SlideShare ist ein Scribd-Unternehmen logo
1 von 26
Allidm.com
Discovering Identity and Access Management Solutions

Directory Services Introduction
http://academy.allidm.com
Stay connected to Allidm

Find us on Facebook:
http: //www. facebook.com/allidm
Follow us on Twitter:
http: //twitter.com/aidy_idm
Look for us on LinkedIn:
http: //www. linkedin.com/allidm
Visit our blog:
http://www.allidm.com/blog
Disclaimer and Acknowledgments

The contents here are created as a own personal endeavor and
thus does not reflect any official stance of any Identity and
Access Management Vendor on any particular technology
Contact Us
On this presentation we’ll talk about some useful topics that
you can use no matter which identity and access management
solution or product you are working on.
If you know one that make a big difference please tell us to
include it in the future
aidy.allidm@gmail.com
Introduction

A directory is a collection of information about
objects arranged in some order that gives details
about each object. Popular examples are a city
,telephone ,directory and a library card catalog.
What’s a Directory Solution?

A directory is a specialized database, also called a data
repository, that stores typed and ordered information about
objects.
A directory is a listing of information about objects arranged in
some order that gives details about each object.
Directories allow users or applications to find resources that
have the characteristics needed for a particular task.
For example, a directory of users can be used to look up a
person’s e-mail address or phone number.
Directory Features

A directory service is highly optimized for reads
A directory service implements a distributed model for storing
information

A directory service can extend the types of information it stores
A directory service has advanced search capabilities
A directory service has loosely consistent replication among
directory servers
Directory clients and servers

Directories are usually accessed using the
client/server model of communication.
An application that wants to read or write
information in a directory does not access the
directory directly.
Instead, it calls a function or application programming
interface (API) that causes a message to be sent to
another process.
Differences Between Directories and
Databases
A directory is often described as a database, but it is a
specialized database that has characteristics that set
it apart from general-purpose relational databases.
What is LDAP?

LDAP is an open industry standard that defines a standard method for
accessing and updating information in a directory.
The Lightweight Directory Access Protocol, a standard, extensible
Internet protocol used to access directory services

The Lightweight Directory Access Protocol (LDAP) defines a message
protocol used by directory clients and directory servers.T
The LDAP Data Interchange Format (LDIF), a standard text format for
exchanging directory data

LDAP protocol uses different messages.
A searchRequest is used to search for a specific entry in the directory.
Interaction between an LDAP client
and an LDAP server
general interaction between an LDAP client and an
LDAP server takes the following form:
Establish a session
Perform Operations
Finish Session
Interaction between an LDAP
client and an LDAP server
Establish a session
The client establishes a session with an LDAP server
known as binding to the server.
The client specifies the host name or IP address and TCP/IP
port number where the LDAP server is listening.
The client can provide a user name and a password to
properly authenticate with the server.
Or the client can establish an anonymous session with default
access rights.

The client and server can also establish a session that uses
stronger security methods such as encryption of data.
Interaction between an LDAP
client and an LDAP server
 Perform Operations

The client performs operations on directory data.
LDAP offers both read and update capabilities.
This allows directory information to be managed as well as
queried.

LDAP also supports searching the directory for data
meeting arbitrary user-specified criteria.
Searching is a very common operation in LDAP.
A user can specify what part of the directory to search and
what information to return.
A search filter that uses Boolean conditions specifies what
directory data matches the search.
Ldap Components

A directory entry usually describes an object such as a
person, a printer, a server, and so on.
Each entry has a name called a distinguished name
(DN) that uniquely identifies it.
The DN consists of a sequence of parts called relative
distinguished names (RDNs)
The entries can be arranged into a hierarchical treelike structure based on their distinguished names.
This tree of directory entries is called the Directory
What’s LDIF?

Is a standard text file format for storing LDAP
configuration information and directory contents.
LDIF file is:
A collection of entries separated from each other by
blank lines
A mapping of attribute names to values
A collection of directives that instruct the parser how to
process the information
Why LDIF ?

System administrators prefer to use plain-text files for
server configuration information, as opposed to some
binary store of bits.
More comfortable to deal with data in vi, Emacs, or
notepad than to dig though raw bits and bytes
Types

An directory server could be installed in the next
ways:
Directory Server
Proxy Server
Replication Gateway
LDAP addresses the problems

Work in process
How LDAP works

In process
What look for an LDAP Solution

Ease of Deploy
Portability
Open Standards
built using open standards and specifications as far as
possible.
DSML

Ease of Administration
web-based, graphical administration console
command line interfaces

Security
Choosing an LDAP Solution

Work in progress
Keys to Successfully Implementing
LDAP
Distinguish clearly between requirements.
Involve everyone, from the chief executive to the users, in
the project.
Make sure users are actively involved in the project.
Use LDAP as an entry point for facilitating identity and
access management (IAM) projects. .
.
Road Map

Work in process
LDAP Solutions Around World

Some of the key vendors providing SSO Solutions are
Oracle
CA
Symplified
Forgerock
IBM
Courion
Atlassian
Allidm.com
Discovering Identity and Access Management Solutions

Allidm Academy
http://academy.allidm.com

Weitere ähnliche Inhalte

Was ist angesagt?

Ppt evaluation of information retrieval system
Ppt evaluation of information retrieval systemPpt evaluation of information retrieval system
Ppt evaluation of information retrieval systemsilambu111
 
Information retrieval s
Information retrieval sInformation retrieval s
Information retrieval ssilambu111
 
Model of information retrieval (3)
Model  of information retrieval (3)Model  of information retrieval (3)
Model of information retrieval (3)9866825059
 
basis of infromation retrival part 1 retrival tools
basis of infromation retrival part 1 retrival toolsbasis of infromation retrival part 1 retrival tools
basis of infromation retrival part 1 retrival toolsSaroj Suwal
 
Information retrieval introduction
Information retrieval introductionInformation retrieval introduction
Information retrieval introductionnimmyjans4
 
Information retrieval system
Information retrieval systemInformation retrieval system
Information retrieval systemLeslie Vargas
 
WorldCat Presentation
WorldCat PresentationWorldCat Presentation
WorldCat PresentationVal MacMillan
 
Ontology and Ontology Libraries: a Critical Study
Ontology and Ontology Libraries: a Critical StudyOntology and Ontology Libraries: a Critical Study
Ontology and Ontology Libraries: a Critical StudyDebashisnaskar
 
CS6007 information retrieval - 5 units notes
CS6007   information retrieval - 5 units notesCS6007   information retrieval - 5 units notes
CS6007 information retrieval - 5 units notesAnandh Arumugakan
 
Database Design
Database DesignDatabase Design
Database Designlearnt
 
Taxonomies & folksonomies
Taxonomies  & folksonomiesTaxonomies  & folksonomies
Taxonomies & folksonomiesAparna Sane
 
Library Information System
Library Information System Library Information System
Library Information System Booktec LibBest
 
information retrieval Techniques and normalization
information retrieval Techniques and normalizationinformation retrieval Techniques and normalization
information retrieval Techniques and normalizationAmeenababs
 

Was ist angesagt? (20)

Ppt evaluation of information retrieval system
Ppt evaluation of information retrieval systemPpt evaluation of information retrieval system
Ppt evaluation of information retrieval system
 
Information retrieval s
Information retrieval sInformation retrieval s
Information retrieval s
 
Inis ppt
Inis pptInis ppt
Inis ppt
 
Model of information retrieval (3)
Model  of information retrieval (3)Model  of information retrieval (3)
Model of information retrieval (3)
 
basis of infromation retrival part 1 retrival tools
basis of infromation retrival part 1 retrival toolsbasis of infromation retrival part 1 retrival tools
basis of infromation retrival part 1 retrival tools
 
Information retrieval introduction
Information retrieval introductionInformation retrieval introduction
Information retrieval introduction
 
Information retrieval system
Information retrieval systemInformation retrieval system
Information retrieval system
 
International Digital Library Initiatives
International Digital Library InitiativesInternational Digital Library Initiatives
International Digital Library Initiatives
 
Thesaurus 2101
Thesaurus 2101Thesaurus 2101
Thesaurus 2101
 
Library portal
Library portalLibrary portal
Library portal
 
WorldCat Presentation
WorldCat PresentationWorldCat Presentation
WorldCat Presentation
 
Ontology and Ontology Libraries: a Critical Study
Ontology and Ontology Libraries: a Critical StudyOntology and Ontology Libraries: a Critical Study
Ontology and Ontology Libraries: a Critical Study
 
CS6007 information retrieval - 5 units notes
CS6007   information retrieval - 5 units notesCS6007   information retrieval - 5 units notes
CS6007 information retrieval - 5 units notes
 
Database And their types
Database And their typesDatabase And their types
Database And their types
 
Database Design
Database DesignDatabase Design
Database Design
 
Taxonomies & folksonomies
Taxonomies  & folksonomiesTaxonomies  & folksonomies
Taxonomies & folksonomies
 
Marc 21
Marc 21Marc 21
Marc 21
 
Library Information System
Library Information System Library Information System
Library Information System
 
information retrieval Techniques and normalization
information retrieval Techniques and normalizationinformation retrieval Techniques and normalization
information retrieval Techniques and normalization
 
Marc21
Marc21Marc21
Marc21
 

Andere mochten auch

Dell Password Manager Architecture - Components
Dell Password Manager Architecture - ComponentsDell Password Manager Architecture - Components
Dell Password Manager Architecture - ComponentsAidy Tificate
 
Identity Manager OpenSource OpenIDM - introduction
Identity Manager OpenSource OpenIDM - introductionIdentity Manager OpenSource OpenIDM - introduction
Identity Manager OpenSource OpenIDM - introductionAidy Tificate
 
Identity Manager Opensource OpenIDM Architecture
Identity Manager Opensource OpenIDM ArchitectureIdentity Manager Opensource OpenIDM Architecture
Identity Manager Opensource OpenIDM ArchitectureAidy Tificate
 
Dell Password Manager Introduction
Dell Password Manager IntroductionDell Password Manager Introduction
Dell Password Manager IntroductionAidy Tificate
 
Dell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access ControlDell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access ControlAidy Tificate
 

Andere mochten auch (9)

Cloud introduction
Cloud introductionCloud introduction
Cloud introduction
 
Dell Password Manager Architecture - Components
Dell Password Manager Architecture - ComponentsDell Password Manager Architecture - Components
Dell Password Manager Architecture - Components
 
IAM Cloud
IAM CloudIAM Cloud
IAM Cloud
 
IAM Password
IAM PasswordIAM Password
IAM Password
 
Identity Manager OpenSource OpenIDM - introduction
Identity Manager OpenSource OpenIDM - introductionIdentity Manager OpenSource OpenIDM - introduction
Identity Manager OpenSource OpenIDM - introduction
 
IDM Introduction
IDM IntroductionIDM Introduction
IDM Introduction
 
Identity Manager Opensource OpenIDM Architecture
Identity Manager Opensource OpenIDM ArchitectureIdentity Manager Opensource OpenIDM Architecture
Identity Manager Opensource OpenIDM Architecture
 
Dell Password Manager Introduction
Dell Password Manager IntroductionDell Password Manager Introduction
Dell Password Manager Introduction
 
Dell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access ControlDell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access Control
 

Ähnlich wie Directory Introduction (20)

Ldap system administration
Ldap system administrationLdap system administration
Ldap system administration
 
LDAP
LDAPLDAP
LDAP
 
Ldap
LdapLdap
Ldap
 
LDAP - Lightweight Directory Access Protocol
LDAP - Lightweight Directory Access ProtocolLDAP - Lightweight Directory Access Protocol
LDAP - Lightweight Directory Access Protocol
 
The Ldap Protocol
The Ldap ProtocolThe Ldap Protocol
The Ldap Protocol
 
Open LDAP vs. Active Directory
Open LDAP vs. Active DirectoryOpen LDAP vs. Active Directory
Open LDAP vs. Active Directory
 
Ldap
LdapLdap
Ldap
 
LDAP
LDAPLDAP
LDAP
 
Choosing an IdM User Store technology
Choosing an IdM User Store technologyChoosing an IdM User Store technology
Choosing an IdM User Store technology
 
AD & LDAP
AD & LDAPAD & LDAP
AD & LDAP
 
LDAP
LDAPLDAP
LDAP
 
Active Directory
Active DirectoryActive Directory
Active Directory
 
X.500 More Than a Global Directory
X.500 More Than a Global DirectoryX.500 More Than a Global Directory
X.500 More Than a Global Directory
 
Configuring Domino To Be An Ldap Directory And To Use An Ldap Directory
Configuring Domino To Be An Ldap Directory And To Use An Ldap DirectoryConfiguring Domino To Be An Ldap Directory And To Use An Ldap Directory
Configuring Domino To Be An Ldap Directory And To Use An Ldap Directory
 
Active directory basics
Active directory basicsActive directory basics
Active directory basics
 
Chapter_11_LDAP_and_Kerberos-converted.pptx
Chapter_11_LDAP_and_Kerberos-converted.pptxChapter_11_LDAP_and_Kerberos-converted.pptx
Chapter_11_LDAP_and_Kerberos-converted.pptx
 
Directory Servers and LDAP
Directory Servers and LDAPDirectory Servers and LDAP
Directory Servers and LDAP
 
Fox pass
Fox passFox pass
Fox pass
 
network administration directory access and remote access
network administration directory access and remote accessnetwork administration directory access and remote access
network administration directory access and remote access
 
LDAP Theory
LDAP TheoryLDAP Theory
LDAP Theory
 

Kürzlich hochgeladen

Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 

Kürzlich hochgeladen (20)

Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

Directory Introduction

  • 1. Allidm.com Discovering Identity and Access Management Solutions Directory Services Introduction http://academy.allidm.com
  • 2. Stay connected to Allidm Find us on Facebook: http: //www. facebook.com/allidm Follow us on Twitter: http: //twitter.com/aidy_idm Look for us on LinkedIn: http: //www. linkedin.com/allidm Visit our blog: http://www.allidm.com/blog
  • 3. Disclaimer and Acknowledgments The contents here are created as a own personal endeavor and thus does not reflect any official stance of any Identity and Access Management Vendor on any particular technology
  • 4. Contact Us On this presentation we’ll talk about some useful topics that you can use no matter which identity and access management solution or product you are working on. If you know one that make a big difference please tell us to include it in the future aidy.allidm@gmail.com
  • 5. Introduction A directory is a collection of information about objects arranged in some order that gives details about each object. Popular examples are a city ,telephone ,directory and a library card catalog.
  • 6. What’s a Directory Solution? A directory is a specialized database, also called a data repository, that stores typed and ordered information about objects. A directory is a listing of information about objects arranged in some order that gives details about each object. Directories allow users or applications to find resources that have the characteristics needed for a particular task. For example, a directory of users can be used to look up a person’s e-mail address or phone number.
  • 7. Directory Features A directory service is highly optimized for reads A directory service implements a distributed model for storing information A directory service can extend the types of information it stores A directory service has advanced search capabilities A directory service has loosely consistent replication among directory servers
  • 8. Directory clients and servers Directories are usually accessed using the client/server model of communication. An application that wants to read or write information in a directory does not access the directory directly. Instead, it calls a function or application programming interface (API) that causes a message to be sent to another process.
  • 9. Differences Between Directories and Databases A directory is often described as a database, but it is a specialized database that has characteristics that set it apart from general-purpose relational databases.
  • 10. What is LDAP? LDAP is an open industry standard that defines a standard method for accessing and updating information in a directory. The Lightweight Directory Access Protocol, a standard, extensible Internet protocol used to access directory services The Lightweight Directory Access Protocol (LDAP) defines a message protocol used by directory clients and directory servers.T The LDAP Data Interchange Format (LDIF), a standard text format for exchanging directory data LDAP protocol uses different messages. A searchRequest is used to search for a specific entry in the directory.
  • 11. Interaction between an LDAP client and an LDAP server general interaction between an LDAP client and an LDAP server takes the following form: Establish a session Perform Operations Finish Session
  • 12. Interaction between an LDAP client and an LDAP server Establish a session The client establishes a session with an LDAP server known as binding to the server. The client specifies the host name or IP address and TCP/IP port number where the LDAP server is listening. The client can provide a user name and a password to properly authenticate with the server. Or the client can establish an anonymous session with default access rights. The client and server can also establish a session that uses stronger security methods such as encryption of data.
  • 13. Interaction between an LDAP client and an LDAP server  Perform Operations The client performs operations on directory data. LDAP offers both read and update capabilities. This allows directory information to be managed as well as queried. LDAP also supports searching the directory for data meeting arbitrary user-specified criteria. Searching is a very common operation in LDAP. A user can specify what part of the directory to search and what information to return. A search filter that uses Boolean conditions specifies what directory data matches the search.
  • 14. Ldap Components A directory entry usually describes an object such as a person, a printer, a server, and so on. Each entry has a name called a distinguished name (DN) that uniquely identifies it. The DN consists of a sequence of parts called relative distinguished names (RDNs) The entries can be arranged into a hierarchical treelike structure based on their distinguished names. This tree of directory entries is called the Directory
  • 15.
  • 16. What’s LDIF? Is a standard text file format for storing LDAP configuration information and directory contents. LDIF file is: A collection of entries separated from each other by blank lines A mapping of attribute names to values A collection of directives that instruct the parser how to process the information
  • 17. Why LDIF ? System administrators prefer to use plain-text files for server configuration information, as opposed to some binary store of bits. More comfortable to deal with data in vi, Emacs, or notepad than to dig though raw bits and bytes
  • 18. Types An directory server could be installed in the next ways: Directory Server Proxy Server Replication Gateway
  • 19. LDAP addresses the problems Work in process
  • 20. How LDAP works In process
  • 21. What look for an LDAP Solution Ease of Deploy Portability Open Standards built using open standards and specifications as far as possible. DSML Ease of Administration web-based, graphical administration console command line interfaces Security
  • 22. Choosing an LDAP Solution Work in progress
  • 23. Keys to Successfully Implementing LDAP Distinguish clearly between requirements. Involve everyone, from the chief executive to the users, in the project. Make sure users are actively involved in the project. Use LDAP as an entry point for facilitating identity and access management (IAM) projects. . .
  • 24. Road Map Work in process
  • 25. LDAP Solutions Around World Some of the key vendors providing SSO Solutions are Oracle CA Symplified Forgerock IBM Courion Atlassian
  • 26. Allidm.com Discovering Identity and Access Management Solutions Allidm Academy http://academy.allidm.com