate Naming Context entity might also be held by this DSA; it is not necessarily on a remote DSA. A subordinate reference enables a DSA to redirect requests for information that it does not hold. It also marks the point at which one naming context ends, and another begins.
9.1 – Characteristics
Each Subordinate Reference entity has two characteristic attributes: - Access Point - Copy Access Point You can use the ADD, SET, SHOW and REMOVE directives on both these attributes. Syntax: ADD DSA SUBORDINATE REFERENCE <name> <attr> {<value>,...} REMOVE DSA SUBORDINATE REFERENCE <name> <attr> {<value>,...} SET DSA SUBORDINATE REFERENCE <name> <attr> {<value>,...} SHOW DSA SUBORDINATE REFERENCE <name> <attr> where <attr> is the characteristic attribute name and <value> is the value. The Access Point attribute is single-valued. You can display the value of both attributes in one SHOW directive by separating the attributes with a comma. For example: SHOW DSA SUBORDINATE REFERENCE <name> <attribute1>, <attribute2> Similarly, you can achieve the same result by using the ALL CHARACTERISTICS qualifier with the SHOW directive. For example: SHOW DSA SUBORDINATE REFERENCE <name> ALL CHARACTERISTICS
9.1.1 – Access Point
This specifies the Access Point of the DSA which holds the master copy of a directory entry subordinate to the current entry. There is no default value. Syntax: ADD DSA SUBORDINATE REFERENCE <name> ACCESS POINT {<value>,...} REMOVE DSA SUBORDINATE REFERENCE <name> ACCESS POINT {<value>,...} SET DSA SUBORDINATE REFERENCE <name> ACCESS POINT {<value>,...} SHOW DSA SUBORDINATE REFERENCE <name> ACCESS POINT where <value> is the access point of the DSA and is specified as follows: {[ae title = "<distinguished name of DSA>", presentation address = '<presentation address>']} The AE Title and Presentation Address attributes are both mandatory. Note that you must specify the AE Title and Presentation Address in the order shown above. Specify all valid NSAPs for a DSA in an access point. This improves the network efficiency of the DSA, ensuring that if a connection to the relevant DSA already exists, it is always re-used. Refer to DSA Common_Datatypes for more information on how to specify an AE Title and a Presentation Address.
9.1.2 – Copy Access Point
This specifies the DSA which holds a copy of a directory entry subordinate to the current entry. There is no default value. Syntax: ADD DSA SUBORDINATE REFERENCE <name> COPY ACCESS POINT {<value>,...} REMOVE DSA SUBORDINATE REFERENCE <name> COPY ACCESS POINT {<value>,...} SET DSA SUBORDINATE REFERENCE <name> COPY ACCESS POINT {<value>,...} SHOW DSA SUBORDINATE REFERENCE <name> COPY ACCESS POINT where <value> is the access point of a DSA to which the Subordinate Reference refers, and is specified as follows: [ae title = "<distinguished name of DSA>", presentation address = '<presentation address>'] The AE Title and the presentation address are both mandatory. Note that the order of the AE Title and presentation address must be the same as that shown above. Specify all valid NSAPs for a DSA in an access point. This improves the network efficiency of the DSA, ensuring that if a connection to the relevant DSA already exists, it is always re-used. Refer to DSA Common_Datatypes for more information on how to specify an AE Title and a Presentation Address.
9.2 – Directives
You can use the ADD, CREATE, DELETE, REMOVE, SET and SHOW directives with the Subordinate Reference entity. The CREATE and DELETE directives are used to create and delete a Subordinate Reference entity. The SET and SHOW directives are used to set or show Subordinate Reference characteristic attributes, respectively. The ADD and REMOVE directives are used to add or remove values to or from a characteristic attribute.
9.2.1 – ADD
Use the ADD directive to add value(s) to a characteristic attribute of the Subordinate Reference entity. You can use the ADD directive on all characteristic attributes of the Subordinate Reference entity. Syntax: ADD DSA SUBORDINATE REFERENCE <attr> {<value>,...} where <attr> is the name of the Characteristic attribute and <value> is the value you want to add to the attribute.
9.2.2 – CREATE
Use this directive to create a Subordinate Reference entity of the specified name. Syntax: CREATE DSA SUBORDINATE REFERENCE <name> <argument> <value>
9.2.2.1 – Arguments
The CREATE directive has an identifier and two arguments: - ACCESS POINT - COPY ACCESS POINT The identifier specifies the name of this Subordinate Reference entity. This is in the form of a distinguished name. The ACCESS POINT argument identifies the DSA holding the master copy of the naming context for which this entity provides a reference. The attribute is single-valued. Specify the ACCESS POINT argument in the following format: ACCESS POINT <access point> where <access point> is the access point of the DSA and is specified as follows: {[ae title = "<distinguished name of DSA>", presentation address = '<presentation address>']} The AE Title and Presentation Address attributes are both mandatory. Note that you must specify the AE Title and Presentation Address in the order shown above. Specify all valid NSAPs for a DSA in an access point. This improves the network efficiency of the DSA, ensuring that if a connection to the relevant DSA already exists, it is always re-used. Refer to DSA Common_Datatypes for more information on how to specify an AE Title and a Presentation Address. The COPY ACCESS POINT is optional and specifies one or more DSAs that hold a copy of the naming context to which this entity provides a reference. Specify the COPY ACCESS POINT argument in the following format: COPY ACCESS POINT <access point> where <access point> is the access point of the DSA and is specified as shown in the preceding description of the ACCESS POINT argument.
9.2.2.2 – Errors
The CREATE directive returns one of the following errors: REASON: Already Exists DESCRIPTION: This Subordinate Reference entity already exists. REASON: Invalid Name DESCRIPTION: The entity name is not a valid directory name. The name of the entity must be in the form of a distinguished name. The response shows the invalid name. REASON: Not Master DESCRIPTION: Cannot create a Subordinate Reference in a shadow Naming Context. You cannot create a Subordinate Reference entity within a shadow Naming Context. You must create a Subordinate Reference entity on the DSA that is listed as being the master DSA for the naming context that should contain this reference, and then replicate the new reference to all shadow DSAs for that naming context. The response identifies the master DSA for the naming context. REASON: Entry Already Exists DESCRIPTION: The DSA already holds an entry with the specified name. If an entry already exists with the name that you specify, then it would be inappropriate to create a Subordinate Reference entity of the same name. The Subordinate Reference entity marks the termination of a naming context, but the existence of an entry already in that place indicates that some naming context extends beyond the proposed termination point. REASON: Alias Entry Already Exists DESCRIPTION: The DSA already holds an alias entry with the specified name. An alias entry already exists with the same name. An alias entry cannot have subordinate entries, so it is inappropriate to create a reference downwards from this position in the DIT. REASON: Naming Context Already Exists DESCRIPTION: The DSA already holds a Naming Context entity with the specified name. A Naming Context entity already exists at this position in the DIT. A Subordinate Reference entity cannot be created if a Naming Context entity already exists at that location. If a Subordinate Reference entity is really required at this position, to terminate some higher naming context, then it must be created before the creation of the Naming Context entity with which it might then coexist. To reduce the chances of invalid configurations, the DSA requires you to create entities in a logical order, marking the termination of one context before allowing the creation of another. REASON: Has Subordinates DESCRIPTION: The DSA already holds entries or entities subordinate to the entity being created. Subordinate entries exist below the proposed location of the Subordinate Reference entity. To create a Subordinate Reference entity in the proposed position would leave these entries beyond the termination point of whichever naming context they are part of. REASON: Below Subordinate Reference DESCRIPTION: The directly superior entity is another Subordinate Reference. There is already a Subordinate Reference entity higher up the DIT. You cannot create consecutive Subordinate Reference entities. REASON: DIT Root DESCRIPTION: Cannot create a Subordinate Reference at the root of the DIT. You cannot create a Subordinate Reference entity directly on the root entry of a DIT (/). A Subordinate Reference entity must have a distinguished name that contains at least one relative distinguished name. REASON: Alias entry DESCRIPTION: Alias entry prevents creation. The identifier you specified for the Subordinate Reference entity is an alias name, not a distinguished name. The DSA does not support the use of alias names when creating entities. Specify the distinguished name of the entry at the top of the naming context to which this entity provides a reference. The response shows the name of the alias entry. REASON: Wrong State DESCRIPTION: The DSA entity is not in the correct state. The DSA must be in state ON, ENABLING, DISABLING or OFF when you create a Subordinate Reference entity. The response shows the current state of the DSA.
9.2.3 – DELETE
Use this directive to delete a Subordinate Reference entity. Syntax: DELETE DSA SUBORDINATE REFERENCE <name>
9.2.3.1 – Errors
The Delete directive returns one of the following errors: REASON: Also a Naming Context DESCRIPTION: The Naming Context entity of the same name must be deleted first. You cannot delete the Subordinate Reference entity because it coexists with a Naming Context entity. To delete the Subordinate Reference entity first would leave the DIT improperly structured. REASON: Also a Shadow Naming Context DESCRIPTION: The shadow Naming Context with the same name must be removed first. You cannot delete the Subordinate Reference entity because it coexists with a shadow Naming Context entity. You need to reconfigure the supplier DSA for the shadow naming context so that this DSA is no longer a consumer DSA for it. Then initiate replication so that this DSA removes its copy of the naming context. You can then remove the Subordinate Reference entity. The response identifies the name of the shadow naming context and its master DSA. REASON: Not Master DESCRIPTION: Cannot delete a shadow Subordinate Reference. The Subordinate Reference entity is a shadow copy that has been created by replication. The DSA does not own the entity and cannot therefore delete it. You need to reconfigure the supplier DSA so that this DSA is no longer a consumer DSA for the specified naming context. Then initiate replication so that this DSA removes its copy of the Naming Context, including the Subordinate Reference entity. The response identifies the name of the shadow naming context and its master DSA. REASON: Has Subordinates DESCRIPTION: The DSA holds entries or entities subordinate to the entity being deleted. The Subordinate Reference entity has subordinates and therefore cannot be deleted. You need to delete all subordinate entries and entities first. REASON: Alias Entry DESCRIPTION: Alias entry prevents deletion. The identifier you specified for the Subordinate Reference entity is an alias name, not a distinguished name. The DSA does not support the use of alias names when deleting entities. The response shows the name of the alias entry. REASON: Wrong State DESCRIPTION: The DSA entity is not in the correct state. The DSA entity must be in state ON, ENABLING, DISABLING or OFF when you delete a Subordinate Reference entity.
9.2.4 – Examples
> CREATE DSA SUBORDINATE REFERENCE "/C=US/O=Abacus/OU=Sales" - _> ACCESS POINT {[AE Title="/C=US/O=Abacus/CN=DSA4", - _> Pres Addr='"DSA"/"DSA"/"DSA"/NS+49002aaa000400083221']} - _> COPY ACCESS POINT {[AE Title="/C=US/O=Abacus/CN=DSA6", - _> Pres Addr='"DSA"/"DSA"/"DSA"/NS+49002aaa000400081222']} > SHOW DSA SUBORDINATE REFERENCE "/C=US/O=Abacus/OU=Sales" - _> ALL ATTRIBUTES The first command creates a Subordinate Reference entity and defines the access points of the master DSA and a shadow DSA of the subordinate naming context to which this entity provides a reference. The second command displays the Subordinate Reference entity. > DELETE DSA SUBORDINATE REFERENCE "/C=US/O=Abacus/OU=Sales" This command deletes the Subordinate Reference entity with the identifier "/C=US/O=Abacus/OU=Sales".
9.2.5 – REMOVE
Use the REMOVE directive to remove value(s) from a characteristic attribute. You can use the REMOVE directive on all Subordinate Reference characteristic attributes. Syntax: REMOVE DSA SUBORDINATE REFERENCE <name> <attr> {<value>,...} where <name> is the identifier of a Subordinate Reference entity, <attr> is the name of the characteristic attribute and <value> is the value you want to remove from the attribute.
9.2.6 – SET
Use the SET directive to change the value of a Subordinate Reference characteristic attribute. You can use the SET directive on all characteristic attributes of the Subordinate Reference entity. Syntax: SET DSA SUBORDINATE REFERENCE <name> <attr> {<value>,...} where <name> is the name of the Subordinate Reference entity, <attr> is the name of the Characteristic attribute and <value> is the value you want to set for the attribute.
9.2.7 – SHOW
Use the SHOW directive to display the characteristic attributes of a Subordinate Reference entity. You can use the SHOW directive on all Characteristic attributes of the Subordinate Reference entity. Syntax: SHOW DSA SUBORDINATE REFERENCE <name> <attr> where <attr> is the name of the Characteristic attribute you want to display. You can display the values of multiple attributes using one SHOW directive by separating the attributes with a comma, for example: SHOW DSA SUBORDINATE REFERENCE <name> <attr1>, <attr2> You can also use the wildcard "*" in a SHOW directive, to show details of all subordinate references; for example: SHOW DSA SUBORDINATE REFERENCE * <attr>
9.3 – Identifier
The identifier of a Subordinate Reference entity is the distinguished name of the entry to which the entity provides a reference, for example, "/C=US/O=Abacus/OU=Accounts". The identifier of a Subordinate Reference entity is the same as the identifier of a Naming Context entity held by some other DSA. Thus the entity provides a reference to the remote naming context. It is possible for the Subordinate Reference entity to be on the same DSA as the Naming Context entity to which it provides a reference. Refer to DSA Common_Datatypes for more information on how to specify a distinguished name. Refer to the CREATE directive for more information on how to create a Subordinate Reference entity.
10 – Superior Reference
A Superior Reference entity provides a reference to a DSA that holds a naming context that is higher in the DIT than all of the naming contexts held locally. The DSA that holds superior information should have further knowledge information that enables the user request to be redirected to the relevant DSA. Such a DSA might have knowledge about parts of the DIT that this DSA does not know about.
10.1 – Characteristics
A Superior Reference entity has one characteristic attribute: Access Point. You can use the ADD, SET, SHOW and REMOVE directives on this attribute. Syntax: ADD DSA SUPERIOR REFERENCE ACCESS POINT {<value>} REMOVE DSA SUPERIOR REFERENCE ACCESS POINT {<value>} SET DSA SUPERIOR REFERENCE ACCESS POINT {<value>} SHOW DSA SUPERIOR REFERENCE ACCESS POINT where <value> is the value. The Access Point attribute is single-valued.
10.1.1 – Access Point
This specifies the Access Point of the DSA which holds a naming context which is superior to all of the naming contexts held within this DSA. There is no default value. The attribute is single-valued. Syntax: ADD DSA SUPERIOR REFERENCE ACCESS POINT {<value>} REMOVE DSA SUPERIOR REFERENCE ACCESS POINT {<value>} SET DSA SUPERIOR REFERENCE ACCESS POINT {<value>} SHOW DSA SUPERIOR REFERENCE ACCESS POINT where <value> is the access point of a DSA that holds a master copy of a naming context that is higher than all naming contexts on this DSA, and is specified as follows: [ae title = "<distinguished name of DSA>", presentation address = '<presentation address>'] The AE Title and Presentation Address attributes are both mandatory. Note that you must specify the AE Title and Presentation Address in the order shown above. Specify all valid NSAPs for the DSA in the access point. This improves the network efficiency of the DSA, ensuring that if a connection to the relevant DSA already exists, it is always re-used. Refer to DSA Common_Datatypes for more information on how to specify an AE Title and a Presentation Address.
10.2 – Directives
You can use the CREATE, DELETE, SET and SHOW directives with the Superior Reference entity. The CREATE and DELETE directives are used to create and delete a Superior Reference entity. The SET and SHOW directives are used to set or display the Superior Reference characteristic attribute, respectively. Note that the only characteristic attribute of the Superior Reference entity is single valued. The ADD and REMOVE directives can therefore only be used to remove the single value, or to add a value if there is no existing value.
10.2.1 – ADD
Use the ADD directive to add value to the Access Point attribute if it does not already have one. Syntax: ADD DSA SUPERIOR REFERENCE <attr> {<value>} where <attr> is the name of the Characteristic attribute and <value> is the value you want to add to the attribute. Note that the Access Point attribute is single-valued, so you can only use the ADD directive if the Access Point currently has no value.
10.2.2 – CREATE
Use this directive to create a Superior Reference entity. Syntax: CREATE DSA SUPERIOR REFERENCE <argument> <value>
10.2.2.1 – Arguments
The CREATE directive has one argument: ACCESS POINT. This argument is optional, although a Superior Reference entity without an Access Point attribute serves no purpose. You can specify the Access Point attribute using the SET directive instead. The ACCESS POINT argument identifies a DSA holding a naming context which is superior to all the naming contexts contained within this DSA. Specify the ACCESS POINT argument in the following format: ACCESS POINT <access point> where <access point> is the access point of the DSA and is specified as follows: {[ae title = "<distinguished name of DSA>", presentation address = '<presentation address>']} The AE Title and Presentation Address attributes are both mandatory. Note that you must specify the AE Title and Presentation Address in the order shown above. Specify all valid NSAPs for the DSA in the access point. This improves the network efficiency of the DSA, ensuring that if a connection to the relevant DSA already exists, it is always re-used. Refer to DSA Common_Datatypes for more information on how to specify an AE Title and a Presentation Address.
10.2.2.2 – Errors
The CREATE directive returns one of the following errors: REASON: Already Exists DESCRIPTION: The Superior Reference entity already exists. REASON: Wrong State DESCRIPTION: The DSA entity is not in the correct state. The DSA entity must be in state ON, ENABLING, DISABLING or OFF when you create a Superior Reference entity. Any other state causes a failure. The response indicates the current state of the DSA.
10.2.3 – DELETE
Use this directive to delete the Superior Reference entity. Syntax: DELETE DSA SUPERIOR REFERENCE
10.2.3.1 – Errors
The Delete directive returns one error only: REASON: Wrong State DESCRIPTION: The DSA entity is not in the correct state. The DSA entity must be in state ON, ENABLING, DISABLING or OFF when you delete a Superior Reference entity. Any other state causes a failure. The response indicates the current state of the DSA.
10.2.4 – Examples
> CREATE DSA SUPERIOR REFERENCE - _> ACCESS POINT {[AE Title="/C=US/O=Abacus/CN=DSA5", - _> Pres Addr='"DSA"/"DSA"/"DSA"/NS+49002aaa000400888888']} > SHOW DSA SUPERIOR REFERENCE ALL ATTRIBUTES The first command creates a Superior Reference entity and defines the access point of the DSA which holds a naming context superior to all naming contexts contained within this DSA. Note that the command specifies no identifier for the Superior Reference entity. The second command displays the Superior Reference entity. > DELETE DSA SUPERIOR REFERENCE This command deletes the Superior Reference entity.
10.2.5 – REMOVE
Use the REMOVE directive to remove a value from the Access Point attribute. Syntax: REMOVE DSA SUPERIOR REFERENCE <attr> {<value>} where <attr> is the name of the Characteristic attribute and <value> is the value of the attribute. Note that the Access Point attribute is single-valued, so there is only ever one value for you to remove.
10.2.6 – SET
Use the SET directive to change the value of the Superior Reference characteristic attribute. Syntax: SET DSA SUPERIOR REFERENCE ACCESS POINT {<value>} where <value> is the value you want to set for the attribute.
10.2.7 – SHOW
Use the SHOW directive to display the characteristic attribute of a Superior Reference entity. Syntax: SHOW DSA SUPERIOR REFERENCE ACCESS POINT