Encrypting Data In eDirectory
253
n
ov
do
cx (e
n)
22
Ju
n
e 20
09
To encrypt replication, you need to use the attribute dsEncryptedReplicationConfig. The syntax is:
enable/disable flag#destination replica number#source replica number
Replace with either of these flags:
0: Encrypted replication is disabled
1: Encrypted replication is enabled
Source replica number and destination replica number represents source and destination replica
numbers of a partition. These numbers can be specified in any order because if the replication from
A to B is encrypted, then replication from B to A is also encrypted.
NOTE:
If the source and destination replica number at the partition level is 0 and if the flag is set to
1, all the replicas are considered to be enabled for encrypted replication.
To enable encrypted replication at the partition level, the value of the dsEncryptedReplicationConfig
attribute should be set to 1#0#0.
Following is a sample LDIF file for enabling encrypted replication at the partition level:
dn: o=ou
changetype:modify
replace: dsEncryptedReplicationConfig
dsEncryptedReplicationConfig:1#0#0
These configurations at the partition level are overridden by the configurations at the replica level.
Refer to
“Enabling Encrypted Replication at the Replica Level using LDAP” on page 254
for more
information.
Enabling Encrypted Replication at the Replica Level
When you enable encrypted replication at the replica level, replication between specific replicas is
encrypted. Both outbound and inbound replication between the replicas are encrypted.
For example, consider partition P1 has replicas R1, R2, R3, and R4. You can encrypt the replication
between replicas R1 and R2 or between R2 and R4.
To enable encrypted replication between replicas of a partition, you need to define an encryption
link between the replicas. Refer to
“Enabling Encrypted Replication at the Replica Level Using
iManager” on page 254
for more information.
If you have enabled encrypted replication for one replica, it means that:
the inbound synchronization from a server to this replica
outbound synchronization from this replica to any other server is encrypted.
The replicas you have enabled for encrypted replication must be on eDirectory 8.8 servers. The
remaining replicas in the replica ring, that are not enabled for encrypted replication, can be on
servers with earlier versions of eDirectory.
If you have enabled only specific replicas for encrypted replication, you can add an eDirectory 8.8
server or a pre-eDirectory 8.8 server to the replica ring.
To disable encrypted replication at the replica level, you need to disable
Encrypt Link
for specific
replicas using Encrypted Replication Configuration Wizard in iManager.
Summary of Contents for EDIRECTORY 8.8 SP5
Page 4: ...4 Novell eDirectory 8 8 Administration Guide novdocx en 22 June 2009...
Page 72: ...72 Novell eDirectory 8 8 Administration Guide novdocx en 22 June 2009...
Page 118: ...118 Novell eDirectory 8 8 Administration Guide novdocx en 22 June 2009...
Page 130: ...130 Novell eDirectory 8 8 Administration Guide novdocx en 22 June 2009...
Page 188: ...188 Novell eDirectory 8 8 Administration Guide novdocx en 22 June 2009...
Page 222: ...222 Novell eDirectory 8 8 Administration Guide novdocx en 22 June 2009...
Page 240: ...240 Novell eDirectory 8 8 Administration Guide novdocx en 22 June 2009...
Page 264: ...264 Novell eDirectory 8 8 Administration Guide novdocx en 22 June 2009...
Page 290: ...290 Novell eDirectory 8 8 Administration Guide novdocx en 22 June 2009...
Page 322: ...322 Novell eDirectory 8 8 Administration Guide novdocx en 22 June 2009...
Page 540: ...540 Novell eDirectory 8 8 Administration Guide novdocx en 22 June 2009...
Page 548: ...548 Novell eDirectory 8 8 Administration Guide novdocx en 22 June 2009...
Page 616: ...616 Novell eDirectory 8 8 Administration Guide novdocx en 22 June 2009...