| Understanding and Deploying LDAP Directory Services, Second Edition |
| By Timothy A. Howes Ph.D., Mark C. Smith, Gordon S. Good |
| |
| Publisher | : Addison Wesley |
| Pub Date | : May 02, 2003 |
| ISBN | : 0-672-32316-8 |
| Pages | : 936 |
| Slots | : 1 | | | Copyright |
| | | Preface |
| | | | The Book's Organization |
| | | | The Book's Audience |
| | | | Conventions Used in This Book |
| | | | Contacting Us |
| |
| | | Acknowledgments |
| | | About the Authors |
| | | Part I. Introduction to Directory Services and LDAP |
| | | | Chapter 1. Directory Services Overview and History |
| | | | What a Directory Is |
| | | | What a Directory Can Do for You |
| | | | What a Directory Is Not |
| | | | The History and Origins of LDAP |
| | | | Further Reading |
| | | | Looking Ahead |
| |
| | | | Chapter 2. Introduction to LDAP |
| | | | What Is LDAP? |
| | | | The LDAP Models |
| | | | LDIF |
| | | | LDAP Server Software |
| | | | LDAP Command-Line Utilities |
| | | | LDAP APIs |
| | | | LDAP and Internationalization |
| | | | LDAP Overview Checklist |
| | | | Further Reading |
| | | | Looking Ahead |
| |
| | | | Chapter 3. LDAPv3 Extensions |
| | | | How LDAPv3 Is Extended |
| | | | The Root DSE and Extension Discovery |
| | | | Selected LDAPv3 Extensions |
| | | | Future Directions: Where Is LDAP Headed Next? |
| | | | LDAP Extensions and Future Directions Checklists |
| | | | Further Reading |
| | | | Looking Ahead |
| |
| | | | Chapter 4. Overview of Netscape Directory Server |
| | | | Basic Installation |
| | | | A Brief Hands-on Tour of Netscape Directory Server |
| | | | Product Focus and Feature Set |
| | | | Extending the Netscape Server: A Simple Plug-in Example |
| | | | Further Reading |
| | | | Looking Ahead |
| |
| |
| | | Part II. Designing Your Directory Service |
| | | | Chapter 5. Directory Design Road Map |
| | | | The Directory Life Cycle |
| | | | Directory Design Checklist |
| | | | Further Reading |
| | | | Looking Ahead |
| |
| | | | Chapter 6. Defining Your Directory Needs |
| | | | Overview of the Directory Needs Definition Process |
| | | | Analyzing Your Environment |
| | | | Determining and Prioritizing Application Needs |
| | | | Determining and Prioritizing Users' Needs and Expectations |
| | | | Determining and Prioritizing Deployment Constraints |
| | | | Determining and Prioritizing Other Environmental Constraints |
| | | | Choosing an Overall Directory Design and Deployment Approach |
| | | | Setting Some Goals and Milestones |
| | | | Defining Your Directory Needs Checklist |
| | | | Further Reading |
| | | | Looking Ahead |
| |
| | | | Chapter 7. Data Design |
| | | | Data Design Overview |
| | | | Common Data-Related Problems |
| | | | Creating a Data Policy Statement |
| | | | Identifying Which Data Elements You Need |
| | | | General Characteristics of Data Elements |
| | | | Sources of Data |
| | | | Maintaining Good Relationships with Other Data Sources |
| | | | Data Design Checklist |
| | | | Further Reading |
| | | | Looking Ahead |
| |
| | | | Chapter 8. Schema Design |
| | | | The Purpose of a Schema |
| | | | Elements of LDAP Schemas |
| | | | Directory Schema Formats |
| | | | The Schema-Checking Process |
| | | | Schema Design Overview |
| | | | Sources of Predefined Schemas |
| | | | Defining New Schema Elements |
| | | | Documenting and Publishing Your Schemas |
| | | | Schema Maintenance and Evolution |
| | | | Schema Design Checklist |
| | | | Further Reading |
| | | | Looking Ahead |
| |
| | | | Chapter 9. Namespace Design |
| | | | The Structure of a Namespace |
| | | | The Purposes of a Namespace |
| | | | Analyzing Your Namespace Needs |
| | | | Examples of Namespaces |
| | | | Namespace Design Checklist |
| | | | Further Reading |
| | | | Looking Ahead |
| |
| | | | Chapter 10. Topology Design |
| | | | Directory Topology Overview |
| | | | Gluing the Directory Together: Knowledge References |
| | | | Authentication in a Distributed Directory |
| | | | Advantages and Disadvantages of Partitioning |
| | | | Designing Your Directory Server Topology |
| | | | Topology Design Checklist |
| | | | Further Reading |
| | | | Looking Ahead |
| |
| | | | Chapter 11. Replication Design |
| | | | Why Replicate? |
| | | | Replication Concepts |
| | | | Advanced Replication Features |
| | | | Designing Your Directory Replication System |
| | | | Replication Design Checklist |
| | | | Further Reading |
| | | | Looking Ahead |
| |
| | | | Chapter 12. Privacy and Security Design |
| | | | Security Guidelines |
| | | | The Purpose of Security |
| | | | Security Threats |
| | | | Security Tools |
| | | | Analyzing Your Security and Privacy Needs |
| | | | Designing for Security |
| | | | Privacy and Security Design Checklist |
| | | | Further Reading |
| | | | Looking Ahead |
| |
| |
| | | Part III. Deploying Your Directory Service |
| | | | Chapter 13. Evaluating Directory Products |
| | | | Making the Right Product Choice |
| | | | Categories of Directory Software |
| | | | Evaluation Criteria for Directory Software |
| | | | Reaching a Decision |
| | | | Evaluating Directory Products Checklist |
| | | | Further Reading |
| | | | Looking Ahead |
| |
| | | | Chapter 14. Piloting Your Directory Service |
| | | | A Piloting Road Map |
| | | | Piloting Your Directory Service Checklist |
| | | | Looking Ahead |
| |
| | | | Chapter 15. Analyzing and Reducing Costs |
| | | | The Politics of Costs |
| | | | Reducing Costs |
| | | | Design, Piloting, and Deployment Costs |
| | | | Ongoing Costs of Providing Your Directory Service |
| | | | Analyzing and Reducing Costs Checklist |
| | | | Further Reading |
| | | | Looking Ahead |
| |
| | | | Chapter 16. Putting Your Directory Service into Production |
| | | | Creating a Plan for Putting Your Directory Service into Production |
| | | | Advice for Putting Your Directory Service into Production |
| | | | Executing Your Plan |
| | | | Putting Your Directory Service into Production Checklist |
| | | | Looking Ahead |
| |
| |
| | | Part IV. Maintaining Your Directory Service |
| | | | Chapter 17. Backups and Disaster Recovery |
| | | | Backup and Restore Procedures |
| | | | Disaster Planning and Recovery |
| | | | Directory-Specific Issues in Disaster Recovery |
| | | | Backups and Disaster Recovery Checklist |
| | | | Further Reading |
| | | | Looking Ahead |
| |
| | | | Chapter 18. Maintaining Data |
| | | | The Importance of Data Maintenance |
| | | | The Data Maintenance Policy |
| | | | Handling New Data Sources |
| | | | Handling Exceptions |
| | | | Checking Data Quality |
| | | | Maintaining Data Checklist |
| | | | Further Reading |
| | | | Looking Ahead |
| |
| | | | Chapter 19. Monitoring |
| | | | Introduction to Monitoring |
| | | | Selecting and Developing Monitoring Tools |
| | | | Notification Techniques |
| | | | Taking Action |
| | | | A Sample Directory Monitoring Utility |
| | | | Performance Analysis |
| | | | Monitoring Checklist |
| | | | Further Reading |
| | | | Looking Ahead |
| |
| | | | Chapter 20. Troubleshooting |
| | | | Discovering Problems |
| | | | Types of Problems |
| | | | Troubleshooting and Resolving Problems |
| | | | Troubleshooting Checklist |
| | | | Further Reading |
| | | | Looking Ahead |
| |
| |
| | | Part V. Leveraging Your Directory Service |
| | | | Chapter 21. Developing New Applications |
| | | | Reasons to Develop Directory-Enabled Applications |
| | | | Common Ways That Applications Use Directories |
| | | | Tools for Developing LDAP Applications |
| | | | Advice for LDAP Application Developers |
| | | | Example 1: setpwd , a Password-Resetting Utility |
| | | | Example 2: SimpleSite, a Web Site with User Profile Storage |
| | | | Developing New Applications Checklist |
| | | | Further Reading |
| | | | Looking Ahead |
| |
| | | | Chapter 22. Directory-Enabling Existing Applications |
| | | | Reasons to Directory-Enable Existing Applications |
| | | | Advice for Directory-Enabling Existing Applications |
| | | | Example 1: A Directory-Enabled finger Service |
| | | | Example 2: Adding LDAP Address Lookup to an E-Mail Client |
| | | | Directory-Enabling Existing Applications Checklist |
| | | | Further Reading |
| | | | Looking Ahead |
| |
| | | | Chapter 23. Directory Coexistence |
| | | | Why Is Coexistence Important? |
| | | | Coexistence Techniques |
| | | | Privacy and Security Considerations |
| | | | Determining Your Coexistence Requirements |
| | | | Directory Coexistence Implementation Considerations |
| | | | Example: The ldapsync Tool: One-Way Synchronization with Join |
| | | | Directory Coexistence Checklist |
| | | | Further Reading |
| | | | Looking Ahead |
| |
| |
| | | Part VI. Case Studies |
| | | | Chapter 24. Case Study: Netscape Communications Corporation |
| | | | Overview of the Organization |
| | | | Directory Drivers |
| | | | Directory Service Design |
| | | | Directory Service Deployment |
| | | | Directory Service Maintenance |
| | | | Leveraging the Directory Service |
| | | | Summary and Lessons Learned |
| | | | Further Reading |
| | | | Looking Ahead |
| |
| | | | Chapter 25. Case Study: A Large Multinational Enterprise |
| | | | Overview of the Organization |
| | | | Directory Drivers |
| | | | Directory Service Design |
| | | | Directory Service Deployment |
| | | | Directory Service Maintenance |
| | | | Leveraging the Directory Service |
| | | | Summary and Lessons Learned |
| | | | Further Reading |
| | | | Looking Ahead |
| |
| | | | Chapter 26. Case Study: An Enterprise with an Extranet |
| | | | Overview of the Organization |
| | | | Directory Drivers |
| | | | Directory Service Design |
| | | | Directory Service Deployment |
| | | | Directory Service Maintenance |
| | | | Leveraging the Directory Service |
| | | | Summary and Lessons Learned |
| | | | Looking Ahead |
| |
| |