Maintenance involves preserving the links and processing within and between servers. This section provides procedures for maintaining ILS, including startup and shutdown, accounts administration, configuring with administrative tools, log-file maintenance, and backup. Use these procedures to keep ILS running and available to clients.
iiiiiiiiiiiiAlthough ILS services are configured to start automatically when you turn on the computer, they can be manually stopped and restarted. However, while ILS is operating, stopping and restarting the service must be done carefully so that connected users are not affected.
Starting and stopping ILS involves the following services:
Note The WWW service must be running to support Intel Internet Phone clients.
Starting and stopping the ILS involves the following tasks:
The following are procedures for each task.
With this procedure you can start the ILS service through Internet Service Manager (ISM) either on a local or remote computer.
To manually start the LDAP and WWW services using ISM
To manually start the LDAP and WWW services from the command line
Net start ldapsvc
Net start w3svc
Note You must start the LDAP service before using the ILS server component.
With this procedure you can manually stop the LDAP and WWW services.
To manually stop the LDAP and WWW services using ISM
You can stop ILS from the command line by using these instructions:
To manually stop the LDAP and WWW services from the command line
Net stop ldapsvc
Net stop w3svc
With these procedures you can manually start or stop the ILS service.
To manually start or stop ILS using ISM
To manually start or stop ILS using inetcfg
inetcfg LDAP Set_ILS_Settings ClientTTL EnableULS {0 | 1} MaxUsers [ServerName]
|
Parameter |
Description |
|
ClientTTL |
Maximum length of time a client remains in the ILS database (in minutes). |
|
Enable ULS |
Enables or disables the User Location Service (ULS) of ILS. A setting of 1 enables ULS; a setting of 0 disables ULS. |
|
MaxUsers |
Maximum number of registered users supported by this ILS server. If this maximum is reached, new entries are refused. |
|
ServerName |
The name of the server to process the command. If you do not specify a server name, the command is processed by the current server. |
inetcfg LDAP Set_ILS_Settings 60 1 1024 server01
The example sets the ILS time-to-live default to 60 minutes, enables ULS, sets the maximum number of registered users to 1,024, and establishes itself on the server01 server.
Note For the settings to take effect, the LDAP service must be stopped and restarted.
From one ISM station, you can control IIS on any other computer on the LAN. To do this, you must have administrator privileges on the computers that are hosting the services you want to start or stop.
To start or stop multiple servers using ISM
iiiiiAs with other Microsoft Internet services, ILS relies heavily on the security and access control features built into Microsoft Windows NT Server and IIS. This section describes an approach to managing the accounts, permissions, access rights, domains, and other security-related issues for ILS.
To control access to the ILS database, you will need to set up administrator rights as well as specify which users and computers can access the ILS directory information. To do this, you can use Internet Service Manager and Windows NT Server User Manager. You may want to control access to ILS by way of the HTTP or LDAP interface using an authentication provider. i
The ILS service also supports secure communication via the Secure Sockets Layer (SSL) protocol. Installing a certificate for ILS enables SSL for LDAP communication to the ILS server. The SSL port number is 636. For more information about SSL support, see the IIS documentation.
Administering security and access involves the following tasks:
Following are procedures for these tasks.
With this procedure you can specify the authentication necessary for clients to use ILS. You can also set security options by using ISM.
To set ILS security options using ISM
Note The Basic (No Encryption) item is provided with the overall LDAP service, but does not govern settings in ILS-only installations.
With this procedure a client computer can be granted or denied access based on its IP address. You can also configure computer access control by using ISM.
To grant or deny access to the LDAP Service
Authentication provides facilities to register new users, authenticate existing users, authorize access to areas of the service on a controlled basis, and generate billing events for processing by an external billing engine. Using a system of authentication allows an account to maintain a single user ID/password identity across all services and enables use of standard system services for controlling, auditing, and managing content rights.
ILS supports LDAP SSL through port 636. Any SSL configured client can open an SSL connection to the ILS server through this port. After you install ILS, you can use Microsoft Internet Service Key Manager to create a new key and add a certificate for SSL. After you create the new key, submit it to your certification authority. When you receive a valid key certificate, you then import into Key Manager to associates it with the key you created earlier.
For information about using Key Manager, see the documentation for Microsoft Internet Service Manager. For more information about SSL, see the documentation for Microsoft Internet Information Server version 3.0.
Configuring ILS involves setting and updating the partitions and partition sources. ILS includes two administration tools:
To run ISM LDAP Service Properties
For a complete description of the fields on the ISM LDAP Service Properties pages, see Chapter 4 in the Internet Locator Server Operations Reference.i
To run Inetcfg
Note For a list of all the commands relevant to ILS, type inetcfg LDAP at the command prompt.
All ILS inetcfg commands use the same general syntax. For a complete description of the inetcfg command line tool for ILS, see Chapter 4 in the Internet Locator Server Operations Reference.
Configuring ILS involves the following tasks:
The following sections contain procedures for accomplishing each task.
Web pages can be built to add, modify, and delete entries online. For information about using Web pages to manage ILS database entries, see the Internet Locator Server Web Page Authors Guide.
If you expect a high volume of traffic coming through your ILS server, you should set a higher value for the maximum number of connections from clients.
This setting represents the maximum number of connections from all sources to the ILS server. You can set the Maximum Connections option on the Service tab for LDAP Service Properties in ISM and using inetcfg.
To set ILS connection parameters using ISM
To set ILS connection parameters using Inetcfg
inetcfg LDAP Set_ILS_Settings ClientTTL EnableULS {0 | 1} MaxUsers [ServerName]
|
Parameter |
Description |
|
ClientTTL |
Maximum length of time a client remains in the ILS database (in minutes). |
|
Enable ULS |
Enables or disables the User Location Service (ULS) of ILS. A setting of 1 enables ULS; a setting of 0 disables ULS. |
|
MaxUsers |
Maximum number of registered users supported by this ILS server. If this maximum is reached, new entries are refused. |
|
ServerName |
The name of the server to process the command. If you do not specify a server name, the command is processed by the current server. |
inetcfg LDAP Set_ILS_Settings 60 1 1024 server01
The example sets the ILS time-to-live default to 60 minutes, enables ULS, sets the maximum number of registered users to 1,024, and establishes itself on the server01 server.
Internet Locator Server gives users the ability to store real-time information about themselves (for example, their current IP address) in a dynamic directory. Other users can then use this information to make direct connections over the Internet. ILS can be administered from ISM or inetcfg.
Note The LDAP service must already be running for Microsoft NetMeeting or Intel Internet Phone clients to connect to the ILS server.
To configure Internet Locator Server using ISM
Use the following procedures to configure ILS using inetcfg.
To enable or disable ILS
inetcfg LDAP Enable_ILS_Server EnableILS {0 | 1} [ServerName]
|
Parameter |
Description |
|
EnableILS |
A setting of 0 disables ILS support on the specified server. A setting of 1 enables ILS support on the specified server. |
|
ServerName |
The name of the server to process the command. If you do not specify a server name, the command is processed by the current server. |
inetcfg LDAP Enable_ILS_Server 1
The example enables the ILS server.
To specify ILS refresh intervals (TTL) or the maximum registered users
inetcfg LDAP Set_ILS_Settings ClientTTL Enable ULS {0 | 1} MaxUsers [ServerName]
|
Parameter |
Description |
|
ClienltTTL |
Maximum length of time a client remains in the ILS database (in minutes). |
|
Enable ULS |
Enables or disables the User Location Service (ULS) of ILS. A setting of 1 enables ULS; a setting of 0 disables ULS. |
|
MaxUsers |
Maximum number of registered users supported by this ILS server. If this maximum is reached, new entries are refused. |
|
ServerName |
The name of the server to process the command. If you do not specify a server name, the command is processed by the current server. |
inetcfg LDAP Set_ILS_Settings 60 1 1024 server01
The example sets the ILS time-to-live default to 60 minutes, enables ULS, sets the maximum number of registered users to 1,024, and establishes itself on the server01 server.
Note If you change MaxUsers, you must restart the ILS service for changes to take effect.
To view the current ILS settings
inetcfg LDAP Get_ILS_Settings [ServerName]
ServerName is the name of the server to process the command. If you do not specify a server name, the command is processed by the current server.
inetcfg LDAP Get_ILS_Settings server01
The example retrieves and displays the ILS settings on the server01 server.
Maintaining data and logs involves servicing the output mechanisms of ILS. The output provides an audit record of ILS processes, in the form of transaction logs and data files.
ILS can be configured to generate entries in a log file or database when significant events occur. There are two types of log files:
Because the transaction logs occupy disk space, you must occasionally remove the transaction logs. If you want to save the data in the logs, copy the files to an archival location. Then delete the log files. To minimize disk space taken up by transaction logs, turn on logging only when you need it.
You can use the ISM, Web-based, or inetcfg administration tools to configure the ILS transaction log settings. This process is described in "ISM Admin Tool" in Chapter 4 of the Internet Locator Server Operations Reference.
Log-file and data-file maintenance involves the following tasks:
Following are procedures for these tasks.
ILS can create a log entry for every directory transaction that it processes. You can have ILS create new log files on a daily, weekly, or monthly basis, or whenever the file size grows beyond a certain point. You can have ILS create log entries in a file or an ODBC database.
When ILS is set up to log transactions to files, the file names represent the date on which the log was created. For example, a log file created on July 27, 1996 would be named Jn960727.log.
Note You can use any text editor to view the ILS transaction logs.
iILS creates Windows NT event log entries when significant events occur. You can use Windows NT Event Viewer application to view these event logs. Transaction logs coupled with Windows NT event logs are the primary methods for monitoring the health of the ILS system.i
To view Windows NT event logs
ILS can record significant event notifications in a system file or an SQL database. The SQL Server must be prepared to receive the log entries. For information about setting up SQL to receive ILS log entries, see the SQL documentation. Log settings can be controlled from ISM.
To modify log settings using ISM
|
Field |
Description |
|
ODBC Data Source Name |
The name to be recorded in the database as the source of the logging information. |
|
Table |
The table into which logging information should be inserted. |
|
User Name |
The name of a user with sufficient privileges to create log entries on the database computer. |
|
Password |
The password for the specified user. |