O'Reilly logo

LDAP Implementation Cookbook by Permana Widhiasta, Harri Stranden, Michel Melot, Heinz Johner

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

3.3. Evaluate Data and Its Relationship to Directory Schema

Rather than defining the data as if it is the only data in the directory and the application the sole application, the design point is to evaluate the data you defined in the previous step against the default schema defined for the IBM SecureWay Directory (see Chapter 2, “Schema and Namespace” on page 31). The design objective for directory exploitation projects is to maximize the sharing of common objects and attributes. For each piece of data, determine the name of the attribute(s) that you will use to represent the data in the directory and the object class(es), that is, the type of entry, that the data will be stored on. Wherever possible, you should use existing schema for your ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required