SlideShare a Scribd company logo
Allidm.com
Discovering Identity and Access Management Solutions

Directory Services Introduction
http://academy.allidm.com
Stay connected to Allidm

Find us on Facebook:
http: //www. facebook.com/allidm
Follow us on Twitter:
http: //twitter.com/aidy_idm
Look for us on LinkedIn:
http: //www. linkedin.com/allidm
Visit our blog:
http://www.allidm.com/blog
Disclaimer and Acknowledgments

The contents here are created as a own personal endeavor and
thus does not reflect any official stance of any Identity and
Access Management Vendor on any particular technology
Contact Us
On this presentation we’ll talk about some useful topics that
you can use no matter which identity and access management
solution or product you are working on.
If you know one that make a big difference please tell us to
include it in the future
aidy.allidm@gmail.com
Introduction

A directory is a collection of information about
objects arranged in some order that gives details
about each object. Popular examples are a city
,telephone ,directory and a library card catalog.
What’s a Directory Solution?

A directory is a specialized database, also called a data
repository, that stores typed and ordered information about
objects.
A directory is a listing of information about objects arranged in
some order that gives details about each object.
Directories allow users or applications to find resources that
have the characteristics needed for a particular task.
For example, a directory of users can be used to look up a
person’s e-mail address or phone number.
Directory Features

A directory service is highly optimized for reads
A directory service implements a distributed model for storing
information

A directory service can extend the types of information it stores
A directory service has advanced search capabilities
A directory service has loosely consistent replication among
directory servers
Directory clients and servers

Directories are usually accessed using the
client/server model of communication.
An application that wants to read or write
information in a directory does not access the
directory directly.
Instead, it calls a function or application programming
interface (API) that causes a message to be sent to
another process.
Differences Between Directories and
Databases
A directory is often described as a database, but it is a
specialized database that has characteristics that set
it apart from general-purpose relational databases.
What is LDAP?

LDAP is an open industry standard that defines a standard method for
accessing and updating information in a directory.
The Lightweight Directory Access Protocol, a standard, extensible
Internet protocol used to access directory services

The Lightweight Directory Access Protocol (LDAP) defines a message
protocol used by directory clients and directory servers.T
The LDAP Data Interchange Format (LDIF), a standard text format for
exchanging directory data

LDAP protocol uses different messages.
A searchRequest is used to search for a specific entry in the directory.
Interaction between an LDAP client
and an LDAP server
general interaction between an LDAP client and an
LDAP server takes the following form:
Establish a session
Perform Operations
Finish Session
Interaction between an LDAP
client and an LDAP server
Establish a session
The client establishes a session with an LDAP server
known as binding to the server.
The client specifies the host name or IP address and TCP/IP
port number where the LDAP server is listening.
The client can provide a user name and a password to
properly authenticate with the server.
Or the client can establish an anonymous session with default
access rights.

The client and server can also establish a session that uses
stronger security methods such as encryption of data.
Interaction between an LDAP
client and an LDAP server
 Perform Operations

The client performs operations on directory data.
LDAP offers both read and update capabilities.
This allows directory information to be managed as well as
queried.

LDAP also supports searching the directory for data
meeting arbitrary user-specified criteria.
Searching is a very common operation in LDAP.
A user can specify what part of the directory to search and
what information to return.
A search filter that uses Boolean conditions specifies what
directory data matches the search.
Ldap Components

A directory entry usually describes an object such as a
person, a printer, a server, and so on.
Each entry has a name called a distinguished name
(DN) that uniquely identifies it.
The DN consists of a sequence of parts called relative
distinguished names (RDNs)
The entries can be arranged into a hierarchical treelike structure based on their distinguished names.
This tree of directory entries is called the Directory
What’s LDIF?

Is a standard text file format for storing LDAP
configuration information and directory contents.
LDIF file is:
A collection of entries separated from each other by
blank lines
A mapping of attribute names to values
A collection of directives that instruct the parser how to
process the information
Why LDIF ?

System administrators prefer to use plain-text files for
server configuration information, as opposed to some
binary store of bits.
More comfortable to deal with data in vi, Emacs, or
notepad than to dig though raw bits and bytes
Types

An directory server could be installed in the next
ways:
Directory Server
Proxy Server
Replication Gateway
LDAP addresses the problems

Work in process
How LDAP works

In process
What look for an LDAP Solution

Ease of Deploy
Portability
Open Standards
built using open standards and specifications as far as
possible.
DSML

Ease of Administration
web-based, graphical administration console
command line interfaces

Security
Choosing an LDAP Solution

Work in progress
Keys to Successfully Implementing
LDAP
Distinguish clearly between requirements.
Involve everyone, from the chief executive to the users, in
the project.
Make sure users are actively involved in the project.
Use LDAP as an entry point for facilitating identity and
access management (IAM) projects. .
.
Road Map

Work in process
LDAP Solutions Around World

Some of the key vendors providing SSO Solutions are
Oracle
CA
Symplified
Forgerock
IBM
Courion
Atlassian
Allidm.com
Discovering Identity and Access Management Solutions

Allidm Academy
http://academy.allidm.com

More Related Content

What's hot

Digital Preservation
Digital PreservationDigital Preservation
Information retrieval s
Information retrieval sInformation retrieval s
Information retrieval ssilambu111
 
Digital Library Software
Digital Library SoftwareDigital Library Software
WorldCat Presentation
WorldCat PresentationWorldCat Presentation
WorldCat Presentation
Val MacMillan
 
OLAP & DATA WAREHOUSE
OLAP & DATA WAREHOUSEOLAP & DATA WAREHOUSE
OLAP & DATA WAREHOUSE
Zalpa Rathod
 
House keeeping operations .pptx
House keeeping operations .pptxHouse keeeping operations .pptx
House keeeping operations .pptx
lisbala
 
Z39.50: Information Retrieval protocol ppt
Z39.50: Information Retrieval protocol pptZ39.50: Information Retrieval protocol ppt
Z39.50: Information Retrieval protocol ppt
SUNILKUMARSINGH
 
Knowledge organization
Knowledge organizationKnowledge organization
Knowledge organization
Ethel88
 
Z39.50.pptx
Z39.50.pptxZ39.50.pptx
Z39.50.pptx
Rbalasubramani
 
key word indexing and their types with example
key word indexing and their types with example key word indexing and their types with example
key word indexing and their types with example
Sourav Sarkar
 
Library Automation A - Z Guide: A Hands on Module
Library Automation A - Z Guide: A Hands on ModuleLibrary Automation A - Z Guide: A Hands on Module
Library Automation A - Z Guide: A Hands on Module
Ashok Kumar Satapathy
 
FUNCTION DEPENDENCY AND TYPES & EXAMPLE
FUNCTION DEPENDENCY  AND TYPES & EXAMPLEFUNCTION DEPENDENCY  AND TYPES & EXAMPLE
FUNCTION DEPENDENCY AND TYPES & EXAMPLE
Vraj Patel
 
Complete dbms notes
Complete dbms notesComplete dbms notes
Complete dbms notes
Tanya Makkar
 
RFID for Modern libraries
RFID for Modern libraries RFID for Modern libraries
RFID for Modern libraries K L universityH
 
Types of databases
Types of databasesTypes of databases
Types of databasesPAQUIAAIZEL
 
Resource Sharing and Networking
Resource Sharing and NetworkingResource Sharing and Networking
Library Automation sofrwere
Library Automation sofrwereLibrary Automation sofrwere
Library Automation sofrwere
Deepak Malviya
 

What's hot (20)

Digital Preservation
Digital PreservationDigital Preservation
Digital Preservation
 
Library automation
Library automationLibrary automation
Library automation
 
Information retrieval s
Information retrieval sInformation retrieval s
Information retrieval s
 
Digital Library Software
Digital Library SoftwareDigital Library Software
Digital Library Software
 
WorldCat Presentation
WorldCat PresentationWorldCat Presentation
WorldCat Presentation
 
OLAP & DATA WAREHOUSE
OLAP & DATA WAREHOUSEOLAP & DATA WAREHOUSE
OLAP & DATA WAREHOUSE
 
House keeeping operations .pptx
House keeeping operations .pptxHouse keeeping operations .pptx
House keeeping operations .pptx
 
Z39.50: Information Retrieval protocol ppt
Z39.50: Information Retrieval protocol pptZ39.50: Information Retrieval protocol ppt
Z39.50: Information Retrieval protocol ppt
 
Distributed database
Distributed databaseDistributed database
Distributed database
 
Knowledge organization
Knowledge organizationKnowledge organization
Knowledge organization
 
Z39.50.pptx
Z39.50.pptxZ39.50.pptx
Z39.50.pptx
 
key word indexing and their types with example
key word indexing and their types with example key word indexing and their types with example
key word indexing and their types with example
 
Library Automation A - Z Guide: A Hands on Module
Library Automation A - Z Guide: A Hands on ModuleLibrary Automation A - Z Guide: A Hands on Module
Library Automation A - Z Guide: A Hands on Module
 
FUNCTION DEPENDENCY AND TYPES & EXAMPLE
FUNCTION DEPENDENCY  AND TYPES & EXAMPLEFUNCTION DEPENDENCY  AND TYPES & EXAMPLE
FUNCTION DEPENDENCY AND TYPES & EXAMPLE
 
POPSI
POPSIPOPSI
POPSI
 
Complete dbms notes
Complete dbms notesComplete dbms notes
Complete dbms notes
 
RFID for Modern libraries
RFID for Modern libraries RFID for Modern libraries
RFID for Modern libraries
 
Types of databases
Types of databasesTypes of databases
Types of databases
 
Resource Sharing and Networking
Resource Sharing and NetworkingResource Sharing and Networking
Resource Sharing and Networking
 
Library Automation sofrwere
Library Automation sofrwereLibrary Automation sofrwere
Library Automation sofrwere
 

Viewers also liked

Cloud introduction
Cloud introductionCloud introduction
Cloud introduction
Aidy Tificate
 
Dell Password Manager Architecture - Components
Dell Password Manager Architecture - ComponentsDell Password Manager Architecture - Components
Dell Password Manager Architecture - Components
Aidy Tificate
 
IAM Cloud
IAM CloudIAM Cloud
IAM Cloud
Aidy Tificate
 
IAM Password
IAM PasswordIAM Password
IAM Password
Aidy Tificate
 
Identity Manager OpenSource OpenIDM - introduction
Identity Manager OpenSource OpenIDM - introductionIdentity Manager OpenSource OpenIDM - introduction
Identity Manager OpenSource OpenIDM - introduction
Aidy Tificate
 
IDM Introduction
IDM IntroductionIDM Introduction
IDM Introduction
Aidy Tificate
 
Identity Manager Opensource OpenIDM Architecture
Identity Manager Opensource OpenIDM ArchitectureIdentity Manager Opensource OpenIDM Architecture
Identity Manager Opensource OpenIDM Architecture
Aidy Tificate
 
Dell Password Manager Introduction
Dell Password Manager IntroductionDell Password Manager Introduction
Dell Password Manager Introduction
Aidy Tificate
 
Dell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access ControlDell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access Control
Aidy Tificate
 

Viewers also liked (9)

Cloud introduction
Cloud introductionCloud introduction
Cloud introduction
 
Dell Password Manager Architecture - Components
Dell Password Manager Architecture - ComponentsDell Password Manager Architecture - Components
Dell Password Manager Architecture - Components
 
IAM Cloud
IAM CloudIAM Cloud
IAM Cloud
 
IAM Password
IAM PasswordIAM Password
IAM Password
 
Identity Manager OpenSource OpenIDM - introduction
Identity Manager OpenSource OpenIDM - introductionIdentity Manager OpenSource OpenIDM - introduction
Identity Manager OpenSource OpenIDM - introduction
 
IDM Introduction
IDM IntroductionIDM Introduction
IDM Introduction
 
Identity Manager Opensource OpenIDM Architecture
Identity Manager Opensource OpenIDM ArchitectureIdentity Manager Opensource OpenIDM Architecture
Identity Manager Opensource OpenIDM Architecture
 
Dell Password Manager Introduction
Dell Password Manager IntroductionDell Password Manager Introduction
Dell Password Manager Introduction
 
Dell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access ControlDell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access Control
 

Similar to Directory Introduction

Ldap system administration
Ldap system administrationLdap system administration
Ldap system administration
Ali Abdo
 
LDAP
LDAPLDAP
LDAP - Lightweight Directory Access Protocol
LDAP - Lightweight Directory Access ProtocolLDAP - Lightweight Directory Access Protocol
LDAP - Lightweight Directory Access Protocol
S. Hasnain Raza
 
The Ldap Protocol
The Ldap ProtocolThe Ldap Protocol
The Ldap Protocol
Glen Plantz
 
Open LDAP vs. Active Directory
Open LDAP vs. Active DirectoryOpen LDAP vs. Active Directory
Open LDAP vs. Active Directory
Ahmad Haghighi
 
LDAP
LDAPLDAP
Choosing an IdM User Store technology
Choosing an IdM User Store technologyChoosing an IdM User Store technology
Choosing an IdM User Store technology
Michael J Geiser
 
AD & LDAP
AD & LDAPAD & LDAP
LDAP
LDAPLDAP
Active Directory
Active DirectoryActive Directory
Active Directory
Small World Group L.L.C
 
X.500 More Than a Global Directory
X.500 More Than a Global DirectoryX.500 More Than a Global Directory
X.500 More Than a Global Directory
lurdhu agnes
 
Configuring Domino To Be An Ldap Directory And To Use An Ldap Directory
Configuring Domino To Be An Ldap Directory And To Use An Ldap DirectoryConfiguring Domino To Be An Ldap Directory And To Use An Ldap Directory
Configuring Domino To Be An Ldap Directory And To Use An Ldap DirectoryEdson Oliveira
 
Active directory basics
Active directory basicsActive directory basics
Active directory basicsSanjeev Gupta
 
Chapter_11_LDAP_and_Kerberos-converted.pptx
Chapter_11_LDAP_and_Kerberos-converted.pptxChapter_11_LDAP_and_Kerberos-converted.pptx
Chapter_11_LDAP_and_Kerberos-converted.pptx
ahmedsayed947221
 
Directory Servers and LDAP
Directory Servers and LDAPDirectory Servers and LDAP
Directory Servers and LDAP
Wildan Maulana
 
Fox pass
Fox passFox pass
Fox pass
foxpass
 
network administration directory access and remote access
network administration directory access and remote accessnetwork administration directory access and remote access
network administration directory access and remote access
Sangeetha Rangarajan
 

Similar to Directory Introduction (20)

Ldap system administration
Ldap system administrationLdap system administration
Ldap system administration
 
LDAP
LDAPLDAP
LDAP
 
Ldap
LdapLdap
Ldap
 
LDAP - Lightweight Directory Access Protocol
LDAP - Lightweight Directory Access ProtocolLDAP - Lightweight Directory Access Protocol
LDAP - Lightweight Directory Access Protocol
 
The Ldap Protocol
The Ldap ProtocolThe Ldap Protocol
The Ldap Protocol
 
Open LDAP vs. Active Directory
Open LDAP vs. Active DirectoryOpen LDAP vs. Active Directory
Open LDAP vs. Active Directory
 
Ldap
LdapLdap
Ldap
 
LDAP
LDAPLDAP
LDAP
 
Choosing an IdM User Store technology
Choosing an IdM User Store technologyChoosing an IdM User Store technology
Choosing an IdM User Store technology
 
AD & LDAP
AD & LDAPAD & LDAP
AD & LDAP
 
LDAP
LDAPLDAP
LDAP
 
Active Directory
Active DirectoryActive Directory
Active Directory
 
X.500 More Than a Global Directory
X.500 More Than a Global DirectoryX.500 More Than a Global Directory
X.500 More Than a Global Directory
 
Configuring Domino To Be An Ldap Directory And To Use An Ldap Directory
Configuring Domino To Be An Ldap Directory And To Use An Ldap DirectoryConfiguring Domino To Be An Ldap Directory And To Use An Ldap Directory
Configuring Domino To Be An Ldap Directory And To Use An Ldap Directory
 
Active directory basics
Active directory basicsActive directory basics
Active directory basics
 
Chapter_11_LDAP_and_Kerberos-converted.pptx
Chapter_11_LDAP_and_Kerberos-converted.pptxChapter_11_LDAP_and_Kerberos-converted.pptx
Chapter_11_LDAP_and_Kerberos-converted.pptx
 
Directory Servers and LDAP
Directory Servers and LDAPDirectory Servers and LDAP
Directory Servers and LDAP
 
Fox pass
Fox passFox pass
Fox pass
 
network administration directory access and remote access
network administration directory access and remote accessnetwork administration directory access and remote access
network administration directory access and remote access
 
LDAP Theory
LDAP TheoryLDAP Theory
LDAP Theory
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 

Directory Introduction

  • 1. Allidm.com Discovering Identity and Access Management Solutions Directory Services Introduction http://academy.allidm.com
  • 2. Stay connected to Allidm Find us on Facebook: http: //www. facebook.com/allidm Follow us on Twitter: http: //twitter.com/aidy_idm Look for us on LinkedIn: http: //www. linkedin.com/allidm Visit our blog: http://www.allidm.com/blog
  • 3. Disclaimer and Acknowledgments The contents here are created as a own personal endeavor and thus does not reflect any official stance of any Identity and Access Management Vendor on any particular technology
  • 4. Contact Us On this presentation we’ll talk about some useful topics that you can use no matter which identity and access management solution or product you are working on. If you know one that make a big difference please tell us to include it in the future aidy.allidm@gmail.com
  • 5. Introduction A directory is a collection of information about objects arranged in some order that gives details about each object. Popular examples are a city ,telephone ,directory and a library card catalog.
  • 6. What’s a Directory Solution? A directory is a specialized database, also called a data repository, that stores typed and ordered information about objects. A directory is a listing of information about objects arranged in some order that gives details about each object. Directories allow users or applications to find resources that have the characteristics needed for a particular task. For example, a directory of users can be used to look up a person’s e-mail address or phone number.
  • 7. Directory Features A directory service is highly optimized for reads A directory service implements a distributed model for storing information A directory service can extend the types of information it stores A directory service has advanced search capabilities A directory service has loosely consistent replication among directory servers
  • 8. Directory clients and servers Directories are usually accessed using the client/server model of communication. An application that wants to read or write information in a directory does not access the directory directly. Instead, it calls a function or application programming interface (API) that causes a message to be sent to another process.
  • 9. Differences Between Directories and Databases A directory is often described as a database, but it is a specialized database that has characteristics that set it apart from general-purpose relational databases.
  • 10. What is LDAP? LDAP is an open industry standard that defines a standard method for accessing and updating information in a directory. The Lightweight Directory Access Protocol, a standard, extensible Internet protocol used to access directory services The Lightweight Directory Access Protocol (LDAP) defines a message protocol used by directory clients and directory servers.T The LDAP Data Interchange Format (LDIF), a standard text format for exchanging directory data LDAP protocol uses different messages. A searchRequest is used to search for a specific entry in the directory.
  • 11. Interaction between an LDAP client and an LDAP server general interaction between an LDAP client and an LDAP server takes the following form: Establish a session Perform Operations Finish Session
  • 12. Interaction between an LDAP client and an LDAP server Establish a session The client establishes a session with an LDAP server known as binding to the server. The client specifies the host name or IP address and TCP/IP port number where the LDAP server is listening. The client can provide a user name and a password to properly authenticate with the server. Or the client can establish an anonymous session with default access rights. The client and server can also establish a session that uses stronger security methods such as encryption of data.
  • 13. Interaction between an LDAP client and an LDAP server  Perform Operations The client performs operations on directory data. LDAP offers both read and update capabilities. This allows directory information to be managed as well as queried. LDAP also supports searching the directory for data meeting arbitrary user-specified criteria. Searching is a very common operation in LDAP. A user can specify what part of the directory to search and what information to return. A search filter that uses Boolean conditions specifies what directory data matches the search.
  • 14. Ldap Components A directory entry usually describes an object such as a person, a printer, a server, and so on. Each entry has a name called a distinguished name (DN) that uniquely identifies it. The DN consists of a sequence of parts called relative distinguished names (RDNs) The entries can be arranged into a hierarchical treelike structure based on their distinguished names. This tree of directory entries is called the Directory
  • 15.
  • 16. What’s LDIF? Is a standard text file format for storing LDAP configuration information and directory contents. LDIF file is: A collection of entries separated from each other by blank lines A mapping of attribute names to values A collection of directives that instruct the parser how to process the information
  • 17. Why LDIF ? System administrators prefer to use plain-text files for server configuration information, as opposed to some binary store of bits. More comfortable to deal with data in vi, Emacs, or notepad than to dig though raw bits and bytes
  • 18. Types An directory server could be installed in the next ways: Directory Server Proxy Server Replication Gateway
  • 19. LDAP addresses the problems Work in process
  • 20. How LDAP works In process
  • 21. What look for an LDAP Solution Ease of Deploy Portability Open Standards built using open standards and specifications as far as possible. DSML Ease of Administration web-based, graphical administration console command line interfaces Security
  • 22. Choosing an LDAP Solution Work in progress
  • 23. Keys to Successfully Implementing LDAP Distinguish clearly between requirements. Involve everyone, from the chief executive to the users, in the project. Make sure users are actively involved in the project. Use LDAP as an entry point for facilitating identity and access management (IAM) projects. . .
  • 24. Road Map Work in process
  • 25. LDAP Solutions Around World Some of the key vendors providing SSO Solutions are Oracle CA Symplified Forgerock IBM Courion Atlassian
  • 26. Allidm.com Discovering Identity and Access Management Solutions Allidm Academy http://academy.allidm.com