O'Reilly logo

Understanding and Deploying LDAP Directory Services, Second Edition by Timothy A. Howes - Ph.D., Mark C. Smith, Gordon S. Good

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 12. Privacy and Security Design

  • Security Guidelines

  • The Purpose of Security

  • Security Threats

  • Security Tools

  • Analyzing Your Security and Privacy Needs

  • Designing for Security

  • Privacy and Security Design Checklist

  • Further Reading

  • Looking Ahead

No discussion of directory design would be complete without at least one chapter explaining how to secure the information in your directory and protect the privacy of your users. Without such safeguards, the types of directory applications that can be supported by your directory are severely limited.

If the information in your directory is not secured and you cannot be sure whether it has been tampered with, the applications that use the data are limited to those unconcerned with the accuracy or completeness ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required