Identifies entities that manage one or more resources and provide access to those resources through a communications protocol.
server
Class Flags |
Setting |
---|---|
Container |
Off |
Effective |
Off |
Nonremovable |
On |
Ambiguous Naming |
Off |
Ambiguous Container |
Off |
Auxiliary Class |
Off |
Rule |
Class/Attribute |
Defined For |
---|---|---|
Super Classes |
Server |
|
Containment |
Server Server Server |
|
Named By |
Server |
Server |
Inherited from Top |
---|---|
Server |
|
---|---|
Inherited from Top |
|
---|---|
Object Name |
Default Rights |
Affected Attributes |
Class Defined For |
---|---|---|---|
[Creator] |
Supervisor |
[Entry Rights] |
|
[Public] |
Read |
Network Address |
Server |
[Self] |
Supervisor |
[Entry Rights] |
Server |
For help in understanding the class definition template, see Reading Class Definitions.
The Host Device attribute identifies the device that hosts the server. This is usually a computer, but it might be some other device. For example, a printer could host a built-in print server.
The Private Key and Public Key attributes are present if the server is a client of eDirectory Authentication Services. The Resource attribute contains a list of resources managed by this service.
The User attribute contains a list of objects that are authorized to use this server. The server must determine if the user list is to be maintained by an administrator, or if the list is automatically generated by the server. If the user list is used by the server as an access control list, the administrator will usually maintain the list. If the user list is purely informational, reflecting access control information stored elsewhere, the server usually maintains the list.