The is used to interact with administration tools using LDAP. It is a dedicated entry point for administration. ds-cfg-administration-connector top Specifies the address or set of addresses on which this should listen for connections from LDAP clients. Multiple addresses may be provided as separate values for this attribute. If no values are provided, then the listens on all interfaces. 0.0.0.0 ds-cfg-listen-address Specifies the name of the key manager that is used with the . The referenced key manager provider must be enabled. ds-cfg-key-manager-provider Specifies the name of the trust manager that is used with the . The referenced trust manager provider must be enabled. ds-cfg-trust-manager-provider Specifies the nicknames (also called the aliases) of the keys or key pairs that the should use when performing SSL communication. The property can be used multiple times (referencing different nicknames) when server certificates with different public key algorithms are used in parallel (for example, RSA, DSA, and ECC-based algorithms). When a nickname refers to an asymmetric (public/private) key pair, the nickname for the public key certificate and associated private key entry must match exactly. A single nickname is used to retrieve both the public key and the private key. Let the server decide. ds-cfg-ssl-cert-nickname Specifies the names of the SSL protocols that are allowed for use in SSL or StartTLS communication. Changes to this property take effect immediately but only impact new SSL/TLS-based sessions created after the change. Uses the default set of SSL protocols provided by the server's JVM. ds-cfg-ssl-protocol Specifies the names of the SSL cipher suites that are allowed for use in SSL communication. Changes to this property take effect immediately but will only impact new SSL/TLS-based sessions created after the change. Uses the default set of SSL cipher suites provided by the server's JVM. ds-cfg-ssl-cipher-suite