Benchmarking the Sun ONE Directory Server 5.2. with the SLAMD Distributed Load Generation Engine

Size: px
Start display at page:

Download "Benchmarking the Sun ONE Directory Server 5.2. with the SLAMD Distributed Load Generation Engine"

Transcription

1 Benchmarking the Sun ONE Directory Server 5.2 with the SLAMD Distributed Load Generation Engine October 2004

2 Contents 1. Introduction Introduction to MakeLDIF...7 Using MakeLDIF...7 Template File Format...10 Template File Tags Introduction to the SLAMD Distributed Load Generation Engine...18 LDAP-Specific Jobs Provided with SLAMD...20 SLAMD Versus Other Load Generation Software Generating and Loading the Data...27 Configuring the Server for Import...33 Importing the LDIF...34 Backing Up the Database Configuring the Directory Server...36 Disk Configuration...36 Disk Layout...37 Cache Sizing...40 Database Tuning Parameters...43 Index Configuration...45 ALLIDs Threshold Configuration...47 The Referential Integrity Plugin...48 Number of Worker Threads Installing and Configuring the SLAMD Server...51 Installing and Configuring the SLAMD Configuration Directory...51 Installing and Configuring SLAMD Benchmarking the Sun ONE Directory Server 5.2 with the SLAMD Distributed Load Generation Engine

3 7. Installing and Configuring the SLAMD Clients Using SLAMD...59 Scheduling a Job for Processing...61 Viewing Job Execution Results...67 Viewing Results from Multiple Jobs...70 Working with Optimizing Jobs Priming the Directory Server...75 The SLAMD LDAP Prime Job...76 The SLAMD LDAP SearchRate Job...81 Partial Cache Priming...83 Verifying the Cache Priming Benchmarking Search Performance...87 The SLAMD LDAP SearchRate Job Class...87 Measuring Exact Search Performance...95 Using Weighted Searches...96 Measuring Substring Search Performance Benchmarking Authentication Performance The SLAMD LDAP AuthRate Job Class The SLAMD LDAP DIGEST-MD5 AuthRate Job Class Simulating Basic Authentications Simulating More Complex Authentications Benchmarking Modify Performance The SLAMD LDAP ModRate Job Measuring Modify Performance Benchmarking Add and Delete Performance The SLAMD LDAP Add and Delete Rate Job Measuring Add and Delete Performance Benchmarking Mixed Load Performance The SLAMD LDAP Load Generator Job Class Measuring Mixed Load Performance Measuring Replication Performance Controlling the Change Rate

4 Measuring Replication Latency Replication Performance Metrics The SLAMD Jobs that Measure Replication Latency Benchmarking by Simulating Real-World Applications Simulate the Application or Drive the Application? Understand the Access Patterns Use Parameters to Increase Flexibility Provide a Means of Constructing Values Provide for Weighted Accesses Provide for Warm-Up and Cool-Down Times Provide a Throttling Mechanism Using the GetFile Servlet Enabling and Configuring the GetFile Servlet Making the Files Available Accessing the GetFile Servlet Using System Information and Measurement Tools Using idsktune Obtaining Information about System Hardware Using vmstat Using prstat Using iostat SLAMD Resource Monitoring Installing the Resource Monitor Client Scheduling a Job to Use Resource Monitoring The VMStat Resource Monitor The IOStat Resource Monitor The NetStat Resource Monitor The Process Size Resource Monitor The Sun ONE Directory Server Resource Monitor The Replication Latency Resource Monitor The UDP Ping Resource Monitor SLAMD License Benchmarking the Sun ONE Directory Server 5.2 with the SLAMD Distributed Load Generation Engine

5 Introduction The Sun ONE Directory Server 5.2 is the most recent release of the premier LDAP directory server on the market, and it contains many enhancements and improvements over previous versions. Many of those improvements are in the areas of performance and scalability. However, rather than taking our word for it, you may want to verify this for yourself. There are a number of very good reasons for doing this: Performing your own benchmarking can allow you to confirm for yourself the claims made about the Directory Server. You may want to trust your own measurements more than those provided by the vendor or a vendor-sponsored study. Performing your own benchmarking can allow you to verify the performance of the Directory Server in your own environment. The type and arrangement of the data in the server, the kinds of applications that access the server, and the kind of hardware on which the server is running can all have a significant impact on performance. Performing your own benchmarking can teach you a great deal about the configuration and administration of the Directory Server. By examining and adjusting the configuration of the server, you can gain a better understanding of how the server works and how best to tune it. This document provides information and suggestions to allow you to perform your own benchmarks of the Sun ONE Directory Server. To achieve this, we will focus on two key tools. MakeLDIF will be used to generate the data to use in the benchmarking process, and SLAMD will be used to generate the load and measure the performance. These tools will be discussed in detail in subsequent chapters. The information provided in this document has been given under the assumption that the Directory Server will be running on a SPARC Solaris 9 system. The vast majority of the content deals with general concepts that can be applied just as well to a Directory Server running on other platforms (Solaris x86, Linux, HP- Introduction 5

6 UX, and AIX, as well as Windows to a lesser extent). In the case where systemspecific information is given (e.g., the section on monitoring system performance metrics), some of these utilities may not be available on all platforms, but there will likely be an equivalent utility. Consult your operating system documentation for more information about locating comparable tools. 6 Benchmarking the Sun ONE Directory Server 5.2 with the SLAMD Distributed Load Generation Engine

7 Introduction to MakeLDIF MakeLDIF is a powerful utility that can be used to generate LDIF files for importing into the Directory Server. It uses template files to describe the structure of the entries to create, and also to define the number and arrangement of the entries in the server. It can be used to generate LDIF files that closely resemble actual production data, but with some subtle changes that make it much easier for use in benchmarking. The benefits of using generated data instead of the actual production data will be discussed later in this document, but for now we will just discuss the features and usage of MakeLDIF. Using MakeLDIF MakeLDIF is a Java-based application and requires a Java runtime environment of version 1.2 or higher in order to run. Note, however, that more recent Java versions exhibit significantly better performance than the 1.2 version and therefore it is recommended that a Java runtime of at least version 1.4 is used. In order to run MakeLDIF, you should invoke the Java runtime with the JAR file and an appropriate set of arguments. For example, a minimal invocation of MakeLDIF could be: java -jar MakeLDIF.jar -t example.template -o example.ldif In this case, the "-t" argument specifies the path to the template file that describes the LDIF file to create, and the "-o" argument specifies the path to the output file that should be created with the LDIF data. These are the only arguments that are required for use with MakeLDIF, but there are a number of other optional arguments: -f {filename} -- Specifies the path to the file containing the list of first names to be used when generating the data. By default, MakeLDIF will use a file named first.names in the current working directory, although this option can Introduction to MakeLDIF 7

8 be used to specify a different file. If a different file is to be used, then it should contain one name per line and it should not contain any duplicates. -l {filename} -- Specifies the path to the file containing the list of last names to be used when generating the data. By default, MakeLDIF will use a file named last.names in the current working directory, although this option can be used to specify a different file. If a different file is to be used, then it should contain one name per line and it should not contain any duplicates. -d {filename} -- Specifies the path and name of a file into which the DNs of the entries generated will be written. This DN file can then be used in conjunction with other utilities like the SLAMD ModRate job that have the ability to operate on a list of entry DNs. If this option is not provided, then no DN file will be generated. -b {filename} -- Specifies the path and name of a file into which bind information for the generated entries will be written. Each line written to this file will be in the form {dn}{tab}{password}, where {dn} is the DN of the user entry, {tab} is the tab character, and {password} is the value of the userpassword attribute for the user entry. If this option is not provided, then no bind information file will be generated. -L {filename} -- Specifies the path and name of a file into which login information is to be written. Each line written to this file will be in the form {loginid}{tab}{password}, where {loginid} is the value of the login ID attribute, {tab} is the tab character, and {password} is the value of the userpassword attribute for the user entry. If this option is not provided, then no login information file will be generated. -i {attribute} -- Specifies the name of the attribute that should be used to hold the login ID for the user if the -L option is used. By default, the uid attribute is assumed to hold the login ID, although this option can be used to specify a different attribute. -F {filename} -- Specifies the path and name of a file into which filter information is to be written. If this option is used, then the -T option must also be used to specify the types of filters to create, and the information will be written with one filter per line. If this is used in conjunction with the -M option, then each filter file created will append the name of the attribute and index type to this base filename. -T {type} -- Specifies the attributes and index types that should be included in the filter file. The format of the filter type should be {attribute}:{type}, where {attribute} is the name of the attribute for which the filters are to be generated and {type} is the index type for which the filters are to be generated. The index types that may be specified are eq for equality indexes (each unique value of 8 Benchmarking the Sun ONE Directory Server 5.2 with the SLAMD Distributed Load Generation Engine

9 the attribute will be included in the filter list), subinitial (for substring filters containing the first three characters of a value followed by an asterisk), subany (for substring filters containing each unique three-character combination present in any of the values surrounded by asterisks), subfinal (for substring filters containing an asterisk followed by the last three characters in the filter list), and sub (which is a shorthand notation for including subinitial, subany, and subfinal filter types). It is possible to specify that multiple filter types should be used in the filter list by separating them with commas. For example, "-T cn:eq,subinitial" will generate both equality and subinitial filters based on values of the cn attribute. Multiple -T options can be provided on the same command line to indicate that filters should be generated for multiple attributes. -n {value} -- Specifies the number of characters that should be included in substring filters generated by MakeLDIF. This applies to all substring filter types (subinitial, subany, and subfinal). The default value is 3, but any positive integer value is allowed. -N {value} -- Specifies the minimum number of entries in the LDIF file that will be required to match a filter before it will be included in the filter file. This applies to all filter types (equality as well as all substring types). The default value is 1, but any positive integer value is allowed. -X {value} -- Specifies the maximum number of entries in the LDIF file that will be allowed to match a filter before it is excluded from the filter file. This applies to all filter types (equality as well as all substring types). By default, there is no limit, but specifying any positive value greater than or equal to the minimum number of entries to match (as specified with the -N option) will enforce a maximum limit. This can be very useful for directory servers that have an ALLIDs threshold or similar feature in which the server will not maintain an index key that matches more than a specified number of entries. -s {value} -- Specifies a numeric seed to use for the random number generator. By default, the random number generator will be seeded based on the current time, which means that every time the LDIF file is generated, the random values will be different. However, if a random seed is provided, then the LDIF file will consistently contain the same sequence of "random" values. That is, if the same template file is used and the same random seed is provided, then the LDIF files generated by MakeLDIF will be identical. Note that this may not be true if certain kinds of tags are used in the template that may use their own random number generator (e.g., the exec tag). -m {value} -- Specifies the maximum number of entries that should be written to a single LDIF file. By default, all entries generated will be written to a single LDIF file (the one specified using the -o argument), but if the -m argument is Introduction to MakeLDIF 9

10 provided, then at most {value} entries will be written to any single file. This can be useful if there is a possibility that the LDIF data will need to be accessed by a utility that does not provide large file support. -x {value} -- Specifies the maximum number of entries that should be created for each template under each branch. This may be used to produce a small version of the LDIF file that can be used to validate that the template has been defined properly to produce the desired result. -w -- Specifies that long lines in the LDIF output should be wrapped at a column length of 75 characters. By default, no wrapping is performed. -M -- Specifies that a different filter file should be created for each index type of each attribute specified using the -T argument. By default, all filters will be written to the same filter file (the file specified by the -F option), but this argument will cause each the filter list for each attribute and index type to be written to a separate file. The name of each filter file will be the base filter file name followed by a period, the attribute name, another period, and the index type. -S -- Specifies that MakeLDIF should skip branch entries when generating the LDIF output. That is, only template entries will be written to the LDIF file but not the parent entry for those template entries. By default, the LDIF file generated will contain both branch and template entries. -D -- Specifies that MakeLDIF should operate in debug mode, which will cause it to provide additional debugging information for some errors that may occur while using MakeLDIF. -H -- Specifies that MakeLDIF should print usage information and exit without performing any other action. If this argument is provided, then no other options are required. -V -- Specifies that MakeLDIF should print version information and exit without performing any other action. If this argument is provided, then no other options are required. Template File Format MakeLDIF uses template files to describe the data that should be generated. The template file format is discussed in detail in the MakeLDIF Usage Guide and will 10 Benchmarking the Sun ONE Directory Server 5.2 with the SLAMD Distributed Load Generation Engine

11 therefore not be repeated here. However, this section does provide a cursory overview of what may be included in a template file. The first section in the template file is the global replacement variable definitions. These are very similar to preprocessor macros in programming languages in that references to global replacement variables are replaced with the values assigned to those variables before any other processing is done with the template files. A global replacement variable is defined with the keyword "define" followed by the name of the replacement variable, an equal sign, and the value to use for that variable. For example: define suffix=dc=example,dc=com defines a global replacement variable named "suffix" with a value of "dc=example,dc=com". Once a global replacement variable has been defined, it can be referenced later in the template file by placing the name of that variable in square brackets (e.g., "[suffix]"). After the global replacement variable definitions come the branch definitions. Branch definitions define the hierarchical structure for the LDIF file -- they specify the entries that should exist at the top of the hierarchy and the number of entries that should exist beneath them. At minimum, a branch definition should specify the DN to use for that entry, and optionally the number and types of subordinate entries that should exist beneath that branch. For example: branch: ou=people,[suffix] subordinatetemplate: person:1000 defines a branch entry with a DN of "ou=people,dc=example,dc=com" (assuming the previous value we assigned to the "[suffix]" global replacement variable), and then 1000 entries below that based on the "person" template. The final section of a template file is the actual template definitions. They specify the content of the entries that should be generated beneath branch entries. A template definition should specify the RDN attribute to use for entries generated with that template and the set of attributes and objectclasses that should be contained in those entries. The template definition can contain a number of tags used to customize the way in which the entries are created, which are described later in this section. However, a sample template definition is as follows: template: person rdnattr: uid objectclass: top objectclass: person objectclass: organizationalperson objectclass: inetorgperson givenname: <first> Introduction to MakeLDIF 11

12 sn: <last> cn: {givenname} {sn} initials: {givenname:1}{sn:1} uid: user.<sequential:1> mail: userpassword: password telephonenumber: <random:telephone> homephone: <random:telephone> pager: <random:telephone> mobile: <random:telephone> employeenumber: <sequential:1> street: <random:numeric:5> <file:streets> Street l: <file:cities> st: <file:states> postalcode: <random:numeric:5> postaladdress: {cn}${street}${l}, {st} {postalcode} description: This is the description for {cn}. Template File Tags The way that MakeLDIF can create realistic-looking entries that accurately simulate a wide variety of production data is through the use of tags that are parsed and replaced with the values generated by evaluating those tags. There are a number of standard tags provided that can be used in template files, including: <presence:{percent}> -- Indicates how likely the associated attribute value is to be included in any given entry generated from this template. The value specified for {percent} should be an integer between 0 and 100, inclusive. This should only be used with attributes that are not required by the objectclasses used in the entry, and there should be something else included in the value of the attribute that will be present in entries that are chosen to include this attribute value. The presence tag itself is replaced with an empty string. <ifpresent:{attribute}> -- Indicates that this attribute value is to be included in an entry only if the entry contains one or more values for attribute {attribute}. Note that if this feature is used, then {attribute} must be assigned a value in the template before the line that checks for its presence. The ifpresent tag itself is replaced with an empty string. <ifpresent:{attribute}:{value}> -- Indicates that this attribute value is to be included in an entry only if the entry contains attribute {attribute} with a value of {value}. Note that if this feature is used, then {attribute} must be assigned a value in the template before the line that checks for its presence. The ifpresent tag itself is replaced with an empty string. 12 Benchmarking the Sun ONE Directory Server 5.2 with the SLAMD Distributed Load Generation Engine

13 <ifabsent:{attribute}> -- Indicates that this attribute value is to be included in an entry only if the entry does not contain any values for attribute {attribute}. Note that if this feature is used, then {attribute} must be assigned a value in the template before the line that checks for its presence. The ifabsent tag itself is replaced with an empty string. <ifabsent:{attribute}:{value}> -- Indicates that this attribute value is to be included in an entry only if the entry does not contain attribute {attribute} with a value of {value}. Note that if this feature is used, then {attribute} must be assigned a value in the template before the line that checks for its presence. The ifabsent tag itself is replaced with an empty string. <first> -- Replaces the tag with a value from the first name file. If both a first name and a last name are included in an entry, then the combination of the first and last name is guaranteed to be unique. This is, no two entries in the same LDIF file will have the same combination of first and last name values. Note that in order to guarantee this, it is necessary to ensure that the first name file does not contain any duplicate values, the last name file does not contain any duplicate values, and the first and last name values are used in their entirety (i.e., you cannot use the substring feature of the attribute value replacements of the form {givenname:5} discussed below). <last> -- Replaces the tag with a value from the last name file. If both a first name and a last name are included in an entry, then the combination of the first and last name is guaranteed to be unique. This is, no two entries in the same LDIF file will have the same combination of first and last name values. Note that in order to guarantee this, it is necessary to ensure that the first name file does not contain any duplicate values, the last name file does not contain any duplicate values, and the first and last name values are used in their entirety (i.e., you cannot use the substring feature of the attribute value replacements of the form {sn:5} discussed below). <dn> -- Replaces the tag with the distinguished name (DN) of the current entry. Note that in order for this to work properly, the RDN attribute for the entry must be assigned a value on an earlier line of the template. <parentdn> -- Replaces the tag with the DN of the parent entry. <ancestordn:{depth}> -- Replaces the tag with the DN of the entry's ancestor at the specified depth. A depth of 1 will return the DN of the entry's immediate parent, a depth of 2 will return the DN of the entry's grandparent, and so on. If the entry does not have an ancestor at the specified depth, then the "<ancestordn:{depth}>" tag will be replaced with an empty string. <parent:{attr}> -- Replaces the tag with the value of the specified attribute from the parent entry, provided that the parent entry was generated using a template Introduction to MakeLDIF 13

14 rather than a branch. If the parent does not have any values for the specified attribute, or if information about the contents of the parent entry are not available, then this tag will be replaced with an empty string. If there are multiple values for the specified attribute, then the first value will be used. <exec:{command}> -- Replaces the tag with the information sent to standard output when the command {command} is executed on the system. Note that because this requires a separate process to be invoked for each entry created using this template, using this tag can make the LDIF generation process proceed much more slowly than if the exec tag is not used. <exec:{command},{arg1},{arg2},...,{argn}> -- Replaces the tag with the information sent to standard output when the command {command} is executed on the system with the provided set of arguments. Note that because this requires a separate process to be invoked for each entry created using this template, using this tag can make the LDIF generation process proceed much more slowly than if the exec tag is not used. <random:chars:{characters}:{length}> -- Replaces the tag with {length} characters from the character set {characters}. The character set {characters} can contain any character other than the colon. <random:chars:{characters}:{minlength}:{maxlength}> -- Replaces the tag with between {minlength} and {maxlength} (inclusive) characters from the character set {characters}. The character set {characters} can contain any character other than the colon. <random:alpha:{length}> -- Replaces the tag with a string of {length} randomlychosen alphabetic characters. <random:alpha:{minlength}:{maxlength}> -- Replaces the tag with a string of between {minlength} and {maxlength} (inclusive) randomly-chosen alphabetic characters. <random:numeric:{length}> -- Replaces the tag with a string of {length} randomlychosen numeric digits. <random:numeric:{minvalue}:{maxvalue}> -- Replaces the tag with an integer value between {minvalue} and {maxvalue} (inclusive). Note that the integer value will not be padded with leading zeroes, so if that is desired then the "<random:numeric:{minvalue}:{maxvalue}:{minlength}>" tag should be used. <random:numeric:{minvalue}:{maxvalue}:{minlength}> -- Replaces the tag with an integer value between {minvalue} and {maxvalue} (inclusive). If the integer value chosen contains less than {minlength} digits, then it will be padded with leading zeroes to the required minimum length. 14 Benchmarking the Sun ONE Directory Server 5.2 with the SLAMD Distributed Load Generation Engine

15 <random:alphanumeric:{length}> -- Replaces the tag with {length} randomlychosen alphanumeric characters. <random:alphanumeric:{minlength}:{maxlength}> -- Replaces the tag with between {minlength} and {maxlength} (inclusive) randomly-chosen alphanumeric characters. <random:hex:{length}> -- Replaces the tag with {length} randomly-chosen hexadecimal digits. <random:hex:{minlength}:{maxlength}> -- Replaces the tag with between {minlength} and {maxlength} (inclusive) randomly-chosen hexadecimal digits. <random:base64:{length}> -- Replaces the tag with {length} randomly-chosen characters from the base64 character set. Note that if {length} is not a multiple of 4, then the generated value will be padded with equal signs so that the total length is a multiple of 4 as per the base64 specification. <random:base64:{minlength}:{maxlength}> -- Replaces the tag with between {minlength} and {maxlength} (inclusive) randomly-chosen characters from the base64 character set. Note that if the selected length is not a multiple of 4, then the generated value will be padded with equal signs so that the total length is a multiple of 4 as per the base64 specification. <random:telephone> -- Replaces the tag with a string of randomly-chosen numeric digits in the form " ". This uses a US-style telephone number, but it is possible to generate telephone numbers in other formats by combining other kinds of tags (e.g., to generate a telephone number in the UK format, you could use "+44 <random:numeric:4> <random:numeric:6>". <random:month> -- Replaces the tag with the name of a randomly-chosen month. <random:month:{length}> -- Replaces the tag with the first {length} characters from the name of a randomly-chosen month. <guid> -- Replaces the tag with a GUID (globally-unique identifier) value containing hexadecimal digits in the form " ab-cdef abcdef". GUID values should be unique within the same LDIF file. <sequential> -- Replaces the tag with a sequentially-increasing numeric value. The first entry generated using this tag will have a value of 0, the second a value of 1, and so on. Note that sequential counters are maintained on a perattribute and per-template basis, so it is possible to use multiple sequential counters in different attributes of the same entry without impacting each other, Introduction to MakeLDIF 15

16 and it is also possible to use sequential counters for the same attribute in different templates without impacting each other. However, it is not possible to use multiple sequential counters for the same attribute in the same template without them impacting each other. <sequential:{initial}> -- Replaces the tag with a sequentially-increasing numeric value, starting at specified initial value {initial}. The first entry generated using this tag will have a value of {initial}, the second a value of {initial}+1, and so on. Note that sequential counters are maintained on a perattribute and per-template basis, so it is possible to use multiple sequential counters in different attributes of the same entry without impacting each other, and it is also possible to use sequential counters for the same attribute in different templates without impacting each other. However, it is not possible to use multiple sequential counters for the same attribute in the same template without them impacting each other. <list:{value1},{value2},...,{valuen}> -- Replaces the tag with a randomly-chosen value from the provided comma-delimited list. Each value in the list provided will have an equal chance of being selected. <list:{value1}:{weight1},{value2}:{weight2},...,{valuen}:{weightn}> -- Replaces the tag with a randomly-chosen value from the provided comma-delimited weighted list. The weight associated with each list item determines how likely that value is to be chosen. A list item with a weight of 2 is twice as likely to be chosen as an item with a weight of 1. The weights specified must be positive integers. <file:{filename}> -- Replaces the tag with a randomly-chosen value from the specified file. There should be one value per line of the file. It is not possible to assign weights to the values in the file, but a value can be weighted artificially by including it in the file multiple times. For example, a value that appears in the file three times will be three times as likely to be chosen as a value that appears only once. <base64:{value}> -- Replaces the tag with the base64-encoded representation of {value}. The value {value} will be converted into a byte array using the UTF-8 character set, and then that byte array will be base64 encoded. <base64:{charset}:{value}> -- Replaces the tag with the base64-encoded representation of {value}. The value {value} will be converted into a byte array using the rules of the Java character set {charset}, and then that byte array will be base64-encoded. See the Java API documentation to determine the names of the character sets that may be used. <loop:{lowerbound}:{upperbound}> -- Creates ({upperbound} - {lowerbound} + 1) copies of this line with this tag replaced in each copy with a sequentially- 16 Benchmarking the Sun ONE Directory Server 5.2 with the SLAMD Distributed Load Generation Engine

17 incrementing number starting at {lowerbound} in the first copy, ({lowerbound} + 1) in the second copy, and so on, so that in the last copy this tag will be replaced with {upperbound}. Note that it is possible to include multiple loop tags on the same line (even with different {lowerbound} values), but only the first tag will be used to determine the number of copies to create. <custom:{class}> -- Replaces the tag with the value generated by invoking the custom tag whose implementation is provided in the class {class}. The provided class name {class} must be fully-qualified (i.e., including the package name if applicable), and that class must exist in the classpath used to run MakeLDIF. <custom:{class}:{arg1},{arg2},...,{argn}> -- Replaces the tag with the value generated by invoking the custom tag whose implementation is provided in the class {class} with the specified argument list. The provided class name {class} must be fully-qualified (i.e., including the package name if applicable), and that class must exist in the classpath used to run MakeLDIF. In addition to the tags listed above, it is also possible to reference the value of one attribute in the value of another. This is done by specifying the attribute name in curly braces, like: uid: {givenname}.{sn} This indicates that the value of the uid attribute should contain the value of the givenname attribute followed by a period and the value of the sn attribute. Further, you can follow the name of the attribute with a colon and a number to indicate that at most the specified number of characters should be taken from the value. For example, initials: {givenname:1}{sn:1} will set the value of the initials attribute to be the concatenation of the first character in the value of the givenname attribute and the first character in the value of the sn attribute. Introduction to MakeLDIF 17

18 Introduction to the SLAMD Distributed Load Generation Engine The SLAMD Distributed Load Generation Engine (SLAMD) is a Java-based application designed for stress testing and performance analysis of network-based applications. It is a highly extensible framework for that can be used for benchmarking a wide variety of applications. It has a number of benefits that make it a very powerful tool for load generation and benchmarking: It is a distributed benchmarking tool, which means that it can run the load generation process on multiple client systems at the same time. This makes it possible to generate higher levels of load than can be achieved using only a single client system, and it can also be used to more accurately simulate a production environment that may need to deal with large numbers of clients. It is very easy to use. All operations can be performed through a simple HTML interface (which should work flawlessly on any browser that supports HTML 4.01, including text-based browsers like lynx). There is no need to remember the correct set of command-line options to specify all of the customizable parameters. It is very extensible. The tasks that it performs to generate load are called jobs, and the set of jobs that can be run by SLAMD is completely customizable. A number of jobs are provided with SLAMD and are available for use as soon as it is installed, and it has a Java API to allow end users to easily define their own jobs for execution. It can be used for testing virtually any network-based application that can communicate using TCP or UDP. Although it was initially used primarily for performance analysis of LDAP directory servers (and therefore is provided with a number of jobs for performing such testing), it has also been used to interact with servers using the HTTP, POP, IMAP, and SMTP protocols, and it has been tested with the Sun ONE Directory Server, Web Server, Messaging Server, Calendar Server, Portal Server, and Identity Server. 18 Benchmarking the Sun ONE Directory Server 5.2 with the SLAMD Distributed Load Generation Engine

19 SLAMD contains a scheduler, which allows a user to either run a job as soon as possible or at a specified time in the future. In addition, it contains a mechanism to define dependencies between jobs so that a number of jobs can be scheduled ahead of time and will run one after another in a predetermined order. This makes it possible for benchmarking to continue around the clock without the need for administrative interaction, allowing you to get more work done in less time. All job data is automatically stored in a configuration directory server. Whenever a job is scheduled, details about that job are stored in the directory server. When a job completes, the statistics collected while it was running will be added to the directory as well. Therefore, the information is automatically preserved, and it is easy to retrieve information about jobs that have been completed in the past. The statistics collected while a job was running can be accessed in many different ways. By default, SLAMD summarizes this information for the entire job, but it is possible to display the data collected at different points in the job's execution, and the performance of each client, and even each thread on each client can be examined individually if it is so desired. SLAMD can generate graphs of the data, which makes it possible to visually examine performance characteristics about the job, and you can even export the data in tab-delimited text form for use in other applications. SLAMD makes it very easy to compare statistics collected by multiple jobs, both numerically and graphically. This can be very useful for "before and after" kinds of analysis in which you want to determine the performance impact associated with changing a configuration option. It can also be useful for monitoring performance over time, for example to make comparisons between daily builds of a product to see what kind of impact changes made between the two builds might have had on performance. SLAMD consists of two main components. The first and simplest is the client. The client is an application that establishes a connection with the SLAMD server and announces that it is available to process jobs. Upon receiving a job request from the server, it will execute the requested job and return the results to the server. Multiple instances of the client can be run on the same system, and clients can connect to the SLAMD server from a number of different systems. The other component is the SLAMD server. The server actually consists of a number of components in itself, including one that interacts with clients, another that manages the jobs that have been scheduled, and a third that handles all interaction with the end user through the administrative interface. Introduction to the SLAMD Distributed Load Generation Engine 19

20 LDAP-Specific Jobs Provided with SLAMD As mentioned above, SLAMD can be used for load testing and performance analysis of virtually any kind of network server that communicates using TCP or UDP, and it is provided by default with jobs for interacting with a variety of protocols. However, to this point it has been used most extensively for conducting benchmarks of LDAP directory servers, and as such it is provided with a number of jobs that can be used to measure the performance of such servers, and those include the following jobs: SearchRate -- This job is used to generate search load against the Directory Server. It is very similar to the searchrate command-line utility in the Directory Server Resource Kit, but it does have a number of distinct advantages, including the ability to use SSL, the ability to follow referrals, and the ability to insert a delay between searches in an attempt to generate a specific, consistent degree of load against the server. Weighted SearchRate -- This job is very similar to the SearchRate job, but it makes it possible to specify two different filters and the frequency with which each will be used. This can be very useful when trying to simulate real-world search load against the directory server, in which the majority of the searches are against a relatively small subset of the entries (e.g., 80% of the searches are targeted at 20% of the entries in the directory). This is particularly useful when the data set is larger than will fit in the Directory Server's entry cache because real-world searches that occur in this type of pattern are more likely to be in the cache than searches on infrequently-accessed entries. ModRate -- This job is used to generate modify load against the Directory Server. It is very similar to the modrate command-line utility in the Directory Server Resource Kit, but it does have a number of distinct advantages, including the ability to use SSL and the ability to insert a delay between searches in an attempt to generate a specific, consistent degree of load against the server. Weighted ModRate -- This job is very similar to the ModRate job, but it makes it possible to specify two different entry DNs (or more appropriately DN patterns) that can be used to target different sets of entries with different frequencies. ModRate with Replica Latency -- This job is very similar to the ModRate job, but it has the added benefit of being able to measure replication latency. That is, while in the process of making modifications to a specified set of entries in the Directory Server, this job will also periodically make changes to a special entry that it is monitoring on the consumer system using a persistent 20 Benchmarking the Sun ONE Directory Server 5.2 with the SLAMD Distributed Load Generation Engine

21 search, measuring the time between the change on the master and the detection of that change on the replica. Weighted ModRate with Replica Latency -- This job is a combination of the Weighted ModRate and the ModRate with Replica Latency jobs. That is, it can perform modifications against two different sets of entries with different frequencies, and at the same time can measure the replication latency associated with those changes. Search and Modify Load Generator -- This job provides a combination of the SearchRate and ModRate job classes in that it allows the user to provide a set of search criteria that will be used to locate entries, and then will modify each entry returned from processing the search. This provides a rough means of generating both read and write load on the server using the same job to measure the impact that they have on each other. AddRate -- This job provides a means of measuring the performance of the Directory Server while processing add requests. It is somewhat similar to the infadd utility in the Directory Server Resource Kit, with the exception that it also provides the ability to use SSL, the ability to customize (on a somewhat limited basis) the kinds of entries that are added, and the ability to insert a delay between adds in an attempt to generate a specific, consistent degree of load against the server. The entries will be added with a sequentiallyincreasing numeric value in the DN, and this job is designed to work well with the DelRate job. Template-Based AddRate -- This job is very similar to the AddRate job, with the exception that the entry to add is generated based on a template (very similar to that used by MakeLDIF). This makes it possible to simulate entries that more accurately reflect the data in the actual directory environment. AddRate with Replica Latency -- This job is very similar to the AddRate job, but it also provides the ability to measure the latency associated with replicating the new entries to another server. It measures this replication latency using the same process as the ModRate with replica latency. DelRate -- This job provides a means of measuring the performance of the Directory Server while processing delete requests. It will delete entries with a sequentially-increasing numeric value in the DN, and it is designed to work with entries created using the AddRate job. DelRate with Replica Latency -- This job is very similar to the DelRate job, but it also provides the ability to measure the latency associated with replicating the deletes to another server. It measures this replication latency using the same process as the ModRate with replica latency. Introduction to the SLAMD Distributed Load Generation Engine 21

22 Add and Delete Rate -- This job combines the work performed by the AddRate and the DelRate jobs into a single unit that adds a specified number of entries, waits for a specific period of time, and then deletes them. Since the net result of this job should be a directory that is the same as before it started, this job can be run repeatedly without causing failures or requiring cleanup between iterations. This means that it can be used in an optimizing job whereas the standalone AddRate and DelRate jobs cannot. Template-Based Add and Delete Rate -- This job is very similar to the Add and Delete Rate job with the exception that the entries to add to the server are generated using a provided template rather than in a hard-coded format. CompRate -- This job provides a means of measuring the performance of the Directory Server while performing LDAP compare operations. It has features similar to other kinds of jobs, including the ability to issue the requests over SSL and the ability to define a delay between requests in an attempt to impose a fixed load against the directory server. AuthRate -- This job provides a means of measuring the performance of the Directory Server while performing authentications. This is very different from the authrate command-line utility provided in the Directory Server Resource Kit because it does much more than just binding to the server, and it does not drop the connection between authentications. Rather, this job simulates the queries that an application might issue to the directory server if it were trying to authenticate a user. Specifically, it will first perform a search to find that user's entry and will then attempt to bind as that user. It will also optionally perform the additional work of determining whether the user is a member of a specified static group, dynamic group, or role in the Directory Server. Digest-MD5 AuthRate -- This job is very similar to the AuthRate job in that it simulates the process of authenticating users to the Directory Server. However, instead of using simple authentication, this job performs a SASL bind with the DIGEST-MD5 mechanism. This provides a means of using password-based authentication without actually exposing the password in clear text in the bind request, and it may be desired in some environments that want to use password based authentication without SSL but do not want the risk of exposing passwords to clients that might have access to capture traffic sent over the network. Weighted AuthRate -- This job is very similar to the AuthRate job in that it simulates the process of authenticating users to the Directory Server. However, it allows for the possibility of specifying two different sets of users to use in the authentication, and also the frequency with which each type of user is to be chosen. 22 Benchmarking the Sun ONE Directory Server 5.2 with the SLAMD Distributed Load Generation Engine

23 LDAP SiteMinder Load Simulator -- This job simulates the load that Netegrity SiteMinder places on the Directory Server whenever it is configured to authenticate users with password services enabled. For environments in which SiteMinder is used, this job provides a means of generating load against the Directory Server so that it can be optimally tuned for that kind of usage. Note that this job communicates directly with the Directory Server itself and does not include any additional processing that SiteMinder may perform in the process of authenticating a user. Therefore, the authentication rate that this job is able to achieve may not accurately reflect the authentication rate of SiteMinder itself. LDAP Weighted SiteMinder Load Simulator -- This job is very similar to the LDAP SiteMinder Load Simulator job, but also adds the ability to use a weighted access pattern when choosing the users to authenticate. Solaris LDAP AuthRate -- This job simulates the load that Solaris 9 clients place on the Directory Server when they are configured to authenticate users with pam_ldap. For environments that do use pam_ldap, this job provides a means of generating load against the Directory Server so that it can be optimally tuned for that kind of usage. Note that it may not be possible to simulate all the ways in which pam_ldap may access the Directory Server, although it is configurable to allow you to choose the credential level and authentication mechanism. LDAP Load Generator -- This job provides the ability to perform a number of different kinds of operations against the directory server. In particular, you can specify the frequencies with which add, compare, delete, modify, modify RDN, and search operations are processed. It can be useful for simulating the performance of the server under various kinds of mixed load, although it does not attempt to simulate the behavior of any specific real-world client. LDAP Weighted Load Generator -- This job is very similar to the LDAP Load Generator job, but also adds the ability to use a weighted access pattern when choosing the DNs of the entries to target for modify and compare operations, and also when choosing the filters to use for search operations. LDAP Load Generator with Multiple Searches -- This job is very similar to the LDAP Load Generator with the exception that it makes it possible to perform multiple kinds of searches rather than just one type. This makes it possible, for example, to include a large number of equality searches on a unique attribute while also issuing a smaller number of substring searches. LDAP Prime Job -- This job provides a means of priming the Directory Server's entry cache by retrieving an indexed attribute whose value is a Introduction to the SLAMD Distributed Load Generation Engine 23

24 sequentially incrementing number. This can be much faster than a simple "(objectclass=*)" query because it can be multithreaded and because all the searches are indexed. While this job is not itself really intended to be used for measuring the performance of the server, it is very helpful in priming the Directory Server before running other jobs. SLAMD Versus Other Load Generation Software Although SLAMD is a very powerful utility for benchmarking directory servers and other network-based applications, is is not the only such utility. When working specifically with LDAP directory servers, there are two other relatively well-known utilities that can be used for such work. Those utilities are DirectoryMark and the Sun ONE Directory Server Resource Kit. DirectoryMark DirectoryMark is a utility developed by Mindcraft and Netscape Communications that has an ability to perform some basic load generation and performance analysis against the directory server. In general, it attempts to simulate the load placed on the directory server as it is used in a messaging environment. The two primary tests that it offers are intended to simulate messaging clients (clients that perform equality searches on a unique attribute) and address book clients (clients that perform substring searches). DirectoryMark is essentially a collection of Perl scripts. One script, dbgen.pl, is a utility for generating LDIF files. Unlike MakeLDIF, dbgen.pl is rather inflexible and there are only a few configurable options. The hierarchy that it generates is not representative of what is used in most real-world deployments, and the set of attributes included in those entries cannot be easily modified. Another Perl script, scriptgen.pl, is a tool that parses the LDIF file created by dbgen.pl and generates other Perl scripts that will interact with those entries in the directory in a predefined manner. SLAMD offers a number of advantages over DirectoryMark: SLAMD is much more user friendly than DirectoryMark. It offers an HTML interface that does not require the user to remember any command-line arguments. SLAMD is much more flexible than DirectoryMark. DirectoryMark offers two primary test modes (messaging and address book), and it cannot easily be 24 Benchmarking the Sun ONE Directory Server 5.2 with the SLAMD Distributed Load Generation Engine

Job Reference Guide. SLAMD Distributed Load Generation Engine. Version 1.8.1

Job Reference Guide. SLAMD Distributed Load Generation Engine. Version 1.8.1 Job Reference Guide SLAMD Distributed Load Generation Engine Version 1.8.1 December 2004 Contents 1. Introduction...3 2. The Utility Jobs...4 3. The LDAP Search Jobs...11 4. The LDAP Authentication Jobs...22

More information

An Oracle White Paper December Oracle Internet Directory 11g Benchmark With 10 Million Users On Oracle Exalogic X2-2

An Oracle White Paper December Oracle Internet Directory 11g Benchmark With 10 Million Users On Oracle Exalogic X2-2 An Oracle White Paper December 2011 Oracle Internet Directory 11g Benchmark With 10 Million Users On Oracle Exalogic X2-2 Disclaimer The following is intended to outline our general product direction.

More information

Realms and Identity Policies

Realms and Identity Policies The following topics describe realms and identity policies: About, page 1 Create a Realm, page 8 Create an Identity Policy, page 14 Create an Identity Rule, page 15 Manage a Realm, page 17 Manage an Identity

More information

Realms and Identity Policies

Realms and Identity Policies The following topics describe realms and identity policies: About, page 1 Create a Realm, page 8 Create an Identity Policy, page 15 Create an Identity Rule, page 15 Manage a Realm, page 20 Manage an Identity

More information

Realms and Identity Policies

Realms and Identity Policies The following topics describe realms and identity policies: Introduction:, page 1 Creating a Realm, page 5 Creating an Identity Policy, page 11 Creating an Identity Rule, page 15 Managing Realms, page

More information

Netegrity SiteMinder 4.51 AuthMark Performance Details

Netegrity SiteMinder 4.51 AuthMark Performance Details Page 1 of 12 Netegrity SiteMinder 4.51 AuthMark Performance Details By Bruce Weiner (PDF version, 96 KB) Contents Executive Summary Test Methodology iload MVP AuthMark Result Analysis Server Hardware Server

More information

ISBG May LDAP: It s Time. Gabriella Davis - Technical Director The Turtle Partnership

ISBG May LDAP: It s Time. Gabriella Davis - Technical Director The Turtle Partnership ISBG May 2015 LDAP: It s Time Gabriella Davis - Technical Director The Turtle Partnership gabriella@turtlepartnership.com What Is LDAP? Lightweight Directory Access Protocol Standard language for reading

More information

NoSQL²: Store LDAP Data in HBase

NoSQL²: Store LDAP Data in HBase NoSQL²: Store LDAP Data in HBase Stefan Seelmann seelmann@apache.org About me Stefan Seelmann Freelancer Software development with Java LDAP, Identity Management Open Source developer Apache Directory

More information

First thing is to examine the valid switches for ldapmodify command, ie on my machine with the Fedora Direcotory Server Installed.

First thing is to examine the valid switches for ldapmodify command, ie on my machine with the Fedora Direcotory Server Installed. LDAP Command via the command line This document is on about the use of LDAP via the command line instead of the GUI. The reason for this is the command lines for LDAP are more powerful and adapt especially

More information

NDK: LDAP Tools. novdocx (ENU) 01 February Novell Developer Kit. LDAP TOOLS. February 28, 2007

NDK: LDAP Tools. novdocx (ENU) 01 February Novell Developer Kit.  LDAP TOOLS. February 28, 2007 NDK: LDAP Tools Novell Developer Kit www.novell.com February 28, 2007 LDAP TOOLS Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,

More information

IBM Tivoli Access Manager for e-business v3.8 Performance Details. Detailed Extranet Results

IBM Tivoli Access Manager for e-business v3.8 Performance Details. Detailed Extranet Results Page 1 of 12 IBM Tivoli Access Manager for e-business v3.8 AuthMark Performance Details Contents Executive Summary Extranet Results Conclusions Test Methodology iload MVP AuthMark Server Set Up Load Generators

More information

Configuring Applications to Exploit LDAP

Configuring  Applications to Exploit LDAP BY BOB PETTI Configuring Email Applications to Exploit LDAP Email applications such as Microsoft Outlook Express, Pegasus Mail, Netscape Communicator, Lotus Notes and Eudora can be configured to retrieve

More information

INTEGRATING WITH LDAP DIRECTORIES

INTEGRATING WITH LDAP DIRECTORIES INTEGRATING WITH LDAP DIRECTORIES 1 BACKGROUND This document outlines the steps involved in integrating Unity Desktop with an LDAP-compliant directory (including Microsoft Active Directory) for click-to-dial

More information

DIRECTORY INTEGRATION: USING ACTIVE DIRECTORY FOR AUTHENTICATION. Gabriella Davis The Turtle Partnership

DIRECTORY INTEGRATION: USING ACTIVE DIRECTORY FOR AUTHENTICATION. Gabriella Davis The Turtle Partnership DIRECTORY INTEGRATION: USING ACTIVE DIRECTORY FOR AUTHENTICATION Gabriella Davis The Turtle Partnership In This Session Review possible use cases for multiple directories Understand security implications

More information

LDAP Directory Services

LDAP Directory Services ATTENTION LDAP Directory Services THE MATERIAL PROVIDED IN THIS DOCUMENT IS FOR INFORMATION PURPOSES ONLY. IT IS NOT INTENDED TO BE ADVICE. YOU SHOULD NOT ACT OR ABSTAIN FROM ACTING BASED UPON SUCH INFORMATION

More information

Identity Policies. Identity Policy Overview. Establishing User Identity through Active Authentication

Identity Policies. Identity Policy Overview. Establishing User Identity through Active Authentication You can use identity policies to collect user identity information from connections. You can then view usage based on user identity in the dashboards, and configure access control based on user or user

More information

ForeScout Open Integration Module: Data Exchange Plugin

ForeScout Open Integration Module: Data Exchange Plugin ForeScout Open Integration Module: Data Exchange Plugin Version 3.2.0 Table of Contents About the Data Exchange Plugin... 4 Requirements... 4 CounterACT Software Requirements... 4 Connectivity Requirements...

More information

StarTeam LDAP QuickStart Manager Administration Guide

StarTeam LDAP QuickStart Manager Administration Guide StarTeam 15.1 LDAP QuickStart Manager Administration Guide Micro Focus The Lawn 22-30 Old Bath Road Newbury, Berkshire RG14 1QN UK http://www.microfocus.com Copyright Micro Focus 2016. All rights reserved.

More information

Authenticating and Importing Users with AD and LDAP

Authenticating and Importing Users with AD and LDAP Purpose This document describes how to integrate with Active Directory (AD) or Lightweight Directory Access Protocol (LDAP). This allows user authentication and validation through the interface. This is

More information

Using an LDAP With ActiveWorkflow

Using an LDAP With ActiveWorkflow Table of contents 1 Groups...2 2 People...2 3 Authentication...3 4 Directory Service... 4 4.1 Connection Properties... 5 4.2 User Retrieval Properties...6 4.3 User Attribute Properties...7 4.4 Group Retrieval

More information

Managing External Identity Sources

Managing External Identity Sources CHAPTER 5 The Cisco Identity Services Engine (Cisco ISE) integrates with external identity sources to validate credentials in user authentication functions, and to retrieve group information and other

More information

Authenticating and Importing Users with Active Directory and LDAP

Authenticating and Importing Users with Active Directory and LDAP Purpose This document describes how to integrate Nagios with Active Directory (AD) or Lightweight Directory Access Protocol (LDAP) to allow user authentication and validation with an AD or LDAP infrastructure

More information

Apache Directory Studio LDAP Browser. User's Guide

Apache Directory Studio LDAP Browser. User's Guide Apache Directory Studio LDAP Browser User's Guide Apache Directory Studio LDAP Browser: User's Guide Version 2.0.0.v20180908-M14 Copyright 2006-2018 Apache Software Foundation Licensed to the Apache Software

More information

CA SiteMinder Federation

CA SiteMinder Federation CA SiteMinder Federation Legacy Federation Guide 12.52 SP1 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

Netegrity SiteMinder 4.61 with Microsoft Active Directory AuthMark Performance Details

Netegrity SiteMinder 4.61 with Microsoft Active Directory AuthMark Performance Details Page 1 of 16 Netegrity SiteMinder 4.61 with Microsoft Active Directory AuthMark Performance Details By Bruce Weiner (PDF version, 131 KB) April 18, 2002 Contents Executive Summary Login Results Extranet

More information

IBM Security Access Manager Version 9.0 October Federation Administration topics IBM

IBM Security Access Manager Version 9.0 October Federation Administration topics IBM IBM Security Access Manager Version 9.0 October 2015 Federation Administration topics IBM IBM Security Access Manager Version 9.0 October 2015 Federation Administration topics IBM ii IBM Security Access

More information

Contents Overview... 5 Downloading Primavera Gateway... 5 Primavera Gateway On-Premises Installation Prerequisites... 6

Contents Overview... 5 Downloading Primavera Gateway... 5 Primavera Gateway On-Premises Installation Prerequisites... 6 Gateway Installation and Configuration Guide for On-Premises Version 17 September 2017 Contents Overview... 5 Downloading Primavera Gateway... 5 Primavera Gateway On-Premises Installation Prerequisites...

More information

CA IdentityMinder. Glossary

CA IdentityMinder. Glossary CA IdentityMinder Glossary 12.6.3 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for your informational

More information

Configuring a Virtual-Domain Server with LDAP

Configuring a Virtual-Domain Server with LDAP This document provides a recipe for configuring a Mirapoint server to perform LDAP authentication, message routing, and email access proxying. Configuration requires two activities: LDAP Database User

More information

SAP NetWeaver Identity Management Virtual Directory Server. Tutorial. Version 7.0 Rev 3. - Accessing databases

SAP NetWeaver Identity Management Virtual Directory Server. Tutorial. Version 7.0 Rev 3. - Accessing databases SAP NetWeaver Identity Management Virtual Directory Server Tutorial - Accessing databases Version 7.0 Rev 3 SAP Library document classification: PUBLIC No part of this publication may be reproduced or

More information

SAP NetWeaver Identity Management Virtual Directory Server. Tutorial. Version 7.2 Rev 1. - Accessing databases

SAP NetWeaver Identity Management Virtual Directory Server. Tutorial. Version 7.2 Rev 1. - Accessing databases SAP NetWeaver Identity Management Virtual Directory Server Tutorial - Accessing databases Version 7.2 Rev 1 No part of this publication may be reproduced or transmitted in any form or for any purpose without

More information

ZENworks Reporting System Reference. January 2017

ZENworks Reporting System Reference. January 2017 ZENworks Reporting System Reference January 2017 Legal Notices For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government rights, patent

More information

Authenticating and Importing Users with AD and LDAP

Authenticating and Importing Users with AD and LDAP Purpose This document describes how to integrate with Active Directory (AD) or Lightweight Directory Access Protocol (LDAP). This allows user authentication and validation through the interface. This is

More information

iload MVP is a general-purpose, script-driven capacity planning, benchmarking, and regression testing tool. The major components of iload MVP are:

iload MVP is a general-purpose, script-driven capacity planning, benchmarking, and regression testing tool. The major components of iload MVP are: Oblix NetPoint 4.0 AuthMark Performance Details By Bruce Weiner (PDF version, 410 KB) October 18, 2000 Contents Executive Summary Test Methodology iload MVP AuthMark Result Analysis Server Hardware Server

More information

Migrating application users and passwords with Password Manager

Migrating application users and passwords with Password Manager Migrating application users and passwords with Password Manager 2016 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Introduction 1 2 Migrating Users 1 3 Initializing Passwords 2 4 Maintaining

More information

IBM Security Identity Manager Version 6.0. IBM Security Access Manager Adapter Installation and Configuration Guide IBM

IBM Security Identity Manager Version 6.0. IBM Security Access Manager Adapter Installation and Configuration Guide IBM IBM Security Identity Manager Version 6.0 IBM Security Access Manager Adapter Installation and Configuration Guide IBM IBM Security Identity Manager Version 6.0 IBM Security Access Manager Adapter Installation

More information

IBM Tivoli Directory Server

IBM Tivoli Directory Server IBM Tivoli Directory Server White Pages Version 6.1 SC23-7837-00 IBM Tivoli Directory Server White Pages Version 6.1 SC23-7837-00 Note Before using this information and the product it supports, read the

More information

Performance Best Practices Paper for IBM Tivoli Directory Integrator v6.1 and v6.1.1

Performance Best Practices Paper for IBM Tivoli Directory Integrator v6.1 and v6.1.1 Performance Best Practices Paper for IBM Tivoli Directory Integrator v6.1 and v6.1.1 version 1.0 July, 2007 Table of Contents 1. Introduction...3 2. Best practices...3 2.1 Preparing the solution environment...3

More information

CounterACT User Directory Plugin

CounterACT User Directory Plugin Version 6.1.2 and Above Table of Contents About the User Directory Plugin... 3 Endpoint User Details... 3 Verify Endpoint Authentication... 3 User Directory Inventory... 4 HTTP Login Action... 5 HTTP Sign

More information

ForeScout CounterACT. Configuration Guide. Version 3.4

ForeScout CounterACT. Configuration Guide. Version 3.4 ForeScout CounterACT Open Integration Module: Data Exchange Version 3.4 Table of Contents About the Data Exchange Module... 4 About Support for Dual Stack Environments... 4 Requirements... 4 CounterACT

More information

akkadian Global Directory 3.0 System Administration Guide

akkadian Global Directory 3.0 System Administration Guide akkadian Global Directory 3.0 System Administration Guide Updated July 19 th, 2016 Copyright and Trademarks: I. Copyright: This website and its content is copyright 2014 Akkadian Labs. All rights reserved.

More information

Porting Google App Engine Applications to IBM Middleware

Porting Google App Engine Applications to IBM Middleware Porting Google App Engine Applications IBM Middleware Author: Animesh Singh, John Reif Abstract: Google App Engine is a cloud computing platform that hosts third party Web applications. Application authors

More information

Creating Domain Templates Using the Domain Template Builder 11g Release 1 (10.3.6)

Creating Domain Templates Using the Domain Template Builder 11g Release 1 (10.3.6) [1]Oracle Fusion Middleware Creating Domain Templates Using the Domain Template Builder 11g Release 1 (10.3.6) E14139-06 April 2015 This document describes how to use the Domain Template Builder to create

More information

SAS Web Infrastructure Kit 1.0. Administrator s Guide

SAS Web Infrastructure Kit 1.0. Administrator s Guide SAS Web Infrastructure Kit 1.0 Administrator s Guide The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2004. SAS Web Infrastructure Kit 1.0: Administrator s Guide. Cary,

More information

LDAP Servers for AAA

LDAP Servers for AAA This chapter describes how to configure LDAP servers used in AAA. About LDAP and the ASA, page 1 Guidelines for, page 5 Configure, page 5 Test LDAP Server Authentication and Authorization, page 9 Monitoring,

More information

1 of 8 14/12/2013 11:51 Tuning long-running processes Contents 1. Reduce the database size 2. Balancing the hardware resources 3. Specifying initial DB2 database settings 4. Specifying initial Oracle database

More information

Management Tools. Management Tools. About the Management GUI. About the CLI. This chapter contains the following sections:

Management Tools. Management Tools. About the Management GUI. About the CLI. This chapter contains the following sections: This chapter contains the following sections:, page 1 About the Management GUI, page 1 About the CLI, page 1 User Login Menu Options, page 2 Customizing the GUI and CLI Banners, page 3 REST API, page 3

More information

Authenticating Cisco VCS accounts using LDAP

Authenticating Cisco VCS accounts using LDAP Authenticating Cisco VCS accounts using LDAP Cisco TelePresence Deployment Guide Cisco VCS X6 D14526.04 February 2011 Contents Contents Document revision history... 3 Introduction... 4 Usage... 4 Cisco

More information

IBM Security Access Manager Version January Federation Administration topics IBM

IBM Security Access Manager Version January Federation Administration topics IBM IBM Security Access Manager Version 9.0.2.1 January 2017 Federation Administration topics IBM IBM Security Access Manager Version 9.0.2.1 January 2017 Federation Administration topics IBM ii IBM Security

More information

IBM Security Identity Manager Version Administration Topics

IBM Security Identity Manager Version Administration Topics IBM Security Identity Manager Version 6.0.0.5 Administration Topics IBM Security Identity Manager Version 6.0.0.5 Administration Topics ii IBM Security Identity Manager Version 6.0.0.5: Administration

More information

FUSION REGISTRY COMMUNITY EDITION SETUP GUIDE VERSION 9. Setup Guide. This guide explains how to install and configure the Fusion Registry.

FUSION REGISTRY COMMUNITY EDITION SETUP GUIDE VERSION 9. Setup Guide. This guide explains how to install and configure the Fusion Registry. FUSION REGISTRY COMMUNITY EDITION VERSION 9 Setup Guide This guide explains how to install and configure the Fusion Registry. FUSION REGISTRY COMMUNITY EDITION SETUP GUIDE Fusion Registry: 9.2.x Document

More information

Using the VMware vcenter Orchestrator Client. vrealize Orchestrator 5.5.1

Using the VMware vcenter Orchestrator Client. vrealize Orchestrator 5.5.1 Using the VMware vcenter Orchestrator Client vrealize Orchestrator 5.5.1 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments

More information

Understanding the LDAP Binding Component

Understanding the LDAP Binding Component Understanding the LDAP Binding Component Sun Microsystems, Inc. 4150 Network Circle Santa Clara, CA 95054 U.S.A. Part No: 820 6573 Dec 2008 Copyright 2008 Sun Microsystems, Inc. 4150 Network Circle, Santa

More information

WPC-LDAP Integration Setup Guide

WPC-LDAP Integration Setup Guide WPC-LDAP Integration Setup Guide 1 Table of Contents WPC-LDAP Integration Setup Guide -----------------------------------------------------------4 1. Introduction ---------------------------------------------------------------------------------------------4

More information

Product Name DCS v MozyPro v2.0 Summary Multi-platform server-client online (Internet / LAN) backup software with web management console

Product Name DCS v MozyPro v2.0 Summary Multi-platform server-client online (Internet / LAN) backup software with web management console Summary Multi-platform server-client online (Internet / LAN) backup software with web management console Windows and MAC platform server client backup software Supported Platforms 32 / 64 bit OS Supported

More information

Oracle Fusion Middleware

Oracle Fusion Middleware Oracle Fusion Middleware Quick Installation Guide for Oracle Identity Management 11g Release 1 (11.1.1) E10033-01 May 2009 This guide is designed to help you quickly install the most common Oracle Identity

More information

ShoreTel Active Directory Import Application

ShoreTel Active Directory Import Application INSTALLATION & USER GUIDE ShoreTel Active Directory Import Application ShoreTel Professional Services Introduction The ShoreTel Active Directory Import Application allows customers to centralize and streamline

More information

Using the VMware vrealize Orchestrator Client

Using the VMware vrealize Orchestrator Client Using the VMware vrealize Orchestrator Client vrealize Orchestrator 7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

Open-Xchange Server Service Pack 1 (SP1)

Open-Xchange Server Service Pack 1 (SP1) Open-Xchange Facts Paper Open-Xchange Server Service Pack 1 (SP1) Features and Benefits v1.31 Copyright 2006, Open-Xchange Inc. 1. Open-Xchange Server 5 - Feature Upgrade March 2006 Open-Xchange is announcing

More information

Lotus Learning Management System R1

Lotus Learning Management System R1 Lotus Learning Management System R1 Version 1.0.4 March 2004 Administrator's Guide G210-1785-00 Contents Chapter 1 Introduction to the Learning Management System and Administration...1 Understanding the

More information

GNU ccscript Scripting Guide IV

GNU ccscript Scripting Guide IV GNU ccscript Scripting Guide IV David Sugar GNU Telephony 2008-08-20 (The text was slightly edited in 2017.) Contents 1 Introduction 1 2 Script file layout 2 3 Statements and syntax 4 4 Loops and conditionals

More information

Configuring Health Monitoring

Configuring Health Monitoring CHAPTER1 This chapter describes how to configure health monitoring on the ACE to track the state of a server by sending out probes. Also referred to as out-of-band health monitoring, the ACE verifies the

More information

BMC Remedy AR System change ID utility

BMC Remedy AR System change ID utility BMC Remedy AR System change ID utility The BMC Remedy AR System change ID utility enables you to change the IDs of certain objects. This document explains the purpose and usage of the utility. The BMC

More information

Pace University. Fundamental Concepts of CS121 1

Pace University. Fundamental Concepts of CS121 1 Pace University Fundamental Concepts of CS121 1 Dr. Lixin Tao http://csis.pace.edu/~lixin Computer Science Department Pace University October 12, 2005 This document complements my tutorial Introduction

More information

Introduction... 5 Configuring Single Sign-On... 7 Prerequisites for Configuring Single Sign-On... 7 Installing Oracle HTTP Server...

Introduction... 5 Configuring Single Sign-On... 7 Prerequisites for Configuring Single Sign-On... 7 Installing Oracle HTTP Server... Oracle Access Manager Configuration Guide for On-Premises Version 17 October 2017 Contents Introduction... 5 Configuring Single Sign-On... 7 Prerequisites for Configuring Single Sign-On... 7 Installing

More information

Visitor Management Host User Guide

Visitor Management Host User Guide Visitor Management Host User Guide Table of Contents CHAPTER 1 Introduction............................................. 5 Conventions Used in this Documentation.............................................5

More information

Index. B Big Brother, 218 BMC Patrol, 219

Index. B Big Brother, 218 BMC Patrol, 219 Index A access control instruction, 159 lists, 105 additional attributes, 16 administration ports, 70 administration web interface, 54 alias, 16 aliases file, 171 alternate address, 16 annual checks, 214

More information

Design and Implementation of A P2P Cooperative Proxy Cache System

Design and Implementation of A P2P Cooperative Proxy Cache System Design and Implementation of A PP Cooperative Proxy Cache System James Z. Wang Vipul Bhulawala Department of Computer Science Clemson University, Box 40974 Clemson, SC 94-0974, USA +1-84--778 {jzwang,

More information

ExamSoft Blackboard Building Block System Administrator Guide Version 1.3.0

ExamSoft Blackboard Building Block System Administrator Guide Version 1.3.0 ExamSoft Blackboard Building Block System Administrator Guide Version 1.3.0 This guide is intended for Blackboard System Administrators and describes how to install and configure the ExamSoft Building

More information

Network Discovery Policies

Network Discovery Policies The following topics describe how to create, configure, and manage network discovery policies: Overview:, page 1 Network Discovery Customization, page 2 Network Discovery Rules, page 3 Configuring Advanced

More information

WhatsConfigured for WhatsUp Gold 2016 User Guide

WhatsConfigured for WhatsUp Gold 2016 User Guide WhatsConfigured for WhatsUp Gold 2016 User Guide Contents Welcome to WhatsConfigured 1 What is WhatsConfigured? 1 Finding more information and updates 1 Sending feedback 2 Deploying WhatsConfigured 3 STEP

More information

Exam Name: IBM Certified System Administrator - WebSphere Application Server Network Deployment V7.0

Exam Name: IBM Certified System Administrator - WebSphere Application Server Network Deployment V7.0 Vendor: IBM Exam Code: 000-377 Exam Name: IBM Certified System Administrator - WebSphere Application Server Network Deployment V7.0 Version: Demo QUESTION 1 An administrator would like to use the Centralized

More information

ForeScout CounterACT. Configuration Guide. Version 6.3

ForeScout CounterACT. Configuration Guide. Version 6.3 ForeScout CounterACT Authentication Module: User Directory Plugin Version 6.3 Table of Contents About the User Directory Plugin... 4 Endpoint User Details... 4 Endpoint Authentication... 5 User Directory

More information

DEPLOYMENT GUIDE Version 1.1. Deploying F5 with IBM WebSphere 7

DEPLOYMENT GUIDE Version 1.1. Deploying F5 with IBM WebSphere 7 DEPLOYMENT GUIDE Version 1.1 Deploying F5 with IBM WebSphere 7 Table of Contents Table of Contents Deploying the BIG-IP LTM system and IBM WebSphere Servers Prerequisites and configuration notes...1-1

More information

IBM Tivoli Identity Manager V5.1 Fundamentals

IBM Tivoli Identity Manager V5.1 Fundamentals IBM Tivoli Identity Manager V5.1 Fundamentals Number: 000-038 Passing Score: 600 Time Limit: 120 min File Version: 1.0 http://www.gratisexam.com/ IBM 000-038 IBM Tivoli Identity Manager V5.1 Fundamentals

More information

Directory Integration with VMware Identity Manager

Directory Integration with VMware Identity Manager Directory Integration with VMware Identity Manager VMware AirWatch 9.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a

More information

User Identity Sources

User Identity Sources The following topics describe Firepower System user identity sources, which are sources for user awareness. These users can be controlled with identity and access control policies: About, on page 1 The

More information

Import Users From LDAP Directory

Import Users From LDAP Directory LDAP Synchronization Overview, page 1 LDAP Synchronization Prerequisites, page 3 LDAP Synchronization Configuration Task Flow, page 3 LDAP Synchronization Overview Lightweight Directory Access Protocol

More information

Administering a Database System

Administering a Database System Microsoft Access 2010 10 Administering a Database System Objectives You will have mastered the material in this project when you can: Create custom Quick Start fields Create indexes Create a Web database

More information

NetIQ Identity Manager Jobs Guide. February 2017

NetIQ Identity Manager Jobs Guide. February 2017 NetIQ Identity Manager Jobs Guide February 2017 Legal Notice For information about NetIQ legal notices, disclaimers, warranties, export and other use restrictions, U.S. Government restricted rights, patent

More information

Oracle Fusion Middleware

Oracle Fusion Middleware Oracle Fusion Middleware Tutorial for Oracle Identity Management 11g Release 1 (11.1.1) E10276-01 May 2009 Oracle Fusion Middleware Tutorial for Oracle Identity Management, 11g Release 1 (11.1.1) E10276-01

More information

Network Programmability with Cisco Application Centric Infrastructure

Network Programmability with Cisco Application Centric Infrastructure White Paper Network Programmability with Cisco Application Centric Infrastructure What You Will Learn This document examines the programmability support on Cisco Application Centric Infrastructure (ACI).

More information

We d like to hear your suggestions for improving our indexes. Send to

We d like to hear your suggestions for improving our indexes. Send  to Index [ ] (brackets) wildcard, 12 { } (curly braces) in variables, 41 ( ) (parentheses) in variables, 41 += (append) operator, 45 * (asterisk) wildcard, 12 $% automatic variable, 16 $+ automatic variable,

More information

CLOUD MAIL Administrator User Guide. (Version 1.0)

CLOUD MAIL Administrator User Guide. (Version 1.0) Administrator User Guide () Table of Contents 1. How to Login the Administration Panel... 3 2. How to Update Administrator Information... 4 3. How to Check the Cloud Mail Account Information... 4 4. How

More information

Advanced Network and System Administration. Accounts and Namespaces

Advanced Network and System Administration. Accounts and Namespaces Advanced Network and System Administration Accounts and Namespaces 1 Topics 1. What is a directory? 2. NIS 3. LDAP 4. OpenLDAP 5. LDAP Authentication 2 What is a Directory? Directory: A collection of information

More information

Configuring Request Authentication and Authorization

Configuring Request Authentication and Authorization CHAPTER 15 Configuring Request Authentication and Authorization Request authentication and authorization is a means to manage employee use of the Internet and restrict access to online content. This chapter

More information

WebSpray TM. User Guide. Web Server Stress-Testing Tool. Version 2.0

WebSpray TM. User Guide. Web Server Stress-Testing Tool. Version 2.0 WebSpray TM Web Server Stress-Testing Tool User Guide Version 2.0 Copyright Copyright 2006 CAI Networks, Inc. All Rights Reserved. The information contained in this document is the property of CAI Networks,

More information

Configure the IM and Presence Service to Integrate with the Microsoft Exchange Server

Configure the IM and Presence Service to Integrate with the Microsoft Exchange Server Configure the IM and Presence Service to Integrate with the Microsoft Exchange Server Configure a Presence Gateway for Microsoft Exchange Integration, page 1 SAN and Wildcard Certificate Support, page

More information

IBM Directory Server 4.1 Release Notes

IBM Directory Server 4.1 Release Notes IBM Directory Server 4.1 Release Notes IBM Directory Server 4.1 Release Notes Note Before using this information and the product it supports, read the general information under Notices on page 9. First

More information

CA SiteMinder. Federation Manager Guide: Legacy Federation. r12.5

CA SiteMinder. Federation Manager Guide: Legacy Federation. r12.5 CA SiteMinder Federation Manager Guide: Legacy Federation r12.5 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

User Manual. Admin Report Kit for IIS 7 (ARKIIS)

User Manual. Admin Report Kit for IIS 7 (ARKIIS) User Manual Admin Report Kit for IIS 7 (ARKIIS) Table of Contents 1 Admin Report Kit for IIS 7... 1 1.1 About ARKIIS... 1 1.2 Who can Use ARKIIS?... 1 1.3 System requirements... 2 1.4 Technical Support...

More information

FileCruiser. Administrator Portal Guide

FileCruiser. Administrator Portal Guide FileCruiser Administrator Portal Guide Contents Administrator Portal Guide Contents Login to the Administration Portal 1 Home 2 Capacity Overview 2 Menu Features 3 OU Space/Team Space/Personal Space Usage

More information

Function Call Stack and Activation Records

Function Call Stack and Activation Records 71 Function Call Stack and Activation Records To understand how C performs function calls, we first need to consider a data structure (i.e., collection of related data items) known as a stack. Students

More information

Using SSL to Secure Client/Server Connections

Using SSL to Secure Client/Server Connections Using SSL to Secure Client/Server Connections Using SSL to Secure Client/Server Connections, page 1 Using SSL to Secure Client/Server Connections Introduction This chapter contains information on creating

More information

GWNMS NeDi. About NeDi. Configuring the NeDi Package. Managing User Access. Managing User Accounts

GWNMS NeDi. About NeDi. Configuring the NeDi Package. Managing User Access. Managing User Accounts GWNMS NeDi This section reviews the GroundWork Monitor NMS NeDi. About NeDi NeDi is an open source toolkit for managing network infrastructure devices such as switches and routers, and is integrated into

More information

Globalbrain Administration Guide. Version 5.4

Globalbrain Administration Guide. Version 5.4 Globalbrain Administration Guide Version 5.4 Copyright 2012 by Brainware, Inc. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system,

More information

VII. Corente Services SSL Client

VII. Corente Services SSL Client VII. Corente Services SSL Client Corente Release 9.1 Manual 9.1.1 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Table of Contents Preface... 5 I. Introduction... 6 Chapter 1. Requirements...

More information

ACS 5.x: LDAP Server Configuration Example

ACS 5.x: LDAP Server Configuration Example ACS 5.x: LDAP Server Configuration Example Document ID: 113473 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information Directory Service Authentication Using

More information

Elixir Schedule Designer User Manual

Elixir Schedule Designer User Manual Elixir Schedule Designer User Manual Release 8.4.1 Elixir Technology Pte Ltd Elixir Schedule Designer User Manual: Release 8.4.1 Elixir Technology Pte Ltd Published 2012 Copyright 2012 Elixir Technology

More information

Vendor: IBM. Exam Code: C Exam Name: IBM Security Identity Manager V6.0 Implementation. Version: Demo

Vendor: IBM. Exam Code: C Exam Name: IBM Security Identity Manager V6.0 Implementation. Version: Demo Vendor: IBM Exam Code: C2150-197 Exam Name: IBM Security Identity Manager V6.0 Implementation Version: Demo Question No : 1 Which is true for the relationship between provisioning policies, services, and

More information