Understanding and deploying LDAP directory services:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boston [u.a.]
Addison-Wesley
2003
|
Ausgabe: | 2. ed. |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Includes bibliographical references and index. - Erscheint: April 2003 |
Beschreibung: | XXXIV, 899 S. Ill., graph. Darst. |
ISBN: | 0672323168 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV016474938 | ||
003 | DE-604 | ||
005 | 20030807 | ||
007 | t | ||
008 | 030128s2003 xxuad|| |||| 00||| eng d | ||
010 | |a 2003000318 | ||
020 | |a 0672323168 |9 0-672-32316-8 | ||
035 | |a (OCoLC)51478218 | ||
035 | |a (DE-599)BVBBV016474938 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-92 |a DE-91G |a DE-M158 |a DE-522 |a DE-1049 |a DE-188 | ||
050 | 0 | |a TK5105.595 | |
082 | 0 | |a 005.7/1369 |2 21 | |
084 | |a ST 201 |0 (DE-625)143612: |2 rvk | ||
084 | |a DAT 252f |2 stub | ||
100 | 1 | |a Howes, Tim |e Verfasser |4 aut | |
245 | 1 | 0 | |a Understanding and deploying LDAP directory services |c Timothy A. Howes ; Mark C. Smith ; Gordon S. Good |
250 | |a 2. ed. | ||
264 | 1 | |a Boston [u.a.] |b Addison-Wesley |c 2003 | |
300 | |a XXXIV, 899 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references and index. - Erscheint: April 2003 | ||
650 | 4 | |a Computer network protocols | |
650 | 4 | |a Directory services (Computer network technology) | |
650 | 4 | |a LDAP (Computer network protocol) | |
650 | 0 | 7 | |a LDAP |0 (DE-588)4537748-0 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a LDAP |0 (DE-588)4537748-0 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Smith, Mark |e Sonstige |4 oth | |
700 | 1 | |a Good, Gordon S. |e Sonstige |4 oth | |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=010185555&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-010185555 |
Datensatz im Suchindex
_version_ | 1804129803158159360 |
---|---|
adam_text | Titel: Understanding and deploying LDAP directory services
Autor: Howes, Timothy A
Jahr: 2003
Contents
Preface xxvii
Acknowledgments xxxi
About the Authors xxxiii
PART I INTRODUCTION TO DIRECTORY SERVICES
AND LDAP i
1, Directory Services Overview and History 3
What a Directory Is 5
Directories Are Dynamic 6
Directories Are Flexible 3
Directories Can Be Secure 10
Directories Can Be Personalized 11
Directory Described 12
What a Directory Can Do for You 24
Finding Things 24
Managing Things 26
Lightweight Database Applications 29
Security Applications 31
What a Directory Is Not 31
Directories versus Databases 32
Directories versus File Systems 33
Directories versus Web Servers 33
Directories versus FTP Servers 34
Directories versus DNS Servers 34
The Complementary Directory 35
v
vi Contents
The History and Origins of LDAP 38
The Dawn of Standard Directories: X.500 38
The Creation and Rise of LDAP
The Key Advantages of LDAP ¦ 1 30
Further Reading 31
Looking Ahead 32
2. Introduction to LDAP 33
What Is LDAP? 53
The LDAP Protocol 54
The LDAP Protocol on the Wire 59
The LDAP Models 60
The LDAP Information Model 60
The LDAP Naming Model 63
The LDAP Functional Model 69
The LDAP Security Model 88
LDIF 93
LDIF Representation of Directory Entries 93
LDIF Update Statements 96
LDAP Server Software 100
LDAP Command-Line Utilities 101
The ldapsearch Command-Line Utility 101
The ldapmodify Command-Line Utility 110
LDAP APIs 115
Overview of the LDAP C API 116
Other LDAP APIs 117
LDAP and Internationalization 118
LDAP Overview Checklist 119
Further Reading 120
Looking Ahead 122
3. LDAPv3 Extensions 123
How LDAPv3 Is Extended 123
LDAP Controls ^24
LDAP Extended Operations 124
SASL Authentication Mechanisms 124
The Root DSE and Extension Discovery 125
Contents vii
Selected LDAPv3 Extensions 127
The ManageDSAIT Control 128
The Persistent Search Request and Entry Change Notification
Response Controls 128
The Server-Side Sorting Request and Response Controls 130
The Virtual List View Request and Response Controls 132
The Proxied Authorization Control 136
Password Expiration Controls 137
Bulk Import Extended Operations 138
The EXTERNAL SASL Mechanism 139
The DIGEST-MD5 SASL Mechanism 140
Future Directions: Where Is LDAP Headed Next? 141
Increased Integration into Operating Systems and
Infrastructure Middleware 141
Emerging Standards Work 141
Other LDAP-Related Standards Work 142
LDAP and XML 143
DSML 143
LDAP Extensions and Future Directions Checklists 145
Further Reading 145
Looking Ahead 146
4. Overview of Netscape Directory Server 147
Basic Installation 148
Extracting and Starting the Setup Program 149
Answering Installation Questions 149
Completing the Installation and Loading Sample Data 152
A Brief Hands-on Tour of Netscape Directory Server 155
Searching 155
Manipulating Netscape Directory Server Databases 160
Controlling Access to Directory Data 167
Changing the Server Configuration Using LDAP 173
Product Focus and Feature Set 176
Origin 176
Product Focus 177
Feature Set 178
Extending the Netscape Server: A Simple Plug-in Example 180
Problem Statement 182
viii Contents
The Design of the Value Constraint Plug-In • 182
The Source Code for the Value Constraint Plug-In 183
Compiling and Installing the Value Constraint Plug-In 191
The Resulting Server Behavior ! 192
Ideas for Improvement ^ : • 196
Further Reading - ;,i •»- !!:. * ; 198
Looking Ahead ¦* i! J ! 1 198
PART II DESIGNING YOUR DIRECTORY SERVICE 199
5. Directory Design Road Map • - • : 201
The Directory Life Cycle * 201
Design n* ¦- 202
Deployment 204
Maintenance 206
Directory Design Checklist 207
Further Reading : 207
Looking Ahead 208
6. Defining Tour Directory Needs 209
Overview of the Directory Needs Definition Process i 210
Step 1: Analyze Your Environment 210
Step 2: Determine and Prioritize Needs 211
Step 3: Choose an Overall Directory Design and
Deployment Approach 212
Step 4: Set Goals and Milestones 212
Analyzing Your Environment 212
Organizational Structure and Geography 213
213
214
215
Computer Systems
The Network
Application Software
Determining and Prioritizing Application Needs 216
Data
Performance
Level of Service
Security
Prioritizing Application Needs
216
217
218
219
219
Contents
ix
Determining and Prioritizing Users Needs and Expectations 220
Asking Your Users 220
Accuracy and Completeness of Data 221
Privacy 222
Audience 222
The Relationship of User Needs to Application Needs 223
Prioritizing Your Users Needs 223
Determining and Prioritizing Deployment Constraints 223
Resources 224
Openness of the Process 224
Skills of the Directory System Designers 224
Skills and Needs of System Administrators 225
The Political Climate 225
Prioritizing Your Deployment Constraints 226
Determining and Prioritizing Other Environmental Constraints 226
Hardware and Software 227
The Network 227
Criticality of Service 228
Security 228
Coexistence with Other Databases and Directories 228
Prioritizing Your Environmental Constraints 228
Choosing an Overall Directory Design and Deployment Approach 229
Match the Prevailing Philosophy 229
Take Constraints into Account 229
Favor Simple over Complex 230
Focus on the Most Important Needs 230
Setting Some Goals and Milestones 230
Goals 230
Milestones 231
Recommendations for Setting Goals and Milestones 232
Defining Your Directory Needs Checklist 233
Further Reading 233
Looking Ahead 234
7. Data Design 235
Data Design Overview 236
Common Data-Related Problems 237
Contents
Creating a Data Policy Statement 239
Identifying Which Data Elements You Need 240
General Characteristics of Data Elements 243
Format 244
The Size of Each Data Value 244
The Number of Distinct Data Values 245
Data Ownership and Restrictions 245
Consumers : 246
Frequency of Changes in Values: Dynamic or Static? 248
Range of Applicability: Shared or Application-Specific? 248
Relationships with Other Data Elements 249
A Data Element Characteristics Example ^ 249
Analyzing Data Elements 251
Sources of Data 251
Other Directory Services and Network Operating Systems 253
Databases 253
Files • / 253
Applications 254
Administrators 254
End Users - ; .• - 254
Maintaining Good Relationships with Other Data Sources 255
Replication
Synchronization
Batch Updates
Political Considerations
Data Design Checklist
Further Reading
Looking Ahead
8. Schema Design
The Purpose of a Schema
Elements of LDAP Schemas
Attributes
Object Classes
Schema Element Summary
Directory Schema Formats
The LDAPv3 Schema Format
The ASN.l Schema Format
255
255
256
257
257
258
258
259
260
261
261
267
272
273
273
Contents
xi
283
284
285
285
286
287
287
287
288
289
289
291
Choosing Names for New Attribute Types and Object Classes 291
Obtaining and Assigning Object Identifiers 292
Modifying Existing Schema Elements 293
Subclassing an Existing Object Class 293
Adding Auxiliary Information to a Directory Object 295
Accommodating New Types of Objects 297
Tips for Defining New Schemas 298
Documenting and Publishing Your Schemas 299
Schema Maintenance and Evolution 300
Establishing a Schema Review Board 300
Granting Permission to Change the Schema Configuration 301
Changing Existing Schemas 301
Upgrading Directory Service Software 301
Schema Design Checklist 301
Further Reading 302
Looking Ahead 303
9. Namespace Design 305
The Structure of a Namespace 306
The Purposes of a Namespace 309
Analyzing Your Namespace Needs 313
Choosing a Suffix 313
Flat and Hierarchical Schemes 315
Naming Attributes 318
Application Considerations 320
The Schema-Checking Process
Schema-Checking Examples
Schema Design Overview
A Few Words about Schema Configuration
The Relationship of Schema Design to Data Design
Let s Call the Whole Thing Off
Sources of Predefined Schemas
Directory-Enabled Applications
Standard Schemas
Schemas Provided by Directory Vendors
Adding a Schema to an Installed Directory Server
Defining New Schema Elements
xii Contents
Administrative Considerations of Naming Attributes and RDNs 322
222
Privacy Considerations ......
324
Anticipating the Future •
Examples of Namespaces * -
Flat Namespace Examples : ¦ 323
Hierarchical Namespace Examples ^ 326
Namespace Design Checklist ¦ * - 323
Further Reading 328
Looking Ahead 32^
10. Topology Design 331
Directory Topology Overview r r • 332
Definition of a Partition ¦ 1 333
Gluing the Directory Together: Knowledge References 336
Name Resolution in the Distributed Directory 337
Configuring a Distributed Directory 345
Authentication in a Distributed Directory * 348
Security Implications 351
Advantages and Disadvantages of Partitioning 351
Designing Your Directory Server Topology 354
Step 1: Inventory Your Directory-Enabled Applications 354
Step 2: Understand Your Directory Server Software and
Its Capabilities 357
Step 3: Create a Map ofYour Physical Network 358
Step 4: Review Your Directory Namespace Design 359
Step 5: Consider Political Constraints 361
Directory Partition Design Examples ¦ ¦ 361
Topology Design Checklist • ••;.! 369
Further Reading 370
Looking Ahead J 37Q
11. Replication Design 371
Why Replicate? 372
Replication Concepts 372
Suppliers, Consumers, and Replication Agreements 375
The Unit of Replication 373
Consistency and Convergence 27c
Contents
xiii
Incremental and Total Updates 377
Initial Population of a Replica 379
Replication Strategies 380
Replication Protocols 391
Advanced Replication Features 392
Replicating a Subset of Directory Information 392
Active Directory GC Servers 394
Scheduling Replication 395
Scheduling Update Latency by Attribute Type 395
Schemas and Replication 395
Access Control and Replication 396
Designing Your Directory Replication System 396
Designing for Maximum Reliability 398
Designing for Maximum Performance 400
Other Considerations 402
Choosing Replication Solutions 404
Replication Design Checklist 404
Further Reading 405
Looking Ahead 405
12. Privacy and Security Design 407
Security Guidelines 408
The Purpose of Security 409
Security Threats 411
Unauthorized Access 411
Unauthorized Tampering 414
Denial-of-Service Attacks 415
Security Tools 416
Analyzing Your Security and Privacy Needs 420
Directory Requirements 420
Understanding Your Environment 423
Understanding Your Users 425
Understanding Your Corporate Policies and Applicable Laws 426
Designing for Security 427
Authentication 427
Access Control 432
Information Privacy and Integrity 440
xiv Contents
. - , Administrative Security •• • •
Respecting Your Users Privacy t. 448
Security versus Deployability 1 . ¦
Privacy and Security Design Checklist w 450
Further Reading • ¦
Looking Ahead ^51
PART III DEPLOYING YOUR DIRECTORY SERVICE 453
13. Evaluating Directory Products * - 455
Making the Right Product Choice 455
Categories of Directory Software v 457
NOS Applications 458
Intranet Applications 458
Extranet Applications 459
Internet-Facing Hosted Applications 1 459
Lightweight Database Applications J ¦ 460
Evaluation Criteria for Directory Software 1 v 462
Core Features , , : 463
Management Features 463
Reliability 1 464
Performance and Scalability 465
Security 466
Standards Compliance , 467
Interoperability t 469
Cost ; 470
Flexibility and Extensibility 470
Other Considerations 471
An Evaluation Criteria Example 472
Reaching a Decision 475
Gathering Basic Product Information 475
Quizzing the Software Vendors 475
Challenging the Vendors to Show What Their Products Can Do 476
Conducting a Directory Services Pilot 476
Negotiating the Best Possible Deal 475
Evaluating Directory Products Checklist 477
Further Reading
Looking Ahead
Contents
xv
14. Piloting Your Directory Service 481
A Piloting Road Map 482
Prepilot Testing 482
Defining Your Goals 484
Defining Your Scope and Time Line 484
Developing Documentation and Training Materials 485
Selecting Your Users 487
Setting Up Your Environment 489
Rolling Out the Pilot 491
Collecting Feedback 492
Scaling Up the Pilot 495
Applying What You ve Learned 496
Piloting Your Directory Service Checklist 498
Looking Ahead 498
15. Analyzing and Reducing Costs 499
The Politics of Costs 500
Reducing Costs 501
General Principles of Cost Reduction 501
Design, Piloting, and Deployment Costs 501
Design Costs 502
Piloting Costs 503
Deployment Hardware Costs 504
Deployment Software Costs 507
Ongoing Costs of Providing Your Directory Service 509
Software Upgrade Costs 509
Hardware Upgrade and Replacement Costs 511
Monitoring Costs 512
Data Maintenance Costs 513
Backup and Restore Costs 514
Disaster Recovery Plan Costs 516
Support and Training Costs 517
Support and Maintenance Contract Costs 518
Costs of Adding New Directory-Enabled Applications 519
Analyzing and Reducing Costs Checklist 520
Further Reading 521
Looking Ahead 521
xvi Contents
16. Putting Tour Directory Service into Production • 523
Creating a Plan for Putting Your Directory Service
into Production ^24
List the Resources Needed for the Rollout 52?
Create a List of Prerequisite Tasks 525
Create a Detailed Rollout Plan 527
Develop Criteria for Success ¦ 527
Create a Publicity and Marketing Plan ¦ 528
Advice for Putting Your Directory Service into Production 529
Don t Jump the Gun 529
Maintain Focus 530
Adopt an Incremental Approach 530
Prepare Yourself Well t . m , . i . 530
Executing Your Plan 533
Putting Your Directory Service into Production Checklist 534
Looking Ahead 5 34
PART IV MAINTAINING YOUR DIRECTORY SERVICE 535
17. Backups and Disaster Recovery 537
Backup and Restore Procedures 538
Backing Up and Restoring Directory Data Using Traditional
Techniques 533
Other Things to Back Up 542
Using Replication for Backup and Restore 543
Using Replication and Traditional Backup Techniques
Together 545
Safeguarding Your Backups 545
Verifying Your Backups 543
Disaster Planning and Recovery 549
Types of Disasters 549
Developing a Directory Disaster Recovery Plan 550
Directory-Specific Issues in Disaster Recovery 553
Backups and Disaster Recovery Checklist 554
Further Reading 555
Looking Ahead rr.
556
Contents
xvii
Maintaining Data 557
The Importance of Data Maintenance 558
The Data Maintenance Policy 558
Application-Maintained Data 560
Centrally Maintained Data 563
User-Maintained Data 565
Handling New Data Sources 570
Handling Exceptions 571
Checking Data Quality 572
Methods of Checking Quality 572
Implications of Checking Quality 573
Correcting Bad Data 574
Maintaining Data Checklist 574
Further Reading 575
Looking Ahead 575
Monitoring 577
Introduction to Monitoring 578
Methods of Monitoring 580
General Monitoring Principles 581
Selecting and Developing Monitoring Tools 582
Monitoring Your Directory with SNMP and an NMS 583
Monitoring Your Directory with Custom Probing Tools 588
Notification Techniques 592
Basic Notification Principles 592
Notification Methods 594
Testing Your Notification System 595
Taking Action 596
Planning Your Course of Action 596
Minimizing the Effect 596
Understanding the Root Cause 597
Correcting the Problem 598
Documenting What Happened 598
A Sample Directory Monitoring Utility 599
Performance Analysis 605
Obtaining Raw Usage Data 606
xviii Contents
Digesting and Analyzing Raw Performance Data
Drawing Conclusions , , 1
Monitoring Checklist • w f-.
Further Reading
Looking Ahead
20. Troubleshooting ^
Discovering Problems
Types of Problems 62 *
Directory Outages 621
Performance Problems 623
Problems with Directory Data 628
Security Problems 630
Troubleshooting and Resolving Problems 632
Step 1: Assess the Problem, and Inform Affected Persons 633
Step 2: Contain the Damage 635
Step 3: Put the System Back into Service by Applying a
Short-Term Fix 635
Step 4: Fully Understand the Problem, and Devise a
Long-Term Fix 636
Step 5: Implement the Long-Term Fix, and Take Steps to
Prevent the Problem from Recurring 637
Step 6: Arrange to Monitor for the Problem 638
Step 7: Document What Happened 638
Troubleshooting Checklist 639
Directory Outages 639
Performance Problems 639
Problems with Directory Data 640
Security Problems 640
Further Reading 640
Looking Ahead 640
PART V LEVERAGING YOUR DIRECTORY SERVICE 641
21. Developing New Applications 643
Reasons to Develop Directory-Enabled Applications 644
Lowering Your Data Management Costs 644
Adapting the Directory to Fit Your Organization 646
Contents
xix
Saving on Deployment and Maintenance Costs 647
Creating Entirely New Kinds of Applications 648
When It Does Not Make Sense to Directory-Enable 648
Common Ways That Applications Use Directories 649
Locating and Sharing Information 649
Verifying Authentication Credentials 650
Aiding the Deployment of Other Services 652
Making Access Control Decisions 654
Enabling Location Independence 657
Tools for Developing LDAP Applications 658
LDAP SDKs 658
LDAP Command-Line Tools 659
LDAP Tag Libraries for Web Development 660
Directory-Agnostic SDKs 662
Advice for LDAP Application Developers 663
Striving to Fit In 663
Communicating Your Application s Directory Needs 665
Designing for Good Performance and Scalability 666
Developing a Prototype and Conducting a Pilot 668
Leveraging Existing Code 668
Avoiding Common Mistakes 669
Example 1: setpwd, a Password-Resetting Utility 671
Directory Use 671
The Help Desk Staffs Experience 671
The Source Code 672
Ideas for Improvement 687
Example 2: SimpleSite, a Web Site with User Profile Storage 687
Directory Use 687
The User Experience 689
The Source Code 693
Ideas for Improvement 722
Developing New Applications Checklist 722
Further Reading 723
Looking Ahead 724
22. Directory-Enabling Existing Applications 725
Reasons to Directory-Enable Existing Applications 726
Enabling New Features in Applications 726
Contents
Lowering Data Management Costs 727
Simplifying Life for End Users 727
Bringing the Directory Service to Your End Users 728
Advice for Directory-Enabling Existing Applications 730
Hide the Directory Integration 731
Make the New Directory Capabilities Visible 732
Use a Protocol Gateway to Achieve Integration 732
Avoid Problematic Architectural Choices 733
Consider How the Directory Service Will Be Affected 735
Plan for a Smooth Transition 735
Be Creative, and Consider All Your Options 736
Example 1: A Directory-Enabled finger Service 737
The Integration Approach 737
Directory Use 738
The End-User Experience 739
The Source Code 741
Ideas for Improvement 746
Example 2: Adding LDAP Address Lookup to an E-Mail Client 746
The Integration Approach 747
The End-User Experience 747
The Source Code 748
Ideas for Improvement 755
Directory-Enabling Existing Applications Checklist 756
Further Reading 757
Looking Ahead 757
23. Directory Coexistence 759
Why Is Coexistence Important? 761
Coexistence Techniques 763
Migration 7^3
One-Way Synchronization 754
Two-Way Synchronization 755
N-Way Join 768
Virtual Directory 77q
Data Translation 772
Privacy and Security Considerations 774
The Join Attribute n-c
Contents xxi
Data Transport 775
Data Source Security 776
Determining Your Coexistence Requirements 777
Directory Coexistence Implementation Considerations 780
Implementation Options 780
Performance Implications 781
Directory Coexistence Tools 781
Tuning and Troubleshooting 782
Monitoring and Caring for Your Coexistence Solution 782
Example: The ldapsync Tool: One-Way Synchronization with Join 783
How It Works 783
Usage Examples 784
The Source Code 787
Ideas for Improvement 792
Directory Coexistence Checklist 793
Further Reading 793
Looking Ahead 794
PART VI CASE STUDIES 795
24. Case Study: Netscape Communications Corporation 797
Overview of the Organization 798
Directory Drivers 799
Directory Service Design 799
Needs 799
Data 801
Schema 804
Namespace 805
Topology 808
Replication 809
Privacy and Security 810
Directory Service Deployment 812
Product Choice 813
Piloting 813
Putting Your Directory Service into Production 814
Directory Service Maintenance 815
Data Backups and Disaster Recovery 815
xxii
Contents
Maintaining Data
817
Monitoring
Leveraging the Directory Service 818
Directory Deployment Impact 819
Summary and Lessons Learned 8^1
Further Reading 8^2
Looking Ahead 8^2
25. Case Study: A Large Multinational Enterprise 823
Overview of the Organization 824
Directory Drivers 826
Directory Service Design 828
Needs 828
Data 829
Schema 831
Namespace 833
Topology 836
Replication 836
Privacy and Security 839
Directory Service Deployment 842
Product Choice 842
Piloting 843
Analyzing and Reducing Costs 844
Putting the Directory Service into Production 845
Directory Service Maintenance 846
Data Backups and Disaster Recovery 846
Maintaining Data 846
Monitoring 848
Troubleshooting 349
Leveraging the Directory Service 849
Applications 849
Directory Deployment Impact 850
Summary and Lessons Learned 852
Further Reading ggg
Looking Ahead
Contents xxiii
26. Case Study: An Enterprise with an Extranet 855
Overview of the Organization 856
Directory Drivers 859
Directory Service Design 859
Needs 859
Data 860
Schema 861
Namespace 863
Topology 865
Replication 867
Privacy and Security 867
Directory Service Deployment 871
Product Choice 871
Piloting 872
Putting Your Directory Service into Production 873
Directory Service Maintenance 874
Data Backups and Disaster Recovery 874
Maintaining Data 875
Monitoring 876
Troubleshooting 876
Leveraging the Directory Service 876
Directory Deployment Impact 877
Summary and Lessons Learned 877
Looking Ahead 878
Index 879
|
any_adam_object | 1 |
author | Howes, Tim |
author_facet | Howes, Tim |
author_role | aut |
author_sort | Howes, Tim |
author_variant | t h th |
building | Verbundindex |
bvnumber | BV016474938 |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.595 |
callnumber-search | TK5105.595 |
callnumber-sort | TK 45105.595 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
classification_rvk | ST 201 |
classification_tum | DAT 252f |
ctrlnum | (OCoLC)51478218 (DE-599)BVBBV016474938 |
dewey-full | 005.7/1369 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.7/1369 |
dewey-search | 005.7/1369 |
dewey-sort | 15.7 41369 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 2. ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01713nam a2200457zc 4500</leader><controlfield tag="001">BV016474938</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20030807 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">030128s2003 xxuad|| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2003000318</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0672323168</subfield><subfield code="9">0-672-32316-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)51478218</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV016474938</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-92</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-M158</subfield><subfield code="a">DE-522</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-188</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5105.595</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.7/1369</subfield><subfield code="2">21</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 201</subfield><subfield code="0">(DE-625)143612:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 252f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Howes, Tim</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Understanding and deploying LDAP directory services</subfield><subfield code="c">Timothy A. Howes ; Mark C. Smith ; Gordon S. Good</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston [u.a.]</subfield><subfield code="b">Addison-Wesley</subfield><subfield code="c">2003</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXXIV, 899 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Erscheint: April 2003</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer network protocols</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Directory services (Computer network technology)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">LDAP (Computer network protocol)</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">LDAP</subfield><subfield code="0">(DE-588)4537748-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">LDAP</subfield><subfield code="0">(DE-588)4537748-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Smith, Mark</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Good, Gordon S.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=010185555&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-010185555</subfield></datafield></record></collection> |
id | DE-604.BV016474938 |
illustrated | Illustrated |
indexdate | 2024-07-09T19:10:56Z |
institution | BVB |
isbn | 0672323168 |
language | English |
lccn | 2003000318 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-010185555 |
oclc_num | 51478218 |
open_access_boolean | |
owner | DE-92 DE-91G DE-BY-TUM DE-M158 DE-522 DE-1049 DE-188 |
owner_facet | DE-92 DE-91G DE-BY-TUM DE-M158 DE-522 DE-1049 DE-188 |
physical | XXXIV, 899 S. Ill., graph. Darst. |
publishDate | 2003 |
publishDateSearch | 2003 |
publishDateSort | 2003 |
publisher | Addison-Wesley |
record_format | marc |
spelling | Howes, Tim Verfasser aut Understanding and deploying LDAP directory services Timothy A. Howes ; Mark C. Smith ; Gordon S. Good 2. ed. Boston [u.a.] Addison-Wesley 2003 XXXIV, 899 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Includes bibliographical references and index. - Erscheint: April 2003 Computer network protocols Directory services (Computer network technology) LDAP (Computer network protocol) LDAP (DE-588)4537748-0 gnd rswk-swf LDAP (DE-588)4537748-0 s DE-604 Smith, Mark Sonstige oth Good, Gordon S. Sonstige oth HBZ Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=010185555&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Howes, Tim Understanding and deploying LDAP directory services Computer network protocols Directory services (Computer network technology) LDAP (Computer network protocol) LDAP (DE-588)4537748-0 gnd |
subject_GND | (DE-588)4537748-0 |
title | Understanding and deploying LDAP directory services |
title_auth | Understanding and deploying LDAP directory services |
title_exact_search | Understanding and deploying LDAP directory services |
title_full | Understanding and deploying LDAP directory services Timothy A. Howes ; Mark C. Smith ; Gordon S. Good |
title_fullStr | Understanding and deploying LDAP directory services Timothy A. Howes ; Mark C. Smith ; Gordon S. Good |
title_full_unstemmed | Understanding and deploying LDAP directory services Timothy A. Howes ; Mark C. Smith ; Gordon S. Good |
title_short | Understanding and deploying LDAP directory services |
title_sort | understanding and deploying ldap directory services |
topic | Computer network protocols Directory services (Computer network technology) LDAP (Computer network protocol) LDAP (DE-588)4537748-0 gnd |
topic_facet | Computer network protocols Directory services (Computer network technology) LDAP (Computer network protocol) LDAP |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=010185555&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT howestim understandinganddeployingldapdirectoryservices AT smithmark understandinganddeployingldapdirectoryservices AT goodgordons understandinganddeployingldapdirectoryservices |