SlideShare ist ein Scribd-Unternehmen logo
1 von 20
AD and LDAP
Active Directory
Lightweight Directory Access Protocol
Active Directory
 It is a common interface for organizing and maintaining
information related to resources connected to a variety of
network directories.
 Directories tend to contain descriptive, attribute-based
information. It support filtering capabilities. Examples
address books (attributes such as name, address, phone
number etc.)
 It is a database that keeps track of all the user accounts and
passwords in your organization. It allows you to store user
accounts and passwords in location, improving your
organization's security.
LDAP
1. Lightweight Directory Access Protocol (LDAP) is an Internet
protocol used to access information directories.
2. A directory service is a distributed database application
designed to manage the entries and attributes in a directory.
3. Runs over TCP/IP
LDAP vs Active Directory
 Ad is a Database
 Ldap is a protocol to access AD.
Eg. Microsoft Outlook work with directory services.
Directory Client/Server Interaction
 Clients performing protocol operations against servers
 Client sends protocol request to server
 Server performs operation on directory
 Server returns response (results/errors)
LDAP server and client
How do you make an LDAP server?
There are many options, like Microsoft, OpenLDAP(free), Sun,
Netscape, QUALCOMM. If you don't want to install your own
directory service, but just want to use LDAP, instructions for
using available LDAP servers, such as four11 and bigfootetc.
How do you make an LDAP client?
There are SDKs in many languages including C, C++, perl, and
Java, to help you make an LDAP client. Go get the SDK for your
language and use the functions that it provides to connect to and
operate on an LDAP server.
LDAP
 Directory
 A set of objects with similar attributes
 Organized in a logical and hierarchical manner
 Example:
 Telephone directory
 Series of names (either of persons or organizations)
 Organized alphabetically
 Each name has an address and phone number
LDAP Naming Examples
Attribute Type String
CommonName CN
LocalityName L
StateorProvinceName ST
OrganizationName O
OrganizationalUnitName OU
CountryName C
StreetAddress STREET
domainComponent DC
Userid UID
LDAP Functions/Operations
 Authentication
 BIND/UNBIND
 ABANDON
 Query
 Search
 Compare entry
 Update
 Add an entry
 Delete an entry (Only Leaf nodes, no aliases)
 Modify an entry
Client and Server Interaction
 Client establishes session with server (BIND)
 Hostname/IP and port number
 Security
 User-id/password based authentication
 Client performs operations
 Read/Update/Search
 SELECT A,B FROM PART_OF_DIRECTORY
 Client ends the session (UNBIND)
 Client can ABANDON the session
LDAP Data Structure
Hierarchical Flat
dc: domain component
ou: organizational unit
Directory structure
 Protocol accesses LDAP directories
 directory is a tree of directory entries
 Entry consists of a set of attributes
 An attribute has
 a name
 an attribute type or attribute description
 one or more values
 Attributes are defined in a schema
 Each entry has a unique identifier:
 Distinguished Name (DN)
 Consists of its Relative Distinguished Name (RDN) constructed from some
attribute(s) in the entry
 Followed by the parent entry's DN
 Think of the DN as a full filename and the RDN as a relative
filename in a folder
Directory structure
 An entry can look like this when represented in LDAP Data Interchange Format
(LDIF) (LDAP itself is a binary protocol):
 dn: cn=John mark,dc=exp,dc=com
cn: John mark
givenName: John
sn: mark
telephoneNumber: +1 888 555 6889
telephoneNumber: +1 888 555 1534
mail: johny@example.com
manager: cn=Barbara jack,dc=example,dc=com
objectClass: inetOrgPerson
objectClass: organizationalPerson
objectClass: person
objectClass: top
 dn (distinguished name) is the name of the entry; it's not an attribute nor part of the
entry
 "cn=John Mark" is the entry's RDN
 "dc=example,dc=com" is the DN of the parent entry.
 Other lines show the attributes in the entry
 Attribute names are typically mnemonic strings
 "cn" for common name,
 "dc" for domain component
 "mail" for e-mail address
 "sn" for surname
Directory structure
 A server holds a subtree starting from a specific entry, e.g.
"dc=example,dc=com" and its children.
 Servers may also hold references to other servers
 An attempt to access "ou=department,dc=example,dc=com" could
return a referral or continuation reference to a server which holds
that part of the directory tree.
 Client can then contact the other server
 Some servers also support chaining
 Server contacts other server(s) and returns the results to the client
Directory structure
 LDAP rarely defines any ordering:
 Server may return
 the values in an attribute
 the attributes in an entry
 the entries found by a search operation
in any order
 Follows from the formal definitions
 an entry is defined as a set of attributes
 an attribute is a set of values
 sets need not be ordered
Operations: Search and Compare
 The Search operation is used to both search for and read entries
 Its parameters are:
 baseObject
 The DN (Distinguished Name) of the entry at which to start the search,
 scope
 BaseObject (search just the named entry, typically used to read one entry), singleLevel
(entries immediately below the base DN), or wholeSubtree (the entire subtree starting at
the base DN).
 filter
 How to examine each entry in the scope. E.g. (&(objectClass=person)(|
(givenName=John)(mail=john*))) - search for persons who either have given name John
or an e-mail address starting with john.
 derefAliases
 Whether and how to follow alias entries (entries which refer to other entries),
 attributes
 Which attributes to return in result entries.
 sizeLimit, timeLimit
 Max number of entries, and max search time.
 typesOnly
 Return attribute types only, not attribute values.
Operations: Search and Compare
 The server returns
 Matching entries
 Maybe continuation references (in any order)
 Followed by the final result with the result code
 The Compare operation
 Takes
 a DN
 an attribute name
 an attribute value
 Checks if the named entry contains that attribute with that
value
Operations: Update operations
 Add, Delete, and Modify DN
 All require the DN of the entry that is to be
changed
 Modify takes a list of attributes to modify and
the modifications to each:
 Add new values, delete the attribute or some
values,, or replace the current values with the new
ones.
 Add operations also can have additional
attributes and values for those attributes.
Operations: Extended operations
 Extended Operation
 A generic LDAP operation can be used to define
new operations
 Examples include the
 Cancel
 Password Modify
Usage
 Applications
 Reasons to choose LDAP for a service
 Widely supported
 Data presented in LDAP is available to many clients and libraries
 LDAP is very general and includes basic security
 Can support many types of applications
 Choosing a few general protocols like LDAP and HTTP for various services
 Allows focusing on a few protocols
 Instead of having to maintain and upgrade many specialized protocols
 Some tasks LDAP does not handle well:
 Model a relational database

Weitere ähnliche Inhalte

Was ist angesagt?

Microsoft Active Directory
Microsoft Active DirectoryMicrosoft Active Directory
Microsoft Active Directory
thebigredhemi
 
02-Active Directory Domain Services.pptx
02-Active Directory Domain Services.pptx02-Active Directory Domain Services.pptx
02-Active Directory Domain Services.pptx
AdiWidyanto2
 
Active Directory Services
Active Directory ServicesActive Directory Services
Active Directory Services
Varun Arora
 

Was ist angesagt? (20)

What is active directory
What is active directoryWhat is active directory
What is active directory
 
Introduction to LDAP and Directory Services
Introduction to LDAP and Directory ServicesIntroduction to LDAP and Directory Services
Introduction to LDAP and Directory Services
 
Active directory slides
Active directory slidesActive directory slides
Active directory slides
 
Active Directory Training
Active Directory TrainingActive Directory Training
Active Directory Training
 
Microsoft Active Directory
Microsoft Active DirectoryMicrosoft Active Directory
Microsoft Active Directory
 
Active directory and application
Active directory and applicationActive directory and application
Active directory and application
 
Microsoft Active Directory.pptx
Microsoft Active Directory.pptxMicrosoft Active Directory.pptx
Microsoft Active Directory.pptx
 
Windows Server 2019.pptx
Windows Server 2019.pptxWindows Server 2019.pptx
Windows Server 2019.pptx
 
Dhcp ppt
Dhcp pptDhcp ppt
Dhcp ppt
 
Active-Directory-Domain-Services.pptx
Active-Directory-Domain-Services.pptxActive-Directory-Domain-Services.pptx
Active-Directory-Domain-Services.pptx
 
IIS
IISIIS
IIS
 
02-Active Directory Domain Services.pptx
02-Active Directory Domain Services.pptx02-Active Directory Domain Services.pptx
02-Active Directory Domain Services.pptx
 
Active directory domain services
Active directory domain servicesActive directory domain services
Active directory domain services
 
IdP, SAML, OAuth
IdP, SAML, OAuthIdP, SAML, OAuth
IdP, SAML, OAuth
 
AAA & RADIUS Protocols
AAA & RADIUS ProtocolsAAA & RADIUS Protocols
AAA & RADIUS Protocols
 
Ldap introduction (eng)
Ldap introduction (eng)Ldap introduction (eng)
Ldap introduction (eng)
 
Directory services
Directory servicesDirectory services
Directory services
 
Introduction to Active Directory
Introduction to Active DirectoryIntroduction to Active Directory
Introduction to Active Directory
 
RADIUS
RADIUSRADIUS
RADIUS
 
Active Directory Services
Active Directory ServicesActive Directory Services
Active Directory Services
 

Andere mochten auch

LDAP Presentation
LDAP PresentationLDAP Presentation
LDAP Presentation
cyberleon95
 
Flexible Symmetric Global Snapshot
Flexible Symmetric Global Snapshot Flexible Symmetric Global Snapshot
Flexible Symmetric Global Snapshot
Ashutosh Jaiswal
 
network filesystem briefs
network filesystem briefsnetwork filesystem briefs
network filesystem briefs
bergwolf
 
Manage password policy in OpenLDAP
Manage password policy in OpenLDAPManage password policy in OpenLDAP
Manage password policy in OpenLDAP
LDAPCon
 
Ldap Synchronization Connector @ 2011.RMLL
Ldap Synchronization Connector @ 2011.RMLLLdap Synchronization Connector @ 2011.RMLL
Ldap Synchronization Connector @ 2011.RMLL
sbahloul
 
Nis Vs Ldap
Nis Vs LdapNis Vs Ldap
Nis Vs Ldap
Juan Bau
 
Posix threads(asha)
Posix threads(asha)Posix threads(asha)
Posix threads(asha)
Nagarajan
 
Day 2 global_state_and_snapshot_algorithms
Day 2 global_state_and_snapshot_algorithmsDay 2 global_state_and_snapshot_algorithms
Day 2 global_state_and_snapshot_algorithms
VI Ni
 
OpenLDAP configuration brought to Apache Directory Studio
OpenLDAP configuration brought to Apache Directory StudioOpenLDAP configuration brought to Apache Directory Studio
OpenLDAP configuration brought to Apache Directory Studio
LDAPCon
 
Installing & Configuring OpenLDAP (Hands On Lab)
Installing & Configuring OpenLDAP (Hands On Lab)Installing & Configuring OpenLDAP (Hands On Lab)
Installing & Configuring OpenLDAP (Hands On Lab)
Michael Lamont
 
What's New in OpenLDAP
What's New in OpenLDAPWhat's New in OpenLDAP
What's New in OpenLDAP
LDAPCon
 

Andere mochten auch (20)

Active Directory & LDAP Authentication Without Triggers
Active Directory & LDAP Authentication Without TriggersActive Directory & LDAP Authentication Without Triggers
Active Directory & LDAP Authentication Without Triggers
 
LDAP Theory
LDAP TheoryLDAP Theory
LDAP Theory
 
LDAP Presentation
LDAP PresentationLDAP Presentation
LDAP Presentation
 
WIN-ADCS-10
WIN-ADCS-10WIN-ADCS-10
WIN-ADCS-10
 
Distributed computing time
Distributed computing timeDistributed computing time
Distributed computing time
 
Flexible Symmetric Global Snapshot
Flexible Symmetric Global Snapshot Flexible Symmetric Global Snapshot
Flexible Symmetric Global Snapshot
 
Ldap
LdapLdap
Ldap
 
Distributed Snapshots
Distributed SnapshotsDistributed Snapshots
Distributed Snapshots
 
Global state recording in Distributed Systems
Global state recording in Distributed SystemsGlobal state recording in Distributed Systems
Global state recording in Distributed Systems
 
network filesystem briefs
network filesystem briefsnetwork filesystem briefs
network filesystem briefs
 
Manage password policy in OpenLDAP
Manage password policy in OpenLDAPManage password policy in OpenLDAP
Manage password policy in OpenLDAP
 
LSC - Synchronizing identities @ Loadays 2010
 LSC - Synchronizing identities @ Loadays 2010 LSC - Synchronizing identities @ Loadays 2010
LSC - Synchronizing identities @ Loadays 2010
 
Ldap Synchronization Connector @ 2011.RMLL
Ldap Synchronization Connector @ 2011.RMLLLdap Synchronization Connector @ 2011.RMLL
Ldap Synchronization Connector @ 2011.RMLL
 
Nis Vs Ldap
Nis Vs LdapNis Vs Ldap
Nis Vs Ldap
 
IAO’s importance on sound student services in educational institutions
IAO’s importance on sound student services in educational institutionsIAO’s importance on sound student services in educational institutions
IAO’s importance on sound student services in educational institutions
 
Posix threads(asha)
Posix threads(asha)Posix threads(asha)
Posix threads(asha)
 
Day 2 global_state_and_snapshot_algorithms
Day 2 global_state_and_snapshot_algorithmsDay 2 global_state_and_snapshot_algorithms
Day 2 global_state_and_snapshot_algorithms
 
OpenLDAP configuration brought to Apache Directory Studio
OpenLDAP configuration brought to Apache Directory StudioOpenLDAP configuration brought to Apache Directory Studio
OpenLDAP configuration brought to Apache Directory Studio
 
Installing & Configuring OpenLDAP (Hands On Lab)
Installing & Configuring OpenLDAP (Hands On Lab)Installing & Configuring OpenLDAP (Hands On Lab)
Installing & Configuring OpenLDAP (Hands On Lab)
 
What's New in OpenLDAP
What's New in OpenLDAPWhat's New in OpenLDAP
What's New in OpenLDAP
 

Ähnlich wie AD & LDAP

Building social and RESTful frameworks
Building social and RESTful frameworksBuilding social and RESTful frameworks
Building social and RESTful frameworks
brendonschwartz
 
Ldap system administration
Ldap system administrationLdap system administration
Ldap system administration
Ali Abdo
 
LESSON 2 - Active Directory and Domain Controller.pptx
LESSON 2 - Active Directory and Domain Controller.pptxLESSON 2 - Active Directory and Domain Controller.pptx
LESSON 2 - Active Directory and Domain Controller.pptx
ssuser0f6f05
 
Breaking down data silos with the open data protocol
Breaking down data silos with the open data protocolBreaking down data silos with the open data protocol
Breaking down data silos with the open data protocol
Woodruff Solutions LLC
 

Ähnlich wie AD & LDAP (20)

LDAP
LDAPLDAP
LDAP
 
Directory Introduction
Directory IntroductionDirectory Introduction
Directory Introduction
 
UnderstandingLDAP.ppt
UnderstandingLDAP.pptUnderstandingLDAP.ppt
UnderstandingLDAP.ppt
 
Name services
Name servicesName services
Name services
 
Name Services
Name Services Name Services
Name Services
 
X.500 More Than a Global Directory
X.500 More Than a Global DirectoryX.500 More Than a Global Directory
X.500 More Than a Global Directory
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
LSC - Synchronizing identities @ Loadays 2010
LSC - Synchronizing identities @ Loadays 2010LSC - Synchronizing identities @ Loadays 2010
LSC - Synchronizing identities @ Loadays 2010
 
Rdbms
RdbmsRdbms
Rdbms
 
Building social and RESTful frameworks
Building social and RESTful frameworksBuilding social and RESTful frameworks
Building social and RESTful frameworks
 
Using OpenLDAP
Using OpenLDAPUsing OpenLDAP
Using OpenLDAP
 
Linq
LinqLinq
Linq
 
Ldap system administration
Ldap system administrationLdap system administration
Ldap system administration
 
Open Ldap Integration and Configuration with Lifray 6.2
Open Ldap Integration and Configuration with Lifray 6.2Open Ldap Integration and Configuration with Lifray 6.2
Open Ldap Integration and Configuration with Lifray 6.2
 
LESSON 2 - Active Directory and Domain Controller.pptx
LESSON 2 - Active Directory and Domain Controller.pptxLESSON 2 - Active Directory and Domain Controller.pptx
LESSON 2 - Active Directory and Domain Controller.pptx
 
Intro
IntroIntro
Intro
 
New
NewNew
New
 
Introduction to Oracle
Introduction to OracleIntroduction to Oracle
Introduction to Oracle
 
Introduction to Oracle
Introduction to OracleIntroduction to Oracle
Introduction to Oracle
 
Breaking down data silos with the open data protocol
Breaking down data silos with the open data protocolBreaking down data silos with the open data protocol
Breaking down data silos with the open data protocol
 

Mehr von Cynoteck Technology Solutions Private Limited

Mehr von Cynoteck Technology Solutions Private Limited (20)

Delivering powerful integrations without code using out-of-the-box Salesforce...
Delivering powerful integrations without code using out-of-the-box Salesforce...Delivering powerful integrations without code using out-of-the-box Salesforce...
Delivering powerful integrations without code using out-of-the-box Salesforce...
 
Test automation using selenium
Test automation using seleniumTest automation using selenium
Test automation using selenium
 
Business process flow enhancement
Business process flow enhancementBusiness process flow enhancement
Business process flow enhancement
 
Editable Grids
Editable GridsEditable Grids
Editable Grids
 
Multi Select Option set in Microsoft Dynamics 365
Multi Select Option set in Microsoft Dynamics 365Multi Select Option set in Microsoft Dynamics 365
Multi Select Option set in Microsoft Dynamics 365
 
Microsoft Dynamics 365 for customer services
Microsoft Dynamics 365 for customer servicesMicrosoft Dynamics 365 for customer services
Microsoft Dynamics 365 for customer services
 
Configuring AWS with IoT
Configuring AWS with IoTConfiguring AWS with IoT
Configuring AWS with IoT
 
An Overview of Google Assistant
An Overview of Google Assistant An Overview of Google Assistant
An Overview of Google Assistant
 
An overview of Ionic
An overview of IonicAn overview of Ionic
An overview of Ionic
 
What's new in Xcode 9?
What's new in Xcode 9? What's new in Xcode 9?
What's new in Xcode 9?
 
An overview of Beacons
An overview of BeaconsAn overview of Beacons
An overview of Beacons
 
An Overview of Angular 4
An Overview of Angular 4 An Overview of Angular 4
An Overview of Angular 4
 
Microsoft Dynamics NAV
Microsoft Dynamics NAV Microsoft Dynamics NAV
Microsoft Dynamics NAV
 
Dynamics 365 for financials
Dynamics 365 for financials Dynamics 365 for financials
Dynamics 365 for financials
 
Microsoft Dynamics 365 for Marketing
Microsoft Dynamics 365 for MarketingMicrosoft Dynamics 365 for Marketing
Microsoft Dynamics 365 for Marketing
 
What is power apps
What is power appsWhat is power apps
What is power apps
 
Microsoft Dynamics 365 for sales
Microsoft Dynamics  365 for sales Microsoft Dynamics  365 for sales
Microsoft Dynamics 365 for sales
 
Microsoft Dynamics 365- field services
Microsoft Dynamics  365- field servicesMicrosoft Dynamics  365- field services
Microsoft Dynamics 365- field services
 
What is project service automation in dynamics 365
What is project service automation in dynamics 365What is project service automation in dynamics 365
What is project service automation in dynamics 365
 
An overview of what is dynamics 365
An overview of what is dynamics 365An overview of what is dynamics 365
An overview of what is dynamics 365
 

Kürzlich hochgeladen

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Kürzlich hochgeladen (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

AD & LDAP

  • 1. AD and LDAP Active Directory Lightweight Directory Access Protocol
  • 2. Active Directory  It is a common interface for organizing and maintaining information related to resources connected to a variety of network directories.  Directories tend to contain descriptive, attribute-based information. It support filtering capabilities. Examples address books (attributes such as name, address, phone number etc.)  It is a database that keeps track of all the user accounts and passwords in your organization. It allows you to store user accounts and passwords in location, improving your organization's security.
  • 3. LDAP 1. Lightweight Directory Access Protocol (LDAP) is an Internet protocol used to access information directories. 2. A directory service is a distributed database application designed to manage the entries and attributes in a directory. 3. Runs over TCP/IP
  • 4. LDAP vs Active Directory  Ad is a Database  Ldap is a protocol to access AD. Eg. Microsoft Outlook work with directory services.
  • 5. Directory Client/Server Interaction  Clients performing protocol operations against servers  Client sends protocol request to server  Server performs operation on directory  Server returns response (results/errors)
  • 6. LDAP server and client How do you make an LDAP server? There are many options, like Microsoft, OpenLDAP(free), Sun, Netscape, QUALCOMM. If you don't want to install your own directory service, but just want to use LDAP, instructions for using available LDAP servers, such as four11 and bigfootetc. How do you make an LDAP client? There are SDKs in many languages including C, C++, perl, and Java, to help you make an LDAP client. Go get the SDK for your language and use the functions that it provides to connect to and operate on an LDAP server.
  • 7. LDAP  Directory  A set of objects with similar attributes  Organized in a logical and hierarchical manner  Example:  Telephone directory  Series of names (either of persons or organizations)  Organized alphabetically  Each name has an address and phone number
  • 8. LDAP Naming Examples Attribute Type String CommonName CN LocalityName L StateorProvinceName ST OrganizationName O OrganizationalUnitName OU CountryName C StreetAddress STREET domainComponent DC Userid UID
  • 9. LDAP Functions/Operations  Authentication  BIND/UNBIND  ABANDON  Query  Search  Compare entry  Update  Add an entry  Delete an entry (Only Leaf nodes, no aliases)  Modify an entry
  • 10. Client and Server Interaction  Client establishes session with server (BIND)  Hostname/IP and port number  Security  User-id/password based authentication  Client performs operations  Read/Update/Search  SELECT A,B FROM PART_OF_DIRECTORY  Client ends the session (UNBIND)  Client can ABANDON the session
  • 11. LDAP Data Structure Hierarchical Flat dc: domain component ou: organizational unit
  • 12. Directory structure  Protocol accesses LDAP directories  directory is a tree of directory entries  Entry consists of a set of attributes  An attribute has  a name  an attribute type or attribute description  one or more values  Attributes are defined in a schema  Each entry has a unique identifier:  Distinguished Name (DN)  Consists of its Relative Distinguished Name (RDN) constructed from some attribute(s) in the entry  Followed by the parent entry's DN  Think of the DN as a full filename and the RDN as a relative filename in a folder
  • 13. Directory structure  An entry can look like this when represented in LDAP Data Interchange Format (LDIF) (LDAP itself is a binary protocol):  dn: cn=John mark,dc=exp,dc=com cn: John mark givenName: John sn: mark telephoneNumber: +1 888 555 6889 telephoneNumber: +1 888 555 1534 mail: johny@example.com manager: cn=Barbara jack,dc=example,dc=com objectClass: inetOrgPerson objectClass: organizationalPerson objectClass: person objectClass: top  dn (distinguished name) is the name of the entry; it's not an attribute nor part of the entry  "cn=John Mark" is the entry's RDN  "dc=example,dc=com" is the DN of the parent entry.  Other lines show the attributes in the entry  Attribute names are typically mnemonic strings  "cn" for common name,  "dc" for domain component  "mail" for e-mail address  "sn" for surname
  • 14. Directory structure  A server holds a subtree starting from a specific entry, e.g. "dc=example,dc=com" and its children.  Servers may also hold references to other servers  An attempt to access "ou=department,dc=example,dc=com" could return a referral or continuation reference to a server which holds that part of the directory tree.  Client can then contact the other server  Some servers also support chaining  Server contacts other server(s) and returns the results to the client
  • 15. Directory structure  LDAP rarely defines any ordering:  Server may return  the values in an attribute  the attributes in an entry  the entries found by a search operation in any order  Follows from the formal definitions  an entry is defined as a set of attributes  an attribute is a set of values  sets need not be ordered
  • 16. Operations: Search and Compare  The Search operation is used to both search for and read entries  Its parameters are:  baseObject  The DN (Distinguished Name) of the entry at which to start the search,  scope  BaseObject (search just the named entry, typically used to read one entry), singleLevel (entries immediately below the base DN), or wholeSubtree (the entire subtree starting at the base DN).  filter  How to examine each entry in the scope. E.g. (&(objectClass=person)(| (givenName=John)(mail=john*))) - search for persons who either have given name John or an e-mail address starting with john.  derefAliases  Whether and how to follow alias entries (entries which refer to other entries),  attributes  Which attributes to return in result entries.  sizeLimit, timeLimit  Max number of entries, and max search time.  typesOnly  Return attribute types only, not attribute values.
  • 17. Operations: Search and Compare  The server returns  Matching entries  Maybe continuation references (in any order)  Followed by the final result with the result code  The Compare operation  Takes  a DN  an attribute name  an attribute value  Checks if the named entry contains that attribute with that value
  • 18. Operations: Update operations  Add, Delete, and Modify DN  All require the DN of the entry that is to be changed  Modify takes a list of attributes to modify and the modifications to each:  Add new values, delete the attribute or some values,, or replace the current values with the new ones.  Add operations also can have additional attributes and values for those attributes.
  • 19. Operations: Extended operations  Extended Operation  A generic LDAP operation can be used to define new operations  Examples include the  Cancel  Password Modify
  • 20. Usage  Applications  Reasons to choose LDAP for a service  Widely supported  Data presented in LDAP is available to many clients and libraries  LDAP is very general and includes basic security  Can support many types of applications  Choosing a few general protocols like LDAP and HTTP for various services  Allows focusing on a few protocols  Instead of having to maintain and upgrade many specialized protocols  Some tasks LDAP does not handle well:  Model a relational database