| |
| |
About the Author | |
| |
| |
About the Technical Reviewers | |
| |
| |
Acknowledgments | |
| |
| |
Preface | |
| |
| |
Introduction | |
| |
| |
| |
Assessing Your Environment | |
| |
| |
Gathering Information | |
| |
| |
Name | |
| |
| |
E-mail | |
| |
| |
Phone | |
| |
| |
PKI Information | |
| |
| |
Badge | |
| |
| |
Customer Data | |
| |
| |
Creating an Ongoing Process | |
| |
| |
Changing Application Sources | |
| |
| |
Understanding Meta-Directories | |
| |
| |
Avoiding Mistakes | |
| |
| |
LDAP As Oracle | |
| |
| |
LDAP As a Sync Source | |
| |
| |
Shortsighted Deployment | |
| |
| |
Summary | |
| |
| |
| |
Understanding Data Definitions | |
| |
| |
Defining Your Schema | |
| |
| |
Understanding Schemas | |
| |
| |
ASN Schema Format | |
| |
| |
Object Identifiers (OIDs) | |
| |
| |
Attributes | |
| |
| |
Object Classes | |
| |
| |
Other Data Definition Information | |
| |
| |
Understanding Distinguished Names (DNs) | |
| |
| |
Schema Checking | |
| |
| |
Referential Integrity | |
| |
| |
Structuring the Directory Information Tree (DIT) | |
| |
| |
Regional Deployment of Information | |
| |
| |
Functional Deployment of Information | |
| |
| |
Organization by Business Function or Group | |
| |
| |
Introducing the LDAP Data Interchange Format (LDIF) | |
| |
| |
LDAP Operations | |
| |
| |
Chaining Operations | |
| |
| |
Indexing Data | |
| |
| |
Summary | |
| |
| |
| |
Implementing Deployment, Operations, and Administration Strategies | |
| |
| |
Separating Your Environments | |
| |
| |
Setting Up Classes of Hosts | |
| |
| |
Using Naming Conventions | |
| |
| |
Using the Creative Convention | |
| |
| |
Using the Logical Convention | |
| |
| |
Reaching a Compromise | |
| |
| |
Following Standard Procedures | |
| |
| |
Using the Standard Host Specifications | |
| |
| |
Using the Standard Host Installation | |
| |
| |
Using the Standard Application Installation | |
| |
| |
Running the Application | |
| |
| |
Starting the Application | |
| |
| |
Stopping the Application | |
| |
| |
Using Command-Line Options | |
| |
| |
Implementing Logs | |
| |
| |
Summary | |
| |
| |
| |
Installing OpenLDAP | |
| |
| |
Choosing a Distribution | |
| |
| |
Setting Up Your System | |
| |
| |
Choosing a Special User | |
| |
| |
Obtaining the Distribution | |
| |
| |
Performing the Base Installation | |
| |
| |
Compiling OpenLDAP | |
| |
| |
Creating a Local Database | |
| |
| |
Creating an Offline Database | |
| |
| |
Using LDAP Search Filters | |
| |
| |
Using OpenLDAP Utilities | |
| |
| |
Idapmodify (1) and ldapadd (1) | |
| |
| |
Idapsearch (1) | |
| |
| |
Idapdelete (1) | |
| |
| |
Idapmodrdn (1) | |
| |
| |
Slapcat (8C) | |
| |
| |
Slapadd (8C) | |
| |
| |
Slapindex (8C) | |
| |
| |
Summary | |
| |
| |
| |
Implementing OpenLDAP | |
| |
| |
How Much RAM Do You Need? | |
| |
| |
How Much Disk Space Do You Need? | |
| |
| |
Considering Security in Your Implementation | |
| |
| |
Authentication | |
| |
| |
SASL | |
| |
| |
X.509 Certificates | |
| |
| |
Transport Layer Security | |
| |
| |
Access Control | |
| |
| |
Kerberos | |
| |
| |
Understanding Replication | |
| |
| |
Changelog/Replication Log | |
| |
| |
Slurpd | |
| |
| |
Updateref | |
| |
| |
Importing Databases | |
| |
| |
Slapcat | |
| |
| |
Testing | |
| |
| |
Understanding Referrals | |
| |
| |
DNS Resource Records for Service Location | |
| |
| |
Localized Scope | |
| |
| |
Understanding the Installation Structure | |
| |
| |
Idap.conf | |
| |
| |
Slapd.conf | |
| |
| |
Slapd.at.conf | |
| |
| |
Slapd.oc.conf | |
| |
| |
Summary | |
| |
| |
| |
Scripting and Programming LDAP | |
| |
| |
Utilizing Command-Line Tools | |
| |
| |
LDAP Controls | |
| |
| |
LDAP API | |
| |
| |
Obtaining the LDAP Perl API | |
| |
| |
Using the LDAP Perl API | |
| |
| |
Mozilla::LDAP::API | |
| |
| |
Performing Operations Against Your OpenLDAP Directory | |
| |
| |
Using Java and JNDI | |
| |
| |
OASIS Standards | |
| |
| |
Directory Services Markup Language (DSML) | |
| |
| |
Directory Schema | |
| |
| |
Conformance | |
| |
| |
Summary | |
| |
| |
| |
Integrating at the System Level | |
| |
| |
Introducing Network Information Services | |
| |
| |
Introducing Standard NIS Configurations | |
| |
| |
Performing Synchronization with LDAP | |
| |
| |
Performing Direct Integration | |
| |
| |
Configuring the LDAP Client (Host) | |
| |
| |
Using the Idapclient Utility | |
| |
| |
Configuring NSS | |
| |
| |
Configuring PAM | |
| |
| |
Setting Up Security | |
| |
| |
Using Sendmail | |
| |
| |
Enabling the Software | |
| |
| |
Building the Binaries | |
| |
| |
Migrating Information | |
| |
| |
Setting Up LDAP Routing | |
| |
| |
Summary | |
| |
| |
| |
Integrating OpenLDAP with Applications, User Systems, and Client Tools | |
| |
| |
Preparing for Integration | |
| |
| |
Integrating Apache | |
| |
| |
Integrating Pine | |
| |
| |
Integrating Samba | |
| |
| |
Integrating Eudora | |
| |
| |
Integrating Exchange | |
| |
| |
Integrating LDAP Browsers | |
| |
| |
Integrating Appliances | |
| |
| |
Summary | |
| |
| |
Index | |