Home
Sun Microsystems 8190994 Server User Manual
Contents
1. Directory Proxy Server 5 Attribute Directory Proxy Server 6 0 Property ids proxy sch OnBindSuccessRule bind dn filters Chapter6 Migrating Directory Proxy Server 103 Sun Confidential Registered Mapping the Actions Configuration TABLE6 18 Mapping Between Version 5 Event Attributes and Version 6 Connection Handler Properties Continued Directory Proxy Server 5 Attribute Directory Proxy Server 6 0 Property ids proxy con ssl required is ssl mandatory ids proxy con bind anonymous allowed auth methods anonymous ids proxy con bind simple allowed auth methods simple ids proxy con bind sasl allowed auth methods sasl Mapping the Actions Configuration Directory Proxy Server 5 supports only one action specified by the ids proxy sch ChangeGroupAction object class This action enables you to configure Directory Proxy Server to change a client from one access group to another based on the evaluation of a rule The action uses the multi valued ids proxy con to group attribute to specify the groups to which the client can change Directory Proxy Server 6 0 connection handlers provide this functionality After being classified into a connection handler a connection can be automatically reclassified into another connection handler For example if a client connects anonymously the connection is allocated to the connection handler configured for anonymous connections Ifthe client later provides a bind DN on t
2. 101 Version 5 and Version 6 Log Functionality ss 102 Mapping Between Version 5 Event Attributes and Version 6 Connection Handler Properties it sis NRA Mn tend Component Distribution in a Multi Master Replication Deployment Multi Host Deployment vnc sant da Sun Java System Directory Server Enterprise Edition 6 0 Migration Guide March 2007 Sun Confidential Registered Examples EXAMPLE 7 1 Sample Export Configuration File Sun Confidential Registered 14 Sun Confidential Registered Preface This Migration Guide describes how to migrate the components of Directory Server Enterprise Edition to version 6 0 The guide provides migration instructions for Directory Server Directory Proxy Server and Identity Synchronization for Windows Who Should Use This Book This guide is intended for directory service administrators who are migrating to Directory Server Enterprise Edition 6 0 The guide might also be useful to business planners who are considering migrating to the new version Before You Read This Book If you are not yet familiar with this version of Directory Server Enterprise Edition you might want to start by evaluating the new features and capabilities of the product For more information see the Sun Java System Directory Server Enterprise Edition 6 0 Evaluation Guide and the Sun Java System Directory Server Enterprise Edition 6 0 Release Notes How This Book Is Organized Chapter 1 describes the
3. Directory Server 5 2 Plug In Directory Directory Server 6 0 Plug In Directory Remarks ServerRoot plugins slapd slapi exampl snstall path ds6 examples Sample plug ins ServerRoot plugins slapd slapi incl ude install path ds6 include Plug in header files SNMP support is no longer handled within Directory Server SNMP monitoring is now handled by the Java Enterprise System Management Framework Java ES MF All plug ins and binaries related to SNMP have therefore been deprecated within Directory Server These plug ins include the following ServerRoot plugins snmp magt magt ServerRoot plugins snmp mibs ServerRoot plugins snmp sagt sagt For information about enabling monitoring Java ES MF monitoring see Enabling Java ES MF Monitoring in Sun Java System Directory Server Enterprise Edition 6 0 Administration Guide Utilities Previously Under ServerRoot shared bin The following tables describes the new location of the administrative tools previously under ServerRoot shared bin Note that as a result of the change to the administrative framework some of these tools have been deprecated TABLE5 5 Tools Previously Under ServerRoot shared bin 5 2 File 6 0 File Purpose ServerRoot shared bin admin_ip pl Deprecated Change IP address ServerRoot shared bin entrycmp install path ds6 bin entrycmp Compare entries for replication ServerRoot shared bin fildif install path ds6 bin fildif Dump filtered LDIF Serve
4. Directory Proxy Server Logging in Sun Java System Directory Server Enterprise Edition 6 0 Administration Guide Mapping the Events Configuration Directory Proxy Server 5 event objects are used to specify conditions that Directory Proxy Server should evaluate at predetermined states Two types of event objects are supported m OnBindSuccess Evaluated when a client successfully completes a bind operation OnSSLEstablished Evaluated when a client successfully established an SSL session In Directory Proxy Server 6 0 events are implemented as properties of a connection handler Use the dpconf command to set these properties For example run the following command to set the authentication methods for the connection handler dpconf set connection handler prop connection handler name allowed auth methods anonymous allowed auth methods sasl allowed auth methods simple In Iplanet Directory Access Router 5 0 IDAR these configuration attributes are stored under ids proxy con Config Name name ou global ou pd2 ou iDAR o services In Directory Proxy Server 5 2 these configuration attributes are stored under ids proxy con Config Name user defined name ou system ou dar config o netscaperoot The following table maps the version 5 event configuration attributes to the corresponding properties in Directory Proxy Server 6 0 TABLE6 18 Mapping Between Version 5 Event Attributes and Version 6 Connection Handler Properties
5. Issues With the New Password Policy If you are migrating a multi master replicated topology a situation will arise where a 6 0 master is replicating to a version 5 server In this situation an object class violation will occur if changes are made to the new password policy attributes on the 6 0 server and replicated to the version 5 server The password policy attributes are managed internally by the server but they might be updated in the event of a bind a user password modify or the addition of an entry with the userpassword attribute To avoid the object class violation the 6 0 password policy schema file 00ds6pwp ldif must be copied to every version 5 server that will be supplied by a 6 0 master When the password policy schema file has been copied restart the version 5 server Migration of Replication Agreements If possible you should migrate replicated servers to the same host name and port number If you must change the host name or port number ofa replicated server all replication agreements that point to that server must be updated manually to point to the new server For example if you migrate a consumer server from red example com 1389 to blue example com 1389 the replication agreements on all masters that point to red example com 1389 must be updated manually to point to blue example com 1389 Replication agreements from the migrated master to consumers in the topology are managed by the dsmig migration tool
6. Sun Java System Directory Server Enterprise Edition 6 0 Migration Guide March 2007 Sun Confidential Registered Tasks to be Performed After Automatic Migration Using dsmig to Migrate User Data In Directory Server 5 2 data is stored in serverRoot slapd instance name db Directory Server 6 0 stores user data in instance path db To migrate data automatically run the following command dsmig migrate data old instance path new instance path All suffixes are migrated by default except the o netscapeRoot suffix dsmig copies the data the indexes and the transaction logs The database context that is the state of the database is not migrated In the new Directory Server administration model there is no Configuration Directory Server This means that the o netscapeRoot suffix is no longer relevant unless your deployment includes Identity Synchronization for Windows By default dsmig does not migrate the o netscapeRoot database unless specifically requested To migrate the o netscapeRoot database use the N option with the migrate data subcommand For more information see dsmig 1M Note During data migration Directory Server checks whether nested group definitions exceed 30 levels Deep nesting can signify a circular group definition where a nested group contains a group that is also its parent When a group with more than 30 nesting levels is encountered Directory Server stops calculating the isMemberOf attributes
7. dsmig migrates configuration data for certain Directory Server plug ins only For most system plug ins configuration data is not migrated automatically dsmig migrates all configuration data for the CoS plug in In addition dsmig migrates the enabled or disabled state for the following system plug ins m 7 bit Check DSML Frontend Pass Through Authentication Referential Integrity Retro Change Log UID Uniqueness When you migrate the configuration in verbose mode dsmig issues a warning indicating which system plug in configurations are not migrated Plug ins that you have created are not migrated However during the migration process user plug in configuration data is dumped in the file new instance path migration old_userplugins_conf tdif These plug ins must be recompiled when the migration is complete Chained Suffix Configuration Data Configuration data for chained suffixes is not migrated By default the configuration data is dumped in the file new instance path migration old_chaining_conf 1dif You can import the chaining configuration data from this file after migration if required Sun Java System Directory Server Enterprise Edition 6 0 Migration Guide March 2007 Sun Confidential Registered Using dsmig to Migrate Configuration Data Configuration Data For Suffixes With Multiple Backends Configuration data for suffixes with multiple backends is not migrated If dsmig detects that a suffix has mor
8. Architectural Changes in Directory Server 6 0 This chapter describes the architectural changes in Directory Server 6 0 that affect migration from a previous version For information on all changes and bug fixes in Directory Server 6 0 see What s New at a Glance in Sun Java System Directory Server Enterprise Edition 6 0 Evaluation Guide This chapter covers the following topics Changes in the Administration Framework on page 69 Changes to ACIs on page 70 Command Line Changes on page 71 Changes to the Console on page 74 New Password Policy on page 74 Changes to Plug Ins on page 77 Changes to the Installed Product Layout on page 78 Changes in the Administration Framework Directory Server 6 0 does not include an administration server as in previous versions Servers are now registered in the Directory Service Control Center DSCC and can be administered remotely by using the web based GUI or the command line tools To migrate to the new administration framework you need to do the following Upgrade each server individually Register each server in the DSCC Removal of the ServerRoot Directory In the new administration model a Directory Server instance is no longer tied to a ServerRoot Each Directory Server instance is a standalone directory that can be manipulated in the same manner as an ordinary standalone directory 69 Sun Confidential Registered Changes to AC
9. restart admin start admin startconsole stop admin uninstall Binaries Previously Under ServerRoot bin The following utilities under ServerRoot bin have been deprecated ServerRoot bin admin admconfig ServerRoot bin https bin ns httpd ServerRoot bin https bin uxwdog ServerRoot bin slapd server ns ldapagt On Solaris Sparc the ns slapd daemon is located in install path ds6 bin lib sparcvSolaris Version On platforms other than Solaris Sparc the ns slapd daemon is located in install path ds6 bin 1ib Libraries and Plug Ins Previously Under ServerRoot lib Product libraries and plug ins in Directory Server 5 2 were located under ServerRoot lib In Directory Server 6 0 on Solaris Sparc these libraries and plug ins are located in install path ds6 1ib sparcvSolaris Version On platforms other than Solaris Sparc they are located directly under install path ds6 1ib Online Help Previously Under ServerRoot manual Console online help files were previously located under ServerRoot manual The console online help files for Directory Server 6 0 are located under opt SUNWdsee ds6 dccapp html Chapter 5 Architectural Changes in Directory Server 6 0 79 Sun Confidential Registered Changes to the Installed Product Layout Plug Ins Previously Under ServerRoot plugins The following tables describes the new location of sample server plug ins and header files for plug in development TABLE5 4 Support for Plug Ins
10. If your topology does not support automated migration these replication agreements must also be updated manually Migration of Referrals Referrals are also affected if you migrate a master replica to a new host or port The details of each master in a topology are present in the Replica Update Vector RUV ofall other servers in the topology The RUV of each server is used to determine the referrals When you change the host name or port number of a master server during migration all referrals to that master from other servers in the topology become invalid The easiest way to correct this is to use the following steps in order when performing the migration 1 Before migrating a master server verify that there are no pending changes to be replicated You can use the insync tool to do this Sun Java System Directory Server Enterprise Edition 6 0 Migration Guide March 2007 Sun Confidential Registered New Replication Recommendations 2 Demote the master server to a hub as described in Promoting or Demoting Replicas in Sun Java System Directory Server Enterprise Edition 6 0 Administration Guide Migrate the hub server either using dsmig or the manual migration progress 4 Promote the hub server to a master as described in Promoting or Demoting Replicas in Sun Java System Directory Server Enterprise Edition 6 0 Administration Guide When you promote the hub you must assign a replicalD to the new migrated master T
11. lt compid gt CoreComponents lt compid gt lt compid gt Connector lt compid gt lt compid gt DSConnector lt compid gt lt compid gt Directory Server Plugin lt compid gt lt compid gt DSSubcomponents lt compid gt lt compid gt ObjectCache lt compid gt lt compid gt ObjectCacheDLLs lt compid gt lt compid gt ADConnector lt compid gt Sun Java System Directory Server Enterprise Edition 6 0 Migration Guide March 2007 Sun Confidential Registered Other Migration Scenarios The following is a example lt compid gt tag Remove lt compid gt lt compid gt and all the text and tags in between lt compid gt Identity Synchronization for Windows lt compversion gt 1 1 lt uniquename gt Identity Synchronization for Windows lt uniquename gt lt compinstance gt 1 lt children gt lt compref gt ADConnector lt instance gt 1 lt version gt 1 1 lt version gt lt instance gt lt compref gt lt compref gt DSSubcomponents lt compinstance gt lt compversion gt lt compid gt 8 Remove the Identity Synchronization for Windows installation folder located at lt serverRoot gt isw lt hostname gt For example C Program Files Sun mps isw example Note You must edit the Windows registry as described in Manually Uninstalling a 1 1 Instance from Windows NT on page 135 before proceeding to Manually
12. lt compidX gt DSSubcomponents lt compid gt m lt compid gt ObjectCache lt compid gt m lt compid gt ObjectCacheDLLs lt compid gt m lt compidX gt ADConnector lt compid gt The following is a lt compid gt tag sample Remove lt compid gt lt compid gt and all the text and tags in between lt compid gt Identity Synchronization for Windows lt compversion gt 1 1 lt uniquename gt Identity Synchronization for Windows lt uniquename gt lt compinstance gt 1 lt children gt lt compref gt ADConnector lt instance gt 1 lt version gt 1 1 lt version gt lt instance gt lt compref gt lt compref gt DSSubcomponents lt compinstance gt lt compversion gt lt compid gt 7 Remove the Identity Synchronization for Windows installation folder located at serverRoot isw hostname For example C Program Files Sun mps isw example 8 Cleanup the configuration directory as follows a From a Command Prompt window run the ldapsearch command against the configuration directory where Identity Synchronization for Windows Core is installed to locate the Identity Synchronization for Windows Console subtree Note ldapsearch is located in lt serverRoot gt shared bin ldapsearch For example C Program Files Sun mps shared bin ldapsearch ldapsearch D cn directory manager w lt password gt b o netscaperoot nsnickname isw dn The resulting entry
13. 1 1 and 1 1 SP1 Connectors and Core components Note You must uninstall Connectors before uninstalling Core components On Solaris or SPARC Type runUninstaller sh On Windows Type runUninstaller bat Back up the product registry file and remove Identity Synchronization for Windows related entries from the file The location of the file is as follows On Solaris var sadm install productregistry On Windows C WINNT System32 productregistry To remove the Identity Synchronization for Windows related entries from the product registry file follow the instructions provided in Manually Uninstalling 1 1 Core and Instances from Solaris on page 125 On Windows only After uninstalling Core restart your machine Note If the uninstall fails you might have to manually uninstall the Identity Synchronization for Windows components Instructions are provided in What to Do if the 1 1 Uninstallation Fails on page 125 On Windows only Verify that Identity Synchronization for Windows is not running If necessary you can stop the service from the command line by typing the following command net stop Sun ONE Identity Synchronization for Windows If this service continues running after uninstallation it causes a sharing violation that prevents you from deleting the instance directory Remove the Identity Synchronization for Windows instance directory isw lt hostname gt Chapter 7 Migrating Id
14. 5 Shell Prompts Shell Prompt C shell on UNIX and Linux systems C shell superuser on UNIX and Linux systems Bourne shell and Korn shell on UNIX and Linux systems Bourne shell and Korn shell superuser on UNIX and Linux systems Microsoft Windows command line machine_name machine name CEN Symbol Conventions The following table explains symbols that might be used in this book TABLEP 6 Symbol Conventions Symbol Description Example Meaning Contains optional arguments ls 1 The 1 option is not required and command options i Contains a set of choices fora d y n The d option requires that you use required command option Indicates a variable com sun javaRoot reference Joins simultaneous multiple Control A keystrokes either the y argument or the n argument References the value of the com sun javaRoot variable Press the Control key while you press the A key 22 Sun Java System Directory Server Enterprise Edition 6 0 Migration Guide March 2007 Sun Confidential Registered Preface TABLEP 6 Symbol Conventions Continued Symbol Description Example Meaning Joins consecutive multiple Ctrl A N Press the Control key release it and keystrokes then press the subsequent keys gt Indicates menu item File New Templates From the File menu choose New selection in a graphical user From the New submenu choose interface Templates
15. Admin Server Intact Install Identity Synchronization for Windows 6 0 Core FIGURE 7 1 Migrating a Single Host Deployment Preparing for Migration Use the following procedure to prepare for migration to version 6 0 Chapter 7 Migrating Identity Synchronization for Windows 117 Sun Confidential Registered Migrating Your System v 118 Preparing to migrate from version 1 1 and 1 1 SP1 to version 6 0 Open a terminal window or command prompt m On Solaris type the following command uncompress c filename tar xf On Windows type the following command or use any archive program for Windows such as WinZip JAVA_HOME bin jar xf filename When the binaries are unpacked the following subdirectories contain the required migration tools installer lib migration Solaris Windows export 1cnf jar exportl1cnf jar forcepwchg exe checktopics jar checktopics jar Export your version 1 1 configuration settings to an XML file From the migration directory execute export11cnf as described in Using the export 1cnf Utility on page 108 java jar exportlicnf jar D cn directory manager w s dc example dc com q f export cfg Add passwords to the exported XML file Enter a password between the double quotes for each cleartextPassword field in the exported configuration file For more information see Inserting Clear Text Passwords on page 108 Stop synchron
16. Copyright 2007 Sun Microsystems Inc 4150 Network Circle Santa Clara CA 95054 U S A Tous droits r serv s Sun Microsystems Inc d tient les droits de propri t intellectuelle relatifs la technologie incorpor e dans le produit qui est d crit dans ce document En particulier et ce sans limitation ces droits de propri t intellectuelle peuvent inclure un ou plusieurs brevets am ricains ou des applications de brevet en attente aux Etats Unis et dans d autres pays Cette distribution peut comprendre des composants d velopp s par des tierces personnes Certaines composants de ce produit peuvent tre d riv es du logiciel Berkeley BSD licenci s par l Universit de Californie UNIX est une marque d pos e aux Etats Unis et dans d autres pays elle est licenci e exclusivement par X Open Company Ltd Sun Sun Microsystems le logo Sun le logo Solaris le logo Java Coffee Cup docs sun com Java et Solaris sont des marques de fabrique ou des marques d pos es de Sun Microsystems Inc aux Etats Unis et dans d autres pays Toutes les marques SPARC sont utilis es sous licence et sont des marques de fabrique ou des marques d pos es de SPARC International Inc aux Etats Unis et dans d autres pays Les produits portant les marques SPARC sont bas s sur une architecture d velopp e par Sun Microsystems Inc L interface d utilisation graphique OPEN LOOK et Sun a t d velopp e par Sun Microsystems Inc pour ses utilisateurs et li
17. FIGURE 4 11 FIGURE 4 12 FIGURE 4 13 FIGURE 4 14 FIGURE 4 15 FIGURE 4 16 FIGURE 7 1 FIGURE 7 2 FIGURE 7 3 Existing version 5 Topology Isolating the Consumer From the Topology ss 55 Migrating the version 5 Consumer sn 56 Placing the 6 0 Consumer Into the Topology ss 57 Existing version 5 Topology With Migrated CONSUMETS eoocccccconononcnnnnnnnononarannnnona 58 Isolating the Hub From the Topology ss ss sense immense 58 Migratine the version o HUD cita sd disaient 59 Placing the 6 0 Hub Into the Topology ns 60 Existing version 5 Topology With Consumers and Hubs Migrated 61 Isolating the Master From the Topology Migrating the version 5 Master ss sise iii a Placing the 6 0 Master Into the Topology s 63 Existing version 5 TOPOlOGY line tiennent 64 Existing Topology With Migrated Servers eeeseseesssseseeseecseeseseeecneaeeecnseeeaeeeees 65 Migrated Topology With Promoted Hub Replicas ss 66 New Fully Meshed All Master TOpOlogy ss 67 Migrating a Single Host Deployment ss Migrating a Multi Master Replication Deployment coccion Migrating a Multi Host Deployment with Windows NT Sun Confidential Registered 10 Sun Confidential Registered Tables TABLE 1 1 TABLE 3 1 TABLE 3 2 TABLE 3 3 TABLE 5 1 TABLE 5 2 TABLE 5 3 TABLE 5 4 TABLE 5 5 TABLE 5 6 TABLE 5 7 TABLE 6 1 TABLE 6 2 TABLE 6 3 TABLE 6 4 TABLE 6 5 TABLE 6 6 TABLE 6 7 TABL
18. Related to Tombstone Purging sun 53 New Replication Recommendations rvvniirvnsnsrandan aiii 53 Migration CONOS it ia 54 Migrating a Replicated Topology to an Identical Topology coicinnnnnnnonanamecnesess 54 Migrating a Replicated Topology to a New Topology meccccciinncnnnnnninonancacnnencacincincincans 63 Migrating Over Multiple Data Centers is 67 Architectural Changes in Directory Server 6 0 ccccccsessessssssesseesessseseeseesesseesessseseeseeseesseaee 69 Changes in the Administration Framework sn 69 Removal of the ServerRoot Directory ini iii ann e 69 Removal of the o netscapeRoot Suffix ne 70 Changes to ACTS sus nine nn saine ne nine 70 Chang sinthe ACTSCOD suscitent Changes in Suffix Level ACIs Command Line Changes iii a E a E naine Deprecated Commands viii in ii 73 Changes to the Console sis cintia dista ce ria id ici New Password Policy mnnon nenna nannaa ar a Aa EE EEE TA Password Policy Compatibility Changes to Plug TnS issued eds aiaia Sun Java System Directory Server Enterprise Edition 6 0 Migration Guide March 2007 Sun Confidential Registered Contents New Plug Ins in Directory Server 6 0 siennes 77 Plug Ins Deprecated in Directory Server 6 0 su 78 Changes tothe Plug In API viii dit cti 78 Changes t the Installed Product Layout ccccssssciesssssesoorscansectoossconsetvacoestnvetsedeussnsocnoesvonss hnssesonseots 78 Administration Utilities Previously Under ServerROot sssssesssssss
19. Represents the default path to the Identity Synchronization for Windows local logs for the System Manager each connector and the Central Logger Depends on your installation serverroot isw hostname logs central Represents the default path to the Identity Synchronization for Windows central logs Depends on your installation Sun Confidential Registered Preface Command Locations The table in this section provides locations for commands that are used in Directory Server Enterprise Edition documentation To learn more about each of the commands see the relevant man pages TABLEP 3 Command Locations Command Java ES Native Package Distribution Zip Distribution cacaoadm Solaris Solaris usr sbin cacaoadm install path dsee6 cacao_2 0 usr lib cacao bin cacaoadm Red Hat HP UX Red Hat HP UX opt sun cacao bin cacaoadm install path dsee6 cacao_2 0 cacao bin cacaoadm Windows Windows install path share install path cacao_2 0 bin cacaoadm bat dsee6 cacao_2 0 bin cacaoadm bat certutil Solaris install path dsee6 bin certutil usr sfw bin certutil Red Hat HP UX opt sun private bin certutil dpadm 1M install path dps6 bin dpadm install path dps6 bin dpadm dpconf 1M install path dps6 bin dpconf install path dps6 bin dpconf dsadm 1M install path ds6 bin dsadm install path ds6 bin dsadm dsccmon 1M install path dscc6 bin dsccmon install path dscc6 bin
20. Windows locations are described in the following manner lt serverRoot gt isw lt hostname gt where lt serverRoot gt represents the parent directory of the Identity Synchronization for Windows installation location For example if you installed Identity Synchronization for Windows in var Sun mps isw lt example gt the lt serverRoot gt would be var Sun mps Chapter 7 Migrating Identity Synchronization for Windows 125 Sun Confidential Registered What to Do if the 1 1 Uninstallation Fails 126 Y To Manually Uninstall Core From a Solaris Machine 1 Stop all Identity Synchronization for Windows Java processes by typing etc init d isw stop into a terminal window If the preceding command does not stop all of the Java processes type the following commands usr ucb ps gauxwww grep java kill s SIGTERM process IDs from preceding command 2 Stop Message Queue a Type the following command to stop the Message Queue broker etc init d imq stop b Type the following commands to stop any remaining imq processes ps ef grep imqbroker kill s SIGTERM process IDs from preceding command c Use one of the following methods to uninstall the broker packages and directories Use the Message Queue broker uninstall script to uninstall the broker This script is located in the Identity Synchronization for Windows instance directory on the host where you installed Core serverRoot isw hostname
21. additional functionality that was not provided in Directory Proxy Server 5 Not all data source properties are listed here For a list of all the properties that can be configured for a data source run the following command dpconf help properties grep ldap data source Sun Java System Directory Server Enterprise Edition 6 0 Migration Guide March 2007 Sun Confidential Registered Mapping the Properties Configuration TABLE6 15 Mapping of ids proxy sch LDAPServer Attributes to Data Source Properties Directory Proxy Server 5 Attribute Directory Proxy Server 6 0 Property ids proxy con host ldap address ids proxy con port ldap port ids proxy con sport ldaps port ids proxy con supported version No equivalent Directory Proxy Server 6 0 supports LDAP v3 backends for both version 2 and version 3 clients Directory Proxy Server 6 0 supports the proxy authorization control version 1 and version 2 ids proxy con use version No equivalent Directory Proxy Server 6 0 supports LDAP v3 backends for both v2 and v3 clients Directory Proxy Server 6 0 supports the proxy authorization control version 1 and version 2 ids proxy con tcp no delay use tcp no delay ids proxy con link security policy ssl policy ids proxy con x509cert subject No equivalent Directory Proxy Server 6 0 does not check the subject ofthe certificate provided by the backend server ids proxy con keepalive interval This functionality is ach
22. again when the version 6 0 system is ready Password changes made on Windows NT are not captured during the migration process For more information see Forcing Password Changes on Windows NT on page 116 for detailed information Note These utilities facilitate the migration of Identity Synchronization for Windows version 1 1 to version 6 0 The migration is performed in the same environment where Identity Synchronization for Windows 1 1 is deployed Consequently these utilities are available in the Solaris SPARC and Windows packages only You can find the migration utilities in the installation migration directory No additional installation steps are required Exporting Version 1 1 Configuration You can use the export11cnf utility to export an existing version 1 1 configuration file to an XML file and then use the idsync importcnf command to import the file into the 6 0 system before installing the connectors Chapter 7 Migrating Identity Synchronization for Windows 107 Sun Confidential Registered Preparing for Identity Synchronization for Windows Migration 108 Tip Although it is possible to re enter the 1 1 configuration manually by using the Identity Synchronization for Windows console it is recommended that you use the export11cnf utility If you do not use export11cnf the state of the connectors is not preserved Exporting the version 1 1 configuration enables you to Eliminate most of the initial configu
23. are added to the replica entry Replication Agreement Configuration The values of the following attributes must be migrated for each replication agreement description ds5agreementEnable ds5ReplicaTransportCompressionLevel ds5ReplicaTransportGroupSize ds5ReplicaTransportWindowSize nsDS5ReplicaBindDN nsDS5ReplicaBindMethod nsDS5ReplicaCredentials nsDS5ReplicaHost nsDS5ReplicaPort nsDS5ReplicaRoot nsDS5ReplicaTimeout nsDS5ReplicaTransportinfo nsDS5ReplicaUpdateSchedule aci Issues can arise when you migrate the nsDS5ReplicaCredentials attribute For more information see Manual Reset of Replication Credentials on page 53 There is no ds5PartialReplConfiguration attribute in Directory Server 6 0 This attribute must be removed If you are using fractional replication the dsReplFractionalInclude and dsReplFractionalExclude attributes are added for each replication agreement Allattributes under cn replication cn config are migrated Password Policy Configuration Attributes Directory Server 6 0 implements a new password policy For details on configuration of the new password policy see Chapter 7 Directory Server Password Policy in Sun Java System Directory Server Enterprise Edition 6 0 Administration Guide The attributes that define the Sun Java System Directory Server Enterprise Edition 6 0 Migration Guide March 2007 Sun Confidential Registered Migrating Configuration Data Manually password polic
24. as the path to the change log database nsslapd changelogdir The following sections list the replication configuration attributes that must be migrated Change Log Attributes TABLE3 1 Change Log Attribute Name Changes Old Attribute Name Directory Server 6 0 Attribute Name nsslapd changelogmaxage dschangelogmaxage nsslapd changelogmaxentries dschangelogmaxentries In addition these attributes must be moved from cn changelog5 cn config to cn replica cn suffixname cn mapping tree cn config entries for each suffix name Fractional Replication Configuration Attributes If your topology uses fractional replication the following attribute names must be changed TABLE 3 2 Fractional Replication Attribute Name Changes Old Attribute Name Directory Server 6 0Attribute Name dsFilterSPType fractional_include dsReplFractionalInclude dsFilterSPType fractional_exclude dsReplFractionalExclude Replica Configuration Attributes The values ofthe following replica configuration attributes must be migrated ds5ReferralDelayAfterInit nsDS5Flags nsDS5ReplicaBindDN Chapter 3 Migrating Directory Server Manually 41 Sun Confidential Registered Migrating Configuration Data Manually 42 nsDS5Replicald nsDS5ReplicaLegacyConsumer nsDS5ReplicaName nsDS5ReplicaPurgeDelay nsDS5ReplicaReferral nsDS5ReplicaRoot nsDS5ReplicaTombstonePurgeInterval aci The dschangelogmaxage and dschangelogmaaxent ries attributes
25. directly 83 Sun Confidential Registered Mapping the Global Configuration The global Directory Proxy Server 5 configuration is specified by two object classes ids proxy sch LDAPProxy Contains the name of the Directory Proxy Server server and the DN of the global configuration object ids proxy sch GlobalConfiguration Contains various global configuration attributes Because of the way in which Directory Proxy Server 6 0 is configured Directory Proxy Server 6 0 has no equivalent for the ids proxy sch LDAPProxy object class or its attributes In Iplanet Directory Access Router 5 0 IDAR these configuration attributes are stored under ids proxy con Config Name name ou global ou pd2 ou iDAR o services In Directory Proxy Server 5 2 these configuration attributes are stored under ids proxy con Config Name user defined name ou system ou dar config o netscaperoot The functionality of the ids proxy sch GlobalConfiguration is provided as properties of various elements in Directory Proxy Server 6 0 The following table maps the attributes of the ids proxy sch GlobalConfiguration object class to the corresponding properties in Directory Proxy Server 6 0 TABLE 6 1 Mapping of Version 5 Global Configuration Attributes to 6 0 Properties Directory Proxy Server 5 Attribute Directory Proxy Server 6 0 Property ids proxy con Config Name No equivalent Directory Proxy Server 6 0 has two listeners a non secure l
26. files located in lt directory server install root gt bin isw For example C SunOne Servers bin isw NextSteps Restart your machine for all changes to take effect v Manually Uninstalling a 1 1 Instance from Windows NT Use the instructions provided in this section to manually uninstall an instance from a Windows NT machine Chapter 7 Migrating Identity Synchronization for Windows 135 Sun Confidential Registered What to Do if the 1 1 Uninstallation Fails 136 Note In this section Identity Synchronization for Windows locations are described as follows lt serverRoot gt isw lt hostname gt where lt serverRoot gt represents the parent directory of the Identity Synchronization for Windows installation location For example if you installed Identity Synchronization for Windows in C Program Files Sun mps isw example the lt serverRoot gt would be C Program Files Sun mps Stop all the Identity Synchronization for Windows Java processes Core and instance installations using one of the following methods Select Start gt Settings gt Control Panel gt Administrative Tools Services to open the Services window In the right pane right click on Identity Synchronization for Windows and select Stop Open a Command Prompt window and type the following command net stop Sun ONE Identity Synchronization for Windows Ifthe preceding methods do not work use the following ste
27. following table maps the Directory Proxy Server 5 search request modifying attributes to the corresponding Directory Proxy Server 6 properties TABLE 6 10 Mapping of Directory Proxy Server 5 Search Request Modifying Attributes to Directory Proxy Server 6 Properties Directory Proxy Server 5 Attribute Directory Proxy Server 6 Property ids proxy con minimum base allowed subtrees property of the request filtering policy ids proxy con max scope allowed search scopes property ofthe request filtering policy ids proxy con max timelimit search time limit property ofthe resource limits policy Mapping Attributes Restricting Search Responses In Directory Proxy Server 5 these attributes describe restrictions that are applied to search results being returned by the server before they are forwarded to the client In Directory Proxy Server 6 this functionality is provided by setting the properties of a resource limits policy and by configuring search data hiding rules For information about configuring a resource limits policy see Creating and Configuring a Resource Limits Policy in Sun Java System Directory Server Enterprise Edition 6 0 Administration Guide For information about creating search data hiding rules see To Create Search Data Hiding Rules in Sun Java System Directory Server Enterprise Edition 6 0 Administration Guide For a list of properties associated with a search data hiding rule run the following c
28. for additional levels Each time this happens Directory Server logs an error You safely ignore these errors although you should examine the definition of the group mentioned in the error message for potential circular definitions Tasks to be Performed After Automatic Migration If you have used dsmig to migrate your server automatically only the following two post migration tasks must be completed Ifyou have customized user plug ins these need to be recompiled and added to the new server manually Ifthe migrated server was part of a replicated topology see Issues Related to Migrating Replicated Servers on page 52 Chapter 2 Automated Migration Using the dsmig Command 35 Sun Confidential Registered 36 Sun Confidential Registered CHAPTER 3 Migrating Directory Server Manually If your deployment does not satisfy the requirements for automatic migration described in Deciding on Automatic or Manual Migration on page 28 you must migrate the servers manually This chapter describes the process for manual migration of each part of the server The chapter covers the following topics Before You Start a Manual Migration on page 37 Migrating the Schema Manually on page 38 Migrating Configuration Data Manually on page 38 Migrating Security Settings Manually on page 48 Migrating User Data Manually on page 49 Migrating User Plug Ins Manually on page 50 Tasks
29. information about Directory Server Enterprise Edition including known problems Sun Java System Directory Server Enterprise Edition 6 0 Documentation Center Contains links to key areas of the documentation set Sun Java System Directory Server Enterprise Edition 6 0 Evaluation Guide Introduces the key features of this release Demonstrates how these features work and what they offer in the context of a fictional deployment that you can implement ona single system Sun Java System Directory Server Enterprise Edition 6 0 Deployment Planning Guide Explains how to plan and design highly available highly scalable directory services based on Directory Server Enterprise Edition Presents the basic concepts and principles of deployment planning and design Discusses the solution life cycle and provides high level examples and strategies to use when planning solutions based on Directory Server Enterprise Edition Sun Java System Directory Server Enterprise Edition 6 0 Installation Guide Explains how to install the Directory Server Enterprise Edition software Shows how to select which components to install configure those components after installation and verify that the configured components function properly For instructions on installing Directory Editor go to http docs sun com coll DirEdit_05q1 Make sure you read the information in Sun Java System Directory Server Enterprise Edition 6 0 Release Notes concerning Dir
30. of the corresponding suffix New Replication Recommendations Directory Server 6 0 does not limit the number of masters in a multi master topology A fully meshed multi master topology with no hubs or consumers is recommended in most cases Chapter 4 Migrating a Replicated Topology 53 Sun Confidential Registered Migration Scenarios Advantages of an all master topology include the following Availability Write traffic is never disrupted if one of the servers goes down Simplicity In an all master topology there is no need to set up referrals to route reads and writes to different servers There may be reasons that an all master topology is not viable in a specific deployment For example fractional replication cannot be used in an all master topology because fractional replication is only supported from masters to consumers Migration Scenarios 54 This section provides sample migration scenarios for a variety of replicated topologies Migrating a Replicated Topology to an Identical Topology Before you start migrating replicated servers determine whether your deployment might not be better served by changing the architecture of the topology This section describes how to migrate if you want to keep your existing topology Migrating a replicated topology to an identical topology involves migrating the consumers then the hubs then the masters The following sections demonstrate a sample migration ofa simple mu
31. on page 31 The following section describes the specific configuration attributes that must be migrated from the old instance to the new instance Migration of Specific Configuration Attributes The values of the following attribute types must be migrated Sun Java System Directory Server Enterprise Edition 6 0 Migration Guide March 2007 Sun Confidential Registered Migrating Configuration Data Manually Global Configuration Attributes The implementation of global scope ACIs requires all ACIs specific to the rootDSE to have a targetscope field with a value of base targetscope base ACIs held in the rootDSE are specific to each Directory Server instance and are not replicated Therefore there should be no incompatibility problems when running a Directory Server 6 0 server in a topology containing servers of previous versions For more information about the changes made with regard to ACI scope see Changes to ACIs on page 70 In addition to the ACI change the following attributes under cn config must be migrated nsslapd accesscontrol nsslapd accesslog level nsslapd accesslog logbuf fering nsslapd accesslog logexpirationtime nsslapd accesslog logexpirationtimeunit nsslapd accesslog logging enabled nsslapd accesslog logmaxdiskspace nsslapd accesslog logminfreediskspace nsslapd accesslog logrotationtime nsslapd accesslog logrotattiontimeunit nsslapd accesslog maxlogsize nsslapd accesslog maxlogsperdir nsslapd attri
32. service This chapter describes the issues involved in migrating replicated servers and covers the following topics Overview of Migrating Replicated Servers on page 51 Issues Related to Migrating Replicated Servers on page 52 New Replication Recommendations on page 53 Migration Scenarios on page 54 Overview of Migrating Replicated Servers Directory Server 6 0 supports an unlimited number of masters in a multi master topology This and other changes might mean that you redesign your topology rather than migrate to an identical topology with new servers See Part III Logical Design in Sun Java System Directory Server Enterprise Edition 6 0 Deployment Planning Guide before continuing When migrating replicated version 5 servers you typically start with the consumers continue with the hubs and finish with the masters This bottom up approach involves interrupting only one server at a time rather than interrupting an entire branch of the replication topology The approach also helps you avoid potential custom schema synchronization issues between masters and consumers 51 Sun Confidential Registered Issues Related to Migrating Replicated Servers Issues Related to Migrating Replicated Servers 52 Depending on your replication topology and on your migration strategy certain issues might arise when you migrate replicated servers These issues are described in the following sections
33. should be similar to the following note that the entry will always end with o NetscapeRoot 134 Sun Java System Directory Server Enterprise Edition 6 0 Migration Guide March 2007 Sun Confidential Registered What to Do if the 1 1 Uninstallation Fails cn Sun ONE Identity Synchronization for Windows cn server group cn myhost mydomain com ou mydomain com o NetscapeRoot b Use the Directory Server Console to remove the Identity Synchronization for Windows Console subtree that you found and all subtrees under it 9 Cleanup the Identity Synchronization for Windows configuration directory also know as the configuration registry as follows a From a Command Prompt window run the following ldapsearch command to locate the Identity Synchronization for Windows configuration directory in Directory Server ldapsearch D cn directory manager w lt password gt b dc my dc domain amp objectclass iplanetservice ou IdentitySynchronization dn The resulting entry should be similar to the following ou IdentitySynchronization ou Services dc my dc domain b Use the Directory Server Console to remove the configuration directory subtree that you found including all subtrees under it 10 Clean up all other Console related files as follows a Remove all Console jar files located in lt serverRoot gt java jars isw For example C Program Files Sun mps java jars isw b Remove all Console servlet jar
34. start Start a Directory Server instance 72 Sun Java System Directory Server Enterprise Edition 6 0 Migration Guide March 2007 Sun Confidential Registered Command Line Changes TABLE5 1 Directory Server 5 and 6 commands Continued Version 5 Command Version 6 0 Command Description stop slapd dsadm stop Stop a Directory Server instance suffix2instance dsconf get suffix prop See the backend name for a suffix vlvindex dsadm reindex Create virtual list view indexes TABLE5 2 Directory Server 5 and 6 Commands Subcommands ofthe directoryserver Command Version 5 Command Version 6 0 Command Description directoryserver ns accountstatus Establish account status accountstatus directoryserver activate ns activate Activate an entry or group of entries directoryserver configure Installation procedure Install Directory Server directoryserver inactivate ns inactivate Inactivate an entry or group of entries directoryserver Uninstallation procedure Uninstall Directory Server unconfigure Deprecated Commands Some version 5 commands have been deprecated in Directory Server 6 0 The following table provides a list of these commands TABLE 5 3 Version 5 Commands That Have Been Deprecated Command Description getpwenc Print encrypted password ns ldapagt Starts a Directory Server SNMP subagent For information about how to do this in Directory Server 6 0 see To Set Up SNMP in Sun Java System Directory Server Enterprise Editio
35. steps involved in migrating to Directory Server 6 0 Chapter 2 explains how to use the migration tool provided with Directory Server 6 0 Chapter 3 describes the process for manual migration of each part of Directory Server Chapter 4 describes the issues involved in migrating replicated servers Chapter 5 describes the architectural changes in Directory Server 6 0 that affect migration from a previous version Chapter 6 describes how the configuration properties in Directory Proxy Server 6 0 can be used to simulate a version 5 configuration Chapter 7 describes the steps involved in migrating to Identity Synchronization for Windows 6 0 Sun Confidential Registered Preface Directory Server Enterprise Edition Documentation Set This Directory Server Enterprise Edition documentation set explains how to use Sun Java System Directory Server Enterprise Edition to evaluate design deploy and administer directory services In addition it shows how to develop client applications for Directory Server Enterprise Edition The Directory Server Enterprise Edition documentation set is available at http docs sun com coll 1224 1 For an introduction to Directory Server Enterprise Edition review the following documents in the order in which they are listed TABLEP 1 Directory Server Enterprise Edition Documentation Document Title Contents Sun Java System Directory Server Enterprise Edition 6 0 Release Notes Contains the latest
36. these tags See the example on Manually Uninstalling 1 1 Core and Instances from Solaris on page 125 lt compid gt Identity Synchronization for Windows lt compid gt lt compid gt Core lt compid gt lt compid gt unistaller lt compid gt lt compid gt wpsyncwatchdog lt compid gt lt compid gt setenv lt compid gt lt compid gt Create DIT lt compid gt lt compid gt Extend Schema lt compid gt lt compid gt resources lt compid gt lt compid gt CoreComponents lt compid gt lt compid gt Connector lt compid gt lt compid gt DSConnector lt compid gt lt compid gt Directory Server Plugin lt compid gt lt compid gt DSSubcomponents lt compid gt lt compid gt ObjectCache lt compid gt lt compid gt ObjectCacheDLLs lt compid gt lt compid gt SUNWidscr lt compid gt lt compid gt SUNWidscm lt compid gt lt compid gt SUNWidsct lt compid gt Sun Java System Directory Server Enterprise Edition 6 0 Migration Guide March 2007 Sun Confidential Registered What to Do if the 1 1 Uninstallation Fails m lt compid gt SUNWidscn lt compid gt m lt compid gt SUNWidsoc lt compid gt m lt compid gt ADConnector lt compid gt The following is an example lt compid gt tag Remove lt compid gt lt compid gt and all the text an
37. to be Performed After Manual Migration on page 50 Before You Start a Manual Migration Migrating an instance manually involves migrating each part of the server in the same order as performed by the automatic migration tool dsmig In this section old instance refers to the version 5 instance and new instance refers to the 6 0 instance Before you start a manual migration ensure that the following tasks have been performed Directory Server 6 0 software has been installed Directory Server 6 0 software can be installed on the same machine that holds the Directory Server 5 instance or on a different machine The new instance has been created The new instance can be created anywhere except for the exact location of the old instance The new instance can be installed on the same LDAP LDAPS port or on a different port If you use different ports any replication agreements to the new instance must be changed accordingly 37 Sun Confidential Registered Migrating the Schema Manually The old instance has been stopped correctly A disorderly shutdown of the old instance will cause problems during migration Even if the old and new instances are on different machines the old instance must be stopped before migration is started Migrating the Schema Manually Directory Server 5 schema files are located in serverRoot slapd serverID config schema Directory Server 6 0 schema files are located in instance path config sch
38. 31 J jar files checktopics 118 119 exportllcnf 118 exportcnf 108 jss3 jar 120 F failures uninstallation 125 migration tools 118 forcepwchg utility Java Naming and Directory Interface 17 description 107 java processes stopping 131 forcing password changes 116 jss3 jar files removing 120 location 116 146 Sun Java System Directory Server Enterprise Edition 6 0 Migration Guide March 2007 Sun Confidential Registered Index L LDAP Idapsearch 129 Idapsearch using 129 local log directory 19 M Message Queue 18 131 upgrading 122 migration checking for undelivered messages 114 clearing messages 115 directory 107 108 114 116 exporting 1 1 or 1 1 SP1 configuration 107 forcing password changes 116 from version 1 1 to 1 2004Q3 105 preparing 117 scenarios 139 140 using checktopics 114 MMR deployments 140 migration scenarios 140 multi host deployments 141 142 P packages removing 127 SUNWidscm 127 SUNWidscn 127 SUNWidscr 127 SUNWidsct 127 SUNWidsoc 127 SUNWijss 120 Password Filter subcomponents 142 password synchronization on demand 106 passwords clear text inserting 108 109 forcing changes 116 synchronizing changes with Directory Server Plugin 106 PDC running forcepwchg utility 116 persist directory backing up 108 119 restoring 124 preparing for migration 117 prerequisites for checktopics utility 114 processes stopping 131 R regedt
39. 32 exe 119 123 137 138 registries editing 133 removing binary files 128 console jar files 130 135 Directory Server Plugin 127 help files 127 packages 127 Solaris packages 127 restarting Directory Server 120 synchronization 115 restoring directories 124 S schema updating 122 server root directory 19 single host deployments 116 SLAMD Distributed Load Generation Engine 17 Solaris removing packages 127 stopping java processes 131 Message Queue 131 subcommands importcnf 107 109 123 SUNWidscm package 127 SUNWidscn package 127 SUNWidscr package 127 SUNWidsct package 127 SUNWidsoc package 127 SUNWijss package removing 120 synchronization restarting 115 147 Sun Confidential Registered Index synchronizing changes with Directory Server XML configuration documents Continued Plugin 106 exporting configurations 107 108 syntax checktopics command 115 checktopics utility 115 exportllcnfcommand 108 system verifying quiescence 114 U uninstallation failures 125 uninstalling 1 1 or 1 1 SP1 instances 135 connectors 121 Core 121 125 130 Directory Server Plugin 120 UNIX commands removing binaries 120 restarting Directory Server 120 uninstalling program 121 unpacking product binary files 118 updating schema 122 using checktopics utilities 114 utilities checktopics 107 114 exportllcnf 107 forcepwchg 107 using checktopics 114 V verifying empty synch
40. 5 x Hub B FIGURE 4 6 Isolating the Hub From the Topology Sun Java System Directory Server Enterprise Edition 6 0 Migration Guide March 2007 Sun Confidential Registered Migration Scenarios The next step involves migrating the version 5 hub 5 x Master A 5 x Master B 6 0 Hub A 5 x Hub A 5 x Hub B FIGURE4 7 Migrating the version 5 Hub The next step involves enabling the replication agreements to the new hub and initializing the hub if necessary Chapter 4 Migrating a Replicated Topology 59 Sun Confidential Registered Migration Scenarios 60 5 x Master A 5 x Master B FIGURE 4 8 Placing the 6 0 Hub Into the Topology Check that the replication on the consumers is in sync with the rest of the topology before migrating another hub A server that has just been migrated does not have a change log and can therefore not update consumer servers that are out of sync Allow the topology to stabilize and all servers to synchronize before migrating the next supplier server Migrating the Masters For each master in the replicated topology 1 Ifyou have client applications that write to the master you want to migrate reroute these applications to write to another master in the topology 2 Ensure that the master is no longer receiving write requests You can do this by enabling read only mode on the master 3 Check that replication is synchronized between the master and all its consumers Mig
41. Data 33 Configuration Data for o netscapeRoot sseseessesseesseesseesseseeseesstesnessesstessseseesesseesneeseesens 33 Configuration Attributes Not Migrated by dsmig cescescessesseesseessesssesessteesseeseesesstesneesneeaee 33 Using dsmig to Migrate User Data Tasks to be Performed After Automatic Migration 35 Migrating Directory Server Manually cccccsssecssssesssecsssesseesessessseesseeseessecsseessesseeseeaseesseesees 37 Before YouStarta Manual Migration tien ni nantes 37 3 Sun Confidential Registered Contents Migrating the Schema Manually jscsiscsscssssassisecssscssesaasvestascasesusnascssssssesnesessstsdoncdos sean tescbasdenbcesctivotionsis 38 Migrating Configuration Data Manually nn 38 Migration of Specific Configuration Attributes sn 38 Migrating Security Settings Manually entire ondes 48 Migrating User Data Manually Migrating User Plug Ins Manually225 seins nn ias 50 Tasks to be Performed After Manual Migration 0 ceseesessesseessesseesssesseeseesseesneeseeesnesneeaneesessens 50 Migrating a Replicated Topology Overview of Migrating Replicated Servers einen 51 Issues Related to Migrating Replicated Servers 52 Issues With the New Password Policy cesssesesssesseeseesseesseesscssesssessesseessessecseessessnesntesnensasens 52 Migration of Replication Agreement nee 52 Migration Of Referrals cuidas desi nui MN en 52 Manual Reset of Replication Credentials nn 53 Problems
42. Documentation Support and Training The Sun web site provides information about the following additional resources Documentation http www sun com documentation m Support http www sun com support m Training http www sun com training Third Party Web Site References Third party URLs are referenced in this document and provide additional related information Note Sun is not responsible for the availability of third party web sites mentioned in this document Sun does not endorse and is not responsible or liable for any content advertising products or other materials that are available on or through such sites or resources Sun will not be responsible or liable for any actual or alleged damage or loss caused or alleged to be caused by or in connection with use of or reliance on any such content goods or services that are available on or through such sites or resources Searching Sun Product Documentation Besides searching for Sun product documentation from the docs sun com web site you can use a search engine of your choice by typing the following syntax in the search field search term site docs sun com For example to search for Directory Server type the following Directory Server site docs sun com To include other Sun web sites in your search such as java sun com www sun com and developers sun com use sun com in place of docs sun com in the search field 23 Sun Confidential Registered Pr
43. E 6 8 TABLE 6 9 TABLE 6 10 TABLE 6 11 Migration Matrix Showing Support for Automated Migration eesse 28 Change Log Attribute Name Changes sens 41 Fractional Replication Attribute Name Changes occoniccccononononnnnnoncncnnonononarannonononos 41 Mapping Between 5 and 6 0 Password Policy Attributes ee eee ceeeeeeees 43 Directory Server5 and 6 commands seseina ri aia 71 Directory Server 5 and 6 Commands Subcommands of the directoryserver Command segs cass ssa cosas csstovextasssinesuessianvia hones EEEa EEA a Rae a AEN CaA AN N a AES 73 Version 5 Commands That Have Been Deprecated ccoooccccncicicnonocnnnnononnnnrnnnnanonnnnn 73 SUpport ior Plus OS a E A S 80 Tools Previously Under ServerRoot shared bin ss 80 Location of Certihcateand Key Files corria t 81 Instance Specitic Subdirectories Mapping of Version 5 Global Configuration Attributes to 6 0 Properties 84 Mapping of Security Configuration ss 86 Mapping of Connection Pool Attributes ss 87 Mapping Between Version 5 Group Attributes and Version 6 Connection Handler Properties yin iaa id 88 Mapping Between Version 5 Network Group Attributes and 6 0 Properties 89 Mapping of Directory Proxy Server 5 Bind Forwarding Attributes to Directory Proxy Server 6 Connection Handler Property Settings concocionnonenomamms 90 Mapping ot Directory Proxy Server 5 Operation Forwarding Attributes to Directory Proxy Server 6 Request Filtering Properties occononio
44. Is Removal of the o netscapeRoot Suffix In previous versions of Directory Server centralized administration information was kept in o netscapeRoot In the new administration model the concept of a configuration directory server no longer exists The o netscapeRoot suffix is no longer required and the netscapeRoot database files are therefore not migrated The configuration data for this suffix can be migrated ifit is specifically required Changes to ACIs 70 The following changes have been made to ACIs in Directory Server 6 0 Changes in the ACI Scope In Directory Server 5 2 ACIs on the root DSE had base scope In Directory Server 6 0 ACIs on the root DSE have global scope by default equivalent to targetscope subtree To reproduce the same behavior as Directory Server 5 2 add targetscope base to ACIs on the root DSE If you use dsmig to migrate the configuration this is done automatically Changes in Suffix Level ACIs In Directory Server 5 2 the following ACI was provided at the suffix level aci targetattr nsroledn aci nsLookThroughLimit nsSizeLimit nsTimeLimit nsIdleTimeout passwordPolicySubentry passwordExpirationTime passwordExpWarned passwordRetryCount retryCountResetTime acc ountUnlockTime passwordHistory passwordAllowChangeTime version 3 0 acl Allow self entry modification except for nsroledn aci resource limit attributes passwordPolicySubentry and pass
45. MR 140 multi host 141 142 deployments single host 116 detecting errors 123 directories etc 124 145 Sun Confidential Registered Index directories Continued isw hostname 121 125 131 migration 107 108 114 116 persist 124 Directory Server command line changes 71 73 restarting 120 upgrading 122 Directory Server Plugin removing 127 synchronizing password changes 106 uninstalling 120 E editing product registry file 133 errors detecting 123 XML configuration file 123 etc directory backing up 108 119 removing 124 restoring 124 examples checktopics command 115 exportllcnfcommand 108 idsyncimportcnf 109 exportl1cnf jar 108 118 exportl1cnf utility 107 description 107 exportllcnfjar 118 inserting clear text passwords 108 exporting 1 1 or 1 1 SP1 configuration 107 108 version 1 1 and 1 1 SP1 configuration files 107 forcepwchg utility Continued preparing for migration 118 requiring password changes 116 forcing password changes 116 H help removing help files 127 hosts Active Directory 140 142 deployment scenarios 141 l Identity Synchronization for Windows configuring 107 idsync importcnf examples 109 importing configuration files 107 123 importcnf subcommand examples 109 importing configuration files 107 123 install path 19 instance path 19 instances uninstalling 1 1 or 1 1 SP1 135 isw hostname directory 19 isw hostname directory 121 125 1
46. Sun Confidential Registered What to Do if the 1 1 Uninstallation Fails Note In this section Identity Synchronization for Windows locations are described in the following manner serverRoot isw hostname where serverRoot represents the parent directory of the Identity Synchronization for Windows installation location For example if you installed Identity Synchronization for Windows in C Program Files Sun mps isw example the serverRoot would be C Program Files Sun mps To uninstall Core from a Windows 2000 machine Stop all Identity Synchronization for Windows Java processes using one of the following methods Select Start gt Settings gt Control Panel gt Administrative Tools gt Services to open the Services window In the right pane right click on Identity Synchronization for Windows and select Stop Opena Command Prompt window and type the following command net stop Sun ONE Identity Synchronization for Windows fthe preceding methods do not work use the following steps to stop the Java processes manually a Open the Services window right click on Identity Synchronization for Windows and select Properties b From the General tab in the Properties window select Manual from the Startup type drop down list Note Although you can view Java processes such as pswwatchdog exe from the Windows Task Manager you cannot determine which processes are specifically related to Identity Synchroniza
47. Sun Java System Directory Server Enterprise Edition 6 0 Migration Guide Y S microsystems Sun Microsystems Inc 4150 Network Circle Santa Clara CA 95054 U S A Part No 819 0994 March 2007 Sun Confidential Registered Copyright 2007 Sun Microsystems Inc 4150 Network Circle Santa Clara CA 95054 U S A All rights reserved Sun Microsystems Inc has intellectual property rights relating to technology embodied in the product that is described in this document In particular and without limitation these intellectual property rights may include one or more U S patents or pending patent applications in the U S and in other countries U S Government Rights Commercial software Government users are subject to the Sun Microsystems Inc standard license agreement and applicable provisions of the FAR and its supplements This distribution may include materials developed by third parties Parts of the product may be derived from Berkeley BSD systems licensed from the University of California UNIX is a registered trademark in the U S and other countries exclusively licensed through X Open Company Ltd Sun Sun Microsystems the Sun logo the Solaris logo the Java Coffee Cup logo docs sun com Java and Solaris are trademarks or registered trademarks of Sun Microsystems Inc in the U S and other countries All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International Inc in t
48. Sun ONE Identity Synchronization for Windows cn server group cn myhost mydomain com ou mydomain com o NetscapeRoot Use the Directory Server Console to remove the Identity Synchronization for Windows Console subtree and all subtrees below it 9 Cleanup the Identity Synchronization for Windows configuration registry as follows 10 130 a Run the following ldapsearch command to locate the Identity Synchronization for Windows configuration registry in Directory Server ldapsearch D cn directory manager w lt password gt b dc my dc domain amp objectclass iplanetservice ou IdentitySynchronization dn The resulting entry should be similar to the following ou IdentitySynchronization ou Services dc my dc domain Use the Directory Server Console to remove the Identity Synchronization for Windows configuration registry and all subtrees below it Clean up all other Console related files as follows a Remove all the Console jar files by typing rm rf lt serverRoot gt java jars isw For example var Sun mps java jars isw b Remove all the Console servlet jar files by typing rm rf lt serverRoot gt bin isw For example var Sun mps bin isw Manually Uninstalling 1 1 Core and Instances from Windows 2000 Use the instructions provided in this section to manually uninstall Core from a Windows 2000 machine Sun Java System Directory Server Enterprise Edition 6 0 Migration Guide March 2007
49. T password changes are not monitored and new password values are not captured during the migration process Consequently you cannot determine new password values after the migration process Instead of requiring all users to change passwords when you finish migrating to 6 0 you can use the forcepwchg command line utility to require a password change for all the users who changed passwords during the migration process Note The forcepwchg utility is available only in the Windows packages You can find the forcepwchg utility in the Windows migration directory Execute forcepwchg directly from that directory No additional installation steps are necessary You must run forcepwchg on the Primary Domain Controller PDC host where the NT components connector Change Detector DLL and Password Filter DLL are installed You cannot run forcepwchg remotely The forcepwchg utility also prints the account names one name per line that it is trying to migrate If an error occurs during the migration process look into the next entry to the last printed entry Migrating Your System 116 This section provides instructions for migrating a single host deployment to version 6 0 Ina single host deployment all Identity Synchronization for Windows components are installed on a single host Windows 2000 Server Solaris version 8 or 9 or SPARC as follows Directory Server one instance Core Message Queue Central Logger System Manager a
50. Uninstalling a 1 1 Instance from Windows NT on page 135 9 Remove the Password Filter DLL Locate the passf1t d11 file in the C winnt system32 folder and rename the file to passflt dll old 10 Restart your machine for all changes to take effect Other Migration Scenarios Because other deployment topologies are possible your migration process may differ from the process described for a single host deployment This section describes two alternative deployment scenarios and explains how to migrate in each case Chapter 7 Migrating Identity Synchronization for Windows 139 Sun Confidential Registered Other Migration Scenarios 140 The sample deployment scenarios include Multi Master Replication Deployment on page 140 Multi Host Deployment with Windows NT on page 141 Multi Master Replication Deployment In a multi master replication MMR deployment two Directory Server instances are installed on different hosts It is possible to run the hosts on different operating systems but in this scenario both hosts are running on the same operating system Table 7 1 and Figure 7 2 illustrate how the Identity Synchronization for Windows components are distributed between the two hosts TABLE7 1 Component Distribution in a Multi Master Replication Deployment Host 1 Host 2 Directory Server one instance as the secondary Directory Server one instance as the preferred master for synchronized us
51. ality is provided with connection pools that are configured in the backend server itself For more information see Chapter 20 LDAP Data Sources and Data Source Pools in Sun Java System Directory Server Enterprise Edition 6 0 Administration Guide In Iplanet Directory Access Router 5 0 IDAR these configuration attributes are stored under ids proxy con Config Name name ou global ou pd2 ou iDAR o services In Directory Proxy Server 5 2 these configuration attributes are stored under ids proxy con Config Name user defined name ou system ou dar config o netscaperoot The following table provides a mapping between Directory Proxy Server 5 connection configuration attributes and the corresponding Directory Proxy Server 6 0 properties TABLE6 3 Mapping of Connection Pool Attributes Directory Proxy Server 5 Attribute Directory Proxy Server 6 0 Property ids proxy con connection pool No equivalent ids proxy con connection pool interval The connection pool grows automatically to a configured maximum The maximum is configured by setting the following properties ofan LDAP data source num bind init num bin incr num bind limit num read init num read incr num read limit num write init num write incr num write limit For information about setting LDAP data source properties see To Configure an LDAP Data Source in Sun Java System Directory Server Enterprise Edition 6 0 Administration Guide ids proxy con
52. anually perform the following steps 1 Ifyou have already started using the new instance stop the instance 2 Back up the certificate database and key database files on the new instance 3 Copy the certificate database and key database files from the existing instance to the new instance cp serverRoot alias slapd serverID cert8 db instance path alias slapd cert8db cp serverRoot alias slapd serverID key3 db instance path alias slapd key3 db For 5 1 servers and earlier releases of 5 2 servers the certificate database to be copied is serverRoot alias slapd serverID cert7 db 4 Copy the password file from the existing instance to the new instance cp serverRoot alias slapd serverID pin txt instance path alias slapd pin txt 5 Update the certificate database password dsadm set flags instance path cert pwd prompt on 6 Copy the certificate mapping file from the existing instance to the new instance cp serverRoot shared config certmap conf instance path alias certmap conf 7 Ifthe existing instance uses an external security token copy the security module database and the external token library to the new instance cp serverRoot alias secmod db instance path alias secmod db 8 Start the new instance The security configuration attributes are migrated when you migrate the rest of the configuration attributes In this sense migration of the security settings is not complete until you have migrated the configuratio
53. arent attr DirectorySource onDemandSSLOption true maxConnections 5 displayName dc example dc com resyncInterval 1000 gt lt SynchronizationHost hostOrderOfSignificance 1 hostname ds host example com port 389 portSSLOption true securePort 636 gt lt Credentials userName uid PSWConnector dc example dc com lt SynchronizationHost gt lt SyncScopeDefinitionSet Chapter 7 Migrating Identity Synchronization for Windows 109 Sun Confidential Registered Preparing for Identity Synchronization for Windows Migration EXAMPLE7 1 Sample Export Configuration File Continued index 0 location ou people dc example dc com filter creationExpression uid uid ou people dc example dc com sulid SUL1 gt lt SunDirectorySource gt lt ActiveDirectorySource parent attr DirectorySource displayName example com resyncInterval 1000 gt lt SynchronizationHost hostOrderOfSignificance 1 hostname ad host example com port 389 portSSLOption true securePort 636 gt lt Credentials userName cn Administrator cn Users dc metaqga dc com cleartextPassword gt lt INSERT PASSWORD BETWEEN THE DOUBLE QUOTES IN THE ABOVE lt SynchronizationHost gt lt SyncScopeDefinitionSet index 0 location cn users dc example dc com filter creationExpression cn cn cn users dc example dc com sulid SUL1 gt lt ActiveDirectorySource gt lt ActiveDirectoryGlobals flowInboundCre
54. art tls enabled Security Configuration Attributes All attributes under cn encryption cn config must be migrated If you are using certificate authentication or the secure port the key file path and certificate database file path under cn encryption cn config must be updated The values of the following attributes must be migrated nsKeyfile nsCertfile Feature Configuration Attributes The values of the aci attributes under cn features cn config must be migrated In addition the values of all identity mapping attributes must be migrated Mapping Tree Configuration Attributes All entries under cn mapping tree cn config must be migrated 40 Sun Java System Directory Server Enterprise Edition 6 0 Migration Guide March 2007 Sun Confidential Registered Migrating Configuration Data Manually The Netscape Root database has been deprecated in Directory Server 6 0 If your old instance made specific use of the Netscape Root database the attributes under o netscaperoot must be migrated Otherwise they can be ignored Replication Configuration Attributes Before migrating replication configuration attributes ensure that there are no pending changes to be replicated You can use the insync command to do this In addition to the configuration attributes all entries under cn replication cn config must be migrated You must manually update the host and port on all replication agreements to the new instance as well
55. ates true flowInboundModifies true flow0utboundCreates true flow0utboundModifies true gt lt TopologyHost parent attr SchemaLocation hostname ad host example com port 3268 portSSLOption true securePort 3269 gt lt Credentials parent attr Credentials userName cn Administrator cn Users dc example dc com 110 Sun Java System Directory Server Enterprise Edition 6 0 Migration Guide March 2007 Sun Confidential Registered FIELD gt Preparing for Identity Synchronization for Windows Migration EXAMPLE7 1 Sample Export Configuration File Continued cleartextPassword gt lt INSERT PASSWORD BETWEEN THE DOUBLE QUOTES IN THE ABOVE FIELD gt lt TopologyHost gt lt TopologyHost parent attr HostsTopologyConfiguration hostname ad host example com port 3268 portSSLOption true securePort 3269 gt lt Credentials parent attr Credentials userName cn Administrator cn Users dc example dc com cleartextPassword gt lt INSERT PASSWORD BETWEEN THE DOUBLE QUOTES IN THE ABOVE FIELD gt lt TopologyHost gt lt AttributeMap gt lt AttributeDescription parent attr WindowsAttribute name lockouttime syntax 1 2 840 113556 1 4 906 gt lt AttributeDescription parent attr SunAttribute name pwdaccountlockedtime syntax 1 3 6 1 4 1 1466 115 121 1 24 gt lt AttributeMap gt lt AttributeDescription parent attr SignificantAttribute name lockouttime synta
56. bute name exceptions nsslapd auditlog logexpirationtime nsslapd auditlog logexpirationtimeunit nsslapd auditlog logging enabled nsslapd auditlog logmaxdiskspace nsslapd auditlog logminfreediskspace nsslapd auditlog logrotationtime nsslapd auditlog logrotattiontimeunit nsslapd auditlog maxlogsize nsslapd auditlog maxlogsperdir nsslapd certmap basedn nsslapd ds4 compatible schema nsslapd enquote sup oc nsslapd errorlog level nsslapd errorlog logexpirationtime nsslapd errorlog logexpirationtimeunit nsslapd errorlog logging enabled nsslapd errorlog logmaxdiskspace nsslapd errorlog logminfreediskspace nsslapd errorlog logrotationtime nsslapd errorlog logrotattiontimeunit nsslapd errorlog maxlogsize nsslapd errorlog maxlogsperdir nsslapd groupevalnestlevel nsslapd idletimeout Chapter 3 Migrating Directory Server Manually 39 Sun Confidential Registered Migrating Configuration Data Manually nsslapd infolog area nsslapd infolog level nsslapd ioblocktimeout nsslapd lastmod nsslapd listenhost nsslapd maxbersize nsslapd maxconnections nsslapd maxdescriptors nsslapd maxpsearch nsslapd maxthreadsperconn nsslapd nagle nsslapd readonly nsslapd referral nsslapd referralmode nsslapd reservedescriptors nsslapd return exact case nsslapd rootpwstoragescheme nsslapd schema repl useronly nsslapd schemacheck nsslapd search tune nsslapd securelistenhost nsslapd security nsslapd sizelimit nsslapd threadnumber nsslapd timelimit ds st
57. cenci s Sun reconna t les efforts de pionniers de Xerox pour la recherche et le d veloppement du concept des interfaces d utilisation visuelle ou graphique pour l industrie de l informatique Sun d tient une licence non exclusive de Xerox sur l interface d utilisation graphique Xerox cette licence couvrant galement les licenci s de Sun qui mettent en place l interface d utilisation graphique OPEN LOOK et qui en outre se conforment aux licences crites de Sun Les produits qui font l objet de cette publication et les informations qu il contient sont r gis par la legislation am ricaine en mati re de contr le des exportations et peuvent tre soumis au droit d autres pays dans le domaine des exportations et importations Les utilisations finales ou utilisateurs finaux pour des armes nucl aires des missiles des armes chimiques ou biologiques ou pour le nucl aire maritime directement ou indirectement sont strictement interdites Les exportations ou r exportations vers des pays sous embargo des Etats Unis ou vers des entit s figurant sur les listes d exclusion d exportation am ricaines y compris mais de mani re non exclusive la liste de personnes qui font objet d un ordre de ne pas participer d une fa on directe ou indirecte aux exportations des produits ou des services qui sont r gis par la legislation am ricaine en mati re de contr le des exportations et la liste de ressortissants sp cifiquement design s sont rigoureusement int
58. con max simultaneous conns from ip max client connections 96 Sun Java System Directory Server Enterprise Edition 6 0 Migration Guide March 2007 Sun Confidential Registered Mapping the Properties Configuration Mapping the Properties Configuration The Directory Proxy Server 5 property objects enable you to specify specialized restrictions that LDAP clients must follow Most of the functionality of property objects is available in Directory Proxy Server 6 although it is supplied by various elements of the new architecture The following sections describe how to map the Directory Proxy Server 5 property objects to the corresponding 6 0 functionality Attribute Renaming Property In Directory Proxy Server 5 attribute renaming is defined by the ids proxy sch RenameAttribute object class This object uses the ids proxy con server attr name and ids proxy con client attr name attributes to specify which attributes must be renamed by Directory Proxy Server The attribute renaming functionality is replaced in Directory Proxy Server 6 by the attr name mappings property of an LDAP data source This property is multi valued and takes values of the form client attribute name server attribute name In a client request Directory Proxy Server renames the client attribute name to the server attribute name Ina response Directory Proxy Server renames the server attribute name to the client attribute name To configure this property use t
59. connection pool timeout backendMaxReadWaitTimeInMilliSec Chapter6 Migrating Directory Proxy Server 87 Sun Confidential Registered Mapping the Groups Configuration Mapping the Groups Configuration Directory Proxy Server 5 uses groups to define how client connections are identified and what restrictions are placed on the client connections In Directory Proxy Server 6 0 this functionality is achieved using connection handlers data views and listeners Connection handlers data views and listeners can be configured by using the Directory Service Control Center or by using the dpconf command For more information see Chapter 25 Directory Proxy Server Connection Handlers in Sun Java System Directory Server Enterprise Edition 6 0 Administration Guide and Chapter 23 Directory Proxy Server Data Views in Sun Java System Directory Server Enterprise Edition 6 0 Administration Guide Mapping the Group Object In Directory Proxy Server 5 a group is defined by setting the attributes ofthe ids proxy sch Group object class Certain attributes of this object class can be mapped to Directory Proxy Server 6 0 connection handler properties For a list of all the connection handler properties run the following command dpconf help properties grep connection handler In Iplanet Directory Access Router 5 0 IDAR these configuration attributes are stored under ids proxy con Name name ou groups ou pd2 ou iDAR o serv
60. ctionality is provided by setting properties of a request filtering policy and a resource limits policy For information on configuring a request filtering policy see Creating and Configuring Request Filtering Policies and Search Data Hiding Rules in Sun Java System Directory Server Enterprise Edition 6 0 Administration Guide For information on configuring a resource limits policy see Creating and Configuring a Resource Limits Policy in Sun Java System Directory Server Enterprise Edition 6 0 Administration Guide For a list of all the properties associated with a request filtering policy or a resource limits policy run the dpadm help properties command and search for the object For example to locate all properties associated with a resource limits policy run the following command dpconf help properties grep resource limits policy In Iplanet Directory Access Router 5 0 IDAR these configuration attributes are stored under ids proxy con Name group name ou groups ou pd2 ou iDAR o services In Directory Proxy Server 5 2 these configuration attributes are stored under ou groups cn user defined name ou dar config o NetscapeRoot The following table maps the Directory Proxy Server 5 search request control attributes to the corresponding Directory Proxy Server 6 0 properties Sun Java System Directory Server Enterprise Edition 6 0 Migration Guide March 2007 Sun Confidential Registered Mapping the Groups Configu
61. ctory Proxy Server 6 Property ids proxy con dn exact target dns ids proxy con dn regexp target dn regular expressions ids proxy con ava target attr value assertions ids proxy con forbidden return To hide a subset of attributes rule action hide attributes attrs attribute name To hide an entire entry rule action hide entry ids proxy con permitted return rule action show attributes attrs attribute name LDAP Server Property In Directory Proxy Server 5 the ids proxy sch LDAPServer property is used to define the backend LDAP servers to which Directory Proxy Server sends requests In Directory Proxy Server 6 0 this functionality is achieved by using LDAP data sources You can set properties for LDAP data sources by using the Directory Service Control Center or by using the command line For more information see Creating and Configuring LDAP Data Sources in Sun Java System Directory Server Enterprise Edition 6 0 Administration Guide In Iplanet Directory Access Router 5 0 IDAR these configuration attributes are stored under ids proxy con Name server name ou properties ou pd2 ou iDAR o services In Directory Proxy Server 5 2 these configuration attributes are stored under ou groups cn user defined name ou dar config o NetscapeRoot The following table maps the attributes of the ids proxy sch LDAPServer object class to the corresponding data source properties in Directory Proxy Server 6 0 Data sources provide
62. ctory Server You will not see this log message until after you start synchronization in Identity Synchronization for Windows 6 0 This is why checking the logs is the last step of the migration procedure 144 Sun Java System Directory Server Enterprise Edition 6 0 Migration Guide March 2007 Sun Confidential Registered Index A Active Directory during migration 116 hosts 140 142 MMR deployments 140 multi host deployments 142 on demand password synchronization 106 password synchronization during migration 106 synchronizing passwords 106 adding passwords to exported XML files 118 arguments checktopics 115 importcnf 123 B binary files removing 128 unpacking 118 C central log directories 19 certificate database default path 19 Change Detector subcomponents 123 124 136 142 checktopics jar 118 119 checktopics utility checktopics jar 118 clearing messages 115 default location 114 checktopics utility Continued description 114 prerequisites 114 syntax 115 using 114 clear text passwords inserting 108 109 configurations exporting 107 configuring Identity Synchronization for Windows 107 connectors uninstalling 121 consoles help files 127 MMR configuration 140 multi host deployments 142 removing jar files 130 135 Core uninstalling 121 125 130 creating XML configuration documents 107 D default locations 18 21 deployments exporting topologies to XML documents 107 M
63. d tags in between lt compid gt Identity Synchronization for Windows lt compversion gt 1 1 lt uniquename gt Identity Synchronization for Windows lt uniquename gt lt compinstance gt 1 lt children gt lt compref gt ADConnector lt instance gt 1 lt version gt 1 1 lt version gt lt instance gt lt compref gt lt compref gt DSSubcomponents lt compinstance gt lt compversion gt lt compid gt Remove the following Identity Synchronization for Windows directories and files a From the installation location type the following command rm rf serverRoot isw hostname b To remove the bootstrap files type the following command rm rf etc init d isw Clean up the configuration directory as follows a Run the following ldapsearch command against the configuration directory where Identity Synchronization for Windows Core is installed to locate the Identity Synchronization for Windows Console subtree ldapsearch D cn directory manager w lt password gt b o netscaperoot nsnickname isw dn Note Ldapsearch is located in Directory Server s lt serverRoof gt shared bin ldapsearch For example var Sun mps shared bin ldapsearch Chapter 7 Migrating Identity Synchronization for Windows 129 Sun Confidential Registered What to Do if the 1 1 Uninstallation Fails The resulting entry should be similar to the following Note that the entry always ends with o NetscapeRoot cn
64. de ids proxy con userid This attribute can be mapped to the user and group names specified when an instance is created by using the following command dpadm create u NAME g NAME INSTANCE PATH For more information see Creating and Deleting a Directory Proxy Server Instance in Sun Java System Directory Server Enterprise Edition 6 0 Administration Guide ids proxy con working dir This attribute can be mapped to the INSTANCE PATH specified when an instance is created by using the following command dpadm create INSTANCE PATH For more information see Creating and Deleting a Directory Proxy Server Instance in Sun Java System Directory Server Enterprise Edition 6 0 Administration Guide ids proxy con include logprdotguivalent For information on configuring logging in Directory Proxy Server 6 0 see Chapter 27 Directory Proxy Server Logging in Sun Java System Directory Server Enterprise Edition 6 0 Administration Guide Mapping the Global Security Configuration In Directory Proxy Server 5 security is configured by using attributes of the global configuration object In Directory Proxy Server 6 0 you can configure security when you create the server instance by using the dpadm command For more information see Chapter 19 Directory Proxy Server Certificates in Sun Java System Directory Server Enterprise Edition 6 0 Administration Guide In Iplanet Directory Access Router 5 0 IDAR
65. dicates warning information The warning depends on the value set for t as follows Iftis set to LDAP_PWP_WARNING RESP_NONE the warning is 1 Iftisset to LDAP_PWP_WARNING RESP_EX the warning is the number of seconds before expiration Iftis set to LDAP_PWP_WARNING RESP_GRACE the warning is the number of remaining grace logins The second i indicates error information If t is set to LDAP PWP WARNING RESP_NONE the error contains one of the following values pwp_ resp no error 1 pwp_ resp expired error 0 pwp_resp locked error 1 pwp_ resp need change error 2 pwp_resp mod not allowed error 3 pwp_resp give old error 4 pwp_resp bad qa error 5 pwp_resp too short error 6 pwp_ resp too young error 7 pwp_ resp in hist error 8 The LDAP_CONTROL_ACCOUNT_USABLE control provides account status information on LDAP search operations only Password Policy Compatibility For migration purposes the new password policy maintains compatibility with previous Directory Server versions by identifying a compatibility mode The compatibility mode determines whether password policy attributes are handled as old attributes or new attributes where old refers to Directory Server 5 password policy attributes The compatibility mode can be read using dsconf command as follows Chapter 5 Architectural Changes in Directory Server 6 0 75 Sun Confidential Registered New Password Policy dsconf get server prop p
66. directly after migration because the first bind for every entry would require a write to the directory The calculated pwdChangedTime is therefore not written to the user entry during the DS5 compatible mode You should leave your topology in DS5 compatible mode until you have been through an entire password expiration cycle 90 days for example depending on the value of passwordMaxAge In this way the pwdChangedTime is added gradually across the directory at the password change of each user entry Changes to Plug Ins This section lists the new and deprecated plug ins in Directory Server 6 0 The section also describes what you need to do if you have custom plug ins created with the old plug in API New Plug Ins in Directory Server 6 0 The following plug ins have been added in Directory Server 6 0 cn example cn ldbm database cn plugins cn config cn gle cn plugins cn config cn MemberOf Plugin cn plugins cn config cn Monitoring Plugin cn plugins cn config cn 0bjectDeletionMatch cn plugins cn config cn pswsync cn pLugins cn config cn Replication Repair cn plugins cn config cn RMCE cn Password Storage Schemes cn pLlugins cn config cn Strong Password Check cn plugins cn config For information about these plug ins see the plugin 5dsconf man page Chapter 5 Architectural Changes in Directory Server 6 0 77 Sun Confidential Registered Changes to the Installed Product Layout Plug Ins Deprecated i
67. ds proxy con permit op modify allow modify operations ids proxy con permit op modrdn allow rename operations ids proxy con permit op extended allow extended operations Chapter 6 Migrating Directory Proxy Server 91 Sun Confidential Registered Mapping the Groups Configuration 92 Mapping Subtree Hiding Directory Proxy Server 5 uses the ids proxy con forbidden subtree attribute to specify a subtree of entries to be excluded in any client request Directory Proxy Server 6 0 provides this functionality with the allowed subtrees and prohibited subtrees properties of a request filtering policy For information on hiding subtrees in this way see Creating and Configuring a Resource Limits Policy in Sun Java System Directory Server Enterprise Edition 6 0 Administration Guide If your subtrees are distributed across different backend servers you can use the excluded subtrees property of a data view to hide subtrees For more information on hiding subtrees in this way see Excluding a Subtree From a Data View in Sun Java System Directory Server Enterprise Edition 6 0 Reference and To Configure Data Views With Hierarchy and a Distribution Algorithm in Sun Java System Directory Server Enterprise Edition 6 0 Administration Guide Mapping Search Request Controls In Directory Proxy Server 5 search request controls are used to prevent certain kinds of requests from reaching the LDAP server In Directory Proxy Server 6 0 this fun
68. dsccmon dsccreg 1M install path dscc6 bin dsccreg install path dscc6 bin dsccreg dsccsetup 1M install path dscc6 bin dsccsetup install path dscc6 bin dsccsetup dsconf 1M install path ds6 bin dsconf install path ds6 bin dsconf dsee deploy 1M Not provided install path dsee6 bin dsee_deploy dsmig 1M install path ds6 bin dsmig install path ds6 bin dsmig entrycmp 1 install path ds6 bin entrycmp install path ds6 bin entrycmp fildif 1 install path ds6 bin fildif install path ds6 bin fildif idsktune 1M install path dsrk6 bin idsktune install path dsrk6 bin idsktune 20 Sun Java System Directory Server Enterprise Edition 6 0 Migration Guide March 2007 Sun Confidential Registered Preface TABLEP 3 Command Locations Continued Command Java ES Native Package Distribution Zip Distribution insync 1 install path ds6 bin insync install path ds6 bin insync ns accountstatus 1M install path ds6 bin ns accountstatus install path ds6 bin ns accountstatus ns activate 1M ns inactivate 1M install path ds6 bin ns activate install path ds6 bin ns inactivate install path ds6 bin ns activate install path ds6 bin ns inactivate repldisc 1 install path ds6 bin repldisc install path ds6 bin repldisc schema_push 1M install path ds6 bin schema_push install path ds6 bin schema_push smcwebserver Solaris Linux HP UX This command pertains only t
69. dt32 do not use regedit to modify do not delete the following registry key Select the registry key entry in the left pane HKEY_LOCAL_MACHINE SYSTEM CurrentCont rolSet CONTROL LSA The registry value type must be REG_MULTI_SZ In the right pane right click on the Notification Packages value and select Modify Change the PASSFLT value to FPNWCLNT Backup copy and rename the current productregistry file located in C WINNT system32 Edit the C WINNT system32 product registry file to remove the following tags Note For best results use an XML editor Alternatively you can use a standard text editor Some of these components might not be included in your file You must delete the beginning tag lt compid gt ending tag lt compid gt and all contents in between both tags Ellipses are used in the following list to represent any additional text and or tags that are included as part of these tags See the example on Manually Uninstalling 1 1 Core and Instances from Windows 2000 on page 130 lt compid gt Identity Synchronization for Windows lt compid gt lt compid gt Core lt compid gt lt compid gt uninstaller lt compid gt lt compid gt wpsyncwatchdog lt compid gt lt compid gt setenv lt compid gt lt compid gt Create DIT lt compid gt lt compid gt Extend Schema lt compid gt lt compid gt resources lt compid gt
70. e Introduces the technical and conceptual foundations of Directory Server Enterprise Edition Describes its components architecture processes and features Also provides a reference to the developer APIs Sun Java System Directory Server Enterprise Edition 6 0 Man Page Reference Describes the command line tools schema objects and other public interfaces that are available through Directory Server Enterprise Edition Individual sections of this document can be installed as online manual pages Sun Java System Identity Synchronization for Windows 6 0 Deployment Planning Guide Provides general guidelines and best practices for planning and deploying Identity Synchronization for Windows Related Reading The SLAMD Distributed Load Generation Engine SLAMD is a Java application that is designed to stress test and analyze the performance of network based applications It was originally developed by Sun Microsystems Inc to benchmark and analyze the performance of LDAP directory servers SLAMD is available as an open source application under the Sun Public License an OSI approved open source license To obtain information about SLAMD go to http www slamd com SLAMD is also available as a java net project See https slamd dev java net Java Naming and Directory Interface JNDI technology supports accessing the Directory Server using LDAP and DSML v2 from Java applications For information about JNDI see http java su
71. e Queue read the installation instructions for Java Enterprise System software at http docs sun com coll 1286 2 http docs sun com coll 1286 2 This chapter includes the following sections Migration Overview on page 106 Before You Migrate Identity Synchronization for Windows on page 106 Preparing for Identity Synchronization for Windows Migration on page 107 Migrating Your System on page 116 What to Do if the 1 1 Uninstallation Fails on page 125 Other Migration Scenarios on page 139 Checking the Logs on page 144 105 Sun Confidential Registered Migration Overview Migration Overview Migration from Identity Synchronization for Windows version 1 1 to version 6 0 is accomplished in the following major phases Preparing your Identity Synchronization for Windows 1 1 installation for migration 1 2 Uninstalling Identity Synchronization for Windows 1 1 3 4 Installing or upgrading dependent products Installing Identity Synchronization for Windows 6 0 by using the configuration and connector states you backed up Note Install Identity Synchronization for Windows 6 0 on the same platform and architecture where you installed Identity Synchronization for Windows 1 1 Before You Migrate Identity Synchronization for Windows 106 Complete the following tasks before you migrate Familiarize yourself with the new features and functionality provided in Identity Synchr
72. e information see Installing Connectors in Sun Java System Directory Server Enterprise Edition 6 0 Installation Guide If you did not select the Configure Identity Synchronization for Windows 6 0 Directory Server Plugin option while installing Directory Server connector configure it now For more information see Appendix A Using the Identity Synchronization for Windows Command Line Utilities in Sun Java System Directory Server Enterprise Edition 6 0 Installation Guide Stop Identity Synchronization for Windows services daemons as described in Starting and Stopping Services in Sun Java System Directory Server Enterprise Edition 6 0 Installation Guide On Windows NT only complete the following steps a Stop the NT Change Detector service by typing the following command net stop Sun Java TM System NT Change Detector b Restore the NT Change Detector Service counters i Open the Registry Editor by executing regedt32 exe ii SelecttheHKEY LOCAL MACHINE window iii Navigate to the SOFTWARE Sun Microsystems Sun Java TM System Identity Synchronization for Windows 1 1 node Chapter 7 Migrating Identity Synchronization for Windows 123 Sun Confidential Registered Migrating Your System iv Double click on each of the following entries to restore their values which you saved prior to uninstalling version 1 1 HighestChangeNumber LastProcessedSecLogRecordNumber LastProcessedSecLogTimeStamp Que
73. e same functionality as Directory Proxy Server 5 bind forwarding In Iplanet Directory Access Router 5 0 IDAR these configuration attributes are stored under ids proxy con Name group name ou groups ou pd2 ou iDAR o services In Directory Proxy Server 5 2 these configuration attributes are stored under ou groups cn user defined name ou dar config o NetscapeRoot The following table maps the Directory Proxy Server 5 bind forwarding attributes to the corresponding Directory Proxy Server 6 connection handler property settings TABLE6 6 Mapping of Directory Proxy Server 5 Bind Forwarding Attributes to Directory Proxy Server 6 Connection Handler Property Settings Directory Proxy Server 5 Attribute Directory Proxy Server 6 Property ids proxy con bind name No equivalent ids proxy con permit auth none allowed auth methods anonymous ids proxy con permit auth simple allowed auth methods simple Sun Java System Directory Server Enterprise Edition 6 0 Migration Guide March 2007 Sun Confidential Registered Mapping the Groups Configuration TABLE6 6 Mapping of Directory Proxy Server 5 Bind Forwarding Attributes to Directory Proxy Server 6 Connection Handler Property Settings Continued Directory Proxy Server 5 Attribute Directory Proxy Server 6 Property ids proxy con permit auth sasl allowed auth methods sasl Mapping Operation Forwarding Operation forwarding determines how Directory Proxy Serve
74. e than one backend it does not migrate any of the configuration entries that belong to that suffix This includes configuration entries for the mapping tree replicas replication agreements LDBM instances indexes and encrypted attributes Instead all of these entries are dumped in the file new instance path migration old distribution conf ldif You can import the distribution configuration data from this file after migration if required Replication Configuration Data Configuration data for replication is not migrated by default If you want this data to be migrated select the R option By default the data is dumped in the file new instance path migration old_ replication conf ldif You can import the replication configuration data from this file after migration if required Configuration Data for o netscapeRoot Configuration data for the o NetscapeRoot suffix is not migrated by default If this information is required use the N to migrate the configuration data If you do not use the N option the data is dumped in the file new instance path migration old_netscape conf ldif You can import the configuration data from this file after migration if required Configuration Attributes Not Migrated by dsmig The following common configuration attributes are not migrated automatically This is not an exhaustive list You might have used additional configuration attributes that must be migrated manually ds hdsml dsmlschemalocation ds
75. ectory Editor before you install Directory Editor Sun Java System Directory Server Enterprise Edition 6 0 Migration Guide Provides instructions for upgrading components from earlier versions of Directory Server Directory Proxy Server and Identity Synchronization for Windows 16 Sun Java System Directory Server Enterprise Edition 6 0 Migration Guide March 2007 Sun Confidential Registered Preface TABLEP 1 Directory Server Enterprise Edition Documentation Continued Document Title Contents Sun Java System Directory Server Enterprise Edition 6 0 Administration Guide Provides command line instructions for administering Directory Server Enterprise Edition For hints and instructions on using the Directory Service Control Center DSCC to administer Directory Server Enterprise Edition see the online help provided in DSCC For instructions on administering Directory Editor go to http docs sun com coll DirEdit_05q1 For instructions on installing and configuring Identity Synchronization for Windows see Part II Installing Identity Synchronization for Windows in Sun Java System Directory Server Enterprise Edition 6 0 Installation Guide Sun Java System Directory Server Enterprise Edition 6 0 Developers Guide Shows how to develop server plug ins with the APIs that are provided as part of Directory Server Enterprise Edition Sun Java System Directory Server Enterprise Edition 6 0 Referenc
76. eements to the new consumer initializing the consumer if necessary and rerouting client applications to the new consumer Sun Java System Directory Server Enterprise Edition 6 0 Migration Guide March 2007 Sun Confidential Registered Migration Scenarios 5 x Master A 5 x Master B FIGURE 4 4 Placing the 6 0 Consumer Into the Topology Migrating the Hubs For each hub in the replicated topology Disable replication agreements from the masters to the hub you want to migrate Disable replication agreements from the hub you want to migrate to the consumers Stop the hub Migrate the hub according to the instructions under Chapter 1 Start the hub Enable the replication agreements from the masters to that hub Enable the replication agreements from that hub to the consumers If you have migrated the data check that replication is in sync SN A JE eee If you have not migrated the data reinitialize the hub The following sequence of diagrams illustrate the migration of a hub as described above The first diagram shows the topology before migrating the hubs Chapter 4 Migrating a Replicated Topology 57 Sun Confidential Registered Migration Scenarios 58 5 x Master A 5 x Master B FIGURE 4 5 Existing version 5 Topology With Migrated Consumers The first migration step involves disabling replication agreements effectively isolating the hub from the topology 5 x Master A 5 x Master B 5 x Hub A
77. eface Sun Welcomes Your Comments Sun is interested in improving its documentation and welcomes your comments and suggestions To share your comments go to http docs sun com and click Send Comments In the online form provide the full document title and part number The part number is a 7 digit or 9 digit number that can be found on the book s title page or in the document s URL For example the part number of this book is 819 0994 24 Sun Java System Directory Server Enterprise Edition 6 0 Migration Guide March 2007 Sun Confidential Registered CHAPTER 1 Overview of the Migration Process for Directory Server This chapter describes the steps involved in migrating to Directory Server 6 0 Directory Server 6 0 provides a migration tool dsmig that automates aspects of the migration for certain platform version combinations If servers within your topology fall outside of these combinations the same migration steps must be performed manually This chapter includes the following topics Before You Migrate on page 25 Deciding on the New Product Distribution on page 27 Outline of Migration Steps on page 27 Deciding on Automatic or Manual Migration on page 28 Before You Migrate This chapter provides an overview of the upgrade and data migration process Before upgrading familiarize yourself with the new features and fixes available in the current version Take the opportunity to r
78. efore not possible in most instances it is possible to configure Directory Proxy Server 6 0 to behave like a version 5 server for compatibility This chapter describes how the configuration properties in Directory Proxy Server 6 0 can be used to simulate a version 5 configuration The chapter covers the following topics Mapping the Global Configuration on page 83 Mapping the Connection Pool Configuration on page 87 Mapping the Groups Configuration on page 88 Mapping the Properties Configuration on page 97 Mapping the Events Configuration on page 103 Mapping the Actions Configuration on page 104 Configuring Directory Proxy Server 6 0 as a Simple Connection Based Router on page 104 Mapping the Global Configuration Before you change the Directory Proxy Server 6 0 configuration back up the configuration by using the dpadm backup command For more information see dpadm 1M You can configure Directory Proxy Server 6 0 by using the Directory Service Control Center DSCC or the dpconf command line utility For more information see dpconf 1M Directory Proxy Server 6 0 configuration can be retrieved as a set of properties For example information about the port is returned in the listen port property This section describes how to map the version 5 global configuration attributes to the corresponding properties in Directory Proxy Server 6 0 where applicable Not all functionality can be mapped
79. ema Directory Server 6 0 provides a new schema file 00ds6pwp ldif that contains new password policy attributes In addition certain configuration attributes have been added to O core tdif Apart from these files the standard schema files provided with Directory Server 6 0 are identical to those provided in version 5 To migrate the schema perform the following steps 1 Copy the 99user ldif file from the existing instance to the new instance If you have already added custom schema to the new instance you will need to choose which version of the custom schema to keep 2 Ifyou have defined custom schema in any other files copy these files to the new instance 3 Any fractional replication information must be redefined in the new instance Migrating Configuration Data Manually 38 Directory Server 5 configuration is specified in the file serverRoot slapd serverID config dse dif Directory Server 6 0 configuration is specified in the file instance path config dse ldif If you are migrating from 5 1 you must migrate the configuration files manually The easiest way to do this is to run the migrateInstance5 migration script to produce a 5 2 configuration and then to migrate the 5 2 configuration using dsmig For information on using migrateInstance5 see the Directory Server 5 2 2005Q1 Installation and Migration Guide For information on using dsmig to migrate the configuration see Using dsmig to Migrate Configuration Data
80. ent local disk space to house binaries and databases for both the old and new servers and also enough extra space to hold LDIF files containing the entries in all existing suffixes You can estimate the local disk space required as somewhat larger than the following calculation local space required 2 space for existing server space for LDIF files If you are using the automatic migration tool the following two prerequisites must be met The existing server instance must be stopped cleanly Ifthe new server is located on a different machine a complete image of the original server instance must be created on the new machine This includes all schema files configuration files security files and database files in an identical layout to the original server root To determine whether you should use automatic or manual migration see Deciding on Automatic or Manual Migration on page 28 Ifyour Directory Server deployment includes Identity Synchronization for Windows you must uninstall Identity Synchronization for Windows before migrating to Directory Server 6 0 For information about migrating Identity Synchronization for Windows see Chapter 7 Sun Java System Directory Server Enterprise Edition 6 0 Migration Guide March 2007 Sun Confidential Registered Outline of Migration Steps Deciding on the New Product Distribution Directory Server 6 0 is provided in two distributions Java Enterprise System distrib
81. entity Synchronization for Windows 121 Sun Confidential Registered Migrating Your System 122 Installing or Upgrading the Dependent Products Use the following steps to upgrade the Java Run Environment install Message Queue and upgrade Directory Server 1 Upgrade the Java 2 Runtime Environment or Java 2 SDK on each host except on Windows NT where Identity Synchronization for Windows components are installed The minimum required version is 1 5 0 Java 2 SDK http java sun com j2se 1 5 0 install html http java sun com j2se 1 4 2 install html Java 2 Runtime Environment http java sun com j2se 1 5 0 jre install html http java sun com j2se 1 4 2 jre install html 2 Install Message Queue 3 6 by using the instructions provided in Sun Java System Message Queue 3 6 Installation Guide 3 Upgrade Directory Server to version 6 0 For more information see Chapter 1 Note To keep the Administration Server intact use the N option while migrating Directory Server configuration and data to version 6 0 For more information on migrating configuration data and user data see Using dsmig to Migrate Configuration Data on page 31 and Using dsmig to Migrate User Data on page 35 respectively The Directory Server upgrade preserves your current Directory Server configuration and database Installing Identity Synchronization for Windows 6 0 Use the following steps to install the Identity Synchronization f
82. ep connection handler In Iplanet Directory Access Router 5 0 IDAR these configuration attributes are stored under ids proxy con Name group name ou groups ou pd2 ou iDAR o services In Directory Proxy Server 5 2 these configuration attributes are stored under ou groups cn user defined name ou dar config o NetscapeRoot The following table maps Directory Proxy Server 5 network group attributes to the corresponding Directory Proxy Server 6 0 properties and describes how to set these properties by using the command line TABLE6 5 Mapping Between Version 5 Network Group Attributes and 6 0 Properties Directory Proxy Server 5 Network Group Attribute Directory Proxy Server 6 0 Property ids proxy con Client domain name filters and ip address filters properties of a connection handler ids proxy con include property No equivalent ids proxy con include rule No equivalent ids proxy con ssl policy ssl_required Set this as a connection handler property by using the following command dpconf set connection handler prop CONNECTION HANDLER NAME is ssl mandatory true ids proxy con ssl policy ssl optional Set this as an LDAP data source property by using the following command dpconf set ldap data source prop dsl ssl policy client ids proxy con ssl policy ssl_ unavailable Set this as a connection handler property by using the following command dpconf set connection handler prop CONNECTION HANDLER NAME is ss
83. erdites LA DOCUMENTATION EST FOURNIE EN L ETAT ET TOUTES AUTRES CONDITIONS DECLARATIONS ET GARANTIES EXPRESSES OU TACITES SONT FORMELLEMENT EXCLUES DANS LA MESURE AUTORISEE PAR LA LOI APPLICABLE Y COMPRIS NOTAMMENT TOUTE GARANTIE IMPLICITE RELATIVE A LA QUALITE MARCHANDE A L APTITUDE A UNE UTILISATION PARTICULIERE OU A L ABSENCE DE CONTREFACON 070222 16599 Sun Confidential Registered Contents Pre acO viii a ia ane nn nat 15 Overview of the Migration Process for Directory Server oooococociociccicnicnonocnioninncnconconcorcnconcnn conos 25 Before You MISTALE suicida ht ne dan a aia od ati 25 Prerequisites to Migrating a Single Directory Server Instance From 5 1 eescesseeseeeeseseeeee 26 Prerequisites to Migrating a Single Directory Server Instance From 5 2 wees 26 Deciding on the New Product Distribution ss 27 Outline of Migration Steps Deciding on Automatic or Manual Migration Automated Migration Using the dsmig Command 20 0 0 eee cesesesseseeeeesecuesesneneeeeeseaneneaeeseneess 29 About the Automatic Migration TOO ss 29 Prerequisites for Running ASMIG ss Using dsmig to Migrate the Schema Using dsmig to Migrate Security Data sursis aeersnisain 31 Using dsmig to Migrate Configuration Data 31 Plagin Configuration Dita iia 32 Chained Suffix Configuration Data siennes 32 Configuration Data For Suffixes With Multiple Backend 0 cesses ees eesesseeseessneeseesseenee 33 Replication Configuration
84. errors although you should examine the definition of the group mentioned in the error message for potential circular definitions Migrating User Plug Ins Manually User plug ins cannot be migrated If you have custom user plug ins recompile them and add them to the Directory Server 6 0 instance manually For a detailed list of plug in API changes see Chapter 2 Changes to the Plug In API Since Directory Server 5 2 in Sun Java System Directory Server Enterprise Edition 6 0 Developers Guide Tasks to be Performed After Manual Migration 50 If you have migrated your server manually the following post migration tasks are required before you can run the new server Ifyou have customized user plug ins these need to be recompiled and added to the new server manually Ifthe migrated server was part of a replicated topology see Chapter 4 Ifyou have customized backup recovery and installation scripts you need to rewrite these scripts to comply with the new version Sun Java System Directory Server Enterprise Edition 6 0 Migration Guide March 2007 Sun Confidential Registered gt CHAPTER 4 Migrating a Replicated Topology Directory Server Enterprise Edition 6 0 does not provide a way to migrate an entire replicated topology automatically Migrating a replicated topology involves migrating each server individually Usually however you should be able to migrate your entire topology without any interruption in
85. ers hubs and masters then promoting the hubs to masters and the consumers to hubs then to masters The following sections demonstrate a sample migration of a simple multi master topology to a new all master topology The following figure shows the existing version 5 topology Chapter 4 Migrating a Replicated Topology 63 Sun Confidential Registered Migration Scenarios 5 x Master A 5 x Master B 24 24 1 I I FIGURE 4 13 Existing version 5 Topology Migrating All the Servers The first step is to migrate all the servers individually as described in Migrating a Replicated Topology to an Identical Topology on page 54 The resulting topology is illustrated in the following figure 64 Sun Java System Directory Server Enterprise Edition 6 0 Migration Guide March 2007 Sun Confidential Registered Migration Scenarios 6 0 Master A 6 0 Master B FIGURE4 14 Existing Topology With Migrated Servers Promoting the Hubs The next step involves promoting the hubs to masters and creating a fully meshed topology between the masters To promote the hubs follow the instructions in Promoting or Demoting Replicas in Sun Java System Directory Server Enterprise Edition 6 0 Administration Guide The following diagram illustrates the topology when the hubs have been promoted Chapter 4 Migrating a Replicated Topology 65 Sun Confidential Registered Migration Scenarios 66 6 0 Master A 6 0 Mas
86. ers master for synchronized users Core Message Queue Central Logger System Directory Server Plugin Manager and Console Active Directory Connector Directory Server Connector Directory Server Plugin The migration process keeps on demand password synchronization running continuously on the preferred master or on the secondary master Note If both hosts are running on a Solaris operating system then a third host running Windows 2000 with Active Directory is required for synchronization purposes only No components would be installed on the third host The following figure illustrates the process for migrating Identity Synchronization for Windows ina MMR deployment Sun Java System Directory Server Enterprise Edition 6 0 Migration Guide March 2007 Sun Confidential Registered Other Migration Scenarios Unpack Identity Synchronization for Windows 6 0 Bits Save 1 1 Configuration Using exportilcnf and Add Passwords to the Exported Configuration Stop Synchronization Run checktopics to Verify Message Queue Start is in Quiescent State Synchronization and Wait Yes Stop Identity Synchronization for Windows Service Back Up Connector State persist etc Directories password Changes on Both Directory Server Start Identity Synchronization for Windows Service EERE Losi Uninstall Directory Server Plugin Uninstall the Identity Synchronization for Windows 1 1 Active Directory and Directory S
87. erver Connectors Uninstall Identity Synchronization for Windows 1 1 Core Upgrade Install Message Queue 3 6 Upgrade to Directory Server 6 0 on Host 1 with Admin Server Intact Install Identity Synchronization for Windows 6 0 Core FIGURE7 2 Migrating a Multi Master Replication Deployment Multi Host Deployment with Windows NT Three hosts are used in this deployment scenario m A Windows NT system A host for Directory Server with the synchronized users and the Directory Server Connector Chapter 7 Migrating Identity Synchronization for Windows 141 Sun Confidential Registered Other Migration Scenarios A host for all other components Table 7 2 and Figure 7 3 illustrate how the Identity Synchronization for Windows components are distributed between the three hosts TABLE7 2 Multi Host Deployment Host 1 Host 2 Host 3 Directory Server with Directory Server for synchronized Windows NT Connector configuration repository users Core Message Queue Central Directory Server Connector Windows NT Subcomponents Logger System Manager and Password Filter DLL and Change Console Detector Service Active Directory Connector Directory Server Plugin In the previous scenario hosts 1 and 2 are running on the same operating system Note Directory Server at host1 contains the configuration registry and the Admin Server console Ensure you migrate to Directory Server 6 0 using the N option to keep the Admin Ser
88. erverRoot gt lib psw pLlugin so Restart Directory Server Open a Command Prompt window and type regedit to open the Registry Editor window Caution Back up your current registry file before proceeding to Manually Uninstalling 1 1 Core and Instances from Windows 2000 on page 130 a Inthe Registry Editor select My Computer in the left pane Sun Java System Directory Server Enterprise Edition 6 0 Migration Guide March 2007 Sun Confidential Registered What to Do if the 1 1 Uninstallation Fails b Select Registry Export Registry File from the menu bar c When the Export Registry File dialog box is displayed specify a name for the file and select a location to save the backup registry In the Registry Editor select Edit gt Delete from the menu bar Remove the following Identity Synchronization for Windows keys from the Windows Registry All entries under HKEY_LOCAL_MACHINE SOFTWARE Microsoft Windows CurrentVersion Uninstall Identity Synchronization for Windows m AllCurrentControlSet and ControlSet such as Cont rolSet Q1 ControlSet002 and so forth entries under HKEY_LOCAL_MACHINE SYSTEM which includes the following entries if they exist m Control Session Manager Environment lt isw installation directory gt m Services Eventlog Application Sun ONE Identity Synchronization for Windows m Services Sun ONE Identity Synchronization for Windows m Services iMQBroker Backup c
89. es TABLE5 1 Directory Server 5 and 6 commands Continued Version 5 Command Version 6 0 Command Description db2bak task dsconf backup Create a database backup archive remotely online db2index dsadm reindex Create and generate indexes locally offline db2index task dsconf reindex Create and generate indexes remotely online db21dif dsadm export Export database contents to LDIF locally offline db21dif task dsconf export Export database contents to LDIF remotely online entrycmp No change Compare the same entry in multiple replicas fildif No change Create a filtered version of an LDIF file idsktune No change Check patches and verifies system tuning insync No change Indicate synchronization between multiple replicas ldif2db dsadm import Import database contents from LDIF locally offline ldif2db task dsconf import Import database contents from LDIF remotely online ldif2ldap ldapmodify B Import data from LDIF over LDAP remotely online MigrateInstance5 dsmig manual migration Migrate data from a previous version procedure mmldif No change Combine multiple LDIF files monitor ldapsearch on cn monitor Retrieve performance monitoring information pwdhash No change Print the encrypted form of a password repldisc No change Discover a replication topology restart slapd dsadm restart Restart a Directory Server instance schema_push No change Update schema modification time stamps start slapd dsadm
90. es In Directory Proxy Server 5 these attributes determine what Directory Proxy Server should do with referrals In Directory Proxy Server 6 0 this functionality is provided by setting properties of a resource limits policy For information on configuring a resource limits policy see Creating and Configuring a Resource Limits Policy in Sun Java System Directory Server Enterprise Edition 6 0 Administration Guide In Iplanet Directory Access Router 5 0 IDAR these configuration attributes are stored under ids proxy con Name group name ou groups ou pd2 ou iDAR o services In Directory Proxy Server 5 2 these configuration attributes are stored under ou groups cn user defined name ou dar config o NetscapeRoot The following table maps the Directory Proxy Server 5 referral configuration attributes to the corresponding Directory Proxy Server 6 resource limits properties Chapter6 Migrating Directory Proxy Server 95 Sun Confidential Registered Mapping the Groups Configuration TABLE6 12 Mapping of Directory Proxy Server 5 Referral Configuration Attributes to Directory Proxy Server 6 resource limits Properties Directory Proxy Server 5 Attribute Directory Proxy Server 6 Property ids proxy con reference referral policy ids proxy con referral ssl policy ids proxy con referral bind policy referral policy referral bind policy ids proxy con max refcount referral hop limit Map
91. es from the existing 1 1 installation tree On Solaris type the following command cd serverRoot isw hostname tar cf var tmp connector state tar persist etc On Windows type the following command cd serverRoot isw hostname zip r C WINNT Temp connector state zip persist etc JAVA HOME bin jar cfM TEMP connector state jar persist etc Chapter 7 Migrating Identity Synchronization for Windows 119 Sun Confidential Registered Migrating Your System Alternatively use any archive program for Windows such as WinZip 9 Start the Identity Synchronization for Windows services For more information see Starting and Stopping Services in Sun Java System Directory Server Enterprise Edition 6 0 Installation Guide Uninstalling Identity Synchronization for Windows Note The Identity Synchronization for Windows 1 1 uninstall program removes the SUNWjss package if it is not registered for use by another application In particular this situation may occur on a Solaris machine if you installed a zip version of Directory Server 5 2 where the uninstall program removes the jss3 jar file from usr share lib mps secvl If you encounter this situation as you migrate to Identity Synchronization for Windows 6 0 the installer reports that a required file is missing and logs the file name to the installation log When this happens you must re install the required patches and restart the installation process For a list of requi
92. esseesseseesseseesseesesssessssneseesnes 79 Binaries Previously Under ServerRoot bin Libraries and Plug Ins Previously Under ServerRoot lib Online Help Previously Under ServerRoot manual ss 79 Plug Ins Previously Under ServerRoot plugins sn 80 Utilities Previously Under ServerRoot shared Din swerscnencarinnrocararaninraana 80 Certificate aiid Key Files isccctssssscsccstesssstscsiscesvdsscsnssnsibes canicas tinc sena dotadas 81 Silent Installation and Uninstallation Templates 0 oes eesesseeseeseeesesseeseeseeateaeeateatensesnes 82 Server Instance Scripts Previously Under ServerRoot slapd ServerID usss 82 Server Instance SubdirectOries suis lot notion 82 6 Migrating Directory Proxy Server Mapping the Global Configuration Mapping the Global Security Configuration ss 85 Mapping the Connection Pool Configuration seen 87 Mapping the Groups Configuration inner Mapping the Group Obra Mapping the Network Group Object Mapping Bind Forwarding ss sites shine Mist nada there Nine Mapping Operation Forwarding siria 91 Mapping Subtree Aide dll 92 Mapping Search Request Controls reporna eiii Mapping Compare Request Controls sine Mann dun Mapping Attributes Modifying Search Requests Mapping Attributes Restricting Search Responses un 94 Mapping the Referral Configuration Attributes nn 95 Mapping the Server Load Configuration sen 96 Mapping the Properties Configuration esse 97 Attribute Renaming Property dis se dit
93. ettings Migrating the Configuration Migrating the Data Migrating the Plug Ins Post migration tasks To avoid unforeseen problems with the migration these steps should be performed in the order listed above In certain cases you can automate some or all of these steps using the dsmig command The following section indicates what can be automated and what must be done manually depending on your existing deployment Chapter 1 Overview of the Migration Process for Directory Server 27 Sun Confidential Registered Deciding on Automatic or Manual Migration Deciding on Automatic or Manual Migration This section provides a table that shows when you can use dsmig and when you need to migrate manually It is based on the migration steps described in the previous section TABLE 1 1 Migration Matrix Showing Support for Automated Migration From To Migration Step Software Version Version 32 64 bit os Schema Config Security Data Plug Ins 5 1 6 0 Any Any Manual Manual Manual Manual Manual 5 2 6 0 Different Any dsmig dsmig dsmig Manual Manual 52 6 0 Same Different dsmig dsmig dsmig Manual Manual 5 2 6 0 Same Same dsmig dsmig dsmig dsmig Manual The following two chapters explain how to perform each migration step outlined above either automatically or manually For information on automatic migration see Chapter 2 For information on manual migration see Chapter 3 28 Sun Java Syste
94. eview design decisions made during implementation of existing directory services For a description of all new features and fixes see What s New at a Glance in Sun Java System Directory Server Enterprise Edition 6 0 Evaluation Guide For information about the new features that specifically affect migration see Chapter 5 25 Sun Confidential Registered Before You Migrate 26 Prerequisites to Migrating a Single Directory Server Instance From 5 1 Before migrating from a 5 1 server instance ensure that the following prerequisites are met Directory Server 6 0 must be installed The new server can be installed on the same machine as the existing server or on a different machine Ensure that the new machine has sufficient local disk space to house binaries and databases for both the old and new servers and also enough extra space to hold LDIF files containing the entries in all existing suffixes You can estimate the local disk space required as somewhat larger than the following calculation local space required 2 space for existing server space for LDIF files Prerequisites to Migrating a Single Directory Server Instance From 5 2 Before migrating from a 5 2 server instance ensure that the following prerequisites are met Directory Server 6 0 must be installed The new server can be installed on the same machine as the existing server or on a different machine Ensure that the new machine has suffici
95. files in Directory Server 6 0 TABLE5 6 Location of Certificate and Key Files 5 2 File 6 0 File Remarks ServerRoot shared config cantmamanp th alias certmap t dnfiguration file for mapping certificates to directory entries ServerRoot alias cert8 db instance path alias cert8 db Trusted certificate database file ServerRoot alias key3 db instance path alias key3 db Database file containing client keys ServerRoot alias secmod db instance path alias secmod dh Database file containing security modules such as PKCS 11 Chapter 5 Architectural Changes in Directory Server 6 0 Sun Confidential Registered 81 Changes to the Installed Product Layout Silent Installation and Uninstallation Templates In Directory Server 5 2 the ServerRoot setup5 directory contained sample templates for silent installation and uninstallation Silent installation and uninstallation are no longer needed for Directory Server 6 0 and these files have therefore been deprecated Server Instance Scripts Previously Under ServerRoot s apd ServerID The command line administration scripts previously under ServerRoot slapd ServerID have been replaced in the new administration framework and deprecated These commands and their Directory Server 6 0 equivalents are described in Command Line Changes on page 71 Server Instance Subdirectories The following table describes the new locations for the co
96. g Clear Text Passwords For security reasons the export11cnf utility does not export clear text passwords from version 1 1 Instead the utility inserts empty strings in cleartextPassword fields wherever applicable For example Sun Java System Directory Server Enterprise Edition 6 0 Migration Guide March 2007 Sun Confidential Registered Preparing for Identity Synchronization for Windows Migration lt Credentials userName cn iswservice cn users dc example dc com cleartextPassword gt lt INSERT PASSWORD BETWEEN THE DOUBLE QUOTES IN THE ABOVE FIELD gt You must enter a password manually between double quotes for every cleartextPassword field in the exported configuration file before you can import the file into Identity Synchronization for Windows importcnf validation prevents you from importing a configuration file with empty password values For example lt Credentials userName cn iswservice cn users dc example dc com cleartextPassword mySecretPassword gt lt INSERT PASSWORD BETWEEN THE DOUBLE QUOTES IN THE ABOVE FIELD gt Sample Export Configuration File In the following sample exported configuration file m ad host example com refers to the Active Directory domain controller ds host example com refers to the host running Directory Server EXAMPLE7 1 Sample Export Configuration File lt xml version 1 0 encoding UTF 8 gt lt ActiveConfiguration gt lt SunDirectorySource p
97. ges are sent The following table lists the attributes of the ids proxy sch LogProperty object class and describes at a high level how the corresponding functionality is achieved in Directory Proxy Server 6 0 TABLE6 17 Version 5 and Version 6 Log Functionality Directory Proxy Server 5 Attribute Purpose Directory Proxy Server 6 0 Equivalent ids proxy con log level Level of logging Global log level ids proxy con stat level Kinds of statistics logged Monitoring data ids proxy con log syslog Syslog facility code syslog output for administrative alerts No equivalent for error messages ids proxy con log file Path to log file log file name of the error log object 102 Sun Java System Directory Server Enterprise Edition 6 0 Migration Guide March 2007 Sun Confidential Registered Mapping the Events Configuration TABLE6 17 Version 5 and Version 6 Log Functionality Continued Directory Proxy Server 5 Attribute Purpose Directory Proxy Server 6 0 Equivalent ids proxy con audit syslog Syslog facility code for audit No equivalent log ids proxy con audit file Path to audit log file log file name of the access log object Because a one to one mapping of log configuration is not possible between the two versions you need to understand the new logging model and then configure your new logs accordingly rather than migrating your old log configuration For more information see Chapter 27
98. grep i Identity Synchronization Note Run the pkgrm package name command again to check if there are still existing packages due to dependencies Remove the Directory Server Plugin a Open the Directory Server Console and select the Configuration tab b Inthe left pane expand the Plugins node and select the pswsync node c Inthe right pane clear the Enable plug in check box d Click Save Chapter 7 Migrating Identity Synchronization for Windows 127 Sun Confidential Registered What to Do if the 1 1 Uninstallation Fails 128 h From the Directory Server Console locate and remove the following entry from the Configuration Directory cn pswsync cn plugins cn config Stop Directory Server Remove the Plugin binary by typing the following command rm f serverRoot lib psw plugin so Restart Directory Server Back up copy and rename the current productregistry file located in var sadm install productregistry Manually edit the productregistry file in var sadm install to remove the following entries if present Note For best results use an XML editor Alternatively you can use a standard text editor Some of the following components may not be included in your file You must delete the beginning tag lt compid gt ending tag lt compid gt and all contents in between both tags Ellipses are used in the following list to represent any additional text or tags that are included as part of
99. hdsml soapschemalocation dsKeyedPassword dsMappedDN dsMatching pattern dsMatching regexp dsSaslPluginsEnable dsSaslPluginsEnable dsSaslPluginsPath dsSearchBaseDN dsSearchFilter Chapter 2 Automated Migration Using the dsmig Command 33 Sun Confidential Registered Using dsmig to Migrate Configuration Data 34 nsabandonedsearchcheckinterval nsbindconnectionslimit nsbindretrylimit nsbindtimeout nschecklocalaci nsconcurrentbindlimit nsconcurrentoperationslimit nsconnectionlife nshoplimit nsMatchingRule nsmaxresponsedelay nsmaxtestresponsedelay nsoperationconnectionslimit nspossiblechainingcomponents nspossiblechainingcomponents nspossiblechainingcomponents nspossiblechainingcomponents nspossiblechainingcomponents nspossiblechainingcomponents nsproxiedauthorization nsreferralonscopedsearch nsslapd db durable transaction nsslapd db home directory nsslapd db logbuf size nsslapd db logdirectory nsslapd db replication batch val nsslapd db transaction logging nsslapd directory nsslapd disk full threshold nsslapd disk low threshold nsslapd enquote sup oc nsslapd exclude from export nsslapd groupevalnestlevel nsslapd localhost nsslapd localuser nsslapd mode nsslapd port nsslapd return exact case nsslapd rewrite rfc1274 nsslapd secureport nsslapd security nsSSL2 nsSSL3 nsSSLActivation nsSSLServerAuth nsSSLSessionTimeout nsState nstransmittedcontrols plugin order preoperation finish entry encode result
100. he U S and other countries Products bearing SPARC trademarks are based upon an architecture developed by Sun Microsystems Inc The OPEN LOOK and Sun Graphical User Interface was developed by Sun Microsystems Inc for its users and licensees Sun acknowledges the pioneering efforts of Xerox in researching and developing the concept of visual or graphical user interfaces for the computer industry Sun holds a non exclusive license from Xerox to the Xerox Graphical User Interface which license also covers Sun s licensees who implement OPEN LOOK GUIs and otherwise comply with Sun s written license agreements Products covered by and information contained in this publication are controlled by U S Export Control laws and may be subject to the export or import laws in other countries Nuclear missile chemical or biological weapons or nuclear maritime end uses or end users whether direct or indirect are strictly prohibited Export or reexport to countries subject to U S embargo or to entities identified on U S export exclusion lists including but not limited to the denied persons and specially designated nationals lists is strictly prohibited DOCUMENTATION IS PROVIDED AS IS AND ALL EXPRESS OR IMPLIED CONDITIONS REPRESENTATIONS AND WARRANTIES INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY FITNESS FOR A PARTICULAR PURPOSE OR NON INFRINGEMENT ARE DISCLAIMED EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID
101. he following command dpconf set ldap data source prop data source name attr name mappings client attribute name server attribute name Forbidden Entry Property In Directory Proxy Server 5 the ids proxy sch ForbiddenEntryProperty object is used to specify a list of entries or attributes that are hidden from client applications In Directory Proxy Server 6 0 this functionality is achieved by creating a search data hiding rule for a request filtering policy In Iplanet Directory Access Router 5 0 IDAR these configuration attributes are stored under ids proxy con Name group name ou groups ou pd2 ou iDAR o services In Directory Proxy Server 5 2 these configuration attributes are stored under ou groups cn user defined name ou dar config o NetscapeRoot The following table maps the attributes of the ids proxy sch ForbiddenEntryProperty object to the corresponding properties of a search data hiding rule in Directory Proxy Server 6 0 For information about creating search data hiding rules see To Create Search Data Hiding Rules in Sun Java System Directory Server Enterprise Edition 6 0 Administration Guide Chapter6 Migrating Directory Proxy Server 97 Sun Confidential Registered Mapping the Properties Configuration 98 TABLE6 14 Mapping of Directory Proxy Server 5 Server Load Configuration Attributes to Directory Proxy Server 6 Resource Limits Properties Directory Proxy Server 5 Attribute Dire
102. he same connection the connection can be reallocated to another connection handler For information on how to configure this functionality in Directory Proxy Server 6 0 see Creating Configuring and Deleting Connection Handlers in Sun Java System Directory Server Enterprise Edition 6 0 Administration Guide Configuring Directory Proxy Server 6 0 as a Simple Connection Based Router 104 Itis possible to configure an instance of Directory Proxy Server 6 0 to behave as a simple connection based router with the same functionality as Directory Proxy Server 5 2 To do this map the configuration attributes described previously and follow the procedure describe in Configuring Directory Proxy Server as a Connection Based Router in Sun Java System Directory Server Enterprise Edition 6 0 Administration Guide Sun Java System Directory Server Enterprise Edition 6 0 Migration Guide March 2007 Sun Confidential Registered CHAPTER 7 Migrating Identity Synchronization for Windows This chapter explains how to migrate your system from Identity Synchronization for Windows version 1 1 and 1 1 SP1 to version 6 0 In the remainder of this chapter version 1 1 includes version 1 1 SP1 Note When you install Identity Synchronization for Windows version 1 1 Message Queue is also installed on your system Identity Synchronization for Windows 6 0 does not install Message Queue For installation and upgrade information about Messag
103. hese events can be sent to the syslog daemon or to an administrator through email The Directory Proxy Server 6 0 access log is equivalent to the version 5 audit log Logs in version 5 were configured by using the ids proxy sch LogProperty object class Logs in Directory Proxy Server 6 0 are configured by setting properties for the access and error log using the dpconf command For example to set properties for the access log use the following command dpconf set access log prop PROPERTY VALUE Directory Proxy Server 6 0 provides new log features such as log file rotation and enables log configuration to be fine tuned For example one log level can be set per message category In Iplanet Directory Access Router 5 0 IDAR log configuration attributes are stored under ids proxy con Config Name name ou global ou pd2 ou iDAR o services In Directory Proxy Server 5 2 log configuration attributes are stored under ids proxy con Config Name user defined name ou system ou dar config o netscaperoot It is not really possible to map the log configuration between Directory Proxy Server 5 and Directory Proxy Server 6 0 because the logging models between these two versions are very different The Directory Proxy Server 5 log model combines what is logged with where it is logged In Directory Proxy Server 6 0 the model is cleaner One set of properties describes what is logged and a separate set of properties describes where log messa
104. his new replicaID must be different to the replicalD of the old server that is being migrated and must be unique within the replicated topology Manual Reset of Replication Credentials dsmig does not migrate the password of the default replication manager entry cn replication manager cn replication cn config Instead the replication manager password is deleted Therefore whether you are using manual or automatic migration you must reset the replication manager password manually To reset the replication manager password use the following command dsconf set server prop h host p port def repl manager pwd file filename In addition dsmig does not migrate non default replication manager entries Ifa version 5 replica uses an entry other than the default replication manager and if this entry is under cn config you must add the default replication manager manually Please refer to the documentation to add a non default replication manager entry manually For information about adding a non default replication manager see Using a Non Default Replication Manager in Sun Java System Directory Server Enterprise Edition 6 0 Administration Guide Problems Related to Tombstone Purging In some cases after migrating a replicated topology you might experience problems related to tombstone purging In some cases tombstone entries are not purged when they should be This problem can be resolved by re indexing the objectclass attribute
105. ices In Directory Proxy Server 5 2 these configuration attributes are stored under ou groups cn user defined name ou dar config o NetscapeRoot The following table maps version 5 group attributes to the corresponding connection handler properties TABLE6 4 Mapping Between Version 5 Group Attributes and Version 6 Connection Handler Properties Directory Proxy Server 5 Group Attribute Directory Proxy Server 6 0 Connection Handler Property ids proxy con Name cn ids proxy con Priority priority ids proxy sch Enable is enabled ids proxy sch belongs to No equivalent ids proxy con permit auth none TRUE allowed auth methods anonymous a gana HE allowed auth methods sasl a allowed auth methods simple ids proxy con permit auth simple TRUE 88 Sun Java System Directory Server Enterprise Edition 6 0 Migration Guide March 2007 Sun Confidential Registered Mapping the Groups Configuration Mapping the Network Group Object Directory Proxy Server 5 groups are configured by setting the attributes of the ids proxy sch NetworkGroup object class These attributes can be mapped to properties of Directory Proxy Server 6 0 connection handlers data sources and listeners For a list of all the properties related to these objects run the dpconf help properties command and search for the object For example to locate all the properties of a connection handler run the following command dpconf help properties gr
106. ieved by setting the following properties ofthe LDAP data source monitoring bind timeout monitoring entry timeout monitoring inactivity timeout monitoring interval For information about setting LDAP data source properties see To Configure an LDAP Data Source in Sun Java System Directory Server Enterprise Edition 6 0 Administration Guide Load Balancing Property In Directory Proxy Server 5 the ids proxy sch LoadBalanceProperty is used to configure load balancing across multiple LDAP servers Directory Proxy Server 5 supports proportional Chapter6 Migrating Directory Proxy Server 99 Sun Confidential Registered Mapping the Properties Configuration dpconf set ldap 100 load balancing only that is each LDAP server is allotted a certain percentage of the total load The ids proxy sch LoadBalanceProperty object class has one attribute ids proxy con Server whose value has the following syntax server name percentage In Iplanet Directory Access Router 5 0 IDAR these configuration attributes are stored under ids proxy con Name load balance ou properties ou pd2 ou iDAR o services In Directory Proxy Server 5 2 these configuration attributes are stored under ids proxy con name load balancing 1 ou properties cn user defined name ou dar config o Nets In Directory Proxy Server 6 0 load balancing is configured as a property of a data source pool A data source pool is essentially a co
107. imq_uninstall m Manually uninstall the packages and directories Use the pkgrm command to remove the following packages SUNWaclg SUNWiqum SUNWiqjx SUNWiqlen SUNWxs rt SUNWiqu SUNWjaf SUNWiqfs SUNWjhrt SUNWiqdoc SUNWiquc SUNWiqsup SUNWigqr SUNWjmail Use the rm rf command to remove the following directories Sun Java System Directory Server Enterprise Edition 6 0 Migration Guide March 2007 Sun Confidential Registered What to Do if the 1 1 Uninstallation Fails 3 etc imq var imq usr bin imq To remove the Identity Synchronization for Windows 1 1 Solaris packages run pkg rm package name for each of the packages listed in Manually Uninstalling 1 1 Core and Instances from Solaris on page 125 The following example shows the use of pkgrm to uninstall packages pkgrm SUNWidscm SUNWidscn SUNWidscr SUNWidsct SUNWidsoc Package Name Description SUNWidscm Sun ONE Directory Server Identity Synchronization package for Core components and Connectors SUNWidscn Sun ONE Directory Server Identity Synchronization package for Console help files SUNWidscr Sun ONE Directory Server Identity Synchronization package for Core Components SUNWidsct Sun ONE Directory Server Identity Synchronization package for Connectors SUNWidsoc Sun ONE Directory Server Identity Synchronization package for Object Cache Type the following command to verify that all of the packages were removed pkginfo
108. inLimit pwdMustChange pwdAllowUserChange pwdSafeModify pwdLockout pwdLockoutDuration pwdMaxFailure Chapter 3 Migrating Directory Server Manually Sun Confidential Registered 43 Migrating Configuration Data Manually 44 TABLE3 3 Mapping Between 5 and 6 0 Password Policy Attributes Continued Legacy Directory Server Attribute Directory Server 6 0 Attribute passwordResetFailureCount pwdFailureCountInterval passwordUnlock SNMP Attributes The entry cn SNMP cn config does not exist in Directory Server 6 0 All attributes under this entry are therefore deprecated For information about setting up SNMP in Directory Server 6 0 see Setting Up SNMP for Directory Server in Sun Java System Directory Server Enterprise Edition 6 0 Administration Guide UniquelD Generator Configuration Attributes The nsState attribute under cn uniqueid generator cn config must be migrated Database Configuration Attributes General database configuration attributes are stored under cn config cn ldbm database cn plugins cn config The following attributes must be migrated nsslapd lookthroughlimit nsslapd allidsthreshold nsslapd cache autosize nsslapd cache autosize split nsslapd cachesize nsslapd db checkpoint interval nsslapd db circular logging nsslapd db durable transactions nsslapd db idl divisor nsslapd db locks nsslapd db logbuf size nsslapd db logfile size nsslapd db page size nsslapd db transaction ba
109. ion 6 0 Migration Guide March 2007 Sun Confidential Registered Using dsmig to Migrate Configuration Data When you run this command any custom schema defined in the 99user ldif file are copied to the new instance Ifthe new instance is already in production and you have already modified the 99user 1dif file of the new instance dsmig performs a best effort merge of the two files Custom schema defined in any other files are also copied to the new instance During schema migration all fractional replication information is moved from the schema files Fractional replication must be redefined in the new instance For more information see dsmig 1M Using dsmig to Migrate Security Data To migrate the security settings automatically run the following command dsmig migrate security old instance path new instance path During the migration of security settings dsmig performs the following tasks Backs up the certificate and database files in the new instance Copies the certificate database and key database files from the old instance to the new instance Copies the password file from the old instance to the new instance Copies the certificate mapping file from the old instance to the new instance Ifthe old instance uses an external security token copies the security module database and the external token library to the new instance For more information see dsmig 1M Using dsmig to Migrate Configuratio
110. ion directory is created within the new instance directory new instance path migration This directory is a repository for data produced by the migration including log files and migration status files dsmig includes a set of sub commands and options that map to the individual migration steps described in Outline of Migration Steps on page 27 For information about the usage of dsmig see dsmig 1M 29 Sun Confidential Registered Prerequisites for Running dsmig Prerequisites for Running dsmig In this section old instance refers to the 5 2 instance and new instance refers to the Directory Server 6 0 instance Before you use dsmig to migrate an instance ensure that the following tasks have been performed The Directory Server 6 0 packages either zip or native packages have been installed The Directory Server 6 0 packages can be installed on the same machine that holds the Directory Server 5 2 instance or on a different machine The old instance must have been stopped correctly A disorderly shutdown of the old instance will cause problems during the migration Even if the old and new instance are on different machines the old instance must be stopped before the migration is started m dsmig has access to the old instance files Ifthe old and new instances are on different machines a complete image of the old instance must be created on the machine that hosts the new instance The complete image inc
111. ise Edition 6 0 Migration Guide March 2007 Sun Confidential Registered What to Do if the 1 1 Uninstallation Fails What to Do if the 1 1 Uninstallation Fails If the version 6 0 installation program finds remnants of the version 1 1 system the 6 0 installation will fail Verify that all of the 1 1 components are completely removed from the system prior to installing version 6 0 If the uninstallation program does not uninstall all of the version 1 1 components you must manually clean up the Identity Synchronization for Windows product registry and Solaris packages Detailed instructions for uninstalling Identity Synchronization for Windows version 1 1 manually are provided in the following sections Manually Uninstalling 1 1 Core and Instances from Solaris on page 125 Manually Uninstalling 1 1 Core and Instances from Windows 2000 on page 130 Manually Uninstalling a 1 1 Instance from Windows NT on page 135 Note The instructions provided in this section are for uninstalling Identity Synchronization for Windows version 1 1 and 1 1 SP1 only Do not use the manual uninstallation procedures provided in the following sections unless the Identity Synchronization for Windows uninstallation program fails Manually Uninstalling 1 1 Core and Instances from Solaris Use the instructions provided in this section to manually uninstall Core from a Solaris machine Note In this section Identity Synchronization for
112. istener and a secure listener The version 5 listen configuration attributes can be mapped to the following four listener properties To configure listener properties use the dpconf command as follows dpconf set ldap listener prop PROPERTY dpconf set ldaps listener prop PROPERTY For more information see Configuring Listeners Between Clients and Directory Proxy Server in Sun Java System Directory Server Enterprise Edition 6 0 Administration Guide ids proxy con listen port listen port ids proxy con listen host listen address ids proxy con listen backlog max connection queue size ids proxy con ldaps port listen port property of the ldaps listener 84 Sun Java System Directory Server Enterprise Edition 6 0 Migration Guide March 2007 Sun Confidential Registered Mapping the Global Configuration TABLE6 1 Mapping of Version 5 Global Configuration Attributes to 6 0 Properties Continued Directory Proxy Server 5 Attribute Directory Proxy Server 6 0 Property ids proxy con max conns This attribute can be mapped to the max client connections property of a connection handler resource limit To configure this property use the dpconf command as follows dpconf set resource limit policy prop POLICY NAME max client connections VALUE For more information see Creating and Configuring a Resource Limits Policy in Sun Java System Directory Server Enterprise Edition 6 0 Administration Gui
113. ivalent Managing Certificates Directory Proxy Server 5 certificates were managed by using the certreg utility or by using the console In Directory Proxy Server 6 0 certificates are managed by using the dpadm command or by using the DSCC Certificates must be installed on each individual data source in Directory Proxy Server 6 0 For information about managing certificates in Directory Proxy Server 6 0 see Chapter 19 Directory Proxy Server Certificates in Sun Java System Directory Server Enterprise Edition 6 0 Administration Guide Access Control on the Proxy Configuration In Directory Proxy Server 5 access control on the proxy configuration is managed by ACIs in the configuration directory server In Directory Proxy Server 6 0 access to the configuration file is restricted to the person who created the proxy instance or to the proxy manager if the configuration is accessed through Directory Proxy Server Editing the configuration file directly is not supported Sun Java System Directory Server Enterprise Edition 6 0 Migration Guide March 2007 Sun Confidential Registered Mapping the Connection Pool Configuration Mapping the Connection Pool Configuration Directory Proxy Server 5 can be configured to reuse existing connections to the backend LDAP servers This can provide a significant performance gain if the backend servers are on a Wide Area Network WAN In Directory Proxy Server 6 0 this function
114. ization as described in Starting and Stopping Synchronization in Sun Java System Directory Server Enterprise Edition 6 0 Installation Guide Sun Java System Directory Server Enterprise Edition 6 0 Migration Guide March 2007 Sun Confidential Registered Migrating Your System Verify that your system is in a stable state From the migration directory execute checktopics as described in Using the checktopics Utility on page 114 The following example shows the execution of the checktopics command java jar checktopics jar D cn directory manager w s dc example dc com q Z Stop Identity Synchronization for Windows services daemons as described in Starting and Stopping Services in Sun Java System Directory Server Enterprise Edition 6 0 Installation Guide Note Do not stop the Sun ONE Message Queue service On Windows NT only perform the following steps a Stop the Sun One NT Change Detector Service by typing the following command net stop Sun One NT ChangeDetector Service b Save the NT Change Detector Service counters i Open the Registry Editor by executing regedt32 exe ii SelecttheHKEY LOCAL MACHINE window iii Navigate to the SOFTWARE Sun Microsystems PSW 1 1 node iv Save the following registry values HighestChangeNumber LastProcessedSecLogRecordNumber LastProcessedSecLogTimeStamp QueueSize Save the connector states by backing up the persist and etc directori
115. kedtime syntax 1 3 6 1 4 1 1466 115 121 1 24 gt lt TopologyHost parent attr SchemaLocation hostname ds host example com port 389 portSSLOption false securePort 636 gt lt Credentials parent attr Credentials userName cn directory manager cleartextPassword gt lt INSERT PASSWORD BETWEEN THE DOUBLE QUOTES IN THE ABOVE FIELD gt lt TopologyHost gt lt AttributeDescription parent attr SignificantAttribute Chapter 7 Migrating Identity Synchronization for Windows 113 Sun Confidential Registered Preparing for Identity Synchronization for Windows Migration 114 EXAMPLE7 1 Sample Export Configuration File Continued name uid syntax 1 3 6 1 4 1 1466 115 121 1 15 gt lt AttributeDescription parent attr CreationAttribute name sn syntax 1 3 6 1 4 1 1466 115 121 1 15 gt lt AttributeDescription parent attr SignificantAttribute name sn syntax 1 3 6 1 4 1 1466 115 121 1 15 gt lt SunDirectoryGlobals gt lt ActiveConfiguration gt After the completion of configuration export export11cnf reports the result of the operation If the operation fails an appropriate error message is displayed with an error identifier Checking for Undelivered Messages The migration process minimizes system downtime by preserving the connectors states in the existing deployment However these states reflect only the last change received and acknowledged by the Message Queue The
116. l mandatory false Chapter6 Migrating Directory Proxy Server 89 Sun Confidential Registered Mapping the Groups Configuration 90 TABLE6 5 Mapping Between Version 5 Network Group Attributes and 6 0 Properties Continued Directory Proxy Server 5 Network Group Attribute Directory Proxy Server 6 0 Property ids proxy con tcp no delay Set this as a property for a specific listener port by using the following command dpconf set ldap listener prop use tcp no delay true ids proxy con allow multi ldapv2 bind No equivalent ids proxy con reverse dns lookup No equivalent ids proxy con timeout This functionality exists but with less granularity than in Directory Proxy Server 5 Set this limit as a property fora specific listener port by using the following command dpconf set ldap listener prop connection idle timeout value Mapping Bind Forwarding Directory Proxy Server 5 bind forwarding is used to determine whether to pass a bind request on to an LDAP server or to reject the bind request and close the client s connection Directory Proxy Server 6 0 forwards either all bind requests or no bind requests However by setting the allowed auth methods connection handler property successful binds can be classified into connection handlers according to the authentication criteria Directory Proxy Server 6 0 can be configured to reject all requests from a specific connection handler providing th
117. llection of LDAP servers to which Directory Proxy Server can route requests For information about setting up a data source pool see Creating and Configuring LDAP Data Source Pools in Sun Java System Directory Server Enterprise Edition 6 0 Administration Guide For a list of properties associated with a data source pool run the following command dpconf help properties grep ldap data source pool Directory Proxy Server 6 0 supports proportional load balancing but also supports additional load balancing algorithms To configure proportional load balancing set the property of the data source pool as follows data source pool prop data source pool name load balancing algorithm proportional The percentage of load allotted to each server is configured by setting various properties of an attached data source An attached data source is a data source that has been attached to a specific data source pool To configure proportional load set the weight properties of the attached data source for each operation type as follows dpconf set attached ldap data source prop data source pool name attached data source name add weight value bind weight value compare weight value delete weight value modify dn weight value modify weight value search weight value For more information see Configuring Load Balancing in Sun Java System Directory Server Enterprise Edition 6 0 Administration Guide Monitoring Backend Servers T
118. llowing sections describe the standard plug ins whose configuration must be migrated if you have changed it 7 Bit Check Plug In The configuration of this plug in is stored under cn 7 bit check cn plugins cn config The following attributes must be migrated nsslapd pluginarg nsslapd pluginenabled Class of Service Plug In The configuration of this plug in is stored under cn Class of Service cn plugins cn config The following attributes must be migrated nsslapd pluginarg nsslapd pluginenabled DSML Frontend Plug In The configuration of this plug in is stored under cn DSMLv2 SOAP HTTP cn frontends cn plugins cn config The following attributes must be migrated ds hdsml port ds hdsml iobuffersize ds hdsml requestmaxsize ds hdsml responsemsgsize ds hdsml poolsize ds hdsml poolmaxsize ds hdsml clientauthmethod ds hdsml rooturl Sun Java System Directory Server Enterprise Edition 6 0 Migration Guide March 2007 Sun Confidential Registered Migrating Configuration Data Manually ds hdsml soapschemalocation ds hdsml dsmlschemalocation nsslapd pluginenabled Pass Through Authentication Plug In The configuration of this plug in is stored under cn Pass Through Authentication cn plugins cn config The following attribute must be migrated nsslapd pluginenabled The nsslapd pluginarg attributes must be migrated only if you require the configuration for o netscapeRoot to be migrated Password Synchronizatio
119. lti master topology Migrating the Consumers For each consumer in the replicated topology Reroute clients to another consumer in the topology Disable any replication agreements to the consumer you want to migrate Stop the consumer Migrate the consumer according to the instructions under Chapter 1 Start the consumer Enable the replication agreements from the hubs to that consumer If you have migrated the data check that replication is in sync If you have not migrated the data reinitialize the consumer Reroute clients back to the consumer SO SOY Gre Ge Nor The following sequence of diagrams illustrate the migration of a consumer as described above The first diagram shows the version 5 topology before the migration Sun Java System Directory Server Enterprise Edition 6 0 Migration Guide March 2007 Sun Confidential Registered Migration Scenarios 5 x Master A 5 x Master B FIGURE 4 1 Existing version 5 Topology The first step involves rerouting clients and disabling replication agreements effectively isolating the consumer from the topology FIGURE 4 2 Isolating the Consumer From the Topology Chapter 4 Migrating a Replicated Topology 55 Sun Confidential Registered Migration Scenarios 56 The next step involves migrating the version 5 consumer 5 x Master A 5 x Master B 24 1 FIGURE4 3 Migrating the version 5 Consumer The next step involves enabling the replication agr
120. ludes all the files required for migration of the instance schema configuration security and database files The complete image files must be located in the same directories as they were under the original Server Root You can run cp r to achieve this provided none of the files have been relocated outside the Server Root You can create and start the new instance manually but is not mandatory to create the new instance before running dsmig dsmig checks whether a new Directory Server instance exists in the specified path Ifa new instance exists the commands are carried out on this instance Ifa new instance does exist the instance is created automatically The new instance can be created anywhere except for the exact location of the old instance Using dsmig to Migrate the Schema 30 Directory Server 5 2 schema files are located in serverRoot slapd instance path config schema Directory Server 6 0 schema files are located in INSTANCE PATH config schema Directory Server 6 0 provides a new schema file 00ds6pwp 1dif that contains new password policy attributes In addition certain configuration attributes have been added to O core tdif Apart from these files the standard schema files provided with Directory Server 6 0 are identical to those provided in 5 2 To migrate the schema automatically run the following command dsmig migrate schema old instance path new instance path Sun Java System Directory Server Enterprise Edit
121. m Directory Server Enterprise Edition 6 0 Migration Guide March 2007 Sun Confidential Registered CHAPTER 2 Automated Migration Using the dsmig Command Directory Server 6 0 provides a command line migration tool to help you migrate from a Directory Server 5 2 instance to a Directory Server 6 0 instance You can only use the migration tool if your deployment satisfies the requirements for automatic migration described in Deciding on Automatic or Manual Migration on page 28 The migration tool provides migration per instance If several instances exist within the same server root the migration tool must be run for each individual instance This chapter explains how to use the migration tool and covers the following topics About the Automatic Migration Tool on page 29 Prerequisites for Running dsmig on page 30 Using dsmig to Migrate the Schema on page 30 Using dsmig to Migrate Security Data on page 31 Using dsmig to Migrate Configuration Data on page 31 Using dsmig to Migrate User Data on page 35 Tasks to be Performed After Automatic Migration on page 35 About the Automatic Migration Tool The migration tool dsmig is delivered with the Directory Server 6 0 packages When these packages have been installed dsmig is located in install path ds6 bin dsmig must be run on the machine on which the new Directory Server instance will be located When the command is run a migrat
122. n Migration of the configuration is described in the following section Sun Java System Directory Server Enterprise Edition 6 0 Migration Guide March 2007 Sun Confidential Registered Migrating User Data Manually Migrating User Data Manually If your topology does not support automatic data migration you must migrate the data manually This involves exporting the data from the existing instance and re importing it to the new instance To migrate data manually from an existing version 5 instance perform the following steps 1 Ifyou already have data in the new instance back up any conflicting suffixes in the new instance 2 Ifyou are migrating a master server instance in a replicated topology make sure that the master is synchronized with all servers that are direct consumers of that master It is not possible to migrate the change log manually A new change log is created in the 6 0 instance 3 Export the required suffixes to LDIF by using the db21dif command This command exports all the suffix contents to an LDIF file when the server is either running or stopped The following example exports two suffixes to a single LDIF file serverRoot slapd serverID db21dif a example ldif Y r s ou people dc example dc com s ou departments dc example dc com In this example a specifies the resulting LDIF file rindicates that replication information should be exported and s specifies the suffixes to be included in the ex
123. n 6 0 Administration Guide restore config Restore Administration Server configuration saveconfig Save Administration Server configuration Chapter 5 Architectural Changes in Directory Server 6 0 73 Sun Confidential Registered Changes to the Console Changes to the Console The downloaded Java Swing based console has been replaced by Directory Service Control Center DSCC DSCC is a graphical interface that enables you to manage an entire directory service by using a web browser The DSCC requires no migration Migrated Directory Server instances can be registered in the DSCC For more information about the DSCC see Chapter 1 Directory Server Overview in Sun Java System Directory Server Enterprise Edition 6 0 Reference New Password Policy 74 Directory Server6 0 implements a new password policy that uses the standard object class and attributes described in the Password Policy for LDAP Directories Internet Draft The new password policy provides the following new features A grace login limit specified by the pwdGraceAuthNLimit attribute This attribute specifies the number of times an expired password can be used to authenticate If it is not present or if it is set to 0 authentication will fail Safe password modification specified by the pwdSafeModi fy attribute This attribute specifies whether the existing password must be sent when changing a password If the attribute is not present the existing pas
124. n Data Directory Server 5 2 configuration is specified in the file serverRoot slapd instance path config dse tdif Directory Server 6 0 configuration is specified in the file instance path config dse dif To migrate the configuration automatically run the following command dsmig migrate config old instance path new instance path In this step dsmig reads each LDIF entry in the configuration file dse ldif of the 5 2 instance If these entries exist in the corresponding Directory Server 6 0 configuration file their values are updated If the entries do not exist they are created Migration of the configuration is done over LDAP By default dsmig binds to the new instance securely issuing a StartTLS request Chapter 2 Automated Migration Using the dsmig Command 31 Sun Confidential Registered Using dsmig to Migrate Configuration Data 32 Note By default StartTLS is not enabled on Windows If you are running dsmig on Windows use the e or unsecured option to specify an unsecure connection Alternatively use the Z or use secure port option to specify a secure connection over SSL If you do not use either of these options on Windows dsmig issues a warning and the migration process terminates with an error For more information see dsmig 1M For details of the specific configuration attributes that are migrated see Migration of Specific Configuration Attributes on page 38 Plug in Configuration Data
125. n Directory Server 6 0 The following plug ins have been deprecated in Directory Server 6 0 cn aci cn index cn userRoot cn ldbm database cn plugins cn config cn cn cn index cn userRoot cn ldbm database cn plugins cn config cn encrypted attributes cn userRoot cn ldbm database cn plugins cn config cn entrydn cn index cn userRoot cn ldbm database cn plugins cn config cn givenName cn index cn userRoot cn ldbm database cn plugins cn config cn index cn userRoot cn ldbm database cn plugins cn config cn mail cn index cn userRoot cn ldbm database cn plugins cn config cn mailHost cn index cn userRoot cn ldbm database cn plugins cn config cn member cn index cn userRoot cn ldbm database cn plugins cn config cn monitor cn userRoot cn ldbm database cn plugins cn config cn nsCalXItemId cn index cn userRoot cn ldbm database cn plugins cn config cn nscpEntryDN cn index cn userRoot cn ldbm database cn plugins cn config cn nsRoleDN cn index cn userRoot cn ldbm database cn plugins cn config cn nsUniqueld cn index cn userRoot cn ldbm database cn plugins cn config cn nswcalCALID cn index cn userRoot cn ldbm database cn plugins cn config cn objectclass cn index cn userRoot cn ldbm database cn plugins cn config cn owner cn index cn userRoot cn ldbm database cn plugins cn config cn parentid cn index cn userRoot cn ldbm database cn plugins cn config cn pipstatus cn index cn userRoot cn ldbm database cn pl
126. n Plug In The configuration of this plug in is stored under cn pswsync cn plugins cn config The following attribute must migrated nsslapd pluginenabled Referential Integrity Plug In The configuration of this plug in is stored under cn Referential Integrity Postoperation cn plugins cn config The following attributes must be migrated nsslapd pluginarg nsslapd pluginenabled Retro Change Log Plug In The configuration of this plug in is stored under cn Retro Changelog PlugIn cn plugins cn config The following attributes must be migrated nsslapd changelogmaxage nsslapd changelogmaxentries nsslapd pluginarg nsslapd pluginenabled UID Uniqueness Plug In The configuration of this plug in is stored under cn UID Uniqueness cn plugins cn config The following attributes must be migrated nsslapd pluginarg nsslapd pluginenabled Chapter 3 Migrating Directory Server Manually 47 Sun Confidential Registered Migrating Security Settings Manually Migrating Security Settings Manually 48 When you migrate an instance manually the order in which you perform the migration of the security and the migration of the configuration is different to when you migrate using dsmig If you migrate the security settings by replacing the default Directory Server 6 0 certificate and key databases wit the old databases as described in this section you must migrate the configuration first To migrate the security settings m
127. n com products jndi The JNDI Tutorial contains detailed descriptions and examples of how to use JNDI This tutorial is at http java sun com products jndi tutorial Directory Server Enterprise Edition can be licensed as a standalone product as a component of Sun Java Enterprise System as part ofa suite of Sun products such as the Sun Java Identity Management Suite or as an add on package to other software products from Sun Java Sun Confidential Registered Preface Enterprise System is a software infrastructure that supports enterprise applications distributed across a network or Internet environment If Directory Server Enterprise Edition was licensed as a component of Java Enterprise System you should be familiar with the system documentation athttp docs sun com coll 1286 2 Identity Synchronization for Windows uses Message Queue with a restricted license Message Queue documentation is available at http docs sun com col1 1307 2 Identity Synchronization for Windows works with Microsoft Windows password policies Information about password policies for Windows 2003 is available in the Microsoft documentation online Information about changing passwords and about group policies in Windows 2003 is available the Microsoft documentation online Information about the Microsoft Certificate Services Enterprise Root certificate authority is available in the Microsoft support documentation online Information about c
128. nd Console Active Directory Connector Directory Server Connector Directory Server Plugin Note If you are using Solaris as your installation host then a Windows 2000 machine with Active Directory is required for synchronization purposes only No components would be installed on the Windows 2000 machine The following figure illustrates the migration process and serves as a checklist to supplement the migration instructions that follow Sun Java System Directory Server Enterprise Edition 6 0 Migration Guide March 2007 Sun Confidential Registered Migrating Your System Unpack Identity Synchronization for Windows 6 0 Bits Save 1 1 Configuration Using export11cn and Add Passwords to the Exported Configuration Stop Synchronization Start Run checktopics to Verify Message Queue is in Quiescent State Synchronization and Wait Yes Stop Identity Synchronization for Windows Services Back Up Connector State persist etc Directories Password Changes on Both Directory Server Start Identity Synchronization for Windows Services Masters 210 Los Uninstall Directory Server Plugin Authentication to Directory Server Fails for Users with Uninstall the Identity Synchronization for Windows 1 1 Invalidated Passwords Active Directory and Directory Server Connectors Uninstall Identity Synchronization for Windows 1 1 Core Upgrade Install Message Queue 3 6 Upgrade to Directory Server 6 0 on Host 1 with
129. nfidential Registered Migration Scenarios 62 5 x Master A 5 x Master B 6 0 Hub A 6 0 Hub B 6 0 Consumer A 6 0 Consumer B AA AA FIGURE 4 10 Isolating the Master From the Topology The next step involves migrating the version 5 master 6 0 Master A 5 x Master A 5 x Master B 6 0 Hub A E 6 0 Hub B FIGURE 4 11 Migrating the version 5 Master Sun Java System Directory Server Enterprise Edition 6 0 Migration Guide March 2007 Sun Confidential Registered Migration Scenarios The next step involves enabling the replication agreements to and from the new master and initializing the master ifnecessary 6 0 Master A 5 x Master B FIGURE 4 12 Placing the 6 0 Master Into the Topology Check that the replication on all hubs and consumers is in sync with the rest of the topology before migrating another master A server that has just been migrated does not have a change log and can therefore not update servers that are out of sync Allow the topology to stabilize and all servers to synchronize before migrating the next supplier server Migrating a Replicated Topology to a New Topology Before you start migrating replicated servers determine whether your deployment might not be better served by changing the architecture of the topology This section describes how to migrate a basic version 5 topology to a new all master topology Migrating to an all master topology involves migrating the consum
130. nfiguration log and backup data previously located under ServerRoot s apd instance name TABLE5 7 Instance Specific Subdirectories Version 5 Directory Version 6 Directory Remarks ServerRoot slapd ServerID bak instance path bak Directory instance database backup ServerRoot slapd ServerID confbak Deprecated Administration Server configuration backup ServerRoot slapd ServerID conf_bk instance path conf_bk Directory instance configuration backup ServerRoot slapd ServerID config instance path config Directory instance configuration ServerRoot slapd ServerID config sdhemtance path config schema Directory instance schema ServerRoot slapd ServerID db instance path db Directory instance databases ServerRoot slapd ServerID dif instance path ds6 bin ldif Sample LDIF files ServerRoot slapd ServerID Locks instance path Vocks Run time process locks ServerRoot slapd ServerID logs instance path logs Server instance log files ServerRoot slapd ServerID tmp instance path tmp Run time temporary files 82 Sun Java System Directory Server Enterprise Edition 6 0 Migration Guide March 2007 Sun Confidential Registered CHAPTER 6 Migrating Directory Proxy Server There is no automatic migration path to move from a previous version to Directory Proxy Server 6 0 Directory Proxy Server 6 0 provides much more functionality than previous versions While a one to one mapping of configuration information is ther
131. o Directory Service Control Center which is not available in the zip usr sbin smcwebserver tas distribution Windows install path share webconsole bin smcwebserver wcadmin Solaris Linux HP UX This command pertains only to Directory Service usr sbin wcadmin Windows install path share webconsole bin wcadmin Control Center which is not available in the zip distribution Typographic Conventions The following table describes the typographic changes that are used in this book TABLEP 4 Typographic Conventions Typeface Meaning Example AaBbCc123 output AaBbCc123 computer output AaBbCc123 name or value The names of commands files and directories and onscreen computer A placeholder to be replaced with a real Edit your Login file Use ls a to list all files machine_name you have mail What you type contrasted with onscreen machine_name su Password The command to remove a file is rm filename Sun Confidential Registered 21 Preface TABLEP 4 Typographic Conventions Continued Typeface Meaning Example AaBbCc123 Book titles new terms and terms to be Read Chapter 6 in the User s Guide emphasized note that some emphasized items appear bold online A cache is a copy that is stored locally Do not save the file Shell Prompts in Command Examples The following table shows default system prompts and superuser prompts TABLEP
132. o monitor the state of its backend LDAP servers Directory Proxy Server 5 performs an anonymous search operation on the RootDSE of each server every ten seconds Directory Proxy Sun Java System Directory Server Enterprise Edition 6 0 Migration Guide March 2007 Sun Confidential Registered Mapping the Properties Configuration Server 6 0 has a number of properties that can be configured to monitor its backend servers For more information see Retrieving Monitored Data About Data Sources in Sun Java System Directory Server Enterprise Edition 6 0 Administration Guide Search Size Limit Property Directory Proxy Server 5 uses the ids proxy sch SizeLimitProperty to apply size limits based on the base and scope of search operations In Directory Proxy Server 6 0 the search size limit can be configured by setting a property of the resource limits policy A resource limits policy defines the maximum resource that Directory Proxy Server can process for a given connection handler Use the dpconfcommand to set the search size limit for a resource policy as follows dpconf set resource limits policy prop policy name search size limit number of entries Resource limits policies control much more than just search size limit For information on configuring resource limits policies see Creating and Configuring a Resource Limits Policy in Sun Java System Directory Server Enterprise Edition 6 0 Administration Guide In Iplanet Director
133. oemmmmmmmm 91 Mapping Directory Proxy Server 5 Search Request Control Attributes to Directory Proxy Server 6 0 Properties ss sin 93 Mapping of Directory Proxy Server 5 Compare Request Control Attributes to Directory Proxy Server 6 Properties c scescsessessssssesseesseseeeeseesseesseesseesseeseenseesseenss 93 Mapping ot Directory Proxy Server 5 Search Request Moditying Attributes to Directory Proxy Server 6 Properties c scescsessessessssssesssesseeessesseesssesssesseeseeseeesseesss 94 Mapping of Directory Proxy Server 5 Search Response Restriction Attributes to Directory Proxy Server 6 0 Properties sessions 95 11 Sun Confidential Registered Tables 12 TABLE 6 12 TABLE 6 13 TABLE 6 14 TABLE 6 15 TABLE 6 16 TABLE 6 17 TABLE 6 18 TABLE 7 1 TABLE 7 2 Mapping of Directory Proxy Server 5 Referral Configuration Attributes to Directory Proxy Server 6 resource limits Properties oioninnianinnnananecnecenss 96 Mapping ot Directory Proxy Server 5 Server Load Configuration Attributes to Directory Proxy Server 6 0 Resource Limits Properties cscscseeseeseeeeseeseeees 96 Mapping of Directory Proxy Server 5 Server Load Configuration Attributes to Directory Proxy Server 6 Resource Limits Properties csscsesseseeseeeeeeeeeseeees 98 Mapping of ids proxy sch LDAPServer Attributes to Data Source Properties RE EE EP PO NE 99 Mapping of Version 5 Search Size Limit Attributes to 6 0 Properties
134. ommand dpconf help properties grep search data hiding rule In Iplanet Directory Access Router 5 0 IDAR these configuration attributes are stored under ids proxy con Name group name ou groups ou pd2 ou iDAR o services In Directory Proxy Server 5 2 these configuration attributes are stored under ou groups cn user defined name ou dar config o NetscapeRoot Sun Java System Directory Server Enterprise Edition 6 0 Migration Guide March 2007 Sun Confidential Registered Mapping the Groups Configuration The following table maps the Directory Proxy Server 5 search response restriction attributes to the corresponding Directory Proxy Server 6 0 properties TABLE6 11 Mapping of Directory Proxy Server 5 Search Response Restriction Attributes to Directory Proxy Server 6 0 Properties Directory Proxy Server 5 Attributes Directory Proxy Server 6 0 Properties ids proxy con max result size search size limit property of the resource limits policy ids proxy con forbidden return To hide a subset of attributes rule action hide attributes attributes attribute name To hide an entire entry rule action hide entry ids proxy con permitted return rule action show attributes attributes attribute name ids proxy con search reference No direct equivalent Search continuation references are governed by the referral policy property ofthe resource limits policy Mapping the Referral Configuration Attribut
135. on However if you use the forcepwchg utility you can identify affected users and force them to change passwords again For more information see Forcing Password Changes on Windows NT on page 116 All other attribute changes made during the migration process at any directory source will be synchronized after the migration process Preparing for Identity Synchronization for Windows Migration Use one or more of the following utilities to migrate from version 1 1 to version 6 0 exportllcnf A stand alone utility that enables you to create an export configuration file from your Identity Synchronization for Windows 1 1 configuration For more information see Exporting Version 1 1 Configuration on page 107 The exported XML document contains the directory deployment topology and enough information to configure the Identity Synchronization for Windows 6 0 installation checktopics A utility that checks Message Queue synchronization topics in a 1 1 installation and determines if any undelivered messages remain in the queue Updates can remain in Message Queue after you stop 1 1 synchronization You must verify that no updates exist in the Message Queue before you proceed with the migration For more information see Checking for Undelivered Messages on page 114 forcepwchg A Windows NT tool that enables you to identify users who changed passwords during the migration process and forces them to change passwords
136. onfiguring LDAP over SSL on Microsoft systems is available in the Microsoft support documentation online Redistributable Files Directory Server Enterprise Edition does not provide any files that you can redistribute Default Paths and Command Locations 18 This section explains the default paths used in the documentation and gives the locations of commands on different operating systems and deployment types Default Paths The table in this section describes the default paths that are used in this document For full descriptions of the files installed see also Chapter 15 Directory Server File Reference in Sun Java System Directory Server Enterprise Edition 6 0 Reference Chapter 26 Directory Proxy Server File Reference in Sun Java System Directory Server Enterprise Edition 6 0 Reference or Appendix A Directory Server Resource Kit File Reference in Sun Java System Directory Server Enterprise Edition 6 0 Reference Sun Java System Directory Server Enterprise Edition 6 0 Migration Guide March 2007 Sun Confidential Registered Preface TABLEP 2 Default Paths Placeholder install path Description Represents the base installation directory for Directory Server Enterprise Edition software The software is installed in directories below this base install path For example Directory Server software is installed in install path ds6 Default Value When you install from a zip distribution u
137. onization for Windows 6 0 Read Chapter 3 Understanding the Product in Sun Java System Directory Server Enterprise Edition 6 0 Installation Guide for installation and configuration information that you can use to plan your migration process Document your version 1 1 deployment and configuration Be sure to note any customizations you have made to the configuration Schedule migration Because the migration process requires at least four hours you might want to schedule migration after normal business hours If the input password or attribute changes while you are migrating the system Identity Synchronization for Windows processes these changes as follows For Active Directory Any password changes made on Active Directory during the migration process will be synchronized on demand by the Directory Server Plug in after the migration process For Directory Server Any password changes made on Directory Server during the migration process will not be synchronized However you can identify affected users in the Identity Synchronization for Windows 6 0 logs after completing the migration process For more information see Checking the Logs on page 144 For Windows NT Any password changes made on NT during the migration process will not be synchronized Sun Java System Directory Server Enterprise Edition 6 0 Migration Guide March 2007 Sun Confidential Registered Preparing for Identity Synchronization for Windows Migrati
138. opy and rename the current productregist ry file located in C WINNT system32 Edit the C WINNT system32 productregistry file to remove the following tags Note For best results use an XML editor Alternatively you can use a standard text editor Some of the following components may not be included in your file You must delete the beginning tag lt compid gt ending tag lt compid gt and all contents in between both tags Ellipses are used in the following list to represent any additional text and or tags that are included as part of these tags See the example Manually Uninstalling 1 1 Core and Instances from Windows 2000 on page 130 lt compid gt Identity Synchronization for Windows lt compid gt lt compid gt Core lt compid gt lt compid gt unistaller lt compid gt lt compid gt wpsyncwatchdog lt compid gt lt compid gt setenv lt compid gt lt compid gt Create DIT lt compid gt lt compid gt Extend Schema lt compid gt lt compid gt resources lt compid gt lt compid gt CoreComponents lt compid gt lt compid gt Connector lt compid gt Chapter 7 Migrating Identity Synchronization for Windows 133 Sun Confidential Registered What to Do if the 1 1 Uninstallation Fails m lt compid gt DSConnector lt compid gt m lt compid gt Directory Server Plugin lt compid gt m
139. or State persist etc Directories Start Identity Synchronization for Windows Service Uninstall the NT Subcomponents on Host 3 Uninstall Directory Server Plugin Remove Identity Synchronization for Windows 1 1 Active Directory Directory Server and NT Connectors Uninstall Identity Synchronization for Windows 1 1 Core Upgrade Install Message Queue 3 6 Upgrade to Directory Server 6 0 on Host 1 with Admin Server Intact Upgrade to Directory Server 6 0 on Host 2 Install Identity Synchronization for Windows 6 0 Core a Qa a m N Ww amp Pp ct 5 oq Pp T T 2 y O Lo S E O B 3 a 5 a Z n Z j Chapter 7 Migrating Identity Synchronization for Windows 143 Sun Confidential Registered Checking the Logs Checking the Logs After migrating to version 6 0 check the central audit log for messages indicating a problem In particular check for Directory Server users whose password changes may have been missed during the migration process Such errors would be similar to the following 16 Apr 2004 14 23 41 029 0500 WARNING 14 CNN101 ds connector host example com Unable to obtain password of user cn JohnSmith ou people dc example dc com because the password was encoded by a previous installation of Identity Synchronization for Windows Directory Server Plugin The password of this user cannot be synchronized at this time Update the password of this user again in the Dire
140. or Windows 6 0 components To install the Identity Synchronization for Windows 6 0 components Install Identity Synchronization for Windows 6 0 Core For more information see Installing Core in Sun Java System Directory Server Enterprise Edition 6 0 Installation Guide Execute idsync prepds against Directory Server to update the schema On Solaris type the following commands cd opt SUNWisw bin idsync prepds arguments On Windows type the following commands Sun Java System Directory Server Enterprise Edition 6 0 Migration Guide March 2007 Sun Confidential Registered Migrating Your System cd serverRoot isw hostname bin idsync prepds arguments For more information about idsync prepds see Appendix A Using the Identity Synchronization for Windows Command Line Utilities in Sun Java System Directory Server Enterprise Edition 6 0 Installation Guide Import your version 1 1 and 1 1 SP1 configuration XML file by typing the following command idsync importcnf arguments Note Ifthe program detects errors in your input configuration file an error results Identity Synchronization for Windows aborts the importcnf process and provides the necessary information to correct errors For more information about using idsync importcnf see Using importcnf in Sun Java System Directory Server Enterprise Edition 6 0 Installation Guide Install the Identity Synchronization for Windows 6 0 Connectors For mor
141. ping the Server Load Configuration In Directory Proxy Server 5 these attributes are used to control the number of simultaneous operations and total number of operations a client can request on one connection In Directory Proxy Server 6 this functionality is provided by setting properties of a resource limits policy For information on configuring a resource limits policy see Creating and Configuring a Resource Limits Policy in Sun Java System Directory Server Enterprise Edition 6 0 Administration Guide In Iplanet Directory Access Router 5 0 IDAR these configuration attributes are stored under ids proxy con Name group name ou groups ou pd2 ou iDAR o services In Directory Proxy Server 5 2 these configuration attributes are stored under ou groups cn user defined name ou dar config o NetscapeRoot The following table maps the Directory Proxy Server 5 server load configuration attributes to the corresponding Directory Proxy Server 6 0 resource limits properties TABLE 6 13 Mapping of Directory Proxy Server 5 Server Load Configuration Attributes to Directory Proxy Server 6 0 Resource Limits Properties Directory Proxy Server 5 Attribute Directory Proxy Server 6 0 Property ids proxy con max simultaneous operations per connectiomax simultaneous operations per connection ids proxy con operations per connection max total operations per connection ids proxy con max conns max connections ids proxy
142. port 4 On the new instance import the LDIF files by using the dsadm import command For example the following commands import the LDIF file created previously into the two suffixes that were exported dsadm import instance path example ldif ou people dc example dc com dsadm import instance path example ldif ou departments dc example dc com 5 Ifthe retro change log was configured on the 5 2 instance export the retro change log to LDIF by using the db21dif command serverRoot slapd serverID db21dif a changelog ldif s cn changelog In this example a specifies the resulting LDIF file and s specifies the changelog suffix 6 On the new instance import the retro change log using the dsadm import command For example the following command imports the change log LDIF file created previously dsadm import instance path changelog ldif cn changelog 7 Startthe newinstance Chapter 3 Migrating Directory Server Manually 49 Sun Confidential Registered Migrating User Plug Ins Manually Note During data migration Directory Server checks whether nested group definitions exceed 30 levels Deep nesting can signify a circular group definition where a nested group contains a group that is also its parent When a group with more than 30 nesting levels is encountered Directory Server stops calculating the isMemberOf attributes for additional levels Each time this happens Directory Server logs an error You safely ignore these
143. ps to stop the Java processes manually a Open the Services window right click on Identity Synchronization for Windows and select Properties b From the General tab in the Properties window select Manual from the Startup type drop down list Note Although you can view Java processes such as pswwatchdog exe from the Windows Task Manager you cannot determine which processes are specifically related to Identity Synchronization for Windows For this reason do not stop processes from the Windows Task Manager Stop the Change Detector service using one of the following methods Inthe Services window right click on Sun ONE NT Change Detector Service in the right pane and select Stop Open a Command Prompt window and type the following command net stop Sun ONE NT Change Detector Service Sun Java System Directory Server Enterprise Edition 6 0 Migration Guide March 2007 Sun Confidential Registered What to Do if the 1 1 Uninstallation Fails Ifthe preceding methods do not work use the following steps to stop the Change Detector Service manually a Open the Services window right click on Change Detector Service and select Properties b From the General tab in the Properties window select Manual from the Startup type drop down list c Restart your Windows NT computer You must remove Identity Synchronization for Windows registry keys Open a Command Prompt window and type regedt32 to open the Regist
144. r 5 handles requests after a successful bind In Directory Proxy Server 6 0 this functionality is provided by setting the properties of a request filtering policy For information on configuring a request filtering policy see Creating and Configuring Request Filtering Policies and Search Data Hiding Rules in Sun Java System Directory Server Enterprise Edition 6 0 Administration Guide For a list of all the properties of a request filtering policy run the following command dpconf help properties grep request filtering policy In Iplanet Directory Access Router 5 0 IDAR these configuration attributes are stored under ids proxy con Name group name ou groups ou pd2 ou iDAR o services In Directory Proxy Server 5 2 these configuration attributes are stored under ou groups cn user defined name ou dar config o NetscapeRoot The following table maps the Directory Proxy Server 5 operation forwarding attributes to the corresponding Directory Proxy Server 6 request filtering properties TABLE6 7 Mapping of Directory Proxy Server 5 Operation Forwarding Attributes to Directory Proxy Server 6 Request Filtering Properties Directory Proxy Server 5 Attribute Directory Proxy Server 6 Property ids proxy con permit op search allow search operations ids proxy con permit op compare allow compare operations ids proxy con permit op add allow add operations ids proxy con permit op delete allow delete operations i
145. r in DS6 mode can never be a supplier to or consumer of a Directory Server 5 server When all servers have been migrated to version 6 0 DS6 mode should be the only compatibility mode The compatibility mode is set using the dsconf command as follows dsconf pwd compat new mode The new mode action takes one of the following values to DS6 migration mode Change to DS6 migration mode from DS5 compatible mode Once the change is made only DS6 migration mode and DS6 mode are available to DS6 mode Change to DS6 mode from DS6 migration mode 76 Sun Java System Directory Server Enterprise Edition 6 0 Migration Guide March 2007 Sun Confidential Registered Changes to Plug Ins Once the change is made only DS6 mode is available The server state can move only towards stricter compliance with the new password policy specifications Compatibility with the old password policy will not be supported indefinitely You should therefore migrate to the new password policy as soon as is feasible for your deployment When you consider migrating to the new password policy note that the pwdChangedTime attribute did not exist in Directory Server 5 2 This attribute is required by the new password policy When the attribute is not present in the user entry its value is calculated from the entry s passwordExpirationTime attribute However writing the calculated pwdChangedTime attribute to the user entry would have a large performance impact
146. rRoot shared bin insync install path ds6 bin insync Check replication synchronization 80 Sun Java System Directory Server Enterprise Edition 6 0 Migration Guide March 2007 Sun Confidential Registered Changes to the Installed Product Layout TABLE5 5 Tools Previously Under ServerRoot shared bin Continued 5 2 File 6 0 File Purpose ServerRoot shared bin ldapcompare usr sfw bin ldapcompare Compare attribute value In Directory Server 6 0 you must install the SUN LDAPCSDK TOOLS package to get this utility ServerRoot shared bin ldapdelete ServerRoot shared bin ldapmodify usr sfw bin ldapdelete usr sfw bin ldapmodify Delete directory entry In Directory Server 6 0 you must install the SUN LDAPCSDK TOOLS package to get this utility Modify directory entry In Directory Server 6 0 you must install the SUN LDAPCSDK TOOLS package to get this utility ServerRoot shared bin ldapsearch usr sfw bin ldapsearch Find directory entries In Directory Server 6 0 you must install the SUN LDAPCSDK TOOLS package to get this utility ServerRoot shared bin modutil Deprecated Manage PKCS 11 modules ServerRoot shared bin uconv ServerRoot shared bin repldisc Deprecated install path ds6 bin repldisc Convert from ISO to UTF 8 Discover replication topology Certificate and Key Files The following table shows the new locations of the certificate and key
147. ration TABLE6 8 Mapping Directory Proxy Server 5 Search Request Control Attributes to Directory Proxy Server 6 0 Properties Directory Proxy Server 5 Attribute Directory Proxy Server 6 0 Property ids proxy con filter inequality allow inequality search operations property of the request filtering policy ids proxy con min substring size minimum search filter substring length property ofthe resource limits policy Mapping Compare Request Controls In Directory Proxy Server 5 compare request controls are used to prevent certain kinds of search and compare operations from reaching the LDAP server In Directory Proxy Server 6 0 this functionality is provided by setting properties of a request filtering policy For information on configuring a request filtering policy see Creating and Configuring Request Filtering Policies and Search Data Hiding Rules in Sun Java System Directory Server Enterprise Edition 6 0 Administration Guide In Iplanet Directory Access Router 5 0 IDAR these configuration attributes are stored under ids proxy con Name group name ou groups ou pd2 ou iDAR o services In Directory Proxy Server 5 2 these configuration attributes are stored under ou groups cn user defined name ou dar config o NetscapeRoot The following table maps the Directory Proxy Server 5 compare request control attributes to the corresponding Directory Proxy Server 6 properties TABLE 6 9 Mapping of Directory Prox
148. ration of the change log is not supported if you are migrating manually so the preceding two steps are mandatory in this case Although automatic migration does migrate the change log you should still perform the above steps to avoid the risk of losing changes Disable any replication agreements to and from the master you want to migrate Stop the master Migrate the master according to the instructions under Chapter 1 A A amp Start the master Sun Java System Directory Server Enterprise Edition 6 0 Migration Guide March 2007 Sun Confidential Registered Migration Scenarios 8 Enable the replication agreements from the master to the hubs and other masters in the topology 9 Ifyou have migrated the data check that replication is in sync 10 If you have not migrated the data reinitialize the master from another master in the topology 11 If you rerouted client applications Step 2 you can now route the applications to write to the migrated master The following sequence of diagrams illustrate the migration of a master as described above The first diagram shows the version 5 topology before the migration of the masters 5 x Master A 5 x Master B FIGURE 4 9 Existing version 5 Topology With Consumers and Hubs Migrated The first step in migrating a master involves disabling replication agreements effectively isolating the master from the topology Chapter 4 Migrating a Replicated Topology 61 Sun Co
149. ration process to be performed from the management Console Guarantee that the connector IDs assigned in version 6 0 match the connector IDs used in version 1 1 This simplifies the task of preserving the existing connector states that can be used directly in the version 6 0 deployment Back up the persist and etc directories and then restore them later to avoid confusion about the underlying directory structure You can find the export11cnf utility in the installation migration directory No additional installation steps are necessary Using the export1 1cnf Utility To export an Identity Synchronization for Windows configuration to an XML file execute export11cnf from the migration directory as follows Ina terminal window type the following java jar exportllcnf jar h hostname p port D bind DN w bind password s rootsuffix q configuration password Z P cert db path m secmod db path f filename For example java jar exportllcnf jar D cn dirmanager w q s dc example dc com f exported configuration The export11cnf utility shares the same common arguments as the Identity Synchronization for Windows command line utilities For more information see Common Arguments to the Idsync Subcommands in Sun Java System Directory Server Enterprise Edition 6 0 Installation Guide The export11cnf utility exports the current configuration into the file specified in the argument of the f option Insertin
150. red patches see see Software Dependency Requirements in Sun Java System Directory Server Enterprise Edition 6 0 Release Notes Y To Uninstall Identity Synchronization for Windows Version 1 1 1 Uninstall the Directory Server plug in manually and restart each Directory Server where the plug in was installed Execute the following steps on each Directory Server where the plug in was installed a Remove the following entries from the Directory Server cn config cn pswsync cn plugins cn configcn pswsync cn plugins cn config For example ldapdelete D cn directory manager w p lt port gt c cn config cn pswsync cn pLugins cn configcn pswsync cn plugins cn config b Restart the Directory Server On Solaris Type lt serverRoot gt slapd lt hostname gt restart slapd On Windows Type lt serverRoot gt slapd lt hostname gt restart slapd bat c Remove the Plugin binaries from the system On Solaris Type rm lt serverRoot gt lLib psw plugin sorm lt serverRoot gt Llib 64 psw plugin so On Windows Type del lt serverRoof gt Lib psw plugin d1t 120 Sun Java System Directory Server Enterprise Edition 6 0 Migration Guide March 2007 Sun Confidential Registered Migrating Your System Change directory cd to lt ServerRoot gt isw lt hostname gt and then use the Identity Synchronization for Windows 1 1 or 1 1 SP1 uninstallation program to uninstall the version
151. refore you do not know whether the message was actually delivered and applied to the destination connector This behavior does not cause problems as long as the Message Queue remains the same However you will lose any messages on the Message Queue during the migration process when you install Message Queue 3 6 You must verify that the synchronization topics on the existing Message Queue do not have any undelivered messages before you proceed with the migration The Identity Synchronization for Windows checktopics utility enables you to verify that all the synchronization topics are empty and the system is not causing any problem Using the checktopics Utility The checktopics utility is delivered in the migration directory of the Solaris SPARC and the Windows Identity Synchronization for Windows 6 0 package Note The prerequisite to run checktopics is a Java Virtual Machine When you run the checktopics utility it connects to the configuration directory which contains information about Synchronization User Lists SULs and current synchronization Sun Java System Directory Server Enterprise Edition 6 0 Migration Guide March 2007 Sun Confidential Registered Preparing for Identity Synchronization for Windows Migration topic names used in Message Queue In addition when you run checktopics it queries Message Queue to check how many outstanding messages remain on each active synchronization topic and then displays this informa
152. ribute name cn syntax 1 3 6 1 4 1 1466 115 121 1 15 gt lt AttributeDescription parent attr WindowsAttribute name cn syntax 1 3 6 1 4 1 1466 115 121 1 15 gt lt AttributeMap gt lt AttributeMap gt lt AttributeDescription parent attr SunAttribute name uniquemember syntax 1 3 6 1 4 1 1466 115 121 1 25 gt lt AttributeDescription parent attr WindowsAttribute 112 Sun Java System Directory Server Enterprise Edition 6 0 Migration Guide March 2007 Sun Confidential Registered Preparing for Identity Synchronization for Windows Migration EXAMPLE7 1 Sample Export Configuration File Continued name member syntax 1 2 840 113556 1 4 910 gt lt AttributeMap gt lt AttributeDescription parent attr SignificantAttribute name member syntax 1 2 840 113556 1 4 910 gt lt ActiveDirectoryGlobals gt lt SunDirectoryGlobals userObjectClass inetOrgPerson flowInboundCreates true flowInboundModifies true flowOutboundCreates true flow0utboundModifies true gt lt AttributeDescription parent attr SignificantAttribute name uniquemember syntax 1 3 6 1 4 1 1466 115 121 1 25 gt lt AttributeDescription parent attr CreationAttribute name cn syntax 1 3 6 1 4 1 1466 115 121 1 15 gt lt AttributeDescription parent attr SignificantAttribute name cn syntax 1 3 6 1 4 1 1466 115 121 1 15 gt lt AttributeDescription parent attr SignificantAttribute name pwdaccountloc
153. ronization topics 114 system quiescence 114 X XML configuration documents creating 107 errors 123 exportllcnf 107 108 148 Sun Java System Directory Server Enterprise Edition 6 0 Migration Guide March 2007 Sun Confidential Registered
154. ry Editor window Caution Do not use regedit because the program does not allow you to edit multi value strings Backup your current Windows registry file before proceeding to Manually Uninstalling a 1 1 Instance from Windows NT on page 135 a Inthe Registry Editor select the top node My Computer in the left pane b Select Registry Export Registry File from the menu bar c When the Export Registry File dialog box is displayed specify a name for the file and select a location to save the backup registry In the Registry Editor select Edit Delete from the menu bar Remove the following Identity Synchronization for Windows keys from the Registry All entries under HKEY_LOCAL_MACHINE SOFTWARE Microsoft Windows CurrentVersion Uninstall Ident Synchronization for Windows m All CurrentControlSet and ControlSet such as ControlSet001 ControlSet002 entries under HKEY LOCAL MACHINE SYSTEM These entries include the following Control Session Manager Environment lt isw installation directory gt m Services Eventlog Application Sun ONE Identity Synchronization for Windows m Services Sun ONE Identity Synchronization for Windows m Services iMQBroker The HKEY LOCAL MACHINE SOFTWARE Sun Microsystems PSW Chapter 7 Migrating Identity Synchronization for Windows 137 Sun Confidential Registered What to Do if the 1 1 Uninstallation Fails 138 5 Use rege
155. s All chained suffix configuration attributes must be migrated The following configuration attributes are common to all chained suffixes These attributes are stored in the entry cn config cn chaining database cn plugins cn config nsActivechainingComponents nsTransmittedControls The following configuration attributes apply to a default instance of a chained suffix These attributes are stored in the entry cn default instance config cn chaining database cn plugins cn config nsAbandonedSearchCheckInterval nsBindConnectionsLimit nsBindRetryLimit nsBindTimeout nsCheckLocalACI nsConcurrentBindLimit nsConcurrentOperationsLimit nsConnectionLife nsHopLimit nsmaxresponsedelay nsmaxtestresponsedelay nsOperationConnectionslimit Chapter 3 Migrating Directory Server Manually 45 Sun Confidential Registered Migrating Configuration Data Manually 46 nsProxiedAuthorization nsReferralOnScopedSearch nsslapd sizelimit nsslapd timelimit Plug In Configuration Attributes If you have changed the configuration of any standard plug in you must update that configuration You must also update the configuration of all custom plug ins At a minimum you must recompile all custom plug ins and add their configuration to the directory For a detailed list of plug in API changes see Chapter 2 Changes to the Plug In API Since Directory Server 5 2 in Sun Java System Directory Server Enterprise Edition 6 0 Developers Guide The fo
156. s id di Forbidden Entry Property LOAP Server Prope y viril ie ARR e O NE Sun Confidential Registered Contents Load Balancing Property A sds easscastsssssoscaosdsessssaaseoasbesesaseascoedeasds 99 Search Size Limit Property sscasscescasstsecsssscapsascsassuashoscssesoiansacoassascasseasestoaevedseseapseassassesb oaasiesedees 101 Log Property issus eisni n inek ad lid 101 Mapping the Events Configuration ste dentistes 103 Mapping the Actions Configuration sense 104 Configuring Directory Proxy Server 6 0 as a Simple Connection Based Router eee 104 Migrating Identity Synchronization for Windows 0 ccesesscsesseeseeseeeeseeseeseseeseeseseeneeneeseaes 105 Migration OVERVIEW vs cronicas inician dress dois E aaa dana dad dates 106 Before You Migrate Identity Synchronization for Windows ssscssesssseseeseeseeseesseeeesseeesseeees 106 Preparing for Identity Synchronization for Windows Migration emociones 107 Exporting Versi n 1 1 GonfeuratiOn isis sise nn e old 107 Checking for Undelivered Messages ccssissssssstsssssossesvecossstoessecoasnnsecssssvonsestusteveassstsstasossesneseodess 114 Y Using the checktopics Utility iis ccinis hidden aaa W To Clear Messages Forcing Password Changes on Windows NT Migrating Your System acusas iria as encara EAN Preparing for Migration sssias sssicveasesocsssnsseastssovssiuashioticbnestssadsscssces casssendeed A E 117 V Preparing to migrate from version 1 1 and 1 1 SP1 to
157. sing dsee_deploy 1M the default install path is the current directory You can set the install path using the i option of the dsee_deploy command When you install from a native package distribution such as you would using the Java Enterprise System installer the default install path is one of the following locations m Solaris systems opt SUNWdsee HP UX systems opt sun Red Hat systems opt sun Windows systems C Program Files Sun JavaES5 DSEE instance path Represents the full path to an instance of Directory Server or Directory Proxy Server The documentation uses Local ds for Directory Server and Local dps for Directory Proxy Server No default path exists Instance paths must nevertheless always be found on a local file system The following directories are recommended var on Solaris systems global if you are using Sun Cluster serverroot Represents the parent directory of the Identity Synchronization for Windows installation location Depends on your installation Note the concept ofa serverroot no longer exists for Directory Server isw hostname Represents the Identity Synchronization for Windows instance directory Depends on your installation path to cert8 db Represents the default path and file name of the client s certificate database for Identity Synchronization for Windows current working dir cert8 db serverroot isw hostname logs
158. sword does not need to be sent In addition the new password policy provides the following new controls LDAP CONTROL PWP REQUEST RESPONSE m LDAP_CONTROL_ACCOUNT_USABLE_ REQUEST RESPONSE These controls enable LDAP clients to obtain account status information The LDAP_CONTROL_PWP control provides account status information on LDAP bind search modify add delete modDN and compare operations The following information is available using the OID 1 3 6 1 4 1 42 2 27 8 5 1inthe search Period of time before the password expires Number of grace login attempts remaining The password has expired The account is locked The password must be changed after being reset Password modifications are allowed The user must supply his her old password The password quality syntax is insufficient The password is too short Sun Java System Directory Server Enterprise Edition 6 0 Migration Guide March 2007 Sun Confidential Registered New Password Policy The password is too young The password already exists in history The LDAP_CONTROL_PWP control indicates warning and error conditions The control value is a BER octet string with the format tii which has the following meaning ma tisa tag defining which warning is set if any The value of t can be one of the following LDAP_PWP WARNING RESP_NONE 0x00L LDAP_PWP WARNING RESP_EXP x01L LDAP_PWP WARNING RESP GRACE 0x02L The first i in
159. tUnlockTime passwordHistory passwordAllowChangeTime pwdAccountLockedTime pwdChangedTime pwdFailureTime pwdGraceUseTime pwdHistory pwdLastAuthTime pwdPolicySubentry pwdReset version 3 0 acl Allow self entry modification except for nsroledn aci resource limit attributes passwordPolicySubentry and password policy state attributes allow write userdn ldap self Tip Do not allow users write access to everything and then deny write access to specific attributes Instead explicitly list the attributes to which you allow write access Command Line Changes In Directory Server 6 0 the functionality of most command line tools is replaced by only two commands dsadm and dsconf The following table shows commands used in Directory Server 5 and the corresponding commands for Directory Server 6 0 The default path ofthese commands when installed from native packages is opt SUNWdsee ds6 bin When installed from the zip installation the default path is install path ds6 bin TABLE5 1 Directory Server 5 and 6 commands Version 5 Command Version 6 0 Command Description bak2db dsadm restore Restore a database from backup locally offline bak2db task dsconf restore Restore a database from backup remotely online db2bak dsadm backup Create a database backup archive locally offline Chapter 5 Architectural Changes in Directory Server 6 0 71 Sun Confidential Registered Command Line Chang
160. tch val nsslapd db tx max nsslapd dbncache nsslapd import cachesize nsslapd exclude from export nsslapd disk low threshold nsslapd disk full threshold Database specific attributes are stored in entries of the form cn database instance name cn dbm database cn pLugins cn config The following attributes must be migrated Sun Java System Directory Server Enterprise Edition 6 0 Migration Guide March 2007 Sun Confidential Registered Migrating Configuration Data Manually nsslapd suffix nsslapd cachesize nsslapd cachememsize nsslapd readonly nsslapd require index If your deployment uses the NetscapeRoot suffix you must migrate the attributes under cn netscapeRoot cn ldbm database cn plugins cn config You must also replace the database location nsslapd directory with the location of the new Directory Server 6 instance All default index configuration attributes must be migrated except for system indexes Default index configuration attributes are stored in the entry cn default indexes cn ldbm database cn plugins cn config Indexes for the NetscapeRoot database do not need to be migrated All index configuration attributes must be migrated except for system indexes Index configuration attributes are stored in entries of the sort cn index name cn index cn database instance name cn ldbm database cn plugins cn config All attribute encryption configuration attributes must be migrated Chained Suffix Attribute
161. ter B FIGURE 4 15 Migrated Topology With Promoted Hub Replicas Promoting the Consumers The next step involves promoting the consumers to hubs and then to masters and creating a fully meshed topology between the masters To promote the consumers follow the instructions in Promoting or Demoting Replicas in Sun Java System Directory Server Enterprise Edition 6 0 Administration Guide The following diagram illustrates the topology when the consumers have been promoted Sun Java System Directory Server Enterprise Edition 6 0 Migration Guide March 2007 Sun Confidential Registered Migration Scenarios 6 0 Master A 6 0 Master B 6 0 Master C 4 FIGURE 4 16 New Fully Meshed All Master Topology Migrating Over Multiple Data Centers Migrating servers over multiple data centers involves migrating each server in each data center individually Before you start migrating replicated servers determine whether your deployment might not be better served by changing the architecture of the topology If you want to keep your existing topology follow the examples in Migrating a Replicated Topology to an Identical Topology on page 54 for each data center To migrate to a new topology follow the examples in Migrating a Replicated Topology to a New Topology on page 63 for each data center Chapter 4 Migrating a Replicated Topology 67 Sun Confidential Registered 68 Sun Confidential Registered CHAPTER 5
162. these configuration attributes are stored under ids proxy con Config Name name ou global ou pd2 ou iDAR o services In Directory Proxy Server 5 2 these configuration attributes are stored under ids proxy con Config Name user defined name ou system ou dar config o netscaperoot The following table maps the version 5 security attributes to the corresponding properties in Directory Proxy Server 6 Chapter 6 Migrating Directory Proxy Server 85 Sun Confidential Registered Mapping the Global Configuration 86 TABLE6 2 Mapping of Security Configuration Directory Proxy Server 5 Attribute ids proxy con ssl key Directory Proxy Server 6 0 Property ssl key pin ids proxy con ssl cert ssl certificate directory ssl server cert alias ids proxy con send cert as client This attribute enables the proxy server to send its certificate to the LDAP server to allow the LDAP server to authenticate the proxy server as an SSL client ssl client cert alias This property enables the proxy server to send a different certificate to the LDAP server depending on whether it is acting as an SSL Server or an SSL Client ids proxy con server ssl version ids proxy con client ssl version ids proxy con ssl cert required No equivalent This feature can be achieved by setting the following server property dpconf set server prop allow cert based auth require ids proxy con ssl cafile No equ
163. tion for Windows For this reason do not stop processes from the Windows Task Manager For a Core uninstallation only stop the Message Queue using one of the following methods Inthe Services window right click on iMQ Broker in the right pane and select Stop Chapter 7 Migrating Identity Synchronization for Windows 131 Sun Confidential Registered What to Do if the 1 1 Uninstallation Fails 132 From a Command Prompt type the following command net stop iMQ Broker Ifthe preceding methods do not work use the following steps to stop Message Queue manually j Open the Services window right click on iMQ Broker and select Properties From the General tab in the Properties window select Manual from the Startup type drop down list Open the Directory Server Console and select the Configuration tab In the left pane expand the Plugins node and select the pswsync node In the right pane uncheck the Enable plug in check box Click Save From the Console locate and remove the following entry from the Configuration Directory cn pswsync cn plugins cn config Stop Directory Server You can stop the server using one ofthe following methods In the Services window right click on Sun ONE Directory Server 5 2 in the right pane and select Stop Open a Command Prompt window and type the following command net stop slapd myhostname Open Windows Explorer to locate and remove the Plugin binary lt S
164. tion for you To execute the checktopics command line utility Open a Terminal window and cd to the migration directory From a command prompt type the subcommand as follows java jar checktopics jar h hostname p port D bind DN w bind password s root suffix q configuration password Z For example java jar checktopics jar D cn directory manager w s dc example dc com q a Note For more information about the checktopics arguments see Common Arguments to the Idsync Subcommands in Sun Java System Directory Server Enterprise Edition 6 0 Installation Guide For more information about using checktopics see Checking for Undelivered Messages on page 114 After running checktopics check your terminal for the following messages Ifthe operation succeeds the terminal window displays a message stating that there are no outstanding messages in the logs Ifthe operation fails an appropriate error message is displayed with an error identifier To Clear Messages If any of the active synchronization topics contain outstanding messages use the following procedure to clear the messages Restart synchronization Wait until the messages are applied to the destination connector Stop synchronization Rerun checktopics Chapter 7 Migrating Identity Synchronization for Windows 115 Sun Confidential Registered Migrating Your System Forcing Password Changes on Windows NT On Windows N
165. ueSize c Start the NT Change Detector service by typing the following command net start Sun Java TM System NT Change Detector 8 Remove the version 6 0 persist and etc directories and all their contents from the instance directory and restore the version 1 1 and 1 1 SP1 persist and etc directories you backed up in Preparing for Migration on page 117 On Solaris type the following command cd var opt SUNWisw rm rf etc persisttar xf var tmp connector state tar On Windows type the following command cd serverRoot isw hostname rd s etc persist JAVA HOME bin jar xf TEMP connector state jar Alternatively use any archive program for Windows such as WinZip 9 Start the service and the synchronization a Start the Identity Synchronization for Windows service as described in Starting and Stopping Services in Sun Java System Directory Server Enterprise Edition 6 0 Installation Guide b Start synchronization as described in Starting and Stopping Synchronization in Sun Java System Directory Server Enterprise Edition 6 0 Installation Guide 10 Check the central audit log to verify that there are no warning messages Note If you have customized the version 1 1 log settings you must manually apply those customizations to your version 6 0 installation Use the Identity Synchronization for Windows Console to configure your version 6 0 log settings 124 Sun Java System Directory Server Enterpr
166. ugins cn config cn pipuid cn index cn userRoot cn ldbm database cn plugins cn config cn seeAlso cn index cn userRoot cn ldbm database cn plugins cn config cn sn cn index cn userRoot cn ldbm database cn plugins cn config cn uid cn index cn userRoot cn ldbm database cn plugins cn config cn uniquemember cn index cn userRoot cn ldbm database cn plugins cn config cn userRoot cn ldbm database cn plugins cn config Changes to the Plug In API If you have developed your own custom plug ins you need to recompile these to work with Directory Server 6 0 For a complete list of the changes made to the plug in API see Chapter 2 Changes to the Plug In API Since Directory Server 5 2 in Sun Java System Directory Server Enterprise Edition 6 0 Developers Guide Changes to the Installed Product Layout 78 This section summarizes the changes to the installed product layout from Directory Server 5 2 Several files and utilities have been deprecated since Directory Server 5 2 as described in the following sections Sun Java System Directory Server Enterprise Edition 6 0 Migration Guide March 2007 Sun Confidential Registered Changes to the Installed Product Layout Administration Utilities Previously Under ServerRoot In Directory Server 6 0 the Administration Server is no longer used to manage server instances The following system administration utilities previously located under ServerRoot have therefore been deprecated
167. ution This distribution takes the form of operating system specific packages such as pkg for Solaris and rpm for Linux Compressed archive zip distribution There are two major differences between these two distributions 1 Installation from zip can be done anywhere on the system and as a non root user The Java Enterprise System distribution requires installation as a super user It is also more difficult from an automated deployment perspective to install the packages anywhere but in the default location The zip distribution can be installed as many times as required and multiple distinct versions of the same product can coexist on a single operating system instance This is not true for the Java Enterprise System distribution The new version of certain shared component packages required by Directory Server are incompatible with the previous version of these packages When you migrate to the new version of Directory Server using the Java Enterprise System distribution the old Directory Server version will no longer run on that machine Depending on your environment and the specific requirements of your organization select the appropriate packaging format Note that the Sun Java Web Console is currently available only in the Java Enterprise System distribution Outline of Migration Steps Migration to Directory Server 6 0 can be broken down into the following distinct steps Be A Migrating the Schema Migrating the Security S
168. ver intact For more information on migrating configuration data and user data see Using dsmig to Migrate Configuration Data on page 31 and Using dsmig to Migrate User Data on page 35 respectively Directory Server at host2 contains the data and the Directory Server plugin When you migrate Directory Server to 6 0 the plugin configuration is lost But it does not cause any problem as Identity Synchronization for Windows migration requires the connectors to be reinstalled and plugin to be reconfigured Therefore Directory Server at host2 should be migrated after Identity Synchronization for Windows uninstallation If both hosts are running a Solaris operating system then a fourth host running Windows 2000 with Active Directory is required for synchronization purposes only No components would be installed on the fourth host Figure 7 3 illustrates the process for migrating Identity Synchronization for Windows for a multi host deployment 142 Sun Java System Directory Server Enterprise Edition 6 0 Migration Guide March 2007 Sun Confidential Registered Other Migration Scenarios Unpack Identity Synchronization for Windows 6 0 Bits Save 1 1 Configuration Using export11cn and Add Passwords to the Exported Configuration Stop Synchronization Run checktopics to Verify Message Queue E Start is in Quiescent State Synchronization and Wait Yes Stop Identity Synchronization for Windows Services Back Up Connect
169. version 6 0 wees 118 Uninstalling Identity Synchronization for Windows cssceseeseeseesseeseeeeesseesneeseeseesneane 120 V To Uninstall Identity Synchronization for Windows Version 1 1 conicincinninnionnncnn 120 Installing or Upgrading the Dependent Products ss 122 Installing Identity Synchronization for Windows 6 0 ns 122 V To install the Identity Synchronization for Windows 6 0 components menciono 122 What to Do if the 1 1 Uninstallation Fails nn 125 Manually Uninstalling 1 1 Core and Instances from Solaris wc ecscessessesseeseeseeeentenens 125 V To Manually Uninstall Core From a Solaris Machine cescesseseeseeseesseeeeseesseesnees 126 Manually Uninstalling 1 1 Core and Instances from Windows 2000 ou 130 V To uninstall Core from a Windows 2000 machine eesceseessessesstesessneetesneeeesneeseeneenes 131 Y Manually Uninstalling a 1 1 Instance from Windows NT Other Migration E AAA PP Multi Master Replication Deployment coccion Multi Host Deployment with Windows NT Checking the Logs cscs csscsssatssctceseasvesstessstvcsuiessastsues cossostsevssonsetss doo nent sica nes Sun Java System Directory Server Enterprise Edition 6 0 Migration Guide March 2007 Sun Confidential Registered Contents Sun Confidential Registered Sun Confidential Registered Figures FIGURE 4 1 FIGURE 4 2 FIGURE 4 3 FIGURE 4 4 FIGURE 4 5 FIGURE 4 6 FIGURE 4 7 FIGURE 4 8 FIGURE 4 9 FIGURE 4 10
170. wd compat mode The pwd compat mode property can have one of the following values DS5 compatible mode If you install a Directory Server instance as part of a replicated topology that includes a version 5 server the compatibility state should be set to DS5 compatible mode In this state both old and new password policy attributes are recognized Only version 5 password policy attributes are replicated but both sets of attributes are stored in the database If you upgrade an existing standalone server to Directory Server 6 0 the compatibility state is set to DS5 compatible mode The server generates the new equivalent password policy attributes If you upgrade an existing server as part of a replicated topology that includes Directory Server 5 servers the compatibility state should also set to DS5 compatible mode The server accepts both old and new password policy attributes Both sets of attributes are stored in the database Only version 5 attributes can be replicated using fractional replication DS6 migration mode As part of your migration you can set the compatibility state to DS6 migration mode In this mode all servers in the topology are version 6 servers but there may be some existing Directory Server 5 password policy attributes in the database DS6 mode If you install a standalone Directory Server instance set compatibility mode to DS6 mode In this case only new password policy attributes are recognized A serve
171. word policy state attributes allow write userdn ldap self This ACI allowed self modification of user passwords among other things This ACT is no longer provided in Directory Server 6 0 Instead the following global ACIs are provided by default aci targetattr aci targetscope base version 3 0 aci Enable read access to rootdse for anonymous users allow read search compare user dn ldap anyone aci targetattr version 3 0 acl Enable full access for Administrators group allow all groupdn ldap cn Administrators cn config Sun Java System Directory Server Enterprise Edition 6 0 Migration Guide March 2007 Sun Confidential Registered Command Line Changes aci targetattr userPassword version 3 0 acl allow userpassword self modification allow write userdn ldap self In Directory Server 6 0 the default userPassword ACI at root DSE level provides equivalent access control to the default 5 2 ACI at suffix level However if you want to reproduce exactly the same access control as in 5 2 add the following ACI to your suffix This ACT is the 5 2 ACI with the new password policy operational attributes for Directory Server 6 0 aci targetattr nsroledn aci nsLookThroughLimit nsSizeLimit nsTimeLimit nsIdleTimeout passwordPolicySubentry passwordExpirationTime passwordExpWarned passwordRetryCount retryCountResetTime accoun
172. x 1 2 840 113556 1 4 906 gt lt AttributeDescription parent attr SignificantAttribute name samaccountname syntax 1 3 6 1 4 1 1466 115 121 1 15 gt lt AttributeDescription parent attr CreationAttribute name samaccountname syntax 1 3 6 1 4 1 1466 115 121 1 15 gt lt AttributeMap gt lt AttributeDescription parent attr WindowsAttribute name samaccountname syntax 1 3 6 1 4 1 1466 115 121 1 15 gt lt AttributeDescription Chapter 7 Migrating Identity Synchronization for Windows 111 Sun Confidential Registered Preparing for Identity Synchronization for Windows Migration EXAMPLE7 1 Sample Export Configuration File Continued parent attr SunAttribute name uid syntax 1 3 6 1 4 1 1466 115 121 1 15 gt lt AttributeMap gt lt AttributeMap gt lt AttributeDescription parent attr SunAttribute name sn syntax 1 3 6 1 4 1 1466 115 121 1 15 gt lt AttributeDescription parent attr WindowsAttribute name sn syntax 1 3 6 1 4 1 1466 115 121 1 15 gt lt AttributeMap gt lt AttributeDescription parent attr SignificantAttribute name sn syntax 1 3 6 1 4 1 1466 115 121 1 15 gt lt AttributeDescription parent attr SignificantAttribute name cn syntax 1 3 6 1 4 1 1466 115 121 1 15 gt lt AttributeDescription parent attr CreationAttribute name cn syntax 1 3 6 1 4 1 1466 115 121 1 15 gt lt AttributeMap gt lt AttributeDescription parent attr SunAtt
173. y Access Router 5 0 IDAR these configuration attributes are stored under ids proxy con Name group name ou groups ou pd2 ou iDAR o services In Directory Proxy Server 5 2 these configuration attributes are stored under ou groups cn user defined name ou dar config o NetscapeRoot The following table maps the attributes of a version 5 size limit property to the corresponding properties in Directory Proxy Server 6 0 TABLE6 16 Mapping of Version 5 Search Size Limit Attributes to 6 0 Properties Directory Proxy Server 5 Attribute Directory Proxy Server 6 0 Property ids proxy con Size Limit search size limit ids proxy con Dn One one level search base dn ids proxy con Dn Sub No equivalent Log Property The logging functionality available in Directory Proxy Server 5 is differs substantially from the functionality available in Directory Proxy Server 6 0 In Directory Proxy Server 5 the following logs were maintained System log Includes log records of system events and errors Audit log Includes audit trails for all events and errors Chapter6 Migrating Directory Proxy Server 101 Sun Confidential Registered Mapping the Properties Configuration Directory Proxy Server 6 0 maintains an errors log file an access log file and administrative alerts The errors log and administrative alerts are equivalent to the version 5 system log Administrative alerts are events raised by Directory Proxy Server T
174. y Server 5 Compare Request Control Attributes to Directory Proxy Server 6 Properties Directory Proxy Server 5 Attribute Directory Proxy Server 6 Property ids proxy con forbidden compare prohibited comparable attrs ids proxy con permitted compare allowed comparable attrs Mapping Attributes Modifying Search Requests In Directory Proxy Server 5 these attributes are used to modify the search request before it is forwarded to the server In Directory Proxy Server 6 this functionality is provided by setting properties of a request filtering policy and a resource limits policy For information on configuring a request filtering policy see Creating and Configuring Request Filtering Policies and Search Data Hiding Rules in Sun Java System Directory Server Chapter6 Migrating Directory Proxy Server 93 Sun Confidential Registered Mapping the Groups Configuration 94 Enterprise Edition 6 0 Administration Guide For information on configuring a resource limits policy see Creating and Configuring a Resource Limits Policy in Sun Java System Directory Server Enterprise Edition 6 0 Administration Guide In Iplanet Directory Access Router 5 0 IDAR these configuration attributes are stored under ids proxy con Name group name ou groups ou pd2 ou iDAR o services In Directory Proxy Server 5 2 these configuration attributes are stored under ou groups cn user defined name ou dar config o NetscapeRoot The
175. y are stored in the entry cn Password Policy cn config Note that in Directory Server 5 1 password policy attributes were located directly under cn config Directory Server 6 0 introduces the new pwdPolicy object class The attributes of this object class replace the old password policy attributes For a description of these new attributes see the pwdPolicy 5dsoc man page By default the new password policy is backward compatible with the old password policy However because backward compatibility is not guaranteed indefinitely you should migrate to the new password policy as soon as is convenient for your deployment For information about password policy compatibility see Password Policy Compatibility on page 75 The following table provides a mapping of the new password policy attributes whose values must be migrated from the legacy attributes TABLE 3 3 Mapping Between 5 and 6 0 Password Policy Attributes Legacy Directory Server Attribute Directory Server 6 0 Attribute password policy is applied to the userPassword attribute only passwordMinAge passwordMaxAge passwordInHistory passwordSyntax passwordMinLength passwordWarning passwordMustChange passwordChange passwordExp passwordStorageScheme passwordExpireWithoutWarning passwordLockout passwordLockoutDuration passwordMaxFailure pwdAttribute pwdMinAge pwdMaxAge pwdInHistory pwdCheckQuality pwdMinLength pwdExpireWarning pwdGraceLog
Download Pdf Manuals
Related Search
Related Contents
NEC MultiSync® LCD2190UXi 21" black Nos offres de stages 12` Ice Rink Owner`s Manual Owner`s Manual for Multi Speed Bicycles Manuel du Copyright © All rights reserved.
Failed to retrieve file