SlideShare a Scribd company logo
1 of 1
How a Virtual Directory Works
You probably have learned about a virtual directory
and how it has helped a lot of organizations today in a
variety of ways. If you are not well acquainted with
how it works, you surely want to know how using it
can also be beneficial to you. A virtual directory is also
referred to as virtual directory server and it is a
software layer delivering a single access point for
applications as well as service platforms of identity
management. It basically works as a high
performance and at the same time lightweight
abstraction layer residing between client applications
and different types of identity data repositories like a
standard and proprietary directory, applications, databases and web services.
It works by receiving and directing queries into appropriate stores of data through the process of
abstraction and virtualization. It incorporates identity data from a number of heterogeneous
stores of data and will present it as it come from a single. This ability of a virtual directory to
reach into different repositories has made it ideal in terms of data consolidation regardless of
where they may be stored. In the recent years, virtual directory servers (VDS) have been the
most commonly used LDAP protocol but virtual directories that are more advanced are capable
of supporting several platforms. According to industry experts, a virtual directory is essential in
the modernization of identity infrastructure.
It is in fact hot today and a virtual directory is the foundation that any company should look at for
their next identity management project. There are many capabilities a virtual directory has.
Many organizations are starting to realize how important it is for them to have a virtual directory
in their web environment. Basically a virtual directory combines identity data across various
sources, creating a single access point. Moreover, it creates high availability and accessibility
for the authoritative stores of data. It even acts as LDAP proxy and firewall which enabled it to
prevent certain attacks like denial of service on the main stores of data through an added and
enhanced virtual layer.

More Related Content

What's hot

My sql and oracle difference
My sql and oracle difference My sql and oracle difference
My sql and oracle difference manisha1110
 
LogicalDOC Flyer
LogicalDOC FlyerLogicalDOC Flyer
LogicalDOC FlyerLogicalDOC
 
Sharepoint & Dynamics CRM
Sharepoint & Dynamics CRMSharepoint & Dynamics CRM
Sharepoint & Dynamics CRMrujuta4radix
 
CIS14: Is the Cloud Ready for Enterprise Identity and Security Requirements?
CIS14: Is the Cloud Ready for Enterprise Identity and Security Requirements?CIS14: Is the Cloud Ready for Enterprise Identity and Security Requirements?
CIS14: Is the Cloud Ready for Enterprise Identity and Security Requirements?CloudIDSummit
 
WSO2Con USA 2017: Opening Keynote - Vision for Agile Digital Transformation
WSO2Con USA 2017: Opening Keynote - Vision for Agile Digital TransformationWSO2Con USA 2017: Opening Keynote - Vision for Agile Digital Transformation
WSO2Con USA 2017: Opening Keynote - Vision for Agile Digital TransformationWSO2
 
Readyportal Platform - Overview updated
Readyportal Platform - Overview updatedReadyportal Platform - Overview updated
Readyportal Platform - Overview updatedReadyportal
 
The Enterprise File Fabric for Leonovus User Collaboration Interface (LUCI)
The Enterprise File Fabric for Leonovus User Collaboration Interface (LUCI)The Enterprise File Fabric for Leonovus User Collaboration Interface (LUCI)
The Enterprise File Fabric for Leonovus User Collaboration Interface (LUCI)Hybrid Cloud
 
Content Collaboration - Prevent data loss in a global digital future
Content Collaboration - Prevent data loss in a global digital futureContent Collaboration - Prevent data loss in a global digital future
Content Collaboration - Prevent data loss in a global digital futureAxway
 
0chain Blockhain and off-chain storage integrity
0chain Blockhain and off-chain storage integrity0chain Blockhain and off-chain storage integrity
0chain Blockhain and off-chain storage integrityVishwas Manral
 
Stix cms general overview_2012
Stix cms general overview_2012Stix cms general overview_2012
Stix cms general overview_2012John Mirabitas
 
Mastering the Art of SharePoint DMS
Mastering the Art of SharePoint DMSMastering the Art of SharePoint DMS
Mastering the Art of SharePoint DMSOliver Wirkus
 
MeetLinkShare - Data Room
MeetLinkShare - Data RoomMeetLinkShare - Data Room
MeetLinkShare - Data RoomRajiv Menon
 
Troubleshooting Exchange Hybrid Deployments
Troubleshooting Exchange Hybrid DeploymentsTroubleshooting Exchange Hybrid Deployments
Troubleshooting Exchange Hybrid DeploymentsJoel Brda
 

What's hot (20)

Presentation1 soa
Presentation1 soaPresentation1 soa
Presentation1 soa
 
My sql and oracle difference
My sql and oracle difference My sql and oracle difference
My sql and oracle difference
 
LogicalDOC Flyer
LogicalDOC FlyerLogicalDOC Flyer
LogicalDOC Flyer
 
Sharepoint & Dynamics CRM
Sharepoint & Dynamics CRMSharepoint & Dynamics CRM
Sharepoint & Dynamics CRM
 
04232015094601
0423201509460104232015094601
04232015094601
 
LiveDOCS
LiveDOCSLiveDOCS
LiveDOCS
 
Multi Tenancy
Multi TenancyMulti Tenancy
Multi Tenancy
 
CIS14: Is the Cloud Ready for Enterprise Identity and Security Requirements?
CIS14: Is the Cloud Ready for Enterprise Identity and Security Requirements?CIS14: Is the Cloud Ready for Enterprise Identity and Security Requirements?
CIS14: Is the Cloud Ready for Enterprise Identity and Security Requirements?
 
WSO2Con USA 2017: Opening Keynote - Vision for Agile Digital Transformation
WSO2Con USA 2017: Opening Keynote - Vision for Agile Digital TransformationWSO2Con USA 2017: Opening Keynote - Vision for Agile Digital Transformation
WSO2Con USA 2017: Opening Keynote - Vision for Agile Digital Transformation
 
Readyportal Platform - Overview updated
Readyportal Platform - Overview updatedReadyportal Platform - Overview updated
Readyportal Platform - Overview updated
 
The Enterprise File Fabric for Leonovus User Collaboration Interface (LUCI)
The Enterprise File Fabric for Leonovus User Collaboration Interface (LUCI)The Enterprise File Fabric for Leonovus User Collaboration Interface (LUCI)
The Enterprise File Fabric for Leonovus User Collaboration Interface (LUCI)
 
SaaSRefArch
SaaSRefArchSaaSRefArch
SaaSRefArch
 
Content Collaboration - Prevent data loss in a global digital future
Content Collaboration - Prevent data loss in a global digital futureContent Collaboration - Prevent data loss in a global digital future
Content Collaboration - Prevent data loss in a global digital future
 
0chain Blockhain and off-chain storage integrity
0chain Blockhain and off-chain storage integrity0chain Blockhain and off-chain storage integrity
0chain Blockhain and off-chain storage integrity
 
Stix cms general overview_2012
Stix cms general overview_2012Stix cms general overview_2012
Stix cms general overview_2012
 
About HOSTEX
About HOSTEXAbout HOSTEX
About HOSTEX
 
I Planet Overview
I Planet OverviewI Planet Overview
I Planet Overview
 
Mastering the Art of SharePoint DMS
Mastering the Art of SharePoint DMSMastering the Art of SharePoint DMS
Mastering the Art of SharePoint DMS
 
MeetLinkShare - Data Room
MeetLinkShare - Data RoomMeetLinkShare - Data Room
MeetLinkShare - Data Room
 
Troubleshooting Exchange Hybrid Deployments
Troubleshooting Exchange Hybrid DeploymentsTroubleshooting Exchange Hybrid Deployments
Troubleshooting Exchange Hybrid Deployments
 

Similar to How a virtual directory works

Active Directory Site And Services.pdf
Active Directory Site And Services.pdfActive Directory Site And Services.pdf
Active Directory Site And Services.pdfEIHEducation
 
Active Directory Site And Services.pdf
Active Directory Site And Services.pdfActive Directory Site And Services.pdf
Active Directory Site And Services.pdfEIHEducation
 
Active directory basics
Active directory basicsActive directory basics
Active directory basicsSanjeev Gupta
 
The End of the Domain Controller
The End of the Domain ControllerThe End of the Domain Controller
The End of the Domain ControllerRobert Crane
 
Benefits of the Azure cloud
Benefits of the Azure cloudBenefits of the Azure cloud
Benefits of the Azure cloudJames Serra
 
Authorization in active directory
Authorization in active directoryAuthorization in active directory
Authorization in active directoryssuser1eca7d
 
How AD has been re-engineered to extend to the cloud
How AD has been re-engineered to extend to the cloudHow AD has been re-engineered to extend to the cloud
How AD has been re-engineered to extend to the cloudLDAPCon
 
Benefits of the Azure Cloud
Benefits of the Azure CloudBenefits of the Azure Cloud
Benefits of the Azure CloudCaserta
 
Data API as a Foundation for Systems of Engagement
Data API as a Foundation for Systems of EngagementData API as a Foundation for Systems of Engagement
Data API as a Foundation for Systems of EngagementVictor Olex
 
Proposal For Their Integration Of Windows Server
Proposal For Their Integration Of Windows ServerProposal For Their Integration Of Windows Server
Proposal For Their Integration Of Windows ServerBrenda Higgins
 
Relational Databases For An Efficient Data Management And...
Relational Databases For An Efficient Data Management And...Relational Databases For An Efficient Data Management And...
Relational Databases For An Efficient Data Management And...Sheena Crouch
 
Third party cloud services cloud computing
Third party cloud services cloud computingThird party cloud services cloud computing
Third party cloud services cloud computingSohailAliMalik
 
Analyst Keynote: TDWI: Data Virtualization as a Data Management Strategy for ...
Analyst Keynote: TDWI: Data Virtualization as a Data Management Strategy for ...Analyst Keynote: TDWI: Data Virtualization as a Data Management Strategy for ...
Analyst Keynote: TDWI: Data Virtualization as a Data Management Strategy for ...Denodo
 
What Are The Best Databases for Web Applications In 2023.pdf
What Are The Best Databases for Web Applications In 2023.pdfWhat Are The Best Databases for Web Applications In 2023.pdf
What Are The Best Databases for Web Applications In 2023.pdfLaura Miller
 
Choosing an IdM User Store technology
Choosing an IdM User Store technologyChoosing an IdM User Store technology
Choosing an IdM User Store technologyMichael J Geiser
 
What Is The Use Of Database Server------
What Is The Use Of Database Server------What Is The Use Of Database Server------
What Is The Use Of Database Server------Shattered Silicon
 
OpenLink Virtuoso - Management & Decision Makers Overview
OpenLink Virtuoso - Management & Decision Makers OverviewOpenLink Virtuoso - Management & Decision Makers Overview
OpenLink Virtuoso - Management & Decision Makers OverviewKingsley Uyi Idehen
 

Similar to How a virtual directory works (20)

Selecting best NoSQL
Selecting best NoSQL Selecting best NoSQL
Selecting best NoSQL
 
Active Directory Site And Services.pdf
Active Directory Site And Services.pdfActive Directory Site And Services.pdf
Active Directory Site And Services.pdf
 
Active Directory Site And Services.pdf
Active Directory Site And Services.pdfActive Directory Site And Services.pdf
Active Directory Site And Services.pdf
 
Active directory basics
Active directory basicsActive directory basics
Active directory basics
 
The End of the Domain Controller
The End of the Domain ControllerThe End of the Domain Controller
The End of the Domain Controller
 
Benefits of the Azure cloud
Benefits of the Azure cloudBenefits of the Azure cloud
Benefits of the Azure cloud
 
Authorization in active directory
Authorization in active directoryAuthorization in active directory
Authorization in active directory
 
How AD has been re-engineered to extend to the cloud
How AD has been re-engineered to extend to the cloudHow AD has been re-engineered to extend to the cloud
How AD has been re-engineered to extend to the cloud
 
Benefits of the Azure Cloud
Benefits of the Azure CloudBenefits of the Azure Cloud
Benefits of the Azure Cloud
 
Data API as a Foundation for Systems of Engagement
Data API as a Foundation for Systems of EngagementData API as a Foundation for Systems of Engagement
Data API as a Foundation for Systems of Engagement
 
Proposal For Their Integration Of Windows Server
Proposal For Their Integration Of Windows ServerProposal For Their Integration Of Windows Server
Proposal For Their Integration Of Windows Server
 
Relational Databases For An Efficient Data Management And...
Relational Databases For An Efficient Data Management And...Relational Databases For An Efficient Data Management And...
Relational Databases For An Efficient Data Management And...
 
InfoRouter Document Management Software Technical Presentation
InfoRouter Document Management Software Technical PresentationInfoRouter Document Management Software Technical Presentation
InfoRouter Document Management Software Technical Presentation
 
Third party cloud services cloud computing
Third party cloud services cloud computingThird party cloud services cloud computing
Third party cloud services cloud computing
 
Analyst Keynote: TDWI: Data Virtualization as a Data Management Strategy for ...
Analyst Keynote: TDWI: Data Virtualization as a Data Management Strategy for ...Analyst Keynote: TDWI: Data Virtualization as a Data Management Strategy for ...
Analyst Keynote: TDWI: Data Virtualization as a Data Management Strategy for ...
 
What Are The Best Databases for Web Applications In 2023.pdf
What Are The Best Databases for Web Applications In 2023.pdfWhat Are The Best Databases for Web Applications In 2023.pdf
What Are The Best Databases for Web Applications In 2023.pdf
 
Choosing an IdM User Store technology
Choosing an IdM User Store technologyChoosing an IdM User Store technology
Choosing an IdM User Store technology
 
What Is The Use Of Database Server------
What Is The Use Of Database Server------What Is The Use Of Database Server------
What Is The Use Of Database Server------
 
OpenLink Virtuoso - Management & Decision Makers Overview
OpenLink Virtuoso - Management & Decision Makers OverviewOpenLink Virtuoso - Management & Decision Makers Overview
OpenLink Virtuoso - Management & Decision Makers Overview
 
Active Directory Integration Solution With AWS
Active Directory Integration Solution With AWSActive Directory Integration Solution With AWS
Active Directory Integration Solution With AWS
 

How a virtual directory works

  • 1. How a Virtual Directory Works You probably have learned about a virtual directory and how it has helped a lot of organizations today in a variety of ways. If you are not well acquainted with how it works, you surely want to know how using it can also be beneficial to you. A virtual directory is also referred to as virtual directory server and it is a software layer delivering a single access point for applications as well as service platforms of identity management. It basically works as a high performance and at the same time lightweight abstraction layer residing between client applications and different types of identity data repositories like a standard and proprietary directory, applications, databases and web services. It works by receiving and directing queries into appropriate stores of data through the process of abstraction and virtualization. It incorporates identity data from a number of heterogeneous stores of data and will present it as it come from a single. This ability of a virtual directory to reach into different repositories has made it ideal in terms of data consolidation regardless of where they may be stored. In the recent years, virtual directory servers (VDS) have been the most commonly used LDAP protocol but virtual directories that are more advanced are capable of supporting several platforms. According to industry experts, a virtual directory is essential in the modernization of identity infrastructure. It is in fact hot today and a virtual directory is the foundation that any company should look at for their next identity management project. There are many capabilities a virtual directory has. Many organizations are starting to realize how important it is for them to have a virtual directory in their web environment. Basically a virtual directory combines identity data across various sources, creating a single access point. Moreover, it creates high availability and accessibility for the authoritative stores of data. It even acts as LDAP proxy and firewall which enabled it to prevent certain attacks like denial of service on the main stores of data through an added and enhanced virtual layer.