Index_D

 < Day Day Up > 



D

DAP, see Directory Access Protocol

Data

access, 13, 106, 142, 146, 309

analysis, 328

design, 330, 332–334, 339, 343–344

encapsulation, 9

exporting, 127

flow, 171

how LDAP works, 18, 19

link layer, 10, 11

loading, 277

loading and directory-server administration, 277

organization, 335

protection, 106

storage and extending directory schema in LDAP, 123

Database

configuration of OpenLDAP, 381–383

centralized and Directory Access Protocol, 13

file, 283

holding information and LDAP, 21–22

Database interface (DBI), 210

Datagrams, 8, 9

DBD-LDAP, 209–210

DBI, see Database interface

dc, see Domain components

DCA, see Defense Communication Agency

DCE, see Distributed computing environment

Decompressed files, 263, 264

Defense Communication Agency (DCA), 8

delEntry, 134, 135, 136

Delete

LDAP

data interchange format, 130, 131–132

functional model, 89, 93

using, 37

ldapmodify in LDAP API, 180

updating

C language API, 234

JAVA language, 245–246

Perl language, 214, 215

PHP scripting language, 206

deleteOldRDN, 96

Demilitarized zone (DMZ), 310, 311, 312

Dependencies, 262

deref, 197

derefAliases, 90

Design, 124

Design pattern, 252

Directory

access and Web services, 297

information, 160

LDAP

case study and Web, 312–314

changing and use, 39

concept, 3–7

information model, 54

management and functional model, 50

manager, 267, 269

partitioning, 82

root, 28

search and use, 32

structure and naming model, 50, 73

updating

batch process, 34–35

files, 129–134

Directory Access Protocols (DAP), 2, 13–14

Directory information tree (DIT)

LDAP

aliases and naming model, 81

case study and Web, 313

functional model, 89

information model, 64

naming model, 73, 74–78

using, 29

version 2 and 3 comparison, 139

root and directory-server software installation, 260

tree design and directory services design, 335–338

Directory schema, LDAP

checking, 118–120

descriptions, 116–118

configuration of server, 276

exploring, 120–123

extending, 123–125

information model, 50

Directory server, LDAP

communication with remote computers, 45

configuration and use, 28

data verification and details, 118–119

database holding information, 21

information retrieval, 6

referrals and naming model, 82

Directory-server administration

administrative utilities, 294–295

backup and recovery, 282

backup methods, 283–285

getting the directory server up and running, 258–270

LDAP users, groups, and UNIX, 291–294

load the data, 277

log files, 278–279

open-source software, 257–258

securing, 270–275

server configuration, 275–276

service-level agreement, 282–283

starting and stopping the server, 279–281

system monitoring, 285–290

user administration, 291

Directory server agent (DSA), 67, 85–87

Directory server entries (DSE), 138–139

Directory-server software, 259–270

Directory services

data design, 332–334

design, 330–332

distributed computing environment, 142

life cycle, 323–324

partitioning, 338–340

planning, 324–330

replication, 340–342

schema design, 334–335

security design, 342–344

tree design, 335–338

Directory suffix, 64, 74, 80–81

Directory tree, 26, 27, see also Directory information tree

directoryOperations, 68

Discussion group members, 315

Disk space, 126, 143

Dispatcher, 319

Distinguished name (DN)

compare operation in JAVA language, 241–242

LDAP

data interchange format, 36, 128

error messages, 30

information model, 53, 54, 57, 64

ldapsearch and API, 184, 186

naming model, 50, 78–80

using, 27–28, 29

Perl language

authentication, 212, 213

updating, 214, 216

replication in OpenLDAP, 385

updating directory with batch process, 35

Distinguished-name syntax, 80, 84–85

Distributed architectures

data distribution between LDAP and non-LDAP systems, 145–146, 170–172

DSML, 172–175

partitioning

chaining, 154–156

chaining versus referrals, 157

clients point of view, 152–154

examples, 150–152

gluing the directories together, 149

referrals, 150

security aspects using chaining, 156

what is, 146–149

replication

agreements, 165–166

load sharing, 166–168

scenarios, 160–162

schema information and access control lists, 162

security aspects, 168

single master versus multimaster, 163–164

work in progress, 169

Distributed computing environment (DCE), 13, 142

distributedOperations, 68–69

DIT, see Directory information tree

DMZ, see Demilitarized zone

dn() method, 220, see also Distinguished name

DN, see Distinguished name

DNS, see Domain name system

DNS style, 81

Domain component object, 64

Domain component style, 81

Domain components (dc), 79

Domain name system (DNS)

distributed computing environment and distributed architectures, 142

directories, 4

hierarchical structure, 5

load sharing in replication of directory data, 166, 167

naming service on Internet, 249

domainComponent attribute, 336

Draft status, 12

DSA, see Directory server agent

DSA specific entry, 149

dsaOperations, 68–69

DSE, see Directory server entries

DSML

architecture, 172–175

tools, 173

Dump method

directory schema, 121

LDAP data interchange format, 127–128

Perl language, 221, 222, 210



 < Day Day Up > 



The ABCs of LDAP. How to Install, Run, and Administer LDAP Services
The ABCs of LDAP: How to Install, Run, and Administer LDAP Services
ISBN: 0849313465
EAN: 2147483647
Year: 2003
Pages: 149

Similar book on Amazon

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net