O'Reilly logo

LDAP Implementation Cookbook by Permana Widhiasta, Harri Stranden, Michel Melot, Heinz Johner

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

5.1. Security of the Directory

The directory may contain many types of information ranging from publicly accessible data, such as e-mail addresses, to very sensitive data like user passwords. Hence the appropriate level of security for the data in the directory must exist.

In particular, the IBM SecureWay Directory provides (explained in the section that follows):

AuthenticationThe requester must prove his/her/its identity to the directory. This is supported using the SASL/CRAM-MD5 mechanism and certificates using SASL/SSL.
Access ControlThe directory server only returns data that the requester is entitled to access. In other words, the requester must have adequate authorization. This is implemented through the use of Access Control Lists (ACLs). ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required