AdministeringEdit online The administration topics describes how to perform administrator tasks through the Web Administration Tool and the command line. Directory overviewYou can know more about directory overview through the information provided here. Further, you can also learn about defining a directory, distinguished names, and IBM® Security Verify Directory.Server AdministrationYou can know more about server administration through the information provided here. Further you can also learn about directory administration, configuration mode, Web Administration Tool, IBM® Directory Schema and many more.Directory ManagementYou can know more about directory management through the information provided here. Further, you will also learn in detail about working with directory entries, access controls, managing search limits, and managing proxy authorizations.User-related tasksYou can learn in detail about realms, templates, users and groups using the information provided here.Error codesThe possible values for an LDAP error code are shown in the tables provided here.Object Identifiers (OIDs) and attributes in the root DSEThe OIDs and attributes discussed in the provided sections are used in IBM® Security Directory Server 10.0.4.LDAP data interchange format (LDIF)The information provided here describes the LDAP Data Interchange Format (LDIF), as used by the idsldapmodify, idsldapsearch, and idsldapadd utilities.ASCII characters from 33 to 126The table provided here shows ASCII characters from 33 to 126. These are the characters that can be used in the encryption seed string.IPv6 supportYou can learn more about IPv6 support through the information provided here.Simple Network Management Protocol agentYou can know in detail about Simple Network Management Protocol agent through the information provided here.Additional information on password policyYou can know more about additional information on password policy through the information provided here.Required attribute definitions for IBM Security Verify DirectoryYou can use the example provided here to know more about required attribute definitions for IBM® Security Verify Directory.Synchronizing two-way cryptography between server instancesYou can use the procedure provided here to synchronize two-way cryptography between server instances.Filtered ACLs and non-filtered ACLs – sample LDIF fileYou can use the information provided here to have a complete understanding of the ACL models, an administrator can best learn through hands on trial. Create sample data with sample ACLs for your directory and check the effective ACLs of each of the entries to ensure that the ACL scheme is correct for the required access.Dynamically-changed attributesYou can read the list of attributes that can be changed dynamically. IBM Security Directory Server backup and restoreYou can know more about IBM® Security Verify Directory backup and restore through reading the information provided here.Setting up SSL security – SSL scenariosYou can make use of the conditions assumed to set up SSL security – SSL scenarios.High Availability ScenariosYou can know in detail about High Availability Scenarios through the information provided here.Referential integrity plug-inYou can know more about referential integrity plug-in and the commands that can be used through the information provided here.Guidelines for interoperability between IBM Security Verify Directory and z/OS IBM Security Verify DirectoryYou can use the information provided here to consider the points when setting up a mixed platform environment where an LDAP directory is being replicated between Security Verify Directory on Linux™, Unix, or Windows™ platforms and z/OS® IBM® Security Verify Directory.LDAPSyncThe LDAPSync solution provides both migration and synchronization services from one or more source systems, such as Sun Directory Server and Active Directory, to a target LDAP directory server. This solution is created with IBM® Security Verify Directory as the target.Last Successful Authentication Time Stamp plug-inYou can record the time stamp that corresponds to the last successful authentication for a user so that you can display it on a web portal or implement security policies.