O'Reilly logo

LDAP Implementation Cookbook by Permana Widhiasta, Harri Stranden, Michel Melot, Heinz Johner

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

5.5. Delegation Model

This section provides a discussion of four alternative solutions that could be used to implement delegation for SSL. Note that delegation is not supported natively by LDAP, and the following discussion, therefore, applies to applications that use LDAP. An example is used to illustrate the four alternatives.

There are several requirements pertaining to the delegation for SSL. The example below that we use throughout this section depicts a typical scenario for delegation (others can be derived from this one). Four solutions are presented to solve the lack of standardized delegation in SSL.

In the example shown in Figure 24, Mary, on a client machine, uses a Web browser to contact a middle tier server (MTS) using HTTP with ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required