This view represents the inheritance relationships between configuration components.
Jump To:
Authorization and Policies, Core, Data Sources, LDAP (Administration and Monitoring), Logging, Monitoring, and Notifications, SCIM, Security and Authorization, System, Topology, Web Services and Applications
Authorization and Policies
Access Token Validator
OAuth2 Scope
Policy
Policy Advice
Policy Information Provider
Policy Obligation
Policy Rule
Policy Service
Policy Set
Policy Variable Definition
Token Resource Lookup Method
Core
DN Map
Recurring Task
Recurring Task Chain
Data Sources
Correlation Attribute Pair
External Server
LDAP Health Check
Load Balancing Algorithm
Secondary Store Adapter
Store Adapter
Store Adapter Plugin
LDAP (Administration and Monitoring)
Access Control Handler
Backend
Certificate Mapper
Cipher Stream Provider
Crypto Manager
Custom Logged Stats
Identity Mapper
Password Policy
Password Storage Scheme
Plugin
Plugin Root
Root DN
Root DN User
SASL Mechanism Handler
Logging, Monitoring, and Notifications
Alarm Manager
Alert Handler
Custom Logged Policy Request Attribute
Debug Target
Gauge
Gauge Data Source
LDAP SDK Debug Logger
Log File Rotation Listener
Log Publisher
Log Retention Policy
Log Rotation Policy
Monitor Provider
SCIM
SCIM Attribute
SCIM Resource Type
SCIM Schema
SCIM Subattribute
Store Adapter Mapping
Security and Authorization
Obscured Value
System
Connection Handler
Global Configuration
Key Manager Provider
Key Pair
Location
Trust Manager Provider
Trusted Certificate
Velocity Context Provider
Velocity Template Loader
Topology
Inter Server Authentication Info
License
Secret Key
Server Group
Server Instance
Server Instance Listener
Topology Admin User
Web Services and Applications
HTTP Configuration
HTTP Servlet Cross Origin Policy
HTTP Servlet Extension
Web Application Extension