SlideShare une entreprise Scribd logo
1  sur  34
Lightweight Directory Access Protocol
Outline
  o Introduction
  o Directory vs Database
  o Current directory
  o Directory features
  o History
  o Understanding LDAP
          Information model
          Naming model
       Ldap directory structure
          Functional model
          Security Model
          Replication model
  o LDAP software
  o Configure a LDAP on a server
  o Conclusion
Page  2
Introduction (1/2)



To improve functionality and ease-of-use, and to enable cost-
 effective administration of distributed applications:

  information about the services:
             resources
             users
             and other objects accessible from the applications
          needs to be organized in a clear and consistent manner.

  Much of this information can be shared among many
   applications.
Page  3
Introduction (2/2)



But it must also be protected



Such information is often collected into a special database
 that is sometimes called a directory.



 The Lightweight Directory Access Protocol (LDAP) is an
 open industry standard that has evolved to meet these needs



. 4
Page
Before moving to the following!!!!


 What is a Directories
Is it a data base as commonly said
Let us knowing the difference




 Directory vs Database




Page  5
Directory vs Database!!!!(1/2)


o A directory is often described as a database
oBut it has special characteristics different from general
 databases:


           They are accessed much more than they are updated. And
           they are optimized for read access


        They are not suited for information that changes rapidly
       (number of jobs in a printer queue)


Page  6
Directory vs Database!!!!(2/2)



        Many directory services don’t support transactions


        Directories normally limits the type of information that can be
         stored


        Databases use powerful query languages like SQL but
         Directories normally use very simple access methods


        Hence directories can be optimized to economically provide
         more applications with rapid access

Page  7
Current directories


           o Paper Directories


                 Phonebook
                 Address Book
                 Sales Catalog


           o Electronic Directories


                 DNS
                 Windows registry
Page  8
Directory features

      oA directory is a listing of information about objects
       arranged in some order that gives details about each
       object.


      o Dynamic (real time update)


      o Flexible (easy change of type and data organization)


      o Secure (who sees what)


      o Personalized (how to present data,…)
Page  9
History:(1/2)




Page  10
History:(2/2)

   o LDAP version 3


             Consideration of special characters




             Security : SASL authentication and TLS encryption
              (Transport Layer Security)


             Overloading operations




Page  11
Understanding LDAP?(1/2)

What’s LDAP!!!
   Lightweight Directory Access Protocol


   An application protocol for querying and modifying
   directory services running over TCP/IP


Information
   Structure of information stored in an LDAP directory.




Page  12
Understanding LDAP?(2/2)

Naming
  • How information is organized and identified.


Functional / Operations
  • Describes what operations can be performed on the
    information stored in an LDAP directory.


Security
   Describes how the information can be protected from
    unauthorized access.



Page  13
Information model

       o Based on X.500 model


       o Information stored in DIT (Directory Information Tree)




                           Hierarchical model


       o An entry contains a set of attributes
                   type of attribute- attribute value(s)
Page  14
Each Tree has



     o DIT ( Directory Information Tree) : top of the Tree



     o Nodes called DSE (Directory service Entry)




     o RootDSE (contains a description of the tree and its
      content), specific to each LDAP server

Page  15
Each entry is an object



                                               Type



                                       Value           Value
                  Attribute


            Attribute                          Value
                           Attribute

                   Entry




Page  16
Two types of attributes


   o Normal attributes : accessible to users
              (givenname attribute)




   o Operational attributes     :   used   only   for   server
    administration data


              (modifyTimeStamp attribute )


Page  17
An attribute is characterized by




Page  18
Object class



    o Contains real or abstract objects



    o It characterizes them by a list of optional and required
     attributes




    o All object classes are contained in the directory schema


Page  19
An object class is defined by

   o A name that identifies


   o An OID that also identifies


   o Required attributes


   o Optional attributes


   o A type (structural, auxiliary or abstract)

Page  20
Three types of object class



   Structural class       Auxiliary class       Abstract class


   Description of
   basic objects in the
                           Contains objects
   directory.
                              that can add       Contains basic
                                additional      LDAP objects like
                            informations to       top or alias
     An entry belongs
                           structural objects
     always at least to
       one structural
        object class



Page  21
Naming model


    o Naming constraints to ensure interoperability between
       directories




    o Each entry is uniquely identified by:


             Relative Distinguished Name (RDNs)
             Distinguished Name (DN)



Page  22
LDAP Data Interchange Format (LDIF)

     o LDAP data represented in standard text format


     o It is used to view or edit the data base


     o The format used is ASCII, binary data are encoded in
      base 64


     o LDIF is used :
             to import / export base
             to make changes to entries

Page  23
LDAP directory structure




Page  24
Example




Page  25
Functional model




      o The functional model describes how to access data


      o Update functions : add, modify, delete, rename


      o Session functions : bind, unbind




Page  26
Basic operations


            LDAP operation                 Description
 Search                      search directory objects using criteria
 Compare                     comparing the contents of two objects
 Add                         Adding an entry
 Modify                      modifying the contents of an entry
 Delete                      Deleting an object
 Rename (Modify DN)          modifying the DN of an entry
 Bind                        server connection
 Unbind                      logout
 Abandon                     Giving up a running operation
 Extended                    extended operation (v3)

Page  27
Search/compare queries parameters



            Parameter                              Description
    base object          the location of the tree where the search must begin
    scope                depth research
    derefAliases         if you follow the links or not
    size limit           limit number of responses
    time limit           maximum time allocated for research
    attrOnly             returns or not the value of attributes in addition to their type
    search filter        Search Filter
    list of attributes   list of attributes that you want to know



Page  28
Security model



    o Define    for    each       user   data    access    rights
      (authentication control list access)




    o Ensuring the confidentiality of trade (encryption)




Page  29
Replication model


     o Duplicate a directory on multiple servers


     o Prevent     network      outages,     overload   of
      service or the server crashes


     o Master-slave structure




Page  30
LDAP software


    o Server software


             OpenLDAP server
             Netscape Directory Server
             IBM's DSSeries LDAP Directory


    o Client software


             Netscape Communicator
             Microsoft Outlook

Page  31
Configure a LDAP on a server


 Installation of the package slapd and ldap-utils:
                   sudo apt-get install slapd ldap-utils

 Modifying the configuration:
                   sudo dpkg-reconfigure slapd

 A password for the administrator:
                   sudo slappasswd
 Edit the configuration file «/etc/ldap/slapd.conf »

            suffix "dc=example,dc=com" directory "/var/lib/ldap"
            rootdn "cn=admin,dc=example,dc=com" rootpw
            {SSHA}d2BamRTgBuhC6SxC0vFGWol31ki8iq5m



Page  32
Conclusion


       o LDAP can become the information system key now


       o LDAP is available on many types of platforms


       o It can centralize information from different sources for
        different applications and different users


       o To simplify data management



Page  33
Thanks for your attention ..




Page  34

Contenu connexe

Tendances

Active Directory Services
Active Directory ServicesActive Directory Services
Active Directory ServicesVarun Arora
 
Introduction to OpenID Connect
Introduction to OpenID Connect Introduction to OpenID Connect
Introduction to OpenID Connect Nat Sakimura
 
Draft: building secure applications with keycloak (oidc/jwt)
Draft: building secure applications with keycloak (oidc/jwt)Draft: building secure applications with keycloak (oidc/jwt)
Draft: building secure applications with keycloak (oidc/jwt)Abhishek Koserwal
 
Secure your app with keycloak
Secure your app with keycloakSecure your app with keycloak
Secure your app with keycloakGuy Marom
 
Building secure applications with keycloak
Building secure applications with keycloak Building secure applications with keycloak
Building secure applications with keycloak Abhishek Koserwal
 
LDAP Presentation
LDAP PresentationLDAP Presentation
LDAP Presentationcyberleon95
 
OWASP Chicago 2016 - What is Attribute Based Access Control (ABAC)?
OWASP Chicago 2016 - What is Attribute Based Access Control (ABAC)?OWASP Chicago 2016 - What is Attribute Based Access Control (ABAC)?
OWASP Chicago 2016 - What is Attribute Based Access Control (ABAC)?David Brossard
 
introduction about REST API
introduction about REST APIintroduction about REST API
introduction about REST APIAmilaSilva13
 
OpenID Connect: An Overview
OpenID Connect: An OverviewOpenID Connect: An Overview
OpenID Connect: An OverviewPat Patterson
 
REST API and CRUD
REST API and CRUDREST API and CRUD
REST API and CRUDPrem Sanil
 
OAuth & OpenID Connect Deep Dive
OAuth & OpenID Connect Deep DiveOAuth & OpenID Connect Deep Dive
OAuth & OpenID Connect Deep DiveNordic APIs
 
What's new in API Connect and DataPower - 2019
What's new in API Connect and DataPower - 2019What's new in API Connect and DataPower - 2019
What's new in API Connect and DataPower - 2019IBM DataPower Gateway
 
SAML VS OAuth 2.0 VS OpenID Connect
SAML VS OAuth 2.0 VS OpenID ConnectSAML VS OAuth 2.0 VS OpenID Connect
SAML VS OAuth 2.0 VS OpenID ConnectUbisecure
 
Microsoft Active Directory
Microsoft Active DirectoryMicrosoft Active Directory
Microsoft Active Directorythebigredhemi
 

Tendances (20)

Laravel Introduction
Laravel IntroductionLaravel Introduction
Laravel Introduction
 
Active Directory Services
Active Directory ServicesActive Directory Services
Active Directory Services
 
Introduction to OpenID Connect
Introduction to OpenID Connect Introduction to OpenID Connect
Introduction to OpenID Connect
 
Draft: building secure applications with keycloak (oidc/jwt)
Draft: building secure applications with keycloak (oidc/jwt)Draft: building secure applications with keycloak (oidc/jwt)
Draft: building secure applications with keycloak (oidc/jwt)
 
Secure your app with keycloak
Secure your app with keycloakSecure your app with keycloak
Secure your app with keycloak
 
laravel.pptx
laravel.pptxlaravel.pptx
laravel.pptx
 
Building secure applications with keycloak
Building secure applications with keycloak Building secure applications with keycloak
Building secure applications with keycloak
 
Keycloak SSO basics
Keycloak SSO basicsKeycloak SSO basics
Keycloak SSO basics
 
Active directory slides
Active directory slidesActive directory slides
Active directory slides
 
LDAP Presentation
LDAP PresentationLDAP Presentation
LDAP Presentation
 
Laravel ppt
Laravel pptLaravel ppt
Laravel ppt
 
OWASP Chicago 2016 - What is Attribute Based Access Control (ABAC)?
OWASP Chicago 2016 - What is Attribute Based Access Control (ABAC)?OWASP Chicago 2016 - What is Attribute Based Access Control (ABAC)?
OWASP Chicago 2016 - What is Attribute Based Access Control (ABAC)?
 
introduction about REST API
introduction about REST APIintroduction about REST API
introduction about REST API
 
OpenID Connect: An Overview
OpenID Connect: An OverviewOpenID Connect: An Overview
OpenID Connect: An Overview
 
REST API and CRUD
REST API and CRUDREST API and CRUD
REST API and CRUD
 
OAuth & OpenID Connect Deep Dive
OAuth & OpenID Connect Deep DiveOAuth & OpenID Connect Deep Dive
OAuth & OpenID Connect Deep Dive
 
What's new in API Connect and DataPower - 2019
What's new in API Connect and DataPower - 2019What's new in API Connect and DataPower - 2019
What's new in API Connect and DataPower - 2019
 
Introducing ELK
Introducing ELKIntroducing ELK
Introducing ELK
 
SAML VS OAuth 2.0 VS OpenID Connect
SAML VS OAuth 2.0 VS OpenID ConnectSAML VS OAuth 2.0 VS OpenID Connect
SAML VS OAuth 2.0 VS OpenID Connect
 
Microsoft Active Directory
Microsoft Active DirectoryMicrosoft Active Directory
Microsoft Active Directory
 

En vedette

Distributed computing time
Distributed computing timeDistributed computing time
Distributed computing timeDeepak John
 
Flexible Symmetric Global Snapshot
Flexible Symmetric Global Snapshot Flexible Symmetric Global Snapshot
Flexible Symmetric Global Snapshot Ashutosh Jaiswal
 
Distributed Snapshots
Distributed SnapshotsDistributed Snapshots
Distributed Snapshotsawesomesos
 
Naming And Binding (Distributed computing)
Naming And Binding (Distributed computing)Naming And Binding (Distributed computing)
Naming And Binding (Distributed computing)Sri Prasanna
 
network filesystem briefs
network filesystem briefsnetwork filesystem briefs
network filesystem briefsbergwolf
 
Global state recording in Distributed Systems
Global state recording in Distributed SystemsGlobal state recording in Distributed Systems
Global state recording in Distributed SystemsArsnet
 
Day 2 global_state_and_snapshot_algorithms
Day 2 global_state_and_snapshot_algorithmsDay 2 global_state_and_snapshot_algorithms
Day 2 global_state_and_snapshot_algorithmsVI Ni
 
Posix threads(asha)
Posix threads(asha)Posix threads(asha)
Posix threads(asha)Nagarajan
 
Lamport’s algorithm for mutual exclusion
Lamport’s algorithm for mutual exclusionLamport’s algorithm for mutual exclusion
Lamport’s algorithm for mutual exclusionNeelamani Samal
 
clock synchronization in Distributed System
clock synchronization in Distributed System clock synchronization in Distributed System
clock synchronization in Distributed System Harshita Ved
 
Mutual Exclusion Election (Distributed computing)
Mutual Exclusion Election (Distributed computing)Mutual Exclusion Election (Distributed computing)
Mutual Exclusion Election (Distributed computing)Sri Prasanna
 
Chapter 4 a interprocess communication
Chapter 4 a interprocess communicationChapter 4 a interprocess communication
Chapter 4 a interprocess communicationAbDul ThaYyal
 
Clock Synchronization in Distributed Systems
Clock Synchronization in Distributed SystemsClock Synchronization in Distributed Systems
Clock Synchronization in Distributed SystemsZbigniew Jerzak
 

En vedette (20)

Distributed computing time
Distributed computing timeDistributed computing time
Distributed computing time
 
Flexible Symmetric Global Snapshot
Flexible Symmetric Global Snapshot Flexible Symmetric Global Snapshot
Flexible Symmetric Global Snapshot
 
Distributed Snapshots
Distributed SnapshotsDistributed Snapshots
Distributed Snapshots
 
Naming And Binding (Distributed computing)
Naming And Binding (Distributed computing)Naming And Binding (Distributed computing)
Naming And Binding (Distributed computing)
 
network filesystem briefs
network filesystem briefsnetwork filesystem briefs
network filesystem briefs
 
Global state recording in Distributed Systems
Global state recording in Distributed SystemsGlobal state recording in Distributed Systems
Global state recording in Distributed Systems
 
Day 2 global_state_and_snapshot_algorithms
Day 2 global_state_and_snapshot_algorithmsDay 2 global_state_and_snapshot_algorithms
Day 2 global_state_and_snapshot_algorithms
 
Posix threads(asha)
Posix threads(asha)Posix threads(asha)
Posix threads(asha)
 
Distributed Systems Naming
Distributed Systems NamingDistributed Systems Naming
Distributed Systems Naming
 
Coda file system tahir
Coda file system   tahirCoda file system   tahir
Coda file system tahir
 
Posix Threads
Posix ThreadsPosix Threads
Posix Threads
 
Coda file system
Coda file systemCoda file system
Coda file system
 
Lamport’s algorithm for mutual exclusion
Lamport’s algorithm for mutual exclusionLamport’s algorithm for mutual exclusion
Lamport’s algorithm for mutual exclusion
 
LDAP Theory
LDAP TheoryLDAP Theory
LDAP Theory
 
clock synchronization in Distributed System
clock synchronization in Distributed System clock synchronization in Distributed System
clock synchronization in Distributed System
 
Mutual Exclusion Election (Distributed computing)
Mutual Exclusion Election (Distributed computing)Mutual Exclusion Election (Distributed computing)
Mutual Exclusion Election (Distributed computing)
 
Chapter 4 a interprocess communication
Chapter 4 a interprocess communicationChapter 4 a interprocess communication
Chapter 4 a interprocess communication
 
6.Distributed Operating Systems
6.Distributed Operating Systems6.Distributed Operating Systems
6.Distributed Operating Systems
 
Clock Synchronization in Distributed Systems
Clock Synchronization in Distributed SystemsClock Synchronization in Distributed Systems
Clock Synchronization in Distributed Systems
 
first pitch
first pitchfirst pitch
first pitch
 

Similaire à Ldap

Ldap system administration
Ldap system administrationLdap system administration
Ldap system administrationAli Abdo
 
Directory Introduction
Directory IntroductionDirectory Introduction
Directory IntroductionAidy Tificate
 
Directory Servers and LDAP
Directory Servers and LDAPDirectory Servers and LDAP
Directory Servers and LDAPWildan Maulana
 
X.500 More Than a Global Directory
X.500 More Than a Global DirectoryX.500 More Than a Global Directory
X.500 More Than a Global Directorylurdhu agnes
 
Open LDAP vs. Active Directory
Open LDAP vs. Active DirectoryOpen LDAP vs. Active Directory
Open LDAP vs. Active DirectoryAhmad Haghighi
 
Ldapsession 1217528612650451-9
Ldapsession 1217528612650451-9Ldapsession 1217528612650451-9
Ldapsession 1217528612650451-9rezgui
 
UnderstandingLDAP.ppt
UnderstandingLDAP.pptUnderstandingLDAP.ppt
UnderstandingLDAP.pptEfrizal Zaida
 
Introduction to Fauna
Introduction to FaunaIntroduction to Fauna
Introduction to Faunaalialaei7
 
Directory services by SAJID
Directory services by SAJIDDirectory services by SAJID
Directory services by SAJIDSajid khan
 
3.Implementation with NOSQL databases Document Databases (Mongodb).pptx
3.Implementation with NOSQL databases Document Databases (Mongodb).pptx3.Implementation with NOSQL databases Document Databases (Mongodb).pptx
3.Implementation with NOSQL databases Document Databases (Mongodb).pptxRushikeshChikane2
 
CIS13: A Breakthrough in Directory Technology: Meet the Elephant in the Room ...
CIS13: A Breakthrough in Directory Technology: Meet the Elephant in the Room ...CIS13: A Breakthrough in Directory Technology: Meet the Elephant in the Room ...
CIS13: A Breakthrough in Directory Technology: Meet the Elephant in the Room ...CloudIDSummit
 
Overview of oracle database
Overview of oracle databaseOverview of oracle database
Overview of oracle databaseSamar Prasad
 
Overview of oracle database
Overview of oracle databaseOverview of oracle database
Overview of oracle databaseSamar Prasad
 
Open Ldap Integration and Configuration with Lifray 6.2
Open Ldap Integration and Configuration with Lifray 6.2Open Ldap Integration and Configuration with Lifray 6.2
Open Ldap Integration and Configuration with Lifray 6.2Vinaykumar Hebballi
 

Similaire à Ldap (20)

Ldap system administration
Ldap system administrationLdap system administration
Ldap system administration
 
Directory Introduction
Directory IntroductionDirectory Introduction
Directory Introduction
 
Ldap
LdapLdap
Ldap
 
Directory Servers and LDAP
Directory Servers and LDAPDirectory Servers and LDAP
Directory Servers and LDAP
 
X.500 More Than a Global Directory
X.500 More Than a Global DirectoryX.500 More Than a Global Directory
X.500 More Than a Global Directory
 
Open LDAP vs. Active Directory
Open LDAP vs. Active DirectoryOpen LDAP vs. Active Directory
Open LDAP vs. Active Directory
 
Ldapsession 1217528612650451-9
Ldapsession 1217528612650451-9Ldapsession 1217528612650451-9
Ldapsession 1217528612650451-9
 
Ldapsession
LdapsessionLdapsession
Ldapsession
 
UnderstandingLDAP.ppt
UnderstandingLDAP.pptUnderstandingLDAP.ppt
UnderstandingLDAP.ppt
 
Lee oracle
Lee oracleLee oracle
Lee oracle
 
Introduction to Fauna
Introduction to FaunaIntroduction to Fauna
Introduction to Fauna
 
70 640 Lesson01 Ppt 041009
70 640 Lesson01 Ppt 04100970 640 Lesson01 Ppt 041009
70 640 Lesson01 Ppt 041009
 
LDAP
LDAPLDAP
LDAP
 
Directory services by SAJID
Directory services by SAJIDDirectory services by SAJID
Directory services by SAJID
 
3.Implementation with NOSQL databases Document Databases (Mongodb).pptx
3.Implementation with NOSQL databases Document Databases (Mongodb).pptx3.Implementation with NOSQL databases Document Databases (Mongodb).pptx
3.Implementation with NOSQL databases Document Databases (Mongodb).pptx
 
Metadata: A concept
Metadata: A conceptMetadata: A concept
Metadata: A concept
 
CIS13: A Breakthrough in Directory Technology: Meet the Elephant in the Room ...
CIS13: A Breakthrough in Directory Technology: Meet the Elephant in the Room ...CIS13: A Breakthrough in Directory Technology: Meet the Elephant in the Room ...
CIS13: A Breakthrough in Directory Technology: Meet the Elephant in the Room ...
 
Overview of oracle database
Overview of oracle databaseOverview of oracle database
Overview of oracle database
 
Overview of oracle database
Overview of oracle databaseOverview of oracle database
Overview of oracle database
 
Open Ldap Integration and Configuration with Lifray 6.2
Open Ldap Integration and Configuration with Lifray 6.2Open Ldap Integration and Configuration with Lifray 6.2
Open Ldap Integration and Configuration with Lifray 6.2
 

Plus de Higher Private School of Engineering and Technology (15)

Cloud computing
Cloud computingCloud computing
Cloud computing
 
VOIP
VOIPVOIP
VOIP
 
Unified communication
Unified communicationUnified communication
Unified communication
 
Streaming
StreamingStreaming
Streaming
 
Sensor networks
Sensor networksSensor networks
Sensor networks
 
Qo s
Qo sQo s
Qo s
 
Peer topeer
Peer topeerPeer topeer
Peer topeer
 
Mobile applications
Mobile applicationsMobile applications
Mobile applications
 
I pv6
I pv6I pv6
I pv6
 
Intenet of things
Intenet of thingsIntenet of things
Intenet of things
 
Help desk
Help deskHelp desk
Help desk
 
Ha
HaHa
Ha
 
Geolocalisation
GeolocalisationGeolocalisation
Geolocalisation
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Virtualization
VirtualizationVirtualization
Virtualization
 

Dernier

ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 

Dernier (20)

ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 

Ldap

  • 2. Outline o Introduction o Directory vs Database o Current directory o Directory features o History o Understanding LDAP  Information model  Naming model  Ldap directory structure  Functional model  Security Model  Replication model o LDAP software o Configure a LDAP on a server o Conclusion Page  2
  • 3. Introduction (1/2) To improve functionality and ease-of-use, and to enable cost- effective administration of distributed applications: information about the services:  resources  users  and other objects accessible from the applications  needs to be organized in a clear and consistent manner. Much of this information can be shared among many applications. Page  3
  • 4. Introduction (2/2) But it must also be protected Such information is often collected into a special database that is sometimes called a directory.  The Lightweight Directory Access Protocol (LDAP) is an open industry standard that has evolved to meet these needs . 4 Page
  • 5. Before moving to the following!!!!  What is a Directories Is it a data base as commonly said Let us knowing the difference  Directory vs Database Page  5
  • 6. Directory vs Database!!!!(1/2) o A directory is often described as a database oBut it has special characteristics different from general databases:  They are accessed much more than they are updated. And they are optimized for read access  They are not suited for information that changes rapidly (number of jobs in a printer queue) Page  6
  • 7. Directory vs Database!!!!(2/2)  Many directory services don’t support transactions  Directories normally limits the type of information that can be stored  Databases use powerful query languages like SQL but Directories normally use very simple access methods  Hence directories can be optimized to economically provide more applications with rapid access Page  7
  • 8. Current directories o Paper Directories  Phonebook  Address Book  Sales Catalog o Electronic Directories  DNS  Windows registry Page  8
  • 9. Directory features oA directory is a listing of information about objects arranged in some order that gives details about each object. o Dynamic (real time update) o Flexible (easy change of type and data organization) o Secure (who sees what) o Personalized (how to present data,…) Page  9
  • 11. History:(2/2) o LDAP version 3  Consideration of special characters  Security : SASL authentication and TLS encryption (Transport Layer Security)  Overloading operations Page  11
  • 12. Understanding LDAP?(1/2) What’s LDAP!!!  Lightweight Directory Access Protocol  An application protocol for querying and modifying directory services running over TCP/IP Information  Structure of information stored in an LDAP directory. Page  12
  • 13. Understanding LDAP?(2/2) Naming • How information is organized and identified. Functional / Operations • Describes what operations can be performed on the information stored in an LDAP directory. Security  Describes how the information can be protected from unauthorized access. Page  13
  • 14. Information model o Based on X.500 model o Information stored in DIT (Directory Information Tree) Hierarchical model o An entry contains a set of attributes type of attribute- attribute value(s) Page  14
  • 15. Each Tree has o DIT ( Directory Information Tree) : top of the Tree o Nodes called DSE (Directory service Entry) o RootDSE (contains a description of the tree and its content), specific to each LDAP server Page  15
  • 16. Each entry is an object Type Value Value Attribute Attribute Value Attribute Entry Page  16
  • 17. Two types of attributes o Normal attributes : accessible to users (givenname attribute) o Operational attributes : used only for server administration data (modifyTimeStamp attribute ) Page  17
  • 18. An attribute is characterized by Page  18
  • 19. Object class o Contains real or abstract objects o It characterizes them by a list of optional and required attributes o All object classes are contained in the directory schema Page  19
  • 20. An object class is defined by o A name that identifies o An OID that also identifies o Required attributes o Optional attributes o A type (structural, auxiliary or abstract) Page  20
  • 21. Three types of object class Structural class Auxiliary class Abstract class Description of basic objects in the Contains objects directory. that can add Contains basic additional LDAP objects like informations to top or alias An entry belongs structural objects always at least to one structural object class Page  21
  • 22. Naming model o Naming constraints to ensure interoperability between directories o Each entry is uniquely identified by:  Relative Distinguished Name (RDNs)  Distinguished Name (DN) Page  22
  • 23. LDAP Data Interchange Format (LDIF) o LDAP data represented in standard text format o It is used to view or edit the data base o The format used is ASCII, binary data are encoded in base 64 o LDIF is used :  to import / export base  to make changes to entries Page  23
  • 26. Functional model o The functional model describes how to access data o Update functions : add, modify, delete, rename o Session functions : bind, unbind Page  26
  • 27. Basic operations LDAP operation Description Search search directory objects using criteria Compare comparing the contents of two objects Add Adding an entry Modify modifying the contents of an entry Delete Deleting an object Rename (Modify DN) modifying the DN of an entry Bind server connection Unbind logout Abandon Giving up a running operation Extended extended operation (v3) Page  27
  • 28. Search/compare queries parameters Parameter Description base object the location of the tree where the search must begin scope depth research derefAliases if you follow the links or not size limit limit number of responses time limit maximum time allocated for research attrOnly returns or not the value of attributes in addition to their type search filter Search Filter list of attributes list of attributes that you want to know Page  28
  • 29. Security model o Define for each user data access rights (authentication control list access) o Ensuring the confidentiality of trade (encryption) Page  29
  • 30. Replication model o Duplicate a directory on multiple servers o Prevent network outages, overload of service or the server crashes o Master-slave structure Page  30
  • 31. LDAP software o Server software  OpenLDAP server  Netscape Directory Server  IBM's DSSeries LDAP Directory o Client software  Netscape Communicator  Microsoft Outlook Page  31
  • 32. Configure a LDAP on a server  Installation of the package slapd and ldap-utils: sudo apt-get install slapd ldap-utils  Modifying the configuration: sudo dpkg-reconfigure slapd  A password for the administrator: sudo slappasswd  Edit the configuration file «/etc/ldap/slapd.conf » suffix "dc=example,dc=com" directory "/var/lib/ldap" rootdn "cn=admin,dc=example,dc=com" rootpw {SSHA}d2BamRTgBuhC6SxC0vFGWol31ki8iq5m Page  32
  • 33. Conclusion o LDAP can become the information system key now o LDAP is available on many types of platforms o It can centralize information from different sources for different applications and different users o To simplify data management Page  33
  • 34. Thanks for your attention .. Page  34