P. 1
Assignment No1 LDAP

Assignment No1 LDAP

|Views: 123|Likes:
Published by inayyer

More info:

Published by: inayyer on Nov 18, 2010
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as DOC, PDF, TXT or read online from Scribd
See more
See less





Advanced Operating Systems

Assignment No.1 By Imran Nayyer Roll # 1433 Ms (CS) 1st Topic: LDAP

will seldom be modified. This is not the case with an LDAP directory. in an LDAP directory there can be one attribute with the name telephone number but with multiple values. making it more efficient and easier to implement than DAP. Question No. traditional databases have been built for transaction integrity and consistency. The way a directory organizes data is considerably different from how a traditional database organizes it. and there is one and only one field with this name as far as the record is concerned. Thus the lightweightness of LDAP comes from it being a simple protocol handling simple data. the directory is most likely to perform better than the database in terms of processing a query for the telephone . In such a situation.3: Describe at least six differences between directories and databases. LDAP uses primitive string encodings for most data elements. for example. Answer: LDAP was designed and optimized to handle simple data.500 DAP. leaving out many of the lesser-used features. This difference is explicit on the following counts: 1: Databases usually have only fields with unique names within a record. an employee record in a database may have a field named telephone number. Question No. So what if an employee has two telephone numbers. This is not really a priority for LDAP where the data is most often read than written. one representing the work number and the other representing the mobile number. However. say one work number and a second cell phone number? 2: In a traditional database.2: What is LDAP? Answer: The Lightweight Directory Access Protocol (LDAP) is an application protocol for querying and modifying data of directory services implemented in Internet Protocol (IP) networks. there could be two fields with the same name telephone number. this is solved by representing the numbers as a separate telephone number table with the employee ids used to relate them to a particular employee. It runs directly over TCP.Question No. which once written. which is essentially a text-based directory storage system.1: What does LDAP stands for? Answer: LDAP stands for Lightweight Directory Access Protocol. an employee record has one field with the name telephone number. as opposed to LDAP. For example. Traditional databases have been designed and optimized for both query and update operations on data and are designed to handle highly complex data. and makes several simplifications to full X. Further.

This is changing with the development of second generation Directory Servers and while it is likely that RDBMS will always remain faster than LDAP the gap is reducing significantly to the point where. be eminently suitable for maintaining details of the bank branches. It is thus possible to replace the LDAP implementation completely without affecting the external interface to the data.. assuming you compare like with like. It does implicitly ignore the use of Directories for transaction processing .though even here there are signs that LDAP implementations are looking at such capabilities. Because LDAP uses standardized data access methods Clients and Servers may be sourced (or developed) independently. LDAP would. however. 3: LDAP is characterized as a 'write-once-read-many-times' service. The above definition focuses exclusively on the standard nature of LDAP data access and does not consider the ratio of reads to writes which.numbers of an employee.. . RDBMS systems provide local access standards such as SQL but remote interfaces tend to be proprietary. employees etc. will depend on the number of operational indices maintained. LDAP provides a method whereby data may be moved (delegated) to multiple locations without affecting any external access to that data. hours of opening. In general RDBMS systems are still significantly faster than LDAP implementations. they change on every access (transaction). (a measured network initiated transaction) the differences will become increasingly non-existent . So why use LDAP? Here is our list of key characteristics which make the (currently) high level of pain worthwhile.in which case you deserve everything you (don't) get. Such a fluid scheme is one of the reasons that queries are processed very fast in a LDAP directory. 4: Visibility of Data Organization 5: Data Synchronization 6: So what are LDAP (Directory) advantages and why would any sane human being use a directory? Before attempting to answer the question let's dismiss the tactical issue of performance. by their nature. By using referral methods LDAP data can be moved to alternate LDAP servers by changing operation parameters only.unless you update a highly indexed attribute on every operation . LDAP provides a remote and local data access method that is standardized. That is to say. the type of data that would normally be stored in an LDAP service would not be expected to change on every access. as noted above. To illustrate: LDAP would NOT be suitable for maintaining banking transaction records since. LDAP systems can be operationally configured to replicate data to one or more application without adding either code or changing the external access to that data.

The scope of information to be stored in a directory is often given as an application requirement. must be kept up-to-date and in running order. The DNS server looks up an internal table that maintains a mapping between a DNS name and the IP address of the machine that hosts the web site. The mail server looks up an internal table to locate the host machine on which the recipient of the message has an account. clients in a single location can access a directory containing information about everybody in the world that is stored by a single directory server. and that directory can be replicated at many directory servers. The server returns the mapping to the browser that now talks directly to the web server using its IP address. a distributed and replicated directory might perform better because a read request can be serviced by a nearby server. we refer to a yellow pages directory. possibly under the control of multiple administrators. . We use white pages directories when we need to find something specific about a person or a business about which we know something distinguishing such as the name of the person or the name of the business. a distributed directory might be more difficult to maintain because multiple sites. there are now quite a few installations where DNS lookup is directory enabled using DNS-toLDAP gateways. such information can reside in a directory and can be accessed by any client that can speak the protocol of the directory. Similarly.Question No. when the name of a website is typed into a browser. For example. In fact. We use directories when we use e-mail or a web browser. A centralized directory may be less available because it is a single point of failure.4: What are three dimensions of a directory and how they are different from each other? Answer: The three dimensions of a directory are 1: scope of information 2: location of clients 3: distribution of servers All are independent of each other. The email client sends a mail message to a mail server. The generic example of a directory would be a telephone directory or an address book. When we need to find more general information about a group. However. clients scattered across the globe can access a directory containing only information about a single department. the browser contacts a Domain Name System (DNS) server. say we need to find the list of all local merchants who specialize in selling reusable widgets. Or. The distribution of directory servers and the way in which data is partitioned or replicated can often be controlled to affect the performance and availability of the directory. For example. Ideally.

though X. Question No. emulating them via the search operation.5: What is DAP? How is LDAP different from DAP? Answer: LDAP has four key advantages over DAP.” Second. LDAP data elements are string types. . This encoding is a big win for distinguished names. which have considerable structure leading to encoding/ decoding complexity and size.1 and BER [12].7: What is stand alone LDAP server? Answer: LDAP server is the server that LDAP clients interact with to obtain directory information.500 uses a complex and highly-structured encoding even for simple data elements.. LDAP uses string encodings for distinguished names and data elements. X. the ability to sign operations). the near universal availability of TCP/IP implementations means that LDAP can run on most systems “out of the box. In addition. LDAP simplifies the X. It leaves out the read and list operations. The actual data is stored in a datastore (usually a database). returning either results or errors to the client. LDAP frees clients from the burden of chasing referrals.500 appears as a single logical directory. This simplifies LDAP implementations.500 functional model in two ways. Third.500 and LDAP both describe and encode protocol elements using ASN. Question No. The LDAP server is responsible for chasing down any referrals returned by X.6: Was LDAP version 2 an internet standard in 1998? Is it now? Answer: Yes LDAP version 2 was an Internet standard in 1998 and it is still an internet standard. First. it runs directly over TCP (or other reliable transport. eliminating much of the connection set-up and packet-handling overhead of the OSI session and presentation layers required by DAP. Clients assume a single connection model in which X. in theory). LDAP relegates the knowledge of a value’s syntax to the application program rather than lower level protocol routines.500 (e. Fourth. It also leaves out some of the more esoteric and less-oftenused service controls and security features of full X.Question No.g. The datastore is hidden from the clients since the server knows how to retrieve information from the datastore and present it to the clients in a common format.500.

and os400-gid attributes in search filters. 1: Bind An LDAP client can bind (authenticate) to the LDAP server using a projected user profile. 5: Delete User profiles can be deleted using the LDAP delete operation.8: Describe six types of operations that LDAP defines on directory entries. However. For certain filters. which is a group profile. 2: Search The system projected backend supports some basic search filters. The os400-gid attribute is limited to specifying (os400-gid=0). 3: Compare The LDAP compare operation can be used to compare an attribute value of a projected user profile. Refer to the Delete User Profile (DLTUSRPRF) command for more information about the behavior of these parameters. only the DN object class and os400-profile values are returned. . To specify the behavior of the DLTUSRPRF OWNOBJOPT and PGPOPT parameters. This is accomplished by specifying the projected user profile distinguished name (DN) for the bind DN and the correct i5/OS™ user profile password for authentication. The os400-profile attribute supports wildcards. These controls can be specified on the LDAP delete operation. two LDAP server controls are now provided. You can retrieve all attributes of a user profile except the password and similar attributes. You can specify the object class. The os400-aut and os400-docpwd attributes cannot be compared. subsequent searches can be conducted to return more detailed information. os400-profile. Answer: The following are the LDAP operations that can be performed using the projected user profiles. which is an individual user profile. 6: ModRDN You cannot rename projected user profiles because this is not supported by the operating system.Question No. or! (Os400-gid=0). 4: Add and modify You can create user profiles using the LDAP add operation and you can also modify user profiles using the LDAP modify operation.

which can do what to what data.wow.9: Name and briefly summarize the four models on which LDAP is based. search.Question No. we reference security implications in the text. in a very fine-grained manner. 3: Functional Model When you read. dc=com' stuff that you stumble across in LDAP systems. 2: Naming Model This defines all that 'dc=example.forget security. We progressively introduce the concepts and have dedicated a specific chapter to it. This is complex but powerful stuff. The Data (or Informational) Model defines how the information or data is represented in an LDAP enabled system . To begin with . write or modify the LDAP you are using the Functional Model . We stick pretty much to the specifications here because the terms are so widely used. Where you cannot retro-fit.this may. . in our view a more intuitive and understandable term. or may NOT. be the way the data is actually stored as explained above. You can always go back and retro-fit security in LDAP. 4: Security Model You can control. Answer: 1: Information Model We tend to use the term Data Model.

wikipedia.html http://www.com/Authoring/Languages/PHP/Pro/prophp1_2.wdvl.com/Authoring/Languages/PHP/Pro/prophp1_4.org/wiki/LDAP . References: http://www.wdvl.html http://www.Note: The information provided in this assignment is 100% my own search from the following links below. No material has been copied from any other student.com/books/ldap/ch2/ http://en.zytrax.

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->