
6 Netscape Directory Server Deployment Guide • December 2001
Chapter 6 Designing the Replication Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
IntroductiontoReplication .............................................................. 95
ReplicationConcepts................................................................. 96
UnitofReplication ................................................................ 97
Read-WriteReplica/Read-OnlyReplica.............................................. 97
Supplier/Consumer............................................................... 97
ChangeLog ...................................................................... 98
ReplicationAgreement ............................................................ 99
DataConsistency .................................................................... 99
CommonReplicationScenarios ......................................................... 100
Single-MasterReplication............................................................ 100
Multi-MasterReplication ............................................................ 101
CascadingReplication............................................................... 103
MixedEnvironments................................................................ 105
DefiningaReplicationStrategy ......................................................... 107
ReplicationSurvey.................................................................. 108
ReplicationResourceRequirements ................................................... 108
UsingReplicationforHighAvailability ............................................... 109
UsingReplicationforLocalAvailability ............................................... 110
UsingReplicationforLoadBalancing ................................................. 110
ExampleofNetworkLoadBalancing ............................................... 111
ExampleofLoadBalancingforImprovedPerformance ............................... 113
ExampleReplicationStrategyforaSmallSite .......................................... 114
ExampleReplicationStrategyforaLargeSite .......................................... 114
UsingReplicationwithotherDirectoryFeatures........................................... 115
ReplicationandAccessControl....................................................... 115
ReplicationandDirectoryServerPlug-ins ............................................. 115
ReplicationandDatabaseLinks ...................................................... 116
SchemaReplication ................................................................. 117
Chapter 7 Designing a Secure Directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
AboutSecurityThreats ................................................................ 119
UnauthorizedAccess ............................................................... 120
UnauthorizedTampering............................................................ 120
DenialofService ................................................................... 121
AnalyzingYourSecurityNeeds ......................................................... 121
DeterminingAccessRights .......................................................... 122
EnsuringDataPrivacyandIntegrity .................................................. 122
ConductingRegularAudits.......................................................... 123
ExampleSecurityNeedsAnalysis .................................................... 123
OverviewofSecurityMethods .......................................................... 124
SelectingAppropriateAuthenticationMethods ........................................... 124
AnonymousAccess ................................................................. 125