Directory server application components

IBM® Security Verify Directory interacts with various application components to query and retrieve data. You must tune each application component for optimal performance.

The following figure illustrates how IBM Security Verify Directory components interact with each other. Tuning these components results in improved performance.

Figure 1. IBM Security Verify Directory components

Directory server components

The arrows in the figure represent the interaction path for a query that is issued from a client computer. The query follows a path from the IBM Security Verify Directory client to the server, to DB2®, to the physical disks in search of the entries that meets the search filter criteria. The shorter the path to matching entries, the better overall performance you can expect from your system.

For example, if a query locates all the matching entries in a server, access to DB2 and the disks is not necessary. If the matching entries are not found in the server, the query continues on to DB2 and, if necessary, to the physical disks. From a performance standpoint, it is better to allocate a significant amount of memory to the server caches and setting the DB2 buffer pools to AUTOMATIC. Otherwise, the server might take considerable amount of time and resources to retrieve data from disk.