Understanding and Deploying LDAP Directory Services, Second Edition |
By Timothy A. Howes Ph.D., Mark C. Smith, Gordon S. Good |
|
Publisher | : Addison Wesley |
Pub Date | : May 02, 2003 |
ISBN | : 0-672-32316-8 |
Pages | : 936 |
Slots | : 1 | | | Copyright |
| | Preface |
| | | The Book's Organization |
| | | The Book's Audience |
| | | Conventions Used in This Book |
| | | Contacting Us |
|
| | Acknowledgments |
| | About the Authors |
| | Part I. Introduction to Directory Services and LDAP |
| | | Chapter 1. Directory Services Overview and History |
| | | What a Directory Is |
| | | What a Directory Can Do for You |
| | | What a Directory Is Not |
| | | The History and Origins of LDAP |
| | | Further Reading |
| | | Looking Ahead |
|
| | | Chapter 2. Introduction to LDAP |
| | | What Is LDAP? |
| | | The LDAP Models |
| | | LDIF |
| | | LDAP Server Software |
| | | LDAP Command-Line Utilities |
| | | LDAP APIs |
| | | LDAP and Internationalization |
| | | LDAP Overview Checklist |
| | | Further Reading |
| | | Looking Ahead |
|
| | | Chapter 3. LDAPv3 Extensions |
| | | How LDAPv3 Is Extended |
| | | The Root DSE and Extension Discovery |
| | | Selected LDAPv3 Extensions |
| | | Future Directions: Where Is LDAP Headed Next? |
| | | LDAP Extensions and Future Directions Checklists |
| | | Further Reading |
| | | Looking Ahead |
|
| | | Chapter 4. Overview of Netscape Directory Server |
| | | Basic Installation |
| | | A Brief Hands-on Tour of Netscape Directory Server |
| | | Product Focus and Feature Set |
| | | Extending the Netscape Server: A Simple Plug-in Example |
| | | Further Reading |
| | | Looking Ahead |
|
|
| | Part II. Designing Your Directory Service |
| | | Chapter 5. Directory Design Road Map |
| | | The Directory Life Cycle |
| | | Directory Design Checklist |
| | | Further Reading |
| | | Looking Ahead |
|
| | | Chapter 6. Defining Your Directory Needs |
| | | Overview of the Directory Needs Definition Process |
| | | Analyzing Your Environment |
| | | Determining and Prioritizing Application Needs |
| | | Determining and Prioritizing Users' Needs and Expectations |
| | | Determining and Prioritizing Deployment Constraints |
| | | Determining and Prioritizing Other Environmental Constraints |
| | | Choosing an Overall Directory Design and Deployment Approach |
| | | Setting Some Goals and Milestones |
| | | Defining Your Directory Needs Checklist |
| | | Further Reading |
| | | Looking Ahead |
|
| | | Chapter 7. Data Design |
| | | Data Design Overview |
| | | Common Data-Related Problems |
| | | Creating a Data Policy Statement |
| | | Identifying Which Data Elements You Need |
| | | General Characteristics of Data Elements |
| | | Sources of Data |
| | | Maintaining Good Relationships with Other Data Sources |
| | | Data Design Checklist |
| | | Further Reading |
| | | Looking Ahead |
|
| | | Chapter 8. Schema Design |
| | | The Purpose of a Schema |
| | | Elements of LDAP Schemas |
| | | Directory Schema Formats |
| | | The Schema-Checking Process |
| | | Schema Design Overview |
| | | Sources of Predefined Schemas |
| | | Defining New Schema Elements |
| | | Documenting and Publishing Your Schemas |
| | | Schema Maintenance and Evolution |
| | | Schema Design Checklist |
| | | Further Reading |
| | | Looking Ahead |
|
| | | Chapter 9. Namespace Design |
| | | The Structure of a Namespace |
| | | The Purposes of a Namespace |
| | | Analyzing Your Namespace Needs |
| | | Examples of Namespaces |
| | | Namespace Design Checklist |
| | | Further Reading |
| | | Looking Ahead |
|
| | | Chapter 10. Topology Design |
| | | Directory Topology Overview |
| | | Gluing the Directory Together: Knowledge References |
| | | Authentication in a Distributed Directory |
| | | Advantages and Disadvantages of Partitioning |
| | | Designing Your Directory Server Topology |
| | | Topology Design Checklist |
| | | Further Reading |
| | | Looking Ahead |
|
| | | Chapter 11. Replication Design |
| | | Why Replicate? |
| | | Replication Concepts |
| | | Advanced Replication Features |
| | | Designing Your Directory Replication System |
| | | Replication Design Checklist |
| | | Further Reading |
| | | Looking Ahead |
|
| | | Chapter 12. Privacy and Security Design |
| | | Security Guidelines |
| | | The Purpose of Security |
| | | Security Threats |
| | | Security Tools |
| | | Analyzing Your Security and Privacy Needs |
| | | Designing for Security |
| | | Privacy and Security Design Checklist |
| | | Further Reading |
| | | Looking Ahead |
|
|
| | Part III. Deploying Your Directory Service |
| | | Chapter 13. Evaluating Directory Products |
| | | Making the Right Product Choice |
| | | Categories of Directory Software |
| | | Evaluation Criteria for Directory Software |
| | | Reaching a Decision |
| | | Evaluating Directory Products Checklist |
| | | Further Reading |
| | | Looking Ahead |
|
| | | Chapter 14. Piloting Your Directory Service |
| | | A Piloting Road Map |
| | | Piloting Your Directory Service Checklist |
| | | Looking Ahead |
|
| | | Chapter 15. Analyzing and Reducing Costs |
| | | The Politics of Costs |
| | | Reducing Costs |
| | | Design, Piloting, and Deployment Costs |
| | | Ongoing Costs of Providing Your Directory Service |
| | | Analyzing and Reducing Costs Checklist |
| | | Further Reading |
| | | Looking Ahead |
|
| | | Chapter 16. Putting Your Directory Service into Production |
| | | Creating a Plan for Putting Your Directory Service into Production |
| | | Advice for Putting Your Directory Service into Production |
| | | Executing Your Plan |
| | | Putting Your Directory Service into Production Checklist |
| | | Looking Ahead |
|
|
| | Part IV. Maintaining Your Directory Service |
| | | Chapter 17. Backups and Disaster Recovery |
| | | Backup and Restore Procedures |
| | | Disaster Planning and Recovery |
| | | Directory-Specific Issues in Disaster Recovery |
| | | Backups and Disaster Recovery Checklist |
| | | Further Reading |
| | | Looking Ahead |
|
| | | Chapter 18. Maintaining Data |
| | | The Importance of Data Maintenance |
| | | The Data Maintenance Policy |
| | | Handling New Data Sources |
| | | Handling Exceptions |
| | | Checking Data Quality |
| | | Maintaining Data Checklist |
| | | Further Reading |
| | | Looking Ahead |
|
| | | Chapter 19. Monitoring |
| | | Introduction to Monitoring |
| | | Selecting and Developing Monitoring Tools |
| | | Notification Techniques |
| | | Taking Action |
| | | A Sample Directory Monitoring Utility |
| | | Performance Analysis |
| | | Monitoring Checklist |
| | | Further Reading |
| | | Looking Ahead |
|
| | | Chapter 20. Troubleshooting |
| | | Discovering Problems |
| | | Types of Problems |
| | | Troubleshooting and Resolving Problems |
| | | Troubleshooting Checklist |
| | | Further Reading |
| | | Looking Ahead |
|
|
| | Part V. Leveraging Your Directory Service |
| | | Chapter 21. Developing New Applications |
| | | Reasons to Develop Directory-Enabled Applications |
| | | Common Ways That Applications Use Directories |
| | | Tools for Developing LDAP Applications |
| | | Advice for LDAP Application Developers |
| | | Example 1: setpwd , a Password-Resetting Utility |
| | | Example 2: SimpleSite, a Web Site with User Profile Storage |
| | | Developing New Applications Checklist |
| | | Further Reading |
| | | Looking Ahead |
|
| | | Chapter 22. Directory-Enabling Existing Applications |
| | | Reasons to Directory-Enable Existing Applications |
| | | Advice for Directory-Enabling Existing Applications |
| | | Example 1: A Directory-Enabled finger Service |
| | | Example 2: Adding LDAP Address Lookup to an E-Mail Client |
| | | Directory-Enabling Existing Applications Checklist |
| | | Further Reading |
| | | Looking Ahead |
|
| | | Chapter 23. Directory Coexistence |
| | | Why Is Coexistence Important? |
| | | Coexistence Techniques |
| | | Privacy and Security Considerations |
| | | Determining Your Coexistence Requirements |
| | | Directory Coexistence Implementation Considerations |
| | | Example: The ldapsync Tool: One-Way Synchronization with Join |
| | | Directory Coexistence Checklist |
| | | Further Reading |
| | | Looking Ahead |
|
|
| | Part VI. Case Studies |
| | | Chapter 24. Case Study: Netscape Communications Corporation |
| | | Overview of the Organization |
| | | Directory Drivers |
| | | Directory Service Design |
| | | Directory Service Deployment |
| | | Directory Service Maintenance |
| | | Leveraging the Directory Service |
| | | Summary and Lessons Learned |
| | | Further Reading |
| | | Looking Ahead |
|
| | | Chapter 25. Case Study: A Large Multinational Enterprise |
| | | Overview of the Organization |
| | | Directory Drivers |
| | | Directory Service Design |
| | | Directory Service Deployment |
| | | Directory Service Maintenance |
| | | Leveraging the Directory Service |
| | | Summary and Lessons Learned |
| | | Further Reading |
| | | Looking Ahead |
|
| | | Chapter 26. Case Study: An Enterprise with an Extranet |
| | | Overview of the Organization |
| | | Directory Drivers |
| | | Directory Service Design |
| | | Directory Service Deployment |
| | | Directory Service Maintenance |
| | | Leveraging the Directory Service |
| | | Summary and Lessons Learned |
| | | Looking Ahead |
|
|