It looks like you're offline.
Open Library logo
additional options menu

MARC record from Internet Archive

LEADER: 07513pam 22003014a 4500
001 9920174440001661
005 20150423124749.0
008 030630s2004 flua b 001 0 eng
010 $a 2003057821
020 $a0849313465 (alk. paper)
035 $a(CSdNU)u188251-01national_inst
035 $a(OCoLC)52575905
035 $a(OCoLC)52575905
040 $aDLC$cDLC$dYDX$dOrPss
042 $apcc
049 $aCNUM
050 00 $aTK5105.5725$b.V64 2004
082 00 $a004.6/2$222
100 1 $aVoglmaier, Reinhard E.
245 14 $aThe ABCs of LDAP :$bhow to install, run, and administer LDAP services /$cReinhard E. Voglmaier.
260 $aBoca Raton :$bAuerbach Publications,$cc2004.
300 $axxiv, 414 p. :$bill. ;$c26 cm.
504 $aIncludes bibliographical references and index.
505 0 $aThe LDAP Protocol -- Directories and Directory Server -- Network Protocols -- The TCP/IP Protocol Stack -- The OSI Protocol Stack -- Internet Standards: RFCs -- DAP: X.500 Standard -- Finally ... LDAP -- LDAP: How It Works -- Under the Hood: The Database Holding Information -- LDAP Basics -- Example: An Enterprise with a Few Departments -- Objects in LDAP: Object Classes, Attributes, and Schema -- Server Configuration -- First Steps with LDAP -- Updating a Directory with a Batch Process -- The LDIF Standard -- Ldapsearch Revisited: Search Filter -- LDAP: Is This a Protocol? -- Your Favorite Browser Speaks LDAP -- LDAP Models -- Information Model -- Object Classes -- Object Identifiers -- Attribute-Type Definitions -- Matching Rules -- Syntaxes -- Conclusion for Information Model -- Naming Model -- The Directory Information Tree -- Distinguished Name -- Examples of Distinguished Names -- Directory Suffix -- Aliases -- Referrals -- Distinguished-Name Syntax -- Last but Not Least, Information about the Server -- Conclusion for Naming Model -- Functional Model -- Overview of LDAP Operations -- LDAP Operations in Detail -- Conclusion for Functional Model -- Security Model -- Authentication and Authorization -- Authentication -- Concluding Authentication -- Authorization -- LDAP: Some Practical Details -- Search Revisited -- Query Filters -- Directory Schema Revisited -- Schema Descriptions -- Checking the Directory Schema -- Exploring the Directory Schema -- Extending the Directory Schema -- LDIF -- File Format -- LDIF: Conclusion, an Example in Perl -- LDAP URLs -- Differences between LDAP (v2) and LDAP (v3) -- Conclusion: Work in Progress -- LDAP Duplication/Replication/Update Protocols (LDUP) -- LDAP Extensions (LDAPext) -- LDAP (v3) Revision (LDAPbis) -- Distributed Architectures -- Introduction to Replication and Partitioning -- Data Distribution between LDAP and Non-LDAP Systems -- Partitioning -- What Is Partitioning? -- Gluing the Directories Together -- Referrals -- And Now ... from the Client Point of View -- Chaining -- Security Aspects Using Chaining -- Difference between Chaining and Referrals -- Replication -- Replication Scenarios -- Schema Information and ACL -- Single Master versus Multimaster -- Replication Agreements -- Load Sharing -- Security Aspects -- Work in Progress -- Data Distribution between LDAP and Non-LDAP Systems -- Broker -- Metadirectory -- DSML -- DSML Tools -- Castor -- LDAP APIs -- LDAP Command-Line Tools -- Selected Commands -- Command-Line Tools: Conclusion -- LDAP and Programming Language Support -- LDAP and PHP -- First Steps with PHP-LDAP -- Authentication and Control Operations -- More about Authentication in a Web Environment -- Search and Associated Commands -- Working with the Result Identifiers -- Conclusion: An Example -- Adding, Deleting, and Modifying Entries -- What Remains? -- Perl and LDAP -- Our First Perl LDAP Program -- Perl Objects -- The C LDAP API -- LDAP SDK v2 versus v3 -- Our First LDAP Program in C -- Structures -- Overview of LDAP Functions -- The Java LDAP API -- Our First Java Class -- Authentication and Control Operations -- Search and Compare Operations -- Update Operations -- LDAP URLs -- JNDI--Java Naming and Directory Interfaces -- Enterprise JavaBeans -- What Is Missing -- Active Directory and ADSI -- Other Languages -- LDAP Directory-Server Administration -- Open-Source Software -- Getting the Directory Server Up and Running -- Software Installation -- Securing Your LDAP Server -- Setting Up Security in Sun One -- Setting Up Security in OpenLDAP -- LDAP Server Configuration -- Load the Data -- Log Files -- Starting and Stopping the Server -- Backup and Recovery -- Service-Level Agreement -- Backup Methods -- Classical Backup -- Logical Backup of the Directory -- Backup via Replication -- System Monitoring -- Why Monitoring -- SNMP -- Home-Grown Solutions -- Log-File Analysis -- User Administration -- LDAP Users, Groups, and UNIX -- Administration Utilities -- LDAP and Web Services -- LDAP URLs -- Application Servers -- Accessing an LDAP Server via CGI Scripts -- Accessing an LDAP Server via an Application Server -- Gateways -- Web Server Authentication -- Example: The auth_ldap Module for Apache -- LDAP Authentication Using CGI Scripts -- LDAP Authentication Using the PHP Preprocessor -- LDAP and the Web: A Case Study -- Requirements -- LDAP Internet Environment -- LDAP Directory -- LDAP Authentication and the Web Server -- LDAP-HTTP Gateway -- LDAP Application Broker -- The Design of Directory Services -- Directory Life Cycle -- Planning of Directory Services -- Goal of the Project -- Benefits of the Project -- Objectives of the Project -- Target of the Project -- Analysis of the Actual Situation -- Steps to Perform -- Project Plan -- Design of Directory Services -- Data Design -- Schema Design -- Tree Design -- Partitioning Design -- Replication Design -- Security Design -- Data Design -- Schema Design -- Tree Design -- Choosing a Root for the Directory Information Tree -- Branching the Directory Tree -- Partitioning -- Number of Entries Is Too High -- Network Traffic to the Directory Is Too High -- Not All of the Data Is Equally Used -- Some Line Segments Become Overloaded -- Partitioning and Namespace -- Replication -- Network Traffic to the Directory Is Too High -- Some Line Segments Become Overloaded -- Replication and Namespace -- Security Design -- Authentication -- Authorization -- Protection of the Data -- LDAP Requests for Comments and Drafts -- LDAP RFCs -- Comments about the Most Important LDAP RFCs -- List of LDAP RFCs -- Work in Progress -- LDAP (v3) Revision (ldapbis) -- LDAP Duplication/Replication/Update Protocols (ldup) -- Useful Links -- LDAP Clients -- OIDs and Standards -- Tutorials and How-Tos -- Security -- SNMP -- LDAP API -- LDAP Server Implementations -- Free Implementations -- Commercial Implementations -- Standards -- Object Classes -- Attribute Types -- Configuration of OpenLDAP -- Configuration Files -- Configuration File of the OpenLDAP Server -- The Global Section -- Access Control Information -- Schema Information -- Log Information -- Resource Limitations -- Referrals -- Back-end and Database Sections -- Playing with Replication in OpenLDAP -- Playing with OpenLDAP Proxy Server -- The Back End -- What We Will Need -- Compiling the OpenLDAP Proxy -- Running the OpenLDAP Proxy -- Further Capabilities -- The Meta Back End.
650 0 $aLDAP (Computer network protocol)
949 $aTK5105.5725 .V64 2004$i31786101588546
994 $a92$bCNU
999 $aTK 5105.5725 .V64 2004$wLC$c1$i31786101588546$d1/7/2005$e12/11/2004 $f4/15/2004$g1$lCIRCSTACKS$mNULS$n1$rY$sY$tBOOK$u2/24/2004