13.07.2015 Views

Naming and Directory Services (DNS, NIS, and LDAP)

Naming and Directory Services (DNS, NIS, and LDAP)

Naming and Directory Services (DNS, NIS, and LDAP)

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CHAPTER 8Introduction to <strong>LDAP</strong> <strong>Naming</strong><strong>Services</strong> (Overview/Reference)The <strong>LDAP</strong> chapters describe how to set up a Solaris <strong>LDAP</strong> naming services client towork with Sun Java System <strong>Directory</strong> Server (formerly Sun ONE <strong>Directory</strong> Server).However, while using the Sun Java System <strong>Directory</strong> Server is recommended, it is notrequired. A brief description of generic directory server requirements appears inChapter 14.Note – A directory server is not necessarily an <strong>LDAP</strong> server. However, in the context ofthese chapters, the term “directory server” is synonymous with “<strong>LDAP</strong> server.”Audience AssumptionsThe <strong>LDAP</strong> naming services chapters are written for system administrators whoalready have a working knowledge of <strong>LDAP</strong>. Following is a partial list of conceptswith which you must be very familiar. Otherwise, you might have difficulty using thisguide to deploy <strong>LDAP</strong> naming services in the Solaris system.■■■■■<strong>LDAP</strong> Information Model (entries, object classes, attributes, types, values)<strong>LDAP</strong> <strong>Naming</strong> Model (<strong>Directory</strong> Information Tree (DIT) structure)<strong>LDAP</strong> Functional Model (search parameters: base object (DN), scope, size limit,time limit, filters (browsing indexes for the Sun Java System <strong>Directory</strong> Server),attribute list)<strong>LDAP</strong> Security Model (authentication methods, access control models)Overall planning <strong>and</strong> design of an <strong>LDAP</strong> directory service, including how to planthe data <strong>and</strong> how to design the DIT, topology, replication, <strong>and</strong> security125

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!