This view represents the inheritance relationships between configuration components.
Jump To:
Authorization and Policies, Data Sources, LDAP (Administration and Monitoring), Logging, Monitoring, and Notifications, SCIM, System, Topology, Web Services and Applications
Authorization and Policies
Access Token Validator
Advice
Impacted Attributes Provider
Key Pair
Policy Configuration Key
Policy Decision Service
Token Resource Lookup Method
Trusted Certificate
Data Sources
Correlation Attribute Pair
External Server
LDAP External Server Template
LDAP Health Check
Load Balancing Algorithm
Secondary Store Adapter
Store Adapter
Store Adapter Plugin
LDAP (Administration and Monitoring)
Access Control Handler
Backend
Certificate Mapper
Cipher Stream Provider
Crypto Manager
Custom Logged Stats
DN Map
Failure Lockout Action
Identity Mapper
Password Policy
Password Storage Scheme
Plugin
Plugin Root
Root DN
Root DN User
SASL Mechanism Handler
Vault Authentication Method
Logging, Monitoring, and Notifications
Alarm Manager
Alert Handler
Debug Target
Gauge
Gauge Data Source
LDAP SDK Debug Logger
Log File Rotation Listener
Log Publisher
Log Retention Policy
Log Rotation Policy
Monitor Provider
Monitoring Endpoint
SCIM
SCIM Attribute
SCIM Resource Type
SCIM Schema
SCIM Subattribute
Store Adapter Mapping
System
Connection Handler
Global Configuration
Key Manager Provider
Location
Obscured Value
Recurring Task
Recurring Task Chain
Trust Manager Provider
Velocity Context Provider
Velocity Template Loader
Topology
Inter Server Authentication Info
License
Secret Key
Server Group
Server Instance
Server Instance Listener
Topology Admin User
Web Services and Applications
Error Template
Gateway API Endpoint
HTTP Configuration
HTTP Servlet Cross Origin Policy
HTTP Servlet Extension
Sideband API Endpoint
Sideband API Shared Secret
Web Application Extension