Schema for the DCE Security Registry Server

Size: px
Start display at page:

Download "Schema for the DCE Security Registry Server"

Transcription

1 Schema for the Security egistry Server Versio Date: 0/20/00 For questios or commets cocerig this documet, sed a ote to dce-ldap@opegroup.org or call Doa Skibbie at

2 . Itroductio Overview Cofiguratio of the Core Schema Cofigurig the ealm Portio of the Schema Creatig a ealm Schema Addig ealm Extesios to a Kerberos Schema Cofigurig the Pricipal ad Orgaizatio Portios of the Schema Creatig a Pricipal ad Orgaizatio Schema Addig Pricipal ad Orgaizatio Extesios to a Kerberos Schema Cofigurig the Group Portio of the Schema Cofigurig a Existig Etry to epreset a Group Cofigurig a New Etry to epreset a Group Cofigurig a New Etry to epreset a Group Alias Cofigurig a New Etry to epreset a Temporary Group With No Members0 3.4 Cofigurig UNIX Iformatio about Pricipals ad Groups Cofigurig Uique Idetifiers Default Method Security Mappig Method Cofigurig UUID Iformatio i Pricipal Etries Cofigurig UUID Iformatio i Orgaizatio Etries Cofiguratio of Legacy Extesios to the Core Schema Directories ACLs eplists Database Sequetial IDs User-Defied Exteded Attributes Security Cosideratios ACL Protectio Data Privacy Protectio Protectio Durig Trasmissio Defiitios of Attributes ad Object Classes Attribute Types New Attribute Types Defied i This Schema Attribute Types Defied i the Netscape Schema Attribute Types Defied i the Tivoli/IBM Schema Object Classes New Object Classes Defied i This Schema Object Classes Defied i the Tivoli/IBM Schema Mappigs Mappigs Ordered by Proposed Objects ad Attributes Mappigs Ordered by Objects ad Attributes

3 . Itroductio This documet defies a schema for storig all attributes that the security server curretly stores i its database. This icludes attributes defiig the followig objects: The at-large ad the policy for the ipals groups orgaizatios directories exteded attributes EAs exteded attribute defiitios XATTs access cotrol lists ACLs replicatio lists The schema exteds the Kerberos schema, ad this documet makes may refereces to the Kerberos schema. For iformatio about the Kerberos schema, refer to the followig documet: "Schema for the Kerberos Versio 5 KDC Server, Documet Versio 7." 3

4 2. Overview The schema is desiged to meet four objectives. The first objective is to exted the Kerberos schema described i the "Itroductio" of this documet. This makes it possible for Kerberos to use a existig cofiguratio ad to use a existig Kerberos cofiguratio. The secod objective is to use attributes defied by stadards orgaizatios where possible ad to provide a way of associatig attributes with exterally cofigured attributes. This makes it possible for to share commo security attributes, such as group memberships, with o- applicatios. The third objective is to provide a way of protectig keys ad other sesitive iformatio. The fourth object is ot to chage ay existig iterfaces. The followig figures illustrates the core schema. The core schema cotais all attributes i the database except for those that uses to maage its database. A sectio later i this documet provides iformatio o legacy extesios that ca be added to the core schema for users who eed all attributes defied i the schema. Ay etry startig a subtree with /Kerberos ipals ealm Krbealm ilucdes KrbealmExt Policy iicludes Ay etry represetig a policy Policy icludes UiqueID KrbMstr Key Actual master key ca be stored i ay locatio, such as a file. Pricipal Ay etry represetig a user ilcudes KrbPricipal Uix UiqueID KrbKey Log Policy icludes Ay etry startig a subtree with groups Ay etry represetig a group UiqueID Ay etry startig a subtree with orgaizatios Group Group Ay etry Org icludes represetig Policy ad a policy Ay etry represetig a UNIX Uix Kerberos object class /Kerberos object ckass object class Ay object ckass DIT directory iformatio tree coector equired forward poiter Optioal forward poiter Optioal DIT coector UiqueID show are security mappig etries, which users eed to cofigure if usig the alterate method for cofigurig uique idetifier iformatio. 4

5 3. Cofiguratio of the Core Schema This sectio provides a high-level descriptio of the tasks that eed to be performed to cofigure the core schema. A sectio later i this documet describes how to cofigure legacy extesios to the core schema. The descriptio i this sectio assumes the admiistrator is usig stadard Versio 3 iterfaces to do the cofiguratio tasks uless oted to the cotrary. I practice, a tool could be provided to the admiistrator that would automate may of the cofiguratio tasks. 3. Cofigurig the ealm Portio of the Schema The realm portio of the schema is the realm portio of the Kerberos schema with extesios. Therefore, a admiistrator ca cofigure the realm portio of the schema so that it ca be used by both a implemetatio of that supports the schema ad a implemetatio of Kerberos that supports the Kerberos schema. I additio, if the Kerberos schema already is cofigured, the admiistrator ca use the existig schema to defie a realm simply by addig extesios to the schema. 3.. Creatig a ealm Schema The admiistrator ca cofigure the realm portio of the schema i a similar way that the admiistrator would cofigure the realm portio of the Kerberos schema. efer to the Kerberos documet, which is refereced i the "Itroductio" of this documet. The followig are the differeces: Add the ealm rather KrbealmExt auxiliary object class ad attributes to the etry represetig the realm. ealm is a subclass of Krbealm, so ealm cotais all the Krbealm attributes. Add the Policy rather tha auxiliary object class ad attributes to the etry represetig the realm or a refereced policy etry. Policy is a subclass of, so Policy cotais all the attributes. The ealm auxiliary object class cotais two attributes that are for cofigurig orgaizatios ad groups. These two attributes are: dceorgsubtree--this attribute lists the DN of each etry uder which will search for orgaizatio etries. dcegroupsubtree--this attribute lists the DN of each etry uder which will search for group etries. The followig figure is a example. I this example, all ipals, orgaizatios, ad groups must reside uder the c=users, ou=austi subtree. 5

6 DN: ou=austi DN: c=users, ou=austi krbealmname=payroll,ou=austi objectclass: Krbealm krbealmname: Payroll objectclass: ealm SubTree: c=users, ou=austi dceorgsubtree: c=users, ou=austi dcegroupsubtree: c=users, ou=austi realm etry 3..2 Addig ealm Extesios to a Kerberos Schema The admiistrator ca add realm iformatio to a existig Kerberos schema by doig the followig: Add the ealm auxiliary object class ad attributes to the etry represetig the realm. Add the Policy auxiliary object class ad attributes to the etry i which the auxiliary object class ad attributes are cofigured. Cofigure the dceorgsubtree ad dcegroupsubtree attributes as previously described. 3.2 Cofigurig the Pricipal ad Orgaizatio Portios of the Schema The ipal ad orgaizatio portios of the schema cotais all iformatio that is i the ipal portio of the Kerberos schema ad exted this schema with iformatio. Therefore, a admiistrator ca cofigure the ipal ad orgaizatio portio of the schema so that it ca be used by both a implemetatio of that supports the schema ad a implemetatio of Kerberos that supports the Kerberos schema. I additio, if the Kerberos schema already is cofigured, the admiistrator ca use this same schema to defie ipals ad orgaizatios simply by addig extesios to the schema. The admiistrator eeds to ote that the schema supports a more flexible model for cofigurig policy attributes for a ipal tha the model supported by the legacy database. The admiistrator ca cofigure policy attributes for the ipal i the ipal etry, a refereced policy etry which ca be cofigured as a orgaizatio, or a combiatio of both etries. If the same policy attribute is cofigured i the both etries, uses the policy attribute i the refereced etry. The added flexibility for cofigurig policy attributes makes it easier for the admiistrator to cofigure ipals to share policy attributes with o- applicatios Creatig a Pricipal ad Orgaizatio Schema The admiistrator ca cofigure the ipal ad orgaizatio portio of the schema i a similar way that the admiistrator would cofigure the ipal portio of the Kerberos schema. efer to the Kerberos documet refereced i the "Itroductio" of this documet. The differeces are as follows: Add the Pricipal rather tha KrbPricipal auxiliary object class ad attributes to each etry represetig a ipal. Pricipal is a subclass of KrbPricipal, so Pricipal cotais all KrbPricipal attributes. 6

7 If cofigurig policy attributes i a ipal etry, add the Policy rather tha auxiliary class ad attributes to the etry represetig the ipal. As stated previously, Policy is a subclass of, so Policy cotais all attributes. If cofigurig policy attributes i a refereced policy etry, cofigure the refereced policy etry as a orgaizatio by doig the followig:. Be sure the dceorgsubtree attribute of the realm etry lists a DN of a etry uder which the refereced policy etry resides. 2. Choose a ame for a orgaizatio that is uique withi the ealm. To determie if a ame is uique, search each DN listed i the dceorgsubtree attribute of the realm etry for a dceorgname attribute that matches the chose ame. If o match is foud, the ame is uique. 3. Add the Org rather tha auxiliary class ad attributes to the refereced policy etry ad cofigure the ame of the orgaizatio i the dceorgname attribute. Org is a subclass of Policy, so Org cotais all the Policy ad attributes. I the followig example, the Mary Smith etry is cofigured as a ipal amed marys@payroll. The ipal etry refereces a policy etry, which is cofigured as a orgaizatio amed mgrsorg@payroll." Both the ipal etry ad the orgaizatio etry reside uder a subtree listed i the realm etry. DN: ou=austi DN: c=users, ou=austi DN: krbealmname=payroll, ou=austi objectclass: Krbealm objectclass: ealm Subtree: c=users, ou=austi dceorgsubtree: ou=austi DN: c=mgrs, ou=austi objectclass: passwordpolicy objectclass: <Kerberos policy attributes> objectclass: Org dceorgname: mgrsorg@payroll < ad policy attributes> DN: c=mary Smith, ou=users, ou=austi objectclass: Perso objectclass: KrbPricipal krbpricipalname: marys@payroll policyobject: c=mgrs, ou=austi objectclass: Pricipal < attributes> realm etry ipal etry orgaizatio etry Addig Pricipal ad Orgaizatio Extesios to a Kerberos Schema The admiistrator ca add ipal ad orgaizatio iformatio to a existig Kerberos schema by doig the followig: Add the Pricipal auxiliary object class ad its attributes to each etry represetig a Kerberos ipal that also eeds to be cofigured as a ipal If cofigurig policy attributes i a ipal etry, add the Policy auxiliary object class ad its attributes to the ipal etry. 7

8 If cofigurig policy attributes i a refereced policy etry refereced with the policyobject attribute of the ipal etry, cofigure the refereced policy etry as a orgaizatio by doig the followig:. Be sure the dceorgsubtree attribute of the realm etry lists a DN of a etry uder which the refereced policy etry resides. 2. Choose a ame for a orgaizatio that is uique withi the ealm. To determie if a ame is uique, search each DN listed i the dceorgsubtree attribute of the realm etry for a dceorgname attribute that matches the chose ame. If o match is foud, the ame is uique. 3. Add the Org to the refereced policy etry ad cofigure the ame of the orgaizatio i the dceorgname attribute. 3.3 Cofigurig the Group Portio of the Schema The admiistrator ca cofigure groups usig ay combiatio of the followig methods: Cofigure a existig etry to represet a group Cofigure a ew etry to represet a group Cofigure a ew etry to represet a alias group Cofigure a ew etry to represet a temporary group with o members Cofigurig a Existig Etry to epreset a Group To cofigure a existig etry to represet a group, the admiistrator must do the followig:. Be sure the dcegroupsubtree attribute of the realm etry lists a DN of the existig group etry. 2. Choose a ame for a group that is uique withi the ealm usig the method previously described. 3. Add the Group auxiliary object class ad attributes to the existig group etry ad cofigure the ame of the group i the dcegroupname attribute. I the followig example, Mary Smith is a member of a mgrs group. Mary Smith is cofigured as a ipal amed marys@payroll, ad the mgrs group is cofigured as a group amed mgrsgroup@payroll. Therefore, the ipal marys@payroll is a member of the group mgrsgroup@payroll. Also ote that both the ipal ad the group reside uder subtrees listed i the realm etry. 8

9 DN: ou=austi DN: c=users, ou=austi DN: krbealmname=payroll, ou=austi objectclass: Krbealm objectclass: ealm Subtree: c=users, ou=austi dcegroupsubtree: ou=austi DN: c=mgrs, ou=austi objectclass: groupofnames membership: c=mary Smith, ou=users, ou=austi objectclass: Group < attributes> DN: c=mary Smith, ou=users, ou=austi objectclass: Perso objectclass: KrbPricipal krbpricipalname: policyobject: c=mgrs, ou=austi objectclass: Pricipal < attributes> realm etry ipal etry group etry Cofigurig a New Etry to epreset a Group To cofigure a ew etry to represet a group, the admiistrator must do the followig:. Be sure the dcegroupsubtree attribute of the realm etry lists a DN of a etry uder which the group etry will reside. 2. Create a etry to represet the group usig a structural object class with a membership attribute. Examples are GroupOfNames ad GroupOfUiqueNames. Cofigure the membership attribute with the DN of each etry represetig a ipal that is a part of this group. 3. Choose a ame for a group that is uique withi the ealm. To determie if a ame is uique, search each DN listed i the dcegroupsubtree attribute of the realm etry for a dcegroupname attribute that matches the chose ame. If o match is foud, the ame is uique. 4. Add the Group auxiliary object class ad attributes to the group etry, ad cofigure the ame of the group i the dcegroupname attribute Cofigurig a New Etry to epreset a Group Alias To cofigure a group alias, the admiistrator eeds to do the followig:. Be sure the dcegroupsubtree attribute of the realm etry lists a DN of a etry uder which the group alias etry will reside. 2. Create a etry to represet the group alias usig ay structural object class, such as the cotaier object class. 3. Choose a ame for the group alias that is uique withi the ealm. To determie if a ame is uique, search each DN listed i the dcegroupsubtree attribute of the realm etry for a dcegroupname attribute that matches the chose ame. If o match is foud, the ame is uique. 4. Add the Group ad KrbAlias auxiliary object classes ad attributes to the group etry. Cofigure the ame of the group i the dcegroupname attribute, ad cofigure the DN of the refereced group etry i the krbaliasedobjectname attribute. 9

10 3.3.4 Cofigurig a New Etry to epreset a Temporary Group With No Members If the admiistrator eeds to support iterfaces that allow a group to be created before addig ay members to the group, the admiistrator will eed to create a temporary group with o members. This is ecessary because the structural object classes for creatig a actual group such as GroupOfNames require a membership attribute. To create a etry represetig a temporary group with o members, the admiistrator must do the followig:. Be sure the dcegroupsubtree attribute of the realm etry lists a DN of a etry uder which the temporary group with o members will reside. 2. Usig ay structural object class such as cotaier, create a etry to represet the temporary group with o members. 3. Choose a ame for a group that is uique withi the ealm. To determie if a ame is uique, search each DN listed i the dcegroupsubtree attribute of the realm etry for a dcegroupname attribute that matches the chose ame. If o match is foud, the ame is uique. 4. Add the Group auxiliary object class ad attributes to the etry represetig the temporary group with o members, ad cofigure the ame of the group i the dcegroupname attribute. Whe the admiistrator eeds to add the first member to the group, the admiistrator ca create a etry represetig the actual group, move the attributes from the etry represetig the temporary group with o members to the etry represetig the actual group, ad the delete the etry represetig temporary group with o members. 3.4 Cofigurig UNIX Iformatio about Pricipals ad Groups If the admiistrator wats to cofigure UNIX iformatio about a ipal or group, the admiistrator must either add the UNIX auxiliary object class ad attributes to the ipal or group etry or cofigure the dceuixobject attribute of the ipal or group etry to referece aother etry i which the UNIX iformatio is cofigured. The followig is a example i which the dceuixobject attribute refereces a etry with UNIX iformatio. DN: c=myuixacct, ou=austi <uix attributes> DN: c=mary Smith, ou=users, ou=austi objectclass: Perso objectclass: KrbPricipal krbpricipalname: marys@payroll policyobject: c=mgrs, ou=austi objectclass: Pricipal dceuixobject: myuixacct, ou=austi < attributes> ipal etry UNIX etry 0

11 3.5 Cofigurig Uique Idetifiers The admiistrator ca cofigure uique idetifier iformatio usig either of the followig methods: Default method Security mappig method The default method is the simplest to implemet ad offers the best performace. To use this method, the server must implemet the system-cotrolled creatorsname attribute as it is defied i the IETF FC 2252 ad implemeted i the referece platform of the Versio 3 protocol. This meas the server must add a creatorsname attribute to each etry that is created i ad allow users to read but ot modify the valued stored i this attribute. The security mappig method is used by curret implemetatios of Tivoli/IBM Policy Director ad does ot require the use of the creatorsname attribute. If a admiistrator eeds to cofigure to share uique idetifier iformatio with Tivoli/IBM Policy Director or if the admiistrator is usig a server that does ot implemet the creatorsname attribute as it is defied i IETF FC 2252 ad implemeted i the referece platform of the Versio 3 protocol, the admiistrator must use the security mappig method. The admiistrator cofigures which method the realm will use by addig a dceuiqueidcfg attribute to the realm etry with a value of either DEFAULT or SECMAP. If the realm etry does ot cotai the dceuiqueidcfg attribute, will use the default method Default Method Usig the default method, a trusted admiistratio tool a idetity listed i the trustedadmtool attribute of the realm etry creates a UiqueID etry uder each etry represetig a object for which the uique idetifier iformatio is beig cofigured. The trusted admiistrator creates the UiqueID etry usig a DN of "c=uiqueid" or "c=diruiqueid" ad a structural object class of UiqueID; the cofigures the UiqueID attributes. A DN of "c=uiqueid" represets a UiqueID etry for ay object except for a directory. A DN of "c=diruiqueid" represets a UiqueID etry for a directory. The UiqueID attributes are c which must cotai the value "UiqueID" or "DirUiqueID", secuuid which must cotai a UUID, ad uixid which ca optioally cotai a UNIX ID. If a user supplies a value for secuuid or uixid, the trusted admiistratio tool must verify that this value is uique. If a user does ot specify a value for secuuid or uixid, the trusted admiistratio tool must geerate this value. The followig figure is a example:

12 ipal etry DN: c=mary Smith, ou=users, ou=austi objectclass: Perso objectclass: KrbPricipal krbpricipalname: objectclass: Pricipal <attributes> UiqueID etry DN: c=uiqueid, c=mary Smith, ou=users, ou=austi objectclass: UiqueID secuuid: xxxxxxxxxxxx uixid: xxxxxxxxxxxxxx creatorsname: ServerA creator must be trusted Whe requires a UUID for a object, must get the UiqueID etry that was cofigured for the object. If the UiqueID etry does ot exist, must create the UiqueID etry, geeratig values for the secuuid ad uixid attributes. the must verify that the creator of the UiqueID etry is trusted. If so, ca get the UUID from the secuuid attribute of the UiqueID etry. Whe requires a UNIX ID for a object, must determie whether the etry represetig the object cotais a uixobject attribute. If so, must get the UNIX ID from the uid attribute of the etry refereced by the uixobject attribute. If ot, must get the UiqueID etry for the object ad verify that is trusted; the, get the UNIX ID from the uixid attribute of the UiqueID etry Security Mappig Method Usig the security mappig method, a admiistrator chooses cotaier etries uder which security mappig etries will reside for ipals, groups, ad other objects; ad cofigures the DN of each cotaier etry i the dcesecmapsubtreepric, dcesecmapsubtreegroup, ad dcesecmapsubtreeorg attributes of the realm etry. The ACLs o the cotaier etry must be set so that oly a trusted admiistrator or process ca isert etries uder this cotaier. The admiistrator the cofigures a security mappig etry for each object that requires a uique idetifier iformatio. To cofigure the security mappig etry, the admiistrator cofigures a etry with a DN of "secuuid=< UUID>", The admiistrator cofigures this usig a structural class of SecMap. The SecMap object class cotais a secuuid attribute, for storig a UUID value, ad a secdn attribute, for storig the etry represetig the object for which the uique idetifier iformatio is cofigured. If the admiistrator wats to cofigure a UNIX uique idetifier, the admiistrator ca cofigure this i the SecMap etry usig the optioal SecMapUix auxiliary object class. The followig figure is a example: 2

13 DN: ou=austi DN: c=users, ou=austi DN: c=mary Smith, ou=users, ou=austi objectclass: Perso objectclass: KrbPricipal krbpricipalname: policyobject: c=mgrs, ou=austi objectclass: Pricipal < attributes> DN: krbealmname=payroll, ou=austi objectclass: Krbealm objectclass: ealm dceuiqueidcfg: SECMAP Subtree: c=users, ou=austi dcesecmapsubtreepric: c=secure realm etry ipal etry DN: c=secure DN: secuuid=xxxxxx, c=secure objectclass: SecMap secuuid: xxxxxxxl secdn: c=mary Smith, ou=users, ou=austi objectclass: SecMapUix uixid: xxxxx SecMap etry 3.6 Cofigurig UUID Iformatio i Pricipal Etries To improve performace durig a iitial logi, the admiistrator ca cofigure the UUIDs of all groups ad foreig groups of which the ipal is a member. The admiistrator cofigures this iformatio i the ipal etry usig the dcehitmembershipuuids ad dcehitforeigmembershipuuids attributes. The admiistrator the must idicate that this cofiguratio has bee doe by cofigurig the dceishitmembershipcofigured attribute to equal TUE. Doig this will improve performace durig a iitial logi, because durig this iitial logi, the cliet ipal requests the security server to retur to the cliet ipal the UUIDs of UUIDs of all groups ad foreig groups of which the ipal is a member. The cliet ipal caches this iformatio ad uses it for subsequet EPAC requests from the privilege server. Whe the security server receives this request from the cliet ipal, it first must check the value of the dcishitmembershipcofigured attribute before returig the iformatio. If dceishitmembershipcofigured equals TUE, returs the UUIDs stored i the dcehitmembershipuuids ad dcehitforeigmembershipuuids attributes. If dceishitmembershipcofigured is ot cofigured or equals FALSE, must search the curret realm for all the local groups of which the ipal is a member ad search all the realms cofigured i the directory for all the foreig groups of which the ipal is a member; the, retur to the user the UUIDs for these groups. 3.7 Cofigurig UUID Iformatio i Orgaizatio Etries To be cosistet with the legacy database, the schema also allows the admiistrator to cofigure the dcehitmembershipuuids ad dcehitforeigmembershipuuids attributes i a orgaizatio object. However, it is ot clear whether this iformatio ever will be used. 3

14 4. Cofiguratio of Legacy Extesios to the Core Schema The legacy extesios to the core schema cotai defiitios for the attributes that uses to maage its database. If the admiistrator wats full support of all legacy fuctios, the admiistrator must cofigure the legacy extesios to the core schema. The admiistrator should ote that although the legacy extesios have to do with maagig a database, the legacy extesios are uderstood oly by. For example, if a user adds attributes defiig a exteded attribute, this attribute ca be iterpreted oly by meas of the iterfaces. The followig are the attributes cotaied i the legacy extesios: Attributes defiig a directory Attributes defiig a ACL Attributes defiig a eplist A attribute defiig a database sequetial ID Attributes defiig a exteded attribute The followig figure illustrates the cofiguratio of all these attributes except for database sequetial IDs. 4

15 Ay etry startig a subtree with /Kerberos ipals Ay etry Dir ACL ealm Krbealm ilucdes KrbealmExt UiqueID KrbMstr Key Policy iicludes ACL Ay etry represetig a policy Policy icludes Actual master key ca Actual be master stored key i ay ca locatio, be stored such i ay as a file. locatio, such as a file. Ay etry represetig a user Pricipal ilcudes KrbPricipal Uix Policy icludes ACL UiqueID KrbKey EA cotaier etry Log c=xattrs ACL UiqueID XATT Ay etry Uix represetig a UNIX Kerberos object class /Kerberos object ckass object class Ay object ckass UiqueID Ay etry startig a subtree with groups Ay etry represetig a group UiqueID DIT directory iformatio tree coector equired forward poiter Optioal forward poiter Optioal DIT coector Ay etry Ay etry startig a Dir subtree with orgaizatios Group ACL Group Ay etry Dir ACL Ay etry Org icludes represetig ACL Policy ad a policy ACL UiqueID cotaier etry c=eplist eplist UiqueID ACL 4. Directories The legacy database code allows directory objects to be cofigured i ipal, group, ad orgaizatio databases. The directory objects are used as cotaiers for ipals, groups, orgaizatios, ad other directories. Three kids of ACLs are supported for directory objects: a directory ACL, a default ACL for all object created uder the directory except for other directories, ad a default ACL for all directory objects created uder the directory. The schema supports directories through the use of the Dir auxiliary object class. The admiistrator ca add Dir ad its attributes to ay etry i the ipal, group, or orgaizatio subtree ad, by doig so, defie the etry as a directory. The admiistrator the ca cofigure ay or all of the three types of supported directory ACLs uder this etry usig the Acl object class. Whe the eviromet is fully migrated to, the admiistrator o loger requires directories. This is because the etry ca use ay etry a cotaier for other etries ad the admiistrator ca cofigure ay etry with propagatio ACLs, which will be the default for all etries created below the etry cofigured as a cotaier. 5

16 4.2 ACLs The legacy database code supports ACLs o all objects. The schema supports ACLs through the use of the ACL structural object class. The admiistrator ca cofigure oe or more ACLs uder each etry represetig a object. Whe the eviromet is fully migrated to, the admiistrator ca use ACLs ad o loger requires support of ACLs. 4.3 eplists The legacy database code has a replist object that is cofigured for each server i the realm. The replist object cotais iformatio to perform replicatio. The schema supports the replist objects through the use of the eplist structural object class. The admiistrator must cofigure uder the realm etry a etry to represet a replist cotaier. The admiistrator cofigures this etry usig a structural object class of eplist ad a DN of c=eplist. The, uder the replist cotaier, the admiistrator the must the eplist object class to cofigure eplists for the security server. Whe the eviromet is fully migrated to, the admiistrator ca use replicatio ad o loger requires support of replicatio. 4.4 Database Sequetial IDs The legacy database code has a database sequetial ID that is cofigured for each object. This ID is to associate oe object such as a EA with aother object such as a ipal. The schema supports the sequetial ID through the use of the LegacyDB auxiliary object class. The admiistrator must cofigure the LegacyDB object class to cofigure the dceid attribute i each etry represetig a object. Whe the eviromet is fully migrated to, the sequetial IDs are ot loger, because the relatioship betwee attributes is cofigured as part of the schema. 4.5 User-Defied Exteded Attributes The admiistrator ca add user-defied attribute extesios to the schema usig oe of two methods. The simplest method is to use the method for extedig a schema. For example, the admiistrator could use the schema iterfaces to add a telephoe umber attribute to a etry represetig a ipal. A user the could use stadard iterfaces to access the telephoe umber stored i this attribute. The secod method is to create etries cotaiig biary represetatios of exteded attributes ad istaces, called exteded attributes EAs, of the exteded attributes. The advatage of this method is that it supports legacy applicatios that make use of exteded attributes ad EAs, because users will be able to access the exteded attributes ad EAs usig stadard iterfaces. The disadvatage of usig this method is that o- applicatios will ot be able to iterpret the cotets of the exteded attributes ad EAs. If the user chooses to use the secod method, the user eeds to do the followig: 6

17 . Use the cotaier structural object class to cofigure a etry uder the realm etry with the relative directory ame DN of c=xatt. 2. Uder the c=xatt etry, use the XATT structural object class to cofigure a etry for each user-defied exteded attribute. Cofigure the ame of the exteded attribute i the dcexattrname attribute ad cofigure a biary represetatio of the exteded attribute defiitio i the dcexattrdef attribute. 3. Uder each etry i which a EA eeds to be attached, use the EA structural object class to cofigure the EA. Cofigure the ame of the EA i the dcexattrname attribute ad a biary represetatio of the EA value i the dcexattrvalue attribute. 7

18 5. Security Cosideratios The followig describes how the attributes defied i this schema are protected. 5. ACL Protectio All attributes i this schema must be protected through the use of ACLs. The followig describes how these ACLs eed to be cofigured. The UiqueID etry ca be created oly by a or trusted admiistratio tool. will igore a UiqueID etry created by ay other idetity. Whe or a trusted admiistratio tool creates a UiqueID etry, it eeds to set the ACLs o the KrbKey etry so that it ca be read ad deleted, but ot modified. The KrbLog ad KrbKey etries ca be created oly by the Kerberos KDC,, or a trusted admiistrator tool. efer to the Kerberos documet for iformatio o how the creator of these etries eeds to create these etries ad the ACLs for the etries. It is the resposibility of the admiistrator to cofigure the ACLs o the remaiig etries. 5.2 Data Privacy Protectio efer to the Kerberos documet for iformatio o how to protect the privacy of keys stored i. 5.3 Protectio Durig Trasmissio If the or admiistratio tools will be separate from, it is the resposibility of the user to cofigure the security protocol for bid operatios to the server. It is recommeded that the user choose a security protocol such as SSL that offers cliet/server autheticatio techique that is as strog or stroger tha the protocol used by for operatios, which is PC with mutual autheticatio ad data itegrity. ad the admiistratio tools are resposible for ecryptig keys before sedig the keys to the server. ad the admiistratio tools eed to use a ecryptio type that is as strog or stroger tha DES. 8

19 6. Defiitios of Attributes ad Object Classes This sectio provides a defiitio of the attributes ad object classes that are used i this schema. efer to the Kerberos schema documet refereced i the "Itroductio" of this documet for iformatio o the Kerberos attributes ad object classes. 6. Attribute Types 6.. New Attribute Types Defied i This Schema dceacldefealmuuid-oid NAME 'dceacldefealmuuid' SYNTAX IA5Strig EQUALITY caseexactmatch DESC 'The UUID of the default realm for this ACL.' dceacletries-oid NAME 'dceacletries' SYNTAX biary DESC 'A list of structures that defie a ACL for a ssociated object. Each structure is biary data of type rsdb_acl_etry_t ad defies a etry i the ACL.' dceaclmgrtype-oid NAME 'dceaclmgrtype' SYNTAX iteger DESC 'A value idicatig the type of ACL maager that will evaluate the ACL defied i this etry. The available types are: ***** list available types ****' dcebadorigiator dcedefaulttktlife-oid NAME 'dcedefaulttktlife' SYNTAX iteger DESC 'Default time a Kerberos TGT issued by this realm is valid.' dcedefdiracletries-oid NAME 'dcedefdiracletries' SYNTAX biary 9

20 DESC 'A list of structures that defie the default ACL for all directories created uder the associated directory. Each structure is biary data of type rsdb_acl_etry_t ad defies a etry i the ACL.' dcedefobjacletries-oid NAME 'dcedefdiracletries' SYNTAX biary DESC 'A list of structures that defie the default ACL for all objects created uder the associated directory. Each structure is biary data of type rsdb_acl_etry_t ad defies a etry i the ACL.' dcedirname-oid NAME 'dcedirname' SYNTAX directorystrig EQUALITY caseexactmatch DESC 'The ame of a directory. uses this attribute oly if a etry is ot cofigured to represet a ipal. If a etry is cofigured to represet a ipal, also allows the etry to represet a directory ad uses the ipal ame, which is cofigured i the krbpricipalname attribute, as the ame of the directory. dcedisabletime-oid NAME 'dcedisabletime' SYNTAX geeralizedtime DESC 'The date ad time a was disabled.' dcedomaicachestate-oid NAME 'dcedomaicachestate' SYNTAX???? DESC '????' dcefullname dcegoodorigiator dcegoodsicedate-oid NAME 'dcegoodsicedate' SYNTAX date DESC 'Date whe TGT was good.' 20

21 dcegroupname-oid NAME 'dcegroupname' SYNTAX directorystrig EQUALITY caseigorematch DESC 'The ame of a group.' dcegroupsubtree-oid NAME 'dcegroupsubtree' SYNTAX directorystrig EQUALITY caseigorematch DESC 'A list of DNs. Each DN cotais the etry of a subtree uder which groups for this realm reside.' dcehitforeigmembershipuuids-oid NAME 'dcehitforeigmembershipuuids' SYNTAX IA5Strig EQUALITY caseexactmatch DESC 'A list of UUID pairs. Each UUID pair idetifies a group from a foreig realm of which the ipal represeted by this etry is a member. The first UUID i the pair idetifies the UUID of the group. The secod UUID i the pair idetifies the UUID of the realm.' dcehitmembershipuuids-oid NAME 'dcehitmembershipuuids' SYNTAX IA5Strig EQUALITY caseexactmatch DESC 'A list of UUIDs. Each UUID idetifies a group i the local realm of which the ipal represeted by this etry is a member. dceid dceisequired-oid NAME 'dceisequired' SYNTAX boolea DESC 'A boolea value idicatig whether the object represeted i this etry is. If this attribute is omitted, assumes dceisequired=false.' dcejouralid-oid NAME 'dcejouralid' SYNTAX iteger 2

22 DESC 'The ID of a etry i the joural database.' dcekeyparts-oid NAME 'dcekeyparts' SYNTAX iteger DESC 'Oe of the followig values idetifyig the keys to objects to idetify the for the associated ipal: Pricipal oly ipal ad group 2 ipal, group, ad orgaizatio 3 If this attribute is omitted, assumes dcekeyparts= ipal oly.' dcelowuixidgroup-oid NAME 'dcelowuixidgroup' SYNTAX IA5Strig EQUALITY caseexactmatch DESC 'The lowest UNIX ID that this realm will assig to a group.' dcelowuixidorg-oid NAME 'dcelowuixidorg' SYNTAX IA5Strig EQUALITY caseexactmatch DESC 'The lowest UNIX ID that this realm will assig to a orgaizatio.' dcelowuixidperso-oid NAME 'dcelowuixidperso' SYNTAX IA5Strig EQUALITY caseexactmatch DESC 'The lowest UNIX ID that this realm will assig to a ipal.' dcemaxuixid-oid NAME 'dcemaxuixid' SYNTAX IA5Strig EQUALITY caseexactmatch DESC 'The highest UNIX ID that this realm will assig to a object.' dcemitktlife-oid NAME 'dcemitktlife' SYNTAX iteger 22

23 DESC 'A value idicatig the miimum time i days? that a Kerberos ticket issued by this is valid.' dceorgname-oid NAME 'dceorgname' SYNTAX directorystrig EQUALITY caseigorematch DESC 'Name of a orgaizatio.' dceorgsubtree-oid NAME 'dceorgsubtree' SYNTAX directorystrig EQUALITY caseigorematch DESC 'A list of DNs. Each DN specifies a subtree uder which orgaizatios for this realm reside.' dcepkprivatekeystorage-oid NAME 'dcepkprivatekeystorage' SYNTAX iteger DESC 'A value idicatig where the private key of a ipal is stored. Available values are: private key storage mechaism private key file' dcepolicyflags-oid NAME 'dcepolicyflags' SYNTAX iteger DESC 'A value cotaiig oe or more of the followig flags: sec_rgy_acct_admi_audit sec_rgy_acct_admi_cliet sec_rgy_acct_admi_lsuse sec_rgy_acct_admi_server' dcepreauthtype-oid NAME 'dcepreauthtype' SYNTAX iteger DESC 'A value idicatig the pre-autheticatio protocol for a ipal. Available values are: 0=o pre-autheticatio =timestamp or higher 2=third party or higher 3=public key' 23

24 If a cotradictio occurs betwee this attribute specifyig that a type of pre-autheticatio is value, 2, or 3 ad the useraccoutcotrol attribute specifyig that o preautheticatio is UF_DONT_EQUIE_PEAUTH flag, will require the preautheticatio specified with this attribute, sice this is the more restrictive.' dceprimarygroup-oid NAME 'dceprimarygroup' SYNTAX IA5Strig EQUALITY caseexactmatch DESC 'The UUID of the primary group to which this ipal is a member.' dceprivatekeystorage dceprojlistok-oid NAME 'dceprojlistok' SYNTAX boolea DESC 'A boolea value idicatig whether it is OK for this group to be icluded i the project list of a ipal. If this attribute is omitted, assumes dceprojlist=false.' dcepublickeyautheticatio-oid NAME 'dcepublickeyautheticatio' SYNTAX IA5Strig EQUALITY caseexactmatch DESC 'A public key that is associated with a ipal ad that is used by the autheticatio protocol to verify the sigature of the ipal whe the ipal is cofigured for public key pre-autheticatio.' dcepublickeyeciphermet-oid NAME 'dcepublickeyeciphermet' SYNTAX IA5Strig EQUALITY caseexactmatch DESC 'A public key that is associated with a ipal ad that is used by the autheticatio protocol to ecrypt the sessio key of the ipal whe the ipal is cofigured for public key pre-autheticatio.; dcepwdoverride-oid NAME 'dcepwdoverride' SYNTAX iteger DESC 'Oe of the followig values: 0=No password override =Password override' 24

25 dcepwdvaltype-oid NAME 'dcepwdvaltype' SYNTAX iteger DESC 'Oe of the followig values, idicatig whether the password maagemet server is to be used for this ipal ad, if so, how the password maagemet server is to be used: 0=No password maagemet server =Pricipal supplies password to be validated by password maagemet server 2=Pricipal ca either supply a password to be validated by password maagemet server or ca have password geerated by password maagemet server. 3= password maagemet server geerates password for user' dcequota-oid NAME 'dcequota' SYNTAX iteger DESC 'Maximum umber of objects that ca be added by this ipal. This attribute is supported oly whe the iterfaces are used to add objects. This attribute is ot supported whe other iterfaces such as iterfaces are used to add objects.' dceeadversio-oid NAME 'dceeadversio' SYNTAX iteger DESC 'A value idicatig the earliest versio of that ca correctly read from this database.' dceeadolyealm dceeplicaifo-oid NAME 'dceeplicaifo' SYNTAX biary DESC 'A structure of type rs_replica_mgt_item_p_t cotaiig iformatio about a replicatio list.' dceeplicatwrs-oid NAME 'dceeplicatwrs' SYNTAX IA5Strig EQUALITY 'caseexactmatch' DESC ' replicatio list towers.' 25

26 dcesecmapsubtreegroup-oid NAME 'dcesecmapsubtreepric' SYNTAX DN DESC 'The DN of a etry represetig a subtree uder which SecMap etries for groups are cofigured.' dcesecmapsubtreeother-oid NAME 'dcesecmapsubtreepric' SYNTAX DN DESC 'The DN of a etry represetig a subtree uder which SecMap etries for objects other tha ipals ad groups are cofigured.' dcesecmapsubtreepric-oid NAME 'dcesecmapsubtreepric' SYNTAX DN DESC 'The DN of a etry represetig a subtree uder which SecMap etries for ipals are cofigured.' dceshadowpwdok-oid NAME 'dceshadowpwdok' SYNTAX boolea DESC 'If true, o protected Uix passwords are trasmitted remotely.' dceuautheticatedquota-oid NAME 'dceuautheticatedquota' SYNTAX iteger DESC 'A value idicatig the quota for uautheticated users.' dceuboudtktsok-oid NAME 'dceuboudtktsok' SYNTAX boolea DESC 'If true, all tickets geerated from this realm are usable at ay cliet site; that is, ot boud to the host from which the cliet requested the certificate. The tickets will cotai o cliet addresses.' dceuiqueidcfg-oid 26

27 NAME 'dceuiqueidcfg' SYNTAX iteger DESC 'A value idicatig the cofiguratio of UUID iformatio. The followig values are available: =DEFAULT Etries of type UiqueID will be used to store UUIDs. 2=SECMAP Etries of type SecMap iwll be used to store UUIDs.' dceuixobject-oid NAME 'dceuixobject' SYNTAX directorystrig DESC 'The DN of a etry for to use i obtaiig UNIX iformatio for this ipal. If a coflict occurs betwee a attribute cofigured this ipal etry ad a attribute cofigured i the refereced etry, uses the attribute cofigured i the refereced etry.' dcewriteversio-oid NAME 'dcewriteversio' SYNTAX DESC 'A value idicatig the earliest versio of that ca correctly write to this database.' dcex500dn-oid NAME 'dcex500dn' SYNTAX directorystrig EQUALITY caseigorematch DESC dcex500dsaadmi-oid NAME 'dcex500dsaadmi' SYNTAX directorystrig EQUALITY caseigorematch DESC dcexattrdef-oid NAME 'dcexattrdef' SYNTAX biary DESC 'A structure of type rsdb_attr_schema_etry_t, which defies a exteded attribute.' 27

28 dcexattrname-oid NAME 'dcexattrname' SYNTAX directorystrig EQUALITY caseexactmatch DESC 'The ame of a exteded attribute defiitio.' dcexattrname-oid NAME 'dcexattrname' SYNTAX directorystrig EQUALITY caseigorematch DESC The ame of a exteded attribute. dcexattrvalue-oid NAME 'dcexattrvalue' SYNTAX biary DESC 'The value of a exteded attribute. The value is biary data of the type defied i a associated exteded attribute defiitio.' uixid-oid NAME 'uixid' SYNTAX IA5Strig EQUALITY caseexactmatch DESC 'The UNIX ID of the associated ipal. If the etry represetig the associated ipal cotais a dceuixobject attribute, ad the etry refereced by this attribute cotais a uid attribute, the UNIX ID specified i this attribute is used ad the uixid attribute is igored.' uixpwdvalid-oid NAME 'uixpwdvalid' SYNTAX boolea DESC 'If true, the UNIX password for the associated ipal is valid.' uixpwdversio-oid NAME 'uixpwdversio' SYNTAX iteger DESC 'The versio of the UNIX password for the associated ipal.' 28

29 6..2 Attribute Types Defied i the Netscape Schema maxfailedlogis timeexpirelockout 6..3 Attribute Types Defied i the Tivoli/IBM Schema NAME 'secacctlife' DESC ' ' SYNTAX NAME 'secpwdalpha' DESC ' ' SYNTAX NAME 'secpwdmgmtbid' DESC ' ' SYNTAX EQUALITY caseigoreia5match NAME 'secpwdspaces' DESC ' ' SYNTAX NAME 'secdn' DESC 'DN of a eperso or accessgroup' SYNTAX NAME 'secuuid' DESC 'ItraVerse uiversally uique ID, strig as per E.G. 2495d90-be07-d-82ed-00c ' SYNTAX {37} EQUALITY caseigoreia5match 29

30 6.2 Object Classes 6.2. New Object Classes Defied i This Schema objectclasses: Acl-oid NAME 'Acl' DESC 'A structural object class for use i cofigurig a etry to represet a ACL for a associated object. The associated object ca be a directory, ipal, group, orgaizatio, realm policy, EA, replicatio list, or EA. The etry represetig the ACL must reside directly below the etry represetig the associated object ad the c attribute of this etry must cotai the value "Acl". The relatioship betwee the etry represetig the ACL ad the etry represetig the associated object is may-to-oe with each ACL cotaiig a differet ACL maager type.' SUP top Structural MUST c $ dceacldefealmuuid $ dceacletries $ dceaclmgrtype MAY dcedefdiracletries $ dcedefobjacletries objectclasses: Dir-oid NAME 'Dir' DESC 'A auxiliary object class for use i cofigurig a etry to represet a directory ame. Cofigurig a directory ame is oly if the etry is ot already cofigured as a ipal ad the user wats to use the directory ame for search operatios. If a etry already is cofigured as a ipal, uses the ipal ame krbpricipalname attribute as the directory ame.' SUP top Auxiliary MUST dcedirname objectclasses: EA-oid NAME 'EA' DESC 'A structural object class for use i cofigurig a etry to represet a user-defied exteded attribute EA for a ipal, group, or orgaizatio. The etry represetig the EA must reside directly below a etry represetig a ipal, group, or orgaizatio ad must cotai a forward referece to a etry represetig a XATT. The relatioship betwee the etry represetig the EA ad the etry represetig the ipal, group, or orgaizatio is may-to-oe, with each EA cofigured with a differet ame. The relatioship betwee the etry represetig the EA ad the etry represetig the XATT is may-to-oe with each EA associated with a differet ipal, group, or orgaizatio.' SUP top Auxiliary MUST dcexattrname $ dcexattrvalue objectclasses: Group-oid NAME 'Group' 30

31 DESC 'A auxiliary object for use i cofigurig a etry with a membership attribute to represet a group. The etry must reside uder oe of the subtrees listed i the dcegroupsubtree attribute of the etry represetig the ealm. See also the dcegroupsubtree attribute of ealm.' SUP top Auxiliary MUST dcegroupname MAY dcefullname $ dceisequired $ dceprojlistok $ dceuixobject objectclasses: LegacyDB-oid NAME 'LegacyDB' DESC 'A auxiliary object class for use i cofigurig legacy database iformatio i a etry represetig a object.' SUP top Auxiliary MAY dceid objectclasses: LogExt-oid NAME 'LogExt' DESC 'A auxiliary object class for cofigurig a existig etry represetig a Kerberos logi activity record to also represet a logi activity record. The existig etry must have bee cofigured with the KrbLog structural object class.' NAME 'Log' SUP top Auxiliary MUST dcebadorigiator $ dcedisabletime $ dcegoodorigiator objectclasses: Log-oid NAME 'Log' DESC 'A structural object class for cofigurig a etry to represet a ad Kerberos logi activity record.' SUP KrbLog Structural MUST dcebadorigiator $ dcedisabletime $ dcegoodorigiator objectclasses: SecMapExt-oid NAME 'SecMapExt' DESC 'A auxiliary object class for cofigurig additioal attributes i a etry cofigured with the SecMap structural object class. SUP top Auxiliary MAY uixid objectclasses: Org-oid NAME 'Org' 3

32 DESC 'A auxiliary object class for use i cofigurig a etry to represet a orgaizatio. The etry must reside uder a subtree listed i the dceorgsubtree attribute of the etry represetig the realm. See also the dceorgsubtree attribute of ealm.' SUP Policy auxiliary MUST dceorgname MAY dcefullname $ dcehitmembershipuuids $ dcehitforeigmembershipuuids objectclasses: Policy-oid NAME 'Policy' DESC 'A auxiliary object class for use i cofigurig policy attributes for a associated ipal or realm. The policy attributes ca reside i the etry represetig the ipal or realm, the etry refereced by the policyobject attribute of the etry represetig the ipal or realm, or both etries. If the same policy attribute is cofigured i both etries, the policy attribute from the etry refereced by policyobject is used. See also Pricipal ad ealm.' SUP auxiliary MUST dcepolicyflags $ dcepreauthtypes $ dcepwdvaltype $ maxfailedlogis $ secacctlife $ secpwdalpha $ secpwdmgmtbid $ secpwdspaces $ timeexpirelockout objectclasses: Pricipal-oid NAME 'Pricipal' DESC 'A auxiliary object for use i cofigurig a etry to represet a ipal. ' SUP KrbPricipal Auxiliary MAY dcehitforeigmembershipuuids $ dcefullname $ dcehitmembershipuuids $ dcejouralid $ dcekeyparts $ dceprimarygroup $ dcepublickeyautheticatio $ dcepublickeyeciphermet $ dceprivatekeystorage $ dceprojlistok $ $ dcepwdoverride $ $ dcequota $ dceuixobject $ $ dcegoodsicedate $ dceisequired $ $ dceuixobject $ dcex500dn $ dcex500dsaadmi objectclasses: ealm-oid NAME 'ealm' DESC 'A auxiliary class for use i cofigurig a etry to represet a realm. The etry also must be cofigured usig the Krbealm structural object class. See also Krbealm.' SUP KrbealmExt Auxiliary MUST MAY dcedomaicachestate $ dcegroupsubtree $ dcelowuixidgroup $ dcelowuixidorg $ dcelowuixidperso $ dcemaxuixid $ dcemitktlife $ dceorgsubtree $ dceeadolyealm $ dceeadversio $ dcesecmapsubtreepric $ dcesecmapsubtreegroup $ dcesecmapsubtreeothers $ dceshadowpwdok $ dceuautheticatedquota $ dceuboudtktsok $ dceuiqueidcfg $ dcewriteversio objectclasses: eplist-oid NAME 'eplist' 32

33 DESC 'A structural object class for use i cofigurig a etry to represet a replicatio list for a server i a realm. The etry represetig the replicatio list must reside directly below a replicatio list cotaier a etry with a DN of c=eplists ad a object class of cotaier. The replicatio list cotaier must reside directly below the etry represetig the associated realm ad must cotai the ame of the associated server i the realm. The relatioship betwee the etry represetig the replicatio list ad the replicatio list cotaier is may-to-oe with each replicatio list cotaiig a differet server ame. The relatioship betwee the replicatio list cotaier ad the etry represetig the realm is oe-to-oe. See also ealm.' SUP top Structural MUST dceeplicaifo $ dceeplicatwrs $ kdcservicename objectclasses: Uix-oid NAME 'Uix' DESC 'A auxiliary object class for use i cofigurig UNIX attributes for a ipal. The UNIX attributes ca reside i the etry represetig the ipal ad/or the etry refereced by the dceuixobject of the etry represetig the ipal. If the same UNIX attribute resides i two etries, uses the UNIX attribute from the etry refereced by dceuixobject.' SUP top Auxiliary MAY uixpwdvalid, gecos, homedirectory, secpwdvalid, userpassword, ixlastupdate, uixpwdversio, logishell objectclasses: XATT-oid NAME 'XATT' DESC 'A structural object class for use i cofigurig a etry to represet a user-defied exteded attribute XATT for a realm. The etry represetig the XATT must reside directly below a XATTS cotaier a etry with a DN of c=xattrs ad a object class of cotaier. The XATTS cotaier must reside directly below a etry represetig a realm. The relatioship betwee the etry represetig the XATT ad the XATTS cotaier is may-to-oe with each XATT cotaiig a differet ame. The relatioship betwee the XATTS cotaier ad the etry represetig the realm is oe-to-oe. See also ealm.' SUP top Structural MUST dcexattrdef $ dcexattrname objectclasses: UiqueID-oid NAME 'UiqueID' DESC 'A structural object class for use i cofigurig a etry to represet uique idetifier iformatio for a associated object. This object class is used oly if the dceuiqueidcfg attribute of the etry represetig the realm is set to DEFAULT. The associated object ca be a directory, ipal, group, orgaizatio, realm policy, EA, replicatio list, or XATT. The etry represetig the uique idetifier iformatio mustreside directly below the etry represetig the associated object ad must have a creator idetity that is a trusted idetity oe of the idetities listed i the kdcservicename or trustedadmtool attribute of the etry represetig the realm. I additio, the c attribute of the etry represetig the uique idetifier iformatio must cotai 33

The Magma Database file formats

The Magma Database file formats The Magma Database file formats Adrew Gaylard, Bret Pikey, ad Mart-Mari Breedt Johaesburg, South Africa 15th May 2006 1 Summary Magma is a ope-source object database created by Chris Muller, of Kasas City,

More information

Oracle Server. What s New in this Release? Release Notes

Oracle  Server. What s New in this Release? Release Notes Oracle email Server Release Notes Release 5.2 for Widows NT May 2001 Part No. A90426-01 These release otes accompay Oracle email Server Release 5.2 for Widows NT. They cotai the followig topics: What s

More information

1 Enterprise Modeler

1 Enterprise Modeler 1 Eterprise Modeler Itroductio I BaaERP, a Busiess Cotrol Model ad a Eterprise Structure Model for multi-site cofiguratios are itroduced. Eterprise Structure Model Busiess Cotrol Models Busiess Fuctio

More information

Avid Interplay Bundle

Avid Interplay Bundle Avid Iterplay Budle Versio 2.5 Cofigurator ReadMe Overview This documet provides a overview of Iterplay Budle v2.5 ad describes how to ru the Iterplay Budle cofiguratio tool. Iterplay Budle v2.5 refers

More information

Chapter 10. Defining Classes. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 10. Defining Classes. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 10 Defiig Classes Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 10.1 Structures 10.2 Classes 10.3 Abstract Data Types 10.4 Itroductio to Iheritace Copyright 2015 Pearso Educatio,

More information

Baan Tools User Management

Baan Tools User Management Baa Tools User Maagemet Module Procedure UP008A US Documetiformatio Documet Documet code : UP008A US Documet group : User Documetatio Documet title : User Maagemet Applicatio/Package : Baa Tools Editio

More information

Chapter 9. Pointers and Dynamic Arrays. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 9. Pointers and Dynamic Arrays. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 9 Poiters ad Dyamic Arrays Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 9.1 Poiters 9.2 Dyamic Arrays Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Slide 9-3

More information

Elementary Educational Computer

Elementary Educational Computer Chapter 5 Elemetary Educatioal Computer. Geeral structure of the Elemetary Educatioal Computer (EEC) The EEC coforms to the 5 uits structure defied by vo Neuma's model (.) All uits are preseted i a simplified

More information

BEA WebLogic Process Integrator

BEA WebLogic Process Integrator BEA WebLogic Process Itegrator A Compoet of BEA WebLogic Itegratio BEA WebLogic Process Itegrator Studio Olie Help BEA WebLogic Process Itegrator Release 2.0 Documet Editio 2.0 July 2001 Copyright Copyright

More information

Getting Started. Getting Started - 1

Getting Started. Getting Started - 1 Gettig Started Gettig Started - 1 Issue 1 Overview of Gettig Started Overview of Gettig Started This sectio explais the basic operatios of the AUDIX system. It describes how to: Log i ad log out of the

More information

Chapter 11. Friends, Overloaded Operators, and Arrays in Classes. Copyright 2014 Pearson Addison-Wesley. All rights reserved.

Chapter 11. Friends, Overloaded Operators, and Arrays in Classes. Copyright 2014 Pearson Addison-Wesley. All rights reserved. Chapter 11 Frieds, Overloaded Operators, ad Arrays i Classes Copyright 2014 Pearso Addiso-Wesley. All rights reserved. Overview 11.1 Fried Fuctios 11.2 Overloadig Operators 11.3 Arrays ad Classes 11.4

More information

Τεχνολογία Λογισμικού

Τεχνολογία Λογισμικού ΕΘΝΙΚΟ ΜΕΤΣΟΒΙΟ ΠΟΛΥΤΕΧΝΕΙΟ Σχολή Ηλεκτρολόγων Μηχανικών και Μηχανικών Υπολογιστών Τεχνολογία Λογισμικού, 7ο/9ο εξάμηνο 2018-2019 Τεχνολογία Λογισμικού Ν.Παπασπύρου, Αν.Καθ. ΣΗΜΜΥ, ickie@softlab.tua,gr

More information

BEA Tuxedo. Using the BEA Tuxedo System on Windows NT

BEA Tuxedo. Using the BEA Tuxedo System on Windows NT BEA Tuxedo Usig the BEA Tuxedo System o Widows NT BEA Tuxedo Release 7.1 Documet Editio 7.1 May 2000 Copyright Copyright 2000 BEA Systems, Ic. All Rights Reserved. Restricted Rights Leged This software

More information

Evaluation scheme for Tracking in AMI

Evaluation scheme for Tracking in AMI A M I C o m m u i c a t i o A U G M E N T E D M U L T I - P A R T Y I N T E R A C T I O N http://www.amiproject.org/ Evaluatio scheme for Trackig i AMI S. Schreiber a D. Gatica-Perez b AMI WP4 Trackig:

More information

% Sun Logo for. X3T10/95-229, Revision 0. April 18, 1998

% Sun Logo for. X3T10/95-229, Revision 0. April 18, 1998 Su Microsystems, Ic. 2550 Garcia Aveue Moutai View, CA 94045 415 960-1300 X3T10/95-229, Revisio 0 April 18, 1998 % Su Logo for Joh Lohmeyer Chairperso, X3T10 Symbios Logic Ic. 1635 Aeroplaza Drive Colorado

More information

BEA Tuxedo. Creating CORBA Server Applications

BEA Tuxedo. Creating CORBA Server Applications BEA Tuxedo Creatig CORBA Server Applicatios BEA Tuxedo Release 8.0 Documet Editio 8.0 Jue 2001 Copyright Copyright 2001 BEA Systems, Ic. All Rights Reserved. Restricted Rights Leged This software ad documetatio

More information

Web OS Switch Software

Web OS Switch Software Web OS Switch Software BBI Quick Guide Nortel Networks Part Number: 213164, Revisio A, July 2000 50 Great Oaks Boulevard Sa Jose, Califoria 95119 408-360-5500 Mai 408-360-5501 Fax www.orteletworks.com

More information

BEA WebLogic XML/Non-XML Translator

BEA WebLogic XML/Non-XML Translator BEA WebLogic XML/No-XML Traslator A Compoet of BEA WebLogic Itegratio Plug-I Guide BEA WebLogic XML/No-XML Traslator Release 2.0 Documet Editio 2.0 July 2001 Copyright Copyright 2001 BEA Systems, Ic. All

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 1 Computers ad Programs 1 Objectives To uderstad the respective roles of hardware ad software i a computig system. To lear what computer scietists

More information

Chapter 5. Functions for All Subtasks. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 5. Functions for All Subtasks. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 5 Fuctios for All Subtasks Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 5.1 void Fuctios 5.2 Call-By-Referece Parameters 5.3 Usig Procedural Abstractio 5.4 Testig ad Debuggig

More information

User Guide. Using Caliber Datamart

User Guide. Using Caliber Datamart User Guide Usig Caliber Datamart 11.1.0 Copyright 2013 Micro Focus. All Rights Reserved. Portios Copyright 1998-2009 Borlad Software Corporatio (a Micro Focus compay). All other marks are the property

More information

BEA WebLogic Enterprise. Using the WebLogic EJB Deployer

BEA WebLogic Enterprise. Using the WebLogic EJB Deployer BEA WebLogic Eterprise Usig the WebLogic EJB Deployer WebLogic Eterprise 5.0 Documet Editio 5.0 December 1999 Copyright Copyright 1999 BEA Systems, Ic. All Rights Reserved. Restricted Rights Leged This

More information

Security of Bluetooth: An overview of Bluetooth Security

Security of Bluetooth: An overview of Bluetooth Security Versio 2 Security of Bluetooth: A overview of Bluetooth Security Marjaaa Träskbäck Departmet of Electrical ad Commuicatios Egieerig mtraskba@cc.hut.fi 52655H ABSTRACT The purpose of this paper is to give

More information

% Sun Logo for Frame. X3T10/95-229, Revision 2. September 28, 1995

% Sun Logo for Frame. X3T10/95-229, Revision 2. September 28, 1995 Su Microsystems, Ic. 2550 Garcia Aveue Moutai View, CA 94045 415 960-1300 X3T10/95-229, Revisio 2 September 28, 1995 % Su Logo for Frame Joh Lohmeyer Chairperso, X3T10 Symbios Logic Ic. 1635 Aeroplaza

More information

Customer Portal Quick Reference User Guide

Customer Portal Quick Reference User Guide Customer Portal Quick Referece User Guide Overview This user guide is iteded for FM Approvals customers usig the Approval Iformatio Maagemet (AIM) customer portal to track their active projects. AIM is

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 6 Defiig Fuctios Pytho Programmig, 2/e 1 Objectives To uderstad why programmers divide programs up ito sets of cooperatig fuctios. To be able to

More information

BEA WebLogic XML/Non-XML Translator. Samples Guide

BEA WebLogic XML/Non-XML Translator. Samples Guide BEA WebLogic XML/No-XML Traslator Samples Guide BEA WebLobic XML/No-XML Traslator Samples Guide 1.0.1 Documet Editio 1.1 March 2001 Copyright Copyright 2000, 2001 BEA Systems, Ic. All Rights Reserved.

More information

Chapter 4. Procedural Abstraction and Functions That Return a Value. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 4. Procedural Abstraction and Functions That Return a Value. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 4 Procedural Abstractio ad Fuctios That Retur a Value Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 4.1 Top-Dow Desig 4.2 Predefied Fuctios 4.3 Programmer-Defied Fuctios 4.4

More information

Computers and Scientific Thinking

Computers and Scientific Thinking Computers ad Scietific Thikig David Reed, Creighto Uiversity Chapter 15 JavaScript Strigs 1 Strigs as Objects so far, your iteractive Web pages have maipulated strigs i simple ways use text box to iput

More information

One advantage that SONAR has over any other music-sequencing product I ve worked

One advantage that SONAR has over any other music-sequencing product I ve worked *gajedra* D:/Thomso_Learig_Projects/Garrigus_163132/z_productio/z_3B2_3D_files/Garrigus_163132_ch17.3d, 14/11/08/16:26:39, 16:26, page: 647 17 CAL 101 Oe advatage that SONAR has over ay other music-sequecig

More information

BAAN IV. BAAN IV Installation Manual for DB2 on Windows NT

BAAN IV. BAAN IV Installation Manual for DB2 on Windows NT BAAN IV BAAN IV Istallatio Maual for DB2 o Widows NT A publicatio of: Baa Developmet B.V. P.O.Box 143 3770 AC Bareveld The Netherlads Prited i the Netherlads Baa Developmet B.V. 1999. All rights reserved.

More information

Baan Finance Financial Statements

Baan Finance Financial Statements Baa Fiace Fiacial Statemets Module Procedure UP041A US Documetiformatio Documet Documet code : UP041A US Documet group : User Documetatio Documet title : Fiacial Statemets Applicatio/Package : Baa Fiace

More information

Configuring Rational Suite

Configuring Rational Suite Cofigurig Ratioal Suite Product Versio Ratioal Suite 2000.02.10 Release Date April 2000 Part Number 800-023317-000 support@ratioal.com http://www.ratioal.com IMPORTANT NOTICE Copyright Notice Copyright

More information

L I N U X. Unit 6 S Y S T E M DHCP & DNS (BIND) A D M I N I S T R A T I O n DPW

L I N U X. Unit 6 S Y S T E M DHCP & DNS (BIND) A D M I N I S T R A T I O n DPW it 6 HCP & (B) oa Warre HCP ervice yamically assigs a P address to requestig machies P addresses are leased scope of addresses ca be assiged or excluded from assigmet HCP servers do ot talk to each other

More information

Code Review Defects. Authors: Mika V. Mäntylä and Casper Lassenius Original version: 4 Sep, 2007 Made available online: 24 April, 2013

Code Review Defects. Authors: Mika V. Mäntylä and Casper Lassenius Original version: 4 Sep, 2007 Made available online: 24 April, 2013 Code Review s Authors: Mika V. Mätylä ad Casper Lasseius Origial versio: 4 Sep, 2007 Made available olie: 24 April, 2013 This documet cotais further details of the code review defects preseted i [1]. of

More information

K-NET bus. When several turrets are connected to the K-Bus, the structure of the system is as showns

K-NET bus. When several turrets are connected to the K-Bus, the structure of the system is as showns K-NET bus The K-Net bus is based o the SPI bus but it allows to addressig may differet turrets like the I 2 C bus. The K-Net is 6 a wires bus (4 for SPI wires ad 2 additioal wires for request ad ackowledge

More information

3.1 Overview of MySQL Programs. These programs are discussed further in Chapter 4, Database Administration. Client programs that access the server:

3.1 Overview of MySQL Programs. These programs are discussed further in Chapter 4, Database Administration. Client programs that access the server: 3 Usig MySQL Programs This chapter provides a brief overview of the programs provided by MySQL AB ad discusses how to specify optios whe you ru these programs. Most programs have optios that are specific

More information

EE 459/500 HDL Based Digital Design with Programmable Logic. Lecture 13 Control and Sequencing: Hardwired and Microprogrammed Control

EE 459/500 HDL Based Digital Design with Programmable Logic. Lecture 13 Control and Sequencing: Hardwired and Microprogrammed Control EE 459/500 HDL Based Digital Desig with Programmable Logic Lecture 13 Cotrol ad Sequecig: Hardwired ad Microprogrammed Cotrol Refereces: Chapter s 4,5 from textbook Chapter 7 of M.M. Mao ad C.R. Kime,

More information

BaanERP. DB2 Installation Guide for BaanERP on Windows NT

BaanERP. DB2 Installation Guide for BaanERP on Windows NT BaaERP DB2 Istallatio Guide for BaaERP o Widows NT A publicatio of: Baa Developmet B.V. P.O.Box 143 3770 AC Bareveld The Netherlads Prited i the Netherlads Baa Developmet B.V. 1999. All rights reserved.

More information

Interactive PMCube Explorer

Interactive PMCube Explorer Iteractive PMCube Explorer Documetatio ad User Maual Thomas Vogelgesag Carl vo Ossietzky Uiversität Oldeburg December 9, 206 Cotets Itroductio 3 2 Applicatio Overview 4 3 Data Preparatio 6 3. Data Warehouse

More information

Appendix D. Controller Implementation

Appendix D. Controller Implementation COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Appedix D Cotroller Implemetatio Cotroller Implemetatios Combiatioal logic (sigle-cycle); Fiite state machie (multi-cycle, pipelied);

More information

Adapter for Mainframe

Adapter for Mainframe BEA WebLogic Java Adapter for Maiframe Workflow Processig Guide Release 5.0 Documet Date: Jauary 2002 Copyright Copyright 2002 BEA Systems, Ic. All Rights Reserved. Restricted Rights Leged This software

More information

Workflow Extensions User Guide. StarTeam 12.0

Workflow Extensions User Guide. StarTeam 12.0 Workflow Extesios User Guide StarTeam 12.0 Micro Focus 575 Ato Blvd., Suite 510 Costa Mesa, CA 92626 Copyright 2011 Micro Focus IP Developmet Limited. All Rights Reserved. StarTeam cotais derivative works

More information

CIS 121. Introduction to Trees

CIS 121. Introduction to Trees CIS 121 Itroductio to Trees 1 Tree ADT Tree defiitio q A tree is a set of odes which may be empty q If ot empty, the there is a distiguished ode r, called root ad zero or more o-empty subtrees T 1, T 2,

More information

Extending The Sleuth Kit and its Underlying Model for Pooled Storage File System Forensic Analysis

Extending The Sleuth Kit and its Underlying Model for Pooled Storage File System Forensic Analysis Extedig The Sleuth Kit ad its Uderlyig Model for Pooled File System Foresic Aalysis Frauhofer Istitute for Commuicatio, Iformatio Processig ad Ergoomics Ja-Niclas Hilgert* Marti Lambertz Daiel Plohma ja-iclas.hilgert@fkie.frauhofer.de

More information

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 1 Itroductio to Computers ad C++ Programmig Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 1.1 Computer Systems 1.2 Programmig ad Problem Solvig 1.3 Itroductio to C++ 1.4 Testig

More information

Modern Systems Analysis and Design Seventh Edition

Modern Systems Analysis and Design Seventh Edition Moder Systems Aalysis ad Desig Seveth Editio Jeffrey A. Hoffer Joey F. George Joseph S. Valacich Desigig Databases Learig Objectives ü Cocisely defie each of the followig key database desig terms: relatio,

More information

BAAN IVc/BaanERP. Conversion Guide Oracle7 to Oracle8

BAAN IVc/BaanERP. Conversion Guide Oracle7 to Oracle8 BAAN IVc/BaaERP A publicatio of: Baa Developmet B.V. P.O.Box 143 3770 AC Bareveld The Netherlads Prited i the Netherlads Baa Developmet B.V. 1999. All rights reserved. The iformatio i this documet is subject

More information

Software development of components for complex signal analysis on the example of adaptive recursive estimation methods.

Software development of components for complex signal analysis on the example of adaptive recursive estimation methods. Software developmet of compoets for complex sigal aalysis o the example of adaptive recursive estimatio methods. SIMON BOYMANN, RALPH MASCHOTTA, SILKE LEHMANN, DUNJA STEUER Istitute of Biomedical Egieerig

More information

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design College of Computer ad Iformatio Scieces Departmet of Computer Sciece CSC 220: Computer Orgaizatio Uit 11 Basic Computer Orgaizatio ad Desig 1 For the rest of the semester, we ll focus o computer architecture:

More information

BEA elink Business Process Option Server Installation Guide

BEA elink Business Process Option Server Installation Guide BEA elik Busiess Process Optio Server Istallatio Guide BEA elik Busiess Process Optio 1.2 Documet Editio 1.2 February 2000 Copyright Copyright 2000 BEA Systems, Ic. All Rights Reserved. Restricted Rights

More information

Task scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation

Task scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation 6-0-0 Kowledge Trasformatio from Task Scearios to View-based Desig Diagrams Nima Dezhkam Kamra Sartipi {dezhka, sartipi}@mcmaster.ca Departmet of Computig ad Software McMaster Uiversity CANADA SEKE 08

More information

Architectural styles for software systems The client-server style

Architectural styles for software systems The client-server style Architectural styles for software systems The cliet-server style Prof. Paolo Ciacarii Software Architecture CdL M Iformatica Uiversità di Bologa Ageda Cliet server style CS two tiers CS three tiers CS

More information

Ones Assignment Method for Solving Traveling Salesman Problem

Ones Assignment Method for Solving Traveling Salesman Problem Joural of mathematics ad computer sciece 0 (0), 58-65 Oes Assigmet Method for Solvig Travelig Salesma Problem Hadi Basirzadeh Departmet of Mathematics, Shahid Chamra Uiversity, Ahvaz, Ira Article history:

More information

CIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19

CIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19 CIS Data Structures ad Algorithms with Java Sprig 09 Stacks, Queues, ad Heaps Moday, February 8 / Tuesday, February 9 Stacks ad Queues Recall the stack ad queue ADTs (abstract data types from lecture.

More information

In this chapter, you learn the concepts and terminology of databases and

In this chapter, you learn the concepts and terminology of databases and A Itroductio to Database Developmet I this chapter, you lear the cocepts ad termiology of databases ad how to desig the tables that your forms ad reports will use. Fially, you build the actual tables used

More information

BEA Tuxedo. Creating CORBA Client Applications

BEA Tuxedo. Creating CORBA Client Applications BEA Tuxedo Creatig CORBA Cliet Applicatios BEA Tuxedo 8.0 Documet Editio 8.0 Jue 2001 Copyright Copyright 2001 BEA Systems, Ic. All Rights Reserved. Restricted Rights Leged This software ad documetatio

More information

Avid recommends that you read all the information in this ReadMe file thoroughly before installing or using any new software release.

Avid recommends that you read all the information in this ReadMe file thoroughly before installing or using any new software release. PostDeko for Editors Versio 8.4 ReadMe Importat Iformatio Avid recommeds that you read all the iformatio i this ReadMe file thoroughly before istallig or usig ay ew software release. Importat: Search the

More information

The VSS CCD photometry spreadsheet

The VSS CCD photometry spreadsheet The VSS CCD photometry spreadsheet Itroductio This Excel spreadsheet has bee developed ad tested by the BAA VSS for aalysig results files produced by the multi-image CCD photometry procedure i AIP4Wi v2.

More information

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5.

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5. Morga Kaufma Publishers 26 February, 208 COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 5 Virtual Memory Review: The Memory Hierarchy Take advatage of the priciple

More information

Performance Plus Software Parameter Definitions

Performance Plus Software Parameter Definitions Performace Plus+ Software Parameter Defiitios/ Performace Plus Software Parameter Defiitios Chapma Techical Note-TG-5 paramete.doc ev-0-03 Performace Plus+ Software Parameter Defiitios/2 Backgroud ad Defiitios

More information

TUTORIAL Create Playlist Helen Doron Course

TUTORIAL Create Playlist Helen Doron Course TUTORIAL Create Playlist Hele Doro Course TUTY Tutorial Create Playlist Hele Doro Course Writte by Serafii Giampiero (INV SRL) Revised by Raffaele Forgioe (INV SRL) Editio EN - 0 Jue 0-0, INV S.r.l. Cotact:

More information

Custodial Integrator Automation Guide

Custodial Integrator Automation Guide Custodial Itegrator Automatio Guide Compay Cofidetial Custodial Itegrator Product Versio: V3.8 Documet Versio: 14 Documet Issue Date: April 21, 2017 Techical Support: (866) 856-4951 Telephoe: (781) 376-0801

More information

Floristic Quality Assessment (FQA) Calculator for Colorado User s Guide

Floristic Quality Assessment (FQA) Calculator for Colorado User s Guide Floristic Quality Assessmet (FQA) Calculator for Colorado User s Guide Created by the Colorado atural Heritage Program Last Updated April 2012 The FQA Calculator was created by Michelle Fik ad Joaa Lemly

More information

Descriptive Statistics Summary Lists

Descriptive Statistics Summary Lists Chapter 209 Descriptive Statistics Summary Lists Itroductio This procedure is used to summarize cotiuous data. Large volumes of such data may be easily summarized i statistical lists of meas, couts, stadard

More information

BEA Tuxedo. Using the CORBA Name Service

BEA Tuxedo. Using the CORBA Name Service BEA Tuxedo Usig the CORBA Name Service BEA Tuxedo Release 8.0 Documet Editio 8.0 Jue 2001 Copyright Copyright 2001 BEA Systems, Ic. All Rights Reserved. Restricted Rights Leged This software ad documetatio

More information

Chapter 4 Threads. Operating Systems: Internals and Design Principles. Ninth Edition By William Stallings

Chapter 4 Threads. Operating Systems: Internals and Design Principles. Ninth Edition By William Stallings Operatig Systems: Iterals ad Desig Priciples Chapter 4 Threads Nith Editio By William Stalligs Processes ad Threads Resource Owership Process icludes a virtual address space to hold the process image The

More information

Linux DNS (BIND), DHCP and Servers

Linux DNS (BIND), DHCP and  Servers it 8 Liux (B), HCP ad mail ervers oa Warre HCP oa Warre HCP ervice yamically assigs a P address to requestig machies P addresses are leased P addresses are leased scope of addresses ca be assiged or excluded

More information

University of Waterloo Department of Electrical and Computer Engineering ECE 250 Algorithms and Data Structures

University of Waterloo Department of Electrical and Computer Engineering ECE 250 Algorithms and Data Structures Uiversity of Waterloo Departmet of Electrical ad Computer Egieerig ECE 250 Algorithms ad Data Structures Midterm Examiatio ( pages) Istructor: Douglas Harder February 7, 2004 7:30-9:00 Name (last, first)

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 22 Database Recovery Techiques Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Recovery algorithms Recovery cocepts Write-ahead

More information

WYSE Academic Challenge Sectional Computer Science 2005 SOLUTION SET

WYSE Academic Challenge Sectional Computer Science 2005 SOLUTION SET WYSE Academic Challege Sectioal Computer Sciece 2005 SOLUTION SET 1. Correct aswer: a. Hz = cycle / secod. CPI = 2, therefore, CPI*I = 2 * 28 X 10 8 istructios = 56 X 10 8 cycles. The clock rate is 56

More information

EE260: Digital Design, Spring /16/18. n Example: m 0 (=x 1 x 2 ) is adjacent to m 1 (=x 1 x 2 ) and m 2 (=x 1 x 2 ) but NOT m 3 (=x 1 x 2 )

EE260: Digital Design, Spring /16/18. n Example: m 0 (=x 1 x 2 ) is adjacent to m 1 (=x 1 x 2 ) and m 2 (=x 1 x 2 ) but NOT m 3 (=x 1 x 2 ) EE26: Digital Desig, Sprig 28 3/6/8 EE 26: Itroductio to Digital Desig Combiatioal Datapath Yao Zheg Departmet of Electrical Egieerig Uiversity of Hawaiʻi at Māoa Combiatioal Logic Blocks Multiplexer Ecoders/Decoders

More information

BEA WebLogic Commerce Server. Registration and User Processing Package

BEA WebLogic Commerce Server. Registration and User Processing Package BEA WebLogic Commerce Server Registratio ad User Processig Package BEA WebLogic Commerce Server 3.2 Documet Editio 3.2 December 2000 Copyright Copyright 2000 BEA Systems, Ic. All Rights Reserved. Restricted

More information

CS 11 C track: lecture 1

CS 11 C track: lecture 1 CS 11 C track: lecture 1 Prelimiaries Need a CMS cluster accout http://acctreq.cms.caltech.edu/cgi-bi/request.cgi Need to kow UNIX IMSS tutorial liked from track home page Track home page: http://courses.cms.caltech.edu/courses/cs11/material

More information

CMSC Computer Architecture Lecture 12: Virtual Memory. Prof. Yanjing Li University of Chicago

CMSC Computer Architecture Lecture 12: Virtual Memory. Prof. Yanjing Li University of Chicago CMSC 22200 Computer Architecture Lecture 12: Virtual Memory Prof. Yajig Li Uiversity of Chicago A System with Physical Memory Oly Examples: most Cray machies early PCs Memory early all embedded systems

More information

n Explore virtualization concepts n Become familiar with cloud concepts

n Explore virtualization concepts n Become familiar with cloud concepts Chapter Objectives Explore virtualizatio cocepts Become familiar with cloud cocepts Chapter #15: Architecture ad Desig 2 Hypervisor Virtualizatio ad cloud services are becomig commo eterprise tools to

More information

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming Lecture Notes 6 Itroductio to algorithm aalysis CSS 501 Data Structures ad Object-Orieted Programmig Readig for this lecture: Carrao, Chapter 10 To be covered i this lecture: Itroductio to algorithm aalysis

More information

VISUALSLX AN OPEN USER SHELL FOR HIGH-PERFORMANCE MODELING AND SIMULATION. Thomas Wiedemann

VISUALSLX AN OPEN USER SHELL FOR HIGH-PERFORMANCE MODELING AND SIMULATION. Thomas Wiedemann Proceedigs of the 2000 Witer Simulatio Coferece J. A. Joies, R. R. Barto, K. Kag, ad P. A. Fishwick, eds. VISUALSLX AN OPEN USER SHELL FOR HIGH-PERFORMANCE MODELING AND SIMULATION Thomas Wiedema Techical

More information

Weston Anniversary Fund

Weston Anniversary Fund Westo Olie Applicatio Guide 2018 1 This guide is desiged to help charities applyig to the Westo to use our olie applicatio form. The Westo is ope to applicatios from 5th Jauary 2018 ad closes o 30th Jue

More information

Outline. CSCI 4730 Operating Systems. Questions. What is an Operating System? Computer System Layers. Computer System Layers

Outline. CSCI 4730 Operating Systems. Questions. What is an Operating System? Computer System Layers. Computer System Layers Outlie CSCI 4730 s! What is a s?!! System Compoet Architecture s Overview Questios What is a?! What are the major operatig system compoets?! What are basic computer system orgaizatios?! How do you commuicate

More information

Solution printed. Do not start the test until instructed to do so! CS 2604 Data Structures Midterm Spring, Instructions:

Solution printed. Do not start the test until instructed to do so! CS 2604 Data Structures Midterm Spring, Instructions: CS 604 Data Structures Midterm Sprig, 00 VIRG INIA POLYTECHNIC INSTITUTE AND STATE U T PROSI M UNI VERSI TY Istructios: Prit your ame i the space provided below. This examiatio is closed book ad closed

More information

Course Site: Copyright 2012, Elsevier Inc. All rights reserved.

Course Site:   Copyright 2012, Elsevier Inc. All rights reserved. Course Site: http://cc.sjtu.edu.c/g2s/site/aca.html 1 Computer Architecture A Quatitative Approach, Fifth Editio Chapter 2 Memory Hierarchy Desig 2 Outlie Memory Hierarchy Cache Desig Basic Cache Optimizatios

More information

Guide to Applying Online

Guide to Applying Online Guide to Applyig Olie Itroductio Respodig to requests for additioal iformatio Reportig: submittig your moitorig or ed of grat Pledges: submittig your Itroductio This guide is to help charities submit their

More information

BEA Tuxedo. Using the CORBA Notification Service

BEA Tuxedo. Using the CORBA Notification Service BEA Tuxedo Usig the CORBA Notificatio Service BEA Tuxedo 8.0 Documet Editio 8.0 Jue 2001 Copyright Copyright 2001 BEA Systems, Ic. All Rights Reserved. Restricted Rights Leged This software ad documetatio

More information

Oracle SDP Number Portability

Oracle SDP Number Portability Oracle SDP Number Portability Implemetatio Guide Release 11i August 2000 Part No. A86289-01 Oracle SDP Number Portability, Realease11i Part No.A86289-01 Copyright 2000, Oracle Corporatio. All rights reserved.

More information

Chapter 8. Strings and Vectors. Copyright 2014 Pearson Addison-Wesley. All rights reserved.

Chapter 8. Strings and Vectors. Copyright 2014 Pearson Addison-Wesley. All rights reserved. Chapter 8 Strigs ad Vectors Overview 8.1 A Array Type for Strigs 8.2 The Stadard strig Class 8.3 Vectors Slide 8-3 8.1 A Array Type for Strigs A Array Type for Strigs C-strigs ca be used to represet strigs

More information

Outline n Introduction n Background o Distributed DBMS Architecture

Outline n Introduction n Background o Distributed DBMS Architecture Outlie Itroductio Backgroud o Distributed DBMS Architecture Datalogical Architecture Implemetatio Alteratives Compoet Architecture o Distributed DBMS Architecture o Distributed Desig o Sematic Data Cotrol

More information

Session Initiated Protocol (SIP) and Message-based Load Balancing (MBLB)

Session Initiated Protocol (SIP) and Message-based Load Balancing (MBLB) F5 White Paper Sessio Iitiated Protocol (SIP) ad Message-based Load Balacig (MBLB) The ability to provide ew ad creative methods of commuicatios has esured a SIP presece i almost every orgaizatio. The

More information

BAAN IV. DB2 for OS/390 Installation Guide for BAAN IV

BAAN IV. DB2 for OS/390 Installation Guide for BAAN IV BAAN IV DB2 for OS/390 Istallatio Guide for BAAN IV A publicatio of: Baa Developmet B.V. P.O.Box 143 3770 AC Bareveld The Netherlads Prited i the Netherlads Baa Developmet B.V. 1999. All rights reserved.

More information

Today s objectives. CSE401: Introduction to Compiler Construction. What is a compiler? Administrative Details. Why study compilers?

Today s objectives. CSE401: Introduction to Compiler Construction. What is a compiler? Administrative Details. Why study compilers? CSE401: Itroductio to Compiler Costructio Larry Ruzzo Sprig 2004 Today s objectives Admiistrative details Defie compilers ad why we study them Defie the high-level structure of compilers Associate specific

More information

BaanERP. Oracle Installation Guide for BaanERP on UNIX

BaanERP. Oracle Installation Guide for BaanERP on UNIX BaaERP Oracle Istallatio Guide for BaaERP o UNIX A publicatio of: Baa Developmet B.V. P.O.Box 143 3770 AC Bareveld The Netherlads Prited i the Netherlads Baa Developmet B.V. 1998. All rights reserved.

More information

Classes and Objects. Again: Distance between points within the first quadrant. José Valente de Oliveira 4-1

Classes and Objects. Again: Distance between points within the first quadrant. José Valente de Oliveira 4-1 Classes ad Objects jvo@ualg.pt José Valete de Oliveira 4-1 Agai: Distace betwee poits withi the first quadrat Sample iput Sample output 1 1 3 4 2 jvo@ualg.pt José Valete de Oliveira 4-2 1 The simplest

More information

CA Top Secret r14 for z/os

CA Top Secret r14 for z/os PRODUCT SHEET: CA TOP SECRET FOR z/os CA Top Secret r14 for z/os CA Top Secret for z/os (CA Top Secret) provides iovative ad comprehesive security for your busiess trasactio eviromets icludig z/os, Maiframe

More information

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON Roberto Lopez ad Eugeio Oñate Iteratioal Ceter for Numerical Methods i Egieerig (CIMNE) Edificio C1, Gra Capitá s/, 08034 Barceloa, Spai ABSTRACT I this work

More information

Message Integrity and Hash Functions. TELE3119: Week4

Message Integrity and Hash Functions. TELE3119: Week4 Message Itegrity ad Hash Fuctios TELE3119: Week4 Outlie Message Itegrity Hash fuctios ad applicatios Hash Structure Popular Hash fuctios 4-2 Message Itegrity Goal: itegrity (ot secrecy) Allows commuicatig

More information

Package RcppRoll. December 22, 2014

Package RcppRoll. December 22, 2014 Type Package Package RcppRoll December 22, 2014 Title Fast rollig fuctios through Rcpp ad RcppArmadillo Versio 0.1.0 Date 2013-01-10 Author Kevi Ushey Maitaier Kevi Ushey RcppRoll

More information

MOTIF XF Extension Owner s Manual

MOTIF XF Extension Owner s Manual MOTIF XF Extesio Ower s Maual Table of Cotets About MOTIF XF Extesio...2 What Extesio ca do...2 Auto settig of Audio Driver... 2 Auto settigs of Remote Device... 2 Project templates with Iput/ Output Bus

More information

Transitioning to BGP

Transitioning to BGP Trasitioig to BGP ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 24 th April

More information

Neolane Social Marketing. Neolane v6.1

Neolane Social Marketing. Neolane v6.1 Neolae Social Marketig Neolae v6.1 This documet, ad the software it describes, are provided subject to a Licese Agreemet ad may ot be used or copied outside of the provisios of the Licese Agreemet. No

More information

Chapter 8. Strings and Vectors. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 8. Strings and Vectors. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 8 Strigs ad Vectors Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 8.1 A Array Type for Strigs 8.2 The Stadard strig Class 8.3 Vectors Copyright 2015 Pearso Educatio, Ltd..

More information