Home
last modified time | relevance | path

Searched refs:SECT (Results 1 – 25 of 56) sorted by relevance

123

/netbsd-src/external/bsd/openldap/dist/doc/guide/admin/
H A Dappendix-changes.sdf15 * {{SECT:When should I use LDAP?}}
16 * {{SECT:When should I not use LDAP?}}
17 * {{SECT:LDAP vs RDBMS}}
18 * {{SECT:Access Control}}
19 * {{SECT:Backends}}
20 * {{SECT:Overlays}}
21 * {{SECT:Replication}}
22 * {{SECT:Maintenance}}
23 * {{SECT:Monitoring}}
24 * {{SECT:Tuning}}
[all …]
H A Dquickstart.sdf64 In particular, the {{SECT:Building and Installing OpenLDAP Software}}
91 and/or actually read the {{SECT:Building and Installing OpenLDAP Software}}
181 in the {{slapd-config}}(5) manual page and the {{SECT:Configuring
216 {{SECT:Running slapd}} chapter of this document.
272 in the {{SECT:Database Creation and Maintenance Tools}} chapter of
295 Access controls are discussed in the {{SECT:Access Control}} chapter.
296 You are also encouraged to read the {{SECT:Security Considerations}},
297 {{SECT:Using SASL}} and {{SECT:Using TLS}} sections.
H A Dbackends.sdf45 It is heavily used by a lot of other {{SECT: Backends}} and {{SECT: Overlays}}.
50 other {{SECT: Backends}} and {{SECT: Overlays}}. Some of them merely provide a
54 For example, the {{SECT: Translucent Proxy}}, which retrieves entries from a
59 Other {{SECT: Overlays}} allow you to tag directives in front of a normal
70 {{SECT: Push Based}} {{SECT: Replication}} section of the guide.
89 {{SECT: Mirror mode replication}}.
246 See the {{SECT:Monitoring}} section.
299 Please see the {{SECT: Monitoring}} section for complete examples of information
461 several limitations. Please see {{SECT: LDAP vs RDBMS}} for discussion.
H A Dmonitoringslapd.sdf24 or with specialized monitoring tools. The {{SECT:Accessing Monitoring
27 {{SECT:Monitor information}} section details monitoring information
33 {{slapd.conf}}(5). The former is discussed in the {{SECT:Monitor
35 latter is discussed in the {{SECT:Monitor configuration via
40 modules is discussed in the {{SECT:Configuring slapd}} and {{SECT:The
86 Control Directive}} section of the {{SECT:The slapd Configuration
91 in the {{SECT:Accessing Monitoring Information}} section of this
379 using {{SECT: Monitor search example}}
H A Ddbtools.sdf33 As described in the {{SECT:General Database Directives}} section,
90 {{SECT:The slapd Configuration File}} section for more information
143 As described in the {{SECT:General Database Directives}} section,
173 {{SECT:The slapd Configuration File}} section for more information
190 add in text form (described below in the {{SECT:The LDIF text entry
210 levels are the same as for slapd. See the {{SECT:Command-Line
211 Options}} section in {{SECT:Running slapd}}.
H A Dmaintenance.sdf75 Obviously this doesn't cater for any complicated deployments with {{SECT: N-Way Multi-Provider}},
77 {{SECT: Troubleshooting}} section.
H A Dpreface.sdf17 document is subject to terms of conditions set forth in {{SECT:OpenLDAP
18 Software Copyright Notices}} and the {{SECT:OpenLDAP Public License}}.
H A Dsecurity.sdf29 restrict remote access, it is recommend that an {{SECT:IP Firewall}}
32 See {{SECT:Command-line Options}} and {{slapd}}(8) for more
79 See the {{SECT:Using TLS}} chapter for more information. StartTLS
84 and confidentiality protection. See the {{SECT:Using SASL}} chapter
110 See the {{SECT:Access Control}} section for more information.
170 mechanism. The {{SECT:Using SASL}} section discusses the use of SASL.
H A Dappendix-recommended-versions.sdf10 Please read the {{SECT:Prerequisite software}} section for more
H A Dreplication.sdf296 For configuration, please see the {{SECT:Syncrepl}} section.
351 For configuration, please see the {{SECT:Delta-syncrepl}} section.
394 For configuration, please see the {{SECT:N-Way Multi-Provider}} section below
427 For configuration, please see the {{SECT:Mirror mode}} section below
439 ({{SECT: Backends}} and {{slapd-ldap(8)}}). Instead of running the
444 For configuration, please see the {{SECT:Syncrepl Proxy}} section.
589 {{SECT:syncrepl}} section of {{SECT:The slapd Configuration File}}
834 must exactly match the URLs {{slapd}} listens on ({{-h}} in {{SECT:Command-Line Options}}).
862 {{SECT:Set up the provider slapd}} section.
864 Here's a specific cut down example using {{SECT:LDAP Sync Replication}} in
[all …]
H A Dsasl.sdf65 DIGEST-MD5. Use of {{SECT:DIGEST-MD5}} is discussed below.
71 and large enterprises. Use of {{SECT:GSSAPI}} and {{SECT:KERBEROS_V4}}
78 TLS is discussed in the {{SECT:Using TLS}} chapter.
102 The second step is described in the section {{SECT:Mapping
160 mapped before use. See the section {{SECT:Mapping Authentication
224 alternatively, mapped prior to use. See the section {{SECT:Mapping
279 See {{SECT: Mapping Authentication Identities}} below for information
299 {{EX:-X}}) was provided. Unless you are attempting {{SECT:SASL
327 Refer to the {{SECT:Using TLS}} chapter for details.
/netbsd-src/external/ibm-public/postfix/dist/mantools/
H A Dsrctoman14 [0-9]) SECT=$1;;
68 s/^.*$/.TH & '"$SECT"'\
H A Dmansect14 [0-9]) SECT=$1;;
/netbsd-src/external/gpl3/binutils.old/dist/ld/
H A Dldgram.h152 SECT = 353, /* SECT */ enumerator
292 #define SECT 353 macro
H A Dldgram.y153 %token CHIP LIST SECT ABSOLUTE LOAD NEWLINE ENDWORD ORDER NAMEWORD ASSERT_K
224 | SECT NAME ',' exp
226 | SECT NAME exp
228 | SECT NAME '=' exp
/netbsd-src/external/gpl3/binutils/dist/ld/
H A Dldgram.h156 SECT = 357, /* SECT */ enumerator
300 #define SECT 357 macro
H A Dldgram.y156 %token CHIP LIST SECT ABSOLUTE LOAD NEWLINE ENDWORD ORDER NAMEWORD ASSERT_K
227 | SECT NAME ',' exp
229 | SECT NAME exp
231 | SECT NAME '=' exp
/netbsd-src/external/gpl3/binutils/dist/bfd/
H A Dcoff-tic4x.c55 #define RELOC_PROCESSING(RELENT,RELOC,SYMS,ABFD,SECT)\ argument
56 tic4x_reloc_processing (RELENT,RELOC,SYMS,ABFD,SECT)
/netbsd-src/external/bsd/openldap/dist/doc/guide/release/
H A Dcopyright.sdf23 modification, are permitted {{only as authorized}} by the {{SECT:OpenLDAP
55 modification, are permitted only as authorized by the {{SECT:OpenLDAP
/netbsd-src/external/gpl3/binutils.old/dist/bfd/
H A Dcoff-tic4x.c55 #define RELOC_PROCESSING(RELENT,RELOC,SYMS,ABFD,SECT)\ argument
56 tic4x_reloc_processing (RELENT,RELOC,SYMS,ABFD,SECT)
/netbsd-src/external/bsd/jemalloc/dist/include/jemalloc/internal/
H A Dprivate_symbols.sh48 ($3 ~ /^SECT[0-9]+/ && $(NF-2) == "External" && !($NF in exported_symbols)) {
/netbsd-src/external/gpl3/gcc.old/dist/gcc/
H A Doutput.h501 #define SECTION_STYLE(SECT) ((SECT)->common.flags & SECTION_STYLE_MASK) argument
/netbsd-src/external/gpl3/gcc/dist/gcc/
H A Doutput.h518 #define SECTION_STYLE(SECT) ((SECT)->common.flags & SECTION_STYLE_MASK) argument
/netbsd-src/external/gpl3/binutils/dist/include/coff/
H A Dti.h523 #define SECTION_RELATIVE_ABSOLUTE_SYMBOL_P(RELOC, SECT) \ argument
524 ((*(RELOC)->sym_ptr_ptr)->section->output_section == (SECT) \
/netbsd-src/external/gpl3/binutils.old/dist/include/coff/
H A Dti.h523 #define SECTION_RELATIVE_ABSOLUTE_SYMBOL_P(RELOC, SECT) \ argument
524 ((*(RELOC)->sym_ptr_ptr)->section->output_section == (SECT) \

123