HjemGrupperSnakMereZeitgeist
Søg På Websted
På dette site bruger vi cookies til at levere vores ydelser, forbedre performance, til analyseformål, og (hvis brugeren ikke er logget ind) til reklamer. Ved at bruge LibraryThing anerkender du at have læst og forstået vores vilkår og betingelser inklusive vores politik for håndtering af brugeroplysninger. Din brug af dette site og dets ydelser er underlagt disse vilkår og betingelser.

Resultater fra Google Bøger

Klik på en miniature for at gå til Google Books

Indlæser...

Understanding and Deploying Ldap Directory Services (Macmillan Network Architecture and Development Series)

af Tim Howes

Andre forfattere: Se andre forfattere sektionen.

MedlemmerAnmeldelserPopularitetGennemsnitlig vurderingSamtaler
1061256,575 (4.63)Ingen
Lightweight Directory Access Protocol (LDAP) is the standard for directory information access and is the underlying protocol for a variety of email systems, Web systems, and enterprise applications. LDAP enables central management of users, groups, devices, and other data, thereby simplifying directory management and reducing the total cost of ownership. Understanding and Deploying LDAP Directory Services , written by the creators of the protocol, is known as the LDAP bible and is the classic text for learning about LDAP and how to utilize it effectively. The Second Edition builds on this success by acting as an exhaustive resource for designing, deploying, and maintaining LDAP directory services. Topics such as implementation pitfalls, establishing and maintaining user access to information, troubleshooting, and real-world scenarios will be thoroughly explored.… (mere)
Ingen
Indlæser...

Bliv medlem af LibraryThing for at finde ud af, om du vil kunne lide denne bog.

Der er ingen diskussionstråde på Snak om denne bog.

Indeholder "Acknowledgments", "About the Authors", "About the Technical Reviewers", "Contents at a Glance", "Contents", "Preface", "The Book's Organization", "The Book's Audience", "Contacting Us", "Part I. An Introduction to Directory Services and LDAP", "1. Directory Services Overview", " What Is a Directory", " Directories Are Dynamic", " Directories Are Flexible", " Flexible Content", " Flexible Organization", " Directories Can Be Secure", " Directories Can Be Personalized", " Directory Described", " Read-to-Write Ratio", " Information Extensibility", " Data Distribution", " Data Replication", " Performance", " Standards and Interoperability", " Directory Description Summary", " What Can a Directory Do for You", " Finding Things", " Managing Things", " Lightweight Database Applications", " Security Applications", " What a Directory Is Not", " Databases Comparison", " File System Comparison", " Web Server Comparison", " FTP Server Comparison", " DNS Server Comparison", " The Complementary Directory", " Directory Services Overview Checklist", " Further Reading", " Looking Ahead", "2. A Brief History of Directories", " Prehistory and Early Electronic Directories", " Early Electronic Directories", " Distributed Computing Research and the Grapevine System", " The Arrival of the Internet", " Application-Specific and Special-Purpose Directories", " Application-Specific Directories", " Centralized Internet Directories", " Network Operating System Directories", " Novell Directory Services", " Microsoft's Active Directory", " Status of NOS Directories", " General-Purpose Standards-Based Directories", " The Dawn of Standard Directories: X.500", " X.500 Innovations", " X.500 Flaws", " Early X.500 Implementations and Pilots", " The Status of X.500 Directories Today", " The Creation and Rise of LDAP", " Forerunners of LDAP: DIXIE and DAS", " The Creation of LDAP", " LDAP Innovations", " Early LDAP Implementations", " LDAP as a Standalone Directory Service", " LDAP Momentum", " LDAP Version 3 Developed", " Status of LDAP Directories Today", " Other Standards-Based General-Purpose Directories", " CSO Nameserver", " Competitors to LDAP", " Directory Services Future", " Metadirectories as an Important Product Directory Category", " Tighter Operating System Integration", " Directories Are Making Operating Systems Less Important", " LDAP as a Database Access Protocol", " LDAP's Continued Dominance", " Directories Are Becoming Truly Ubiquitous", " Conclusion", " Directory Services Time Line", " Further Reading", " Looking Ahead", "3. An Introduction to LDAP", " What Is LDAP?", " What Can LDAP Do for You?", " How Does LDAP Work?", " The LDAP Protocol on the Wire", " The LDAP Models", " The LDAP Information Model", " Maintaining Order: Directory Schemas", " The LDAP Naming Model", " Why Is Naming Important?", " Messy RDN Topics: Multivalued RDNs and Quoting", " Aliases", " The LDAP Functional Model", " The LDAP Interrogation Operations", " Equality Filters", " Approximate Filters", " "Greater Than or Equal To" and "Less Than or Equal To" Filters", " Presence Filters", " Extensible Matching", " Negation", " Combining Filter Terms", " Quoting in Search Filters", " Specifying Which Attributes Are to Be Returned", " Common Types of Searches", " Hiding LDAP Filters from Users", " The LDAP Update Operations", " The LDAP Authentication and Control Operations", " The LDAP Security Model", " Access Control Models", " SSL AND TLS", " LDAP APIs", " An Overview of the C LDAP API", " Other LDAP APIs", " LDIF", " LDIF Representation of Directory Entries", " LDIF Update Statements", " LDAP and Internationalization", " LDAP Overview Checklist", " Further Reading", " Looking Ahead", "Part II. Designing Your Directory Service", "4. Directory Road Map", " The Directory Life Cycle", " Design", " Deployment", " Maintenance", " Directory Design Checklist", " Further Reading", " Looking Ahead", "5. Defining Your Directory Needs", " An Overview of the Directory Needs Definition Process", " Analyzing Your Environment", " Determining and Prioritizing Application Needs", " Choosing an Overall Directory Design and Deployment Approach", " Setting Goals and Milestones", " Analyzing Your Environment", " Organizational Structure and Geography", " Computer Systems", " The Network", " Application Software", " Users", " System Designers and Administrators", " The Political Climate", " Resources", " Determining and Prioritizing Application Needs", " Data", " Performance", " Availability", " Level of Service", " Security", " Prioritizing Application Needs", " Determining and Prioritizing Users' Needs and Expectations", " Asking Your Users", " Accuracy and Completeness of Data", " Privacy", " Audience", " The Relationship of User Needs to Application Needs", " Prioritizing Your Users' Needs", " Determining and Prioritizing Deployment Constraints", " Resources", " Openness of the Process", " Skills of the Directory System Designers", " Skills and Needs of System Administrators", " The Political Climate", " Prioritizing Your Deployment Constraints", " Determining and Prioritizing Other Environmental Constraints", " Computing Hardware and Software", " The Network", " Criticality of Service", " Security", " Coexistence with Other Databases and Directories", " Prioritizing Your Environmental Constraints", " Choosing an Overall Directory Design and Deployment Approach", " Matching the Prevailing Philosophy", " Taking Constraints into Account", " Favoring Simple Solutions over Complex Ones", " Focusing on Your Most Important Needs", " The Bottom Line", " Setting Goals and Milestones", " Goals", " Milestones", " Recommendations for Setting Goals and Milestones", " Defining Your Directory Needs Checklist", " Further Reading", " Looking Ahead", "6. Data Design", " Data Design Overview", " Common Data-Related Problems", " Creating a Data Policy Statement", " Identifying Which Data Elements You Need", " General Characteristics of Data Elements", " Format", " Size of Data Values", " Number of Occurences", " Data Ownership", " Consumers", " Dynamic Versus Static Data Elements", " Shared Versus Application-Specific Data Elements", " Relationships with Other Data Elements", " A Data Element Characteristics Example", " Sources of Data", " Other Directory Services and Network Operating Systems", " Databases", " Files", " Applications", " Administrators", " End Users", " Maintaining Good Relationships with Other Data Sources", " Replication", " Synchronization", " Batch Updates", " Political Considerations", " Data Design Checklist", " Further Reading", "7. Schema Design", " The Purpose of a Schema", " Elements of LDAP Schemas", " Attributes", " Attribute Hierarchies", " Attribute Syntaxes and Matching Rules", " Object Classes", " An Object Class Example", " The Presence of Multiple-Object Classes", " Object Class Inheritance", " The LDAPv3 extensibleObject Object Class", " Schema Element Summary", " Directory Schema Formats", " The slapd.conf Schema Format", " slapd.conf Attribute Type Definitions", " slapd.conf Object Class Definitions", " The ASN.1 Schema Format", " ASN.1 Type Definitions", " ASN.1 Object Class Definitions", " The LDAPv3 Schema Format", " LDAPv3 Attribute Type Definitions", " LDAPv3 Object Class Definitions", " The Schema-Checking Process", " Schema Design Overview", " A Few Words about Schema Configuration", " The Relationship of Schema Design to Data Design", " Let's Call the Whole Thing Off", " Sources of Predefined Schemas", " Directory-Enabled Applications", " Standard Schemas", " Schemas Provided by Directory Vendors", " Defining New Schema Elements", " Choosing Names for New Attribute Types and Object Classes", " Obtaining and Assigning Object Identifiers", " Modifying Existing Schema Elements", " Subclassing an Existing Object Class", " Adding Auxiliary Information to a Directory Object", " Accommodating New Types of Objects", " Tips for Defining New Schemas", " Documenting and Publishing Your Schemas", " Schema Maintenance and Evolution", " Establishing a Schema Review Board", " Granting Permission to Change the Schema Configuration", " Changing Existing Schemas", " Upgrading Directory Service Software", " Schema Design Checklist", " Further Reading", " Looking Ahead", "8. Namespace Design", " The Structure of a Namespace", " The Purposes of a Namespace", " Analyzing Your Namespace Needs", " Choosing a Suffix", " Flat and Hierarchical Schemes", " Naming Attributes", " Application Considerations", " Administrative Considerations of Naming Attributes and RDNs", " Privacy Considerations", " Anticipating the Future", " Examples of Namespaces", " Flat Namespace Examples", " Hierarchical Namespace Examples", " Namespace Design Checklist", " Further Reading", " Looking Ahead", "9. Topology Design", " Directory Topology Overview", " Gluing the Directory Together: Knowledge References", " Name Resolution in the Distributed Directory", " Putting Knowledge Information into Your Directory", " Authentication in a Distributed Directory", " Security Implications", " Advantages and Disadvantages of Partitioning", " Designing Your Directory Server Topology", " Directory Partition Design Examples", " Topology Design Checklist", " Further Reading", " Looking Ahead", "10. Replication Design", " Why Replicate?", " Replication Concepts", " Suppliers, Consumers, and Replication Agreements", " The Unit of Replication", " Consistency and Convergence", " Incremental and Total Updates", " The Netscape Directory Server Update Process", " The Novell Directory Server Update Process", " Initial Population of a Replica", " Replication Strategies", " Conflict Resolution in Multi-master Replication", " Advanced Features", " Scheduling Replication", " Scheduling Update Latency by Attribute Type", " Schemas and Replication", " Access Control and Replication", " Designing Your Directory Replication System", " Designing for Maximum Reliability", " Designing for Maximum Performance", " Other Considerations", " Choosing Replication Solutions", " Replication Checklist", " Further Reading", " Looking Ahead", "11. Privacy and Security Design", " Security Guidelines", " The Purpose of Security", " Security Threats", " Unauthorized Access", " Unauthorized Tampering", " Denial-of-Service Attacks", " Security Tools", " Analyzing Your Security and Privacy Needs", " Directory Requirements", " Read or Write", " Sensitivity of Data", " Replication", " Administration", " Understanding Your Environment", " The User Community", " Directory Accessibility", " The Network Environment", " Physical Security", " Understanding Your Users", " Designing for Security", " Authentication", " Access Control", " Information Privacy and Integrity", " Respecting Your Users' Privacy", " Security versus Deployability", " Further Reading", " Looking Ahead", "Part III. Deploying Your Directory Service", "12. Choosing Directory Products", " Making the Right Product Choice", " Categories of Directory Software", " Network Operating System Applications", " Intranet Applications", " Extranet Applications", " Internet and Hosted Applications", " Lightweight Database Applications", " Evaluation Criteria for Directory Software", " Core Features", " Management Features", " Reliability", " Performance and Scalability", " Security", " Standards Compliance", " Interoperability", " Cost", " Flexibility and Extensibility", " Other Considerations", " An Evaluation Criteria Example", " Reaching a Decision", " Gathering Basic Product Information", " Quizzing the Software Vendors", " Challenging the Vendors to Show What Their Products Can Do", " Conducting a Directory Services Pilot", " Negotiating the Best Possible Deal", " Directory Software Options", " Directory Server Software", " Directory-Enabled Applications", " SDKs", " Choosing Directory Products Checklist", " Further Reading", " Looking Ahead", "13. Piloting Your Directory Service", " Pre-pilot Testing", " A Piloting Road Map", " Defining Your Goals", " Defining Your Scope", " Developing Documentation and Training Materials", " Selecting Your Users", " Setting Up Your Environment", " Rolling Out the Pilot", " Collecting Feedback", " Scaling It Up", " Applying What You've Learned", " Piloting Checklist", " Looking Ahead", "14. Analyzing and Reducing Costs", " The Politics of Costs", " Reducing Costs", " General Principles of Cost Reduction", " Design, Piloting, and Deployment Costs", " Design Costs", " Piloting Costs", " Deployment Hardware Costs", " Deployment Software Costs", " Ongoing Costs of Providing Your Directory Service", " Software Upgrade Costs", " Hardware Upgrade and Replacement Costs", " Monitoring Costs", " Data Maintenance Costs", " Backup and Restore Costs", " Disaster Recovery Plan Costs", " Support and Training Costs", " Software Support Contracts and Hardware Maintenance Contracts", " Costs of Adding New Directory-Enabled Applications", " Analyzing and Reducing Costs Checklist", " Further Reading", " Looking Ahead", "15. Going Production", " Creating a Plan for Going Production", " List the Resources Needed for the Rollout", " Create a List of Prerequisite Tasks", " Create a Detailed Rollout Plan", " Develop Criteria for Success", " Create a Publicity and Marketing Plan", " Advice for Going Production", " Don't Jump the Gun", " Don't Lose Focus", " Adopt an Incremental Approach", " Prepare Yourself Well", " Executing Your Plan", " Going Production Checklist", " Looking Ahead", "Part IV. Maintaining Your Directory Service", "16. Backups and Disaster Recovery", " Backup and Restore Procedures", " Backing Up and Restoring Directory Data Using Traditional Techniques", " Other Things to Back Up", " Using Replication for Backup and Restore", " Using Replication and Traditional Backup Techniques Together", " Safeguarding Your Backups", " Verifying Your Backups", " Disaster Planning and Recovery", " Types of Disasters", " Developing a Directory Disaster Recovery Plan", " Directory-Specific Issues in Disaster Recovery", " Summary", " Backups and Disaster Recovery Checklist", " Further Reading", " Looking Ahead", "17. Maintaining Data", " The Importance of Data Maintenance", " The Data Maintenance Policy", " Application-Maintained Data", " Centrally Maintained Data", " User-Maintained Data", " Handling New Data Sources", " Handling Exceptions", " Checking Data Quality", " Methods of Checking Quality", " Implications of Checking Quality", " Correcting Bad Data", " Data Maintenance Checklist", " Further Reading", " Looking Ahead", "18. Monitoring", " An Introduction to Monitoring", " Methods of Monitoring", " General Monitoring Principles", " Selecting and Developing Monitoring Tools", " Monitoring Your Directory with SNMP and an a Network Management System", " Monitoring Your Directory with Custom Probing Tools", " Proactive Monitoring", " Notification Techniques", " Basic Notification Principles", " Notification Methods", " Testing Your Notification System", " Taking Action", " Planning Your Course of Action", " Minimizing the Effect", " Understanding the Root Cause", " Correcting the Problem", " Documenting What Happened", " A Sample Directory Monitoring Utility", " Monitoring Checklist", " Further Reading", " Looking Ahead", "19. Troubleshooting", " Discovering Problems", " Types of Problems", " Directory Outages", " Performance Problems", " Problems with Directory Data", " Security Problems", " Troubleshooting and Resolving Problems", " Step 1: Assess the Problem, and Inform Affected Persons", " Step 2: Contain the Damage", " Step 3: Put the System Back into Service by Applying a Short-Term Fix", " Step 4: Fully Understand the Problem, and Devise a Long-Term Fix", " Step 5: Implement the Long-Term Fix, and Take Steps to Prevent the Problem from Recurring", " Step 6: Arrange to Monitor for the Problem", " Step 7: Document What Happened", " Troubleshooting Checklist", " Directory Outages", " Performance Problems", " Problems with Directory Data", " Security Problems", " Looking Ahead", "Part V. Leveraging Your Directory Service", "20. Developing New Applications", " Reasons to Develop Directory-Enabled Applications", " Lowering Your Data Management Costs", " Adapting the Directory to Fit Your Organization", " Saving on Deployment and Maintenance Costs", " Creating Entirely New Kinds of Applications", " When It Does Not Make Sense to Directory-Enable", " Common Ways That Applications Use Directories", " Locating and Sharing Information", " Verifying Authentication Credentials", " Aiding the Deployment of Other Services", " Making Access Control Decisions", " Enabling Location Independence", " Tools for Developing LDAP Applications", " LDAP SDKs", " LDAP Scripting Components for JavaScript and Perl", " LDAP Command-Line Tools", " Directory-Agnostic SDKs", " Advice for LDAP Application Developers", " Striving to Fit In", " Communicating Your Application's Directory Needs", " Designing for Good Performance and Scalability", " Developing a Prototype and Conducting a Pilot", " Leveraging Existing Code", " Avoiding Common Mistakes", " Example 1: A Password-Resetting Utility", " Directory Use", " The Source Code", " The Help Desk Staff's Experience", " Ideas for Improvement", " Example 2: An Employee Time-Off Request Web Application", " Directory Use", " The Source Code", " The Employee's Experience", " The Manager's Experience", " Ideas for Improvement", " Developing New Applications Checklist", " Further Reading", " Looking Ahead", "21. Directory-Enabling Existing Applications", " Reasons to Directory-Enable Existing Applications", " Enabling New Features in Applications", " Lowering Data Management Costs", " Simplifying Life for End Users", " Bringing the Directory Service to Your End Users", " Advice for Directory-Enabling Existing Applications", " Hiding the Directory Integration", " Making the New Directory Capabilities Visible", " Using a Protocol Gateway to Achieve Integration", " Avoiding Problematic Architectural Choices", " Considering How the Directory Service Will Be Affected", " Planning for a Transition", " Being Creative, and Considering All Your Options", " Example 1: A Directory-Enabled finger Service", " The Integration Approach", " The Source Code", " The Resulting End User Experience", " Ideas for Improvement", " Example 2: Adding LDAP Address Lookup to an Email Client", " The Integration Approach", " The Code", " The Resulting End User Experience", " Ideas for Improvement", " Directory-Enabling Existing Applications Checklist", " Further Reading", " Looking Ahead", "22. Directory Coexistence", " Why Is Coexistence Important?", " Determining Your Requirements", " Coexistence Techniques", " Migration", " One-Way Synchronization", " Two-Way Synchronization", " N-Way Join", " Virtual Directory", " Privacy and Security Considerations", " Join Attribute", " Data Transport", " Foreign Directory Security", " Example 1: One-Way Synchronization with Join", " Example 2: A Virtual Directory", " Directory Coexistence Checklist", " Further Reading", " Looking Ahead", "Part VI. Case Studies", "23. Case Study: Netscape Communications Corporation", " An Overview of the Organization", " Directory Drivers", " Directory Service Design", " Needs", " Data", " Schema", " Namespace", " Topology", " Replication", " Privacy and Security", " Directory Service Deployment", " Product Choice", " Piloting", " Going Production", " Directory Service Maintenance", " Data Backups and Disaster Recovery", " Maintaining Data", " Monitoring", " Leveraging the Directory Service", " Directory Deployment Impact", " Summary and Lessons Learned", " Further Reading", " Looking Ahead", "24. Case Study: A Large University", " An Overview of the Organization", " Directory Drivers", " Directory Service Design", " Needs", " Data", " Schema", " Namespace", " Topology", " Replication", " Privacy and Security", " Deployment", " Product Choice", " Piloting", " Analyzing and Reducing Costs", " Going Production", " Maintenance", " Data Backups and Disaster Recovery", " Maintaining Data", " Monitoring", " Troubleshooting", " Leveraging the Directory Service", " Applications", " Directory Deployment Impact", " Summary and Lessons Learned", " Looking Ahead", "25. Case Study: A Large Multinational Enterprise", " An Overview of the Organization", " Directory Drivers", " Directory Service Design", " Needs", " Data", " Schema", " Namespace", " Topology", " Replication", " Privacy and Security", " Deployment", " Product Choice", " Piloting", " Analyzing and Reducing Costs", " Going Production", " Maintenance", " Data Backups and Disaster Recovery", " Maintaining Data", " Monitoring", " Troubleshooting", " Leveraging the Directory Service", " Applications", " Directory Deployment Impact", " Summary and Lessons Learned", " Further Reading", " Looking Ahead", "26. Case Study: An Enterprise with an Extranet", " An Overview of the Organization", " Directory Drivers", " Directory Service Design", " Needs", " Data", " Schema", " Namespace", " Topology", " Replication", " Privacy and Security", " Deployment", " Product Choice", " Piloting", " Going Production", " Maintenance", " Data Backup and Disaster Recovery", " Maintaining Data", " Monitoring", " Troubleshooting", " Leveraging the Directory Service", " Applications", " Directory Deployment Impact", " Summary and Lessons Learned", " The Big Picture", " Further Reading", "Index".

En rimeligt grundig gennemgang af LDAP og hvad man kan bruge det til og hvorfor. Der er en sød beretning om hvordan den opstod som et mellemlag mellem verden og X.500 servere. Da næsten al trafik til X.500 på et tidspunkt var ldap, opstod ideen om bare at lave en ldapserver i stedet for et ldapfernislag på en X.500 server. ( )
  bnielsen | Jan 29, 2016 |
ingen anmeldelser | tilføj en anmeldelse

» Tilføj andre forfattere (10 mulige)

Forfatter navnRolleHvilken slags forfatterVærk?Status
Tim Howesprimær forfatteralle udgaverberegnet
Good, Gordon S.Forfattermedforfatternogle udgaverbekræftet
Howes, Timothy A.Forfattermedforfatternogle udgaverbekræftet
Smith, Mark C.Forfattermedforfatternogle udgaverbekræftet
Du bliver nødt til at logge ind for at redigere data i Almen Viden.
For mere hjælp se Almen Viden hjælpesiden.
Kanonisk titel
Originaltitel
Alternative titler
Oprindelig udgivelsesdato
Personer/Figurer
Vigtige steder
Vigtige begivenheder
Beslægtede film
Indskrift
Tilegnelse
Første ord
Citater
Sidste ord
Oplysning om flertydighed
Forlagets redaktører
Bagsidecitater
Originalsprog
Canonical DDC/MDS
Canonical LCC

Henvisninger til dette værk andre steder.

Wikipedia på engelsk (1)

Lightweight Directory Access Protocol (LDAP) is the standard for directory information access and is the underlying protocol for a variety of email systems, Web systems, and enterprise applications. LDAP enables central management of users, groups, devices, and other data, thereby simplifying directory management and reducing the total cost of ownership. Understanding and Deploying LDAP Directory Services , written by the creators of the protocol, is known as the LDAP bible and is the classic text for learning about LDAP and how to utilize it effectively. The Second Edition builds on this success by acting as an exhaustive resource for designing, deploying, and maintaining LDAP directory services. Topics such as implementation pitfalls, establishing and maintaining user access to information, troubleshooting, and real-world scenarios will be thoroughly explored.

No library descriptions found.

Beskrivelse af bogen
Haiku-resume

Current Discussions

Ingen

Populære omslag

Quick Links

Vurdering

Gennemsnit: (4.63)
0.5
1
1.5
2
2.5
3
3.5
4 1
4.5 1
5 2

Er det dig?

Bliv LibraryThing-forfatter.

 

Om | Kontakt | LibraryThing.com | Brugerbetingelser/Håndtering af brugeroplysninger | Hjælp/FAQs | Blog | Butik | APIs | TinyCat | Efterladte biblioteker | Tidlige Anmeldere | Almen Viden | 204,467,455 bøger! | Topbjælke: Altid synlig