ECS and LDAP Karen Krivaa Product Marketing Manager.

Slides:



Advertisements
Similar presentations
Bryant Morris Sr. Sales Engineer January,2002 SURA - Birmingham, AL.
Advertisements

H.323 Gatekeepers Lucent Technologies - elemedia.
H. 323 Chapter 4.
H.323 Recommended by ITU-T for implementing packet-based multimedia conferencing over LAN that cannot guarantee QoS. Specifying protocols, methods and.
VoIP EE 548 Ashish Kapoor. Characteristics – Centralized and Distributed Control H.323 pushes call control functionality to the endpoint, while still.
ASGC Site Update Yi-Ping Wu Jeng-Hsueh Wu. Two Significant Researches 1.Oracle Security issues and Studies for 3D 2.Streams Replications Study Report.
Module 10: Troubleshooting AD DS, DNS, and Replication Issues.
Active Directory: Final Solution to Enterprise System Integration
Understanding Active Directory
Directory Services BICS 565. What is a Directory Service (DS)? A service that allows users to lookup information about entities in an organization Entities.
3.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 3: Introducing Active Directory.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
1 Chapter 1 Introduction to Windows Server Two main goals for Net Admin Make network resources available to users Files, folders, printers, etc.
By Rashid Khan Lesson 4-Preparing to Serve: Understanding Microsoft Networking.
Chapter 16 AAA. AAA Components  AAA server –Authenticates users accessing a device or network –Authorizes user to perform specific activities –Performs.
Windows 2000 Remote Access. Remote Access Overview With Windows 2000 remote access, remote access clients connect to remote access servers and are transparently.
System Architecture University of Maryland David Henry Office of Information Technology December 6, 2002.
SIMI: ISO Perspective Al ISO CSU Northridge
Fermilab VPN Service What is a VPN ?.
Understanding Active Directory
A centralized system.  Active Directory is Microsoft's trademarked directory service, an integral part of the Windows architecture. Like other directory.
HalFILE 3.0 Active Directory Integration. halFILE 3.0 AD – What is it? Centralized organization of network objects and security – servers, computers,
Directory and File Transfer Services Chapter 7. Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP.
Overview of Active Directory Domain Services Lesson 1.
Overview of Active Directory Domain Services Lesson 1.
Module D Panko and Panko Business Data Networks and Security, 9 th Edition © 2013 Pearson Education, Inc. Publishing as Prentice Hall.
Session 6 Windows Platform Dina Alkhoudari. Learning Objectives What is Active Directory Logical components of active directory Physical components of.
A New Architecture for Web Services at CERN Alberto Di Meglio, Francois Fluckiger, Monica Marinucci, Per Hagen, Alberto Pace
Windows Server 2008 R2 Domain Name System Chapter 5.
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
USM Regional PeopleSoft Conference
1 Introduction of Desktop Video Conferencing based on ITU-Standard H.350 Spring 2005 Internet2 Member Meeting Frank Reinemer Managed Services Consulting,
Active Directory Windows2003 Server. Agenda What is Active Directory What is Active Directory Building an Active Directory Building an Active Directory.
INTRODUCTION What is a Web-Enabled Database? Problem and its Importance Two-tier Architecture Three-tier Architecture Need for a compatible centralized.
Building Secure, Flexible and Scalable Environments using LDAP - SANS Orlando Sacha Faust PricewaterhouseCoopers
3Com Confidential Proprietary 3G CDMA AAA Function Yingchun Xu 3COM.
PS Security By Deviprasad. Agenda Components of PS Security Security Model User Profiles Roles Permission List. Dynamic Roles Static Roles Building Roles/Rules.
Erie 1 BOCES / WNYRIC eBOCES applications Visit us at:
Made by Reference Services Section, NCCU update Database for Beginners.
 Identify Active Directory functions and Benefits.  Identify the major components that make up an Active Directory structure.  Identify how DNS relates.
Identity and Access Management Siddharth Karnik. Identity Management -> Oracle Identity Management is a product set that allows enterprises to manage.
Using RADIUS as a AAA backbone for Windows networks Kostas Kalevras NTUA Network Operations Centre.
Page 1 Active Directory and DNS Lecture 2 Hassan Shuja 09/14/2004.
Client/Server Model: A Business View The different Client/server implementations differ according to: 1.Where the processing for the presentation of information.
Windows 2000 Ronnie Park Jarod Nozawa Joe Stones Yassir Mhdhroui.
OVERVIEW OF ACTIVE DIRECTORY
1 Active Directory Service in Windows 2000 Li Yang SID: November 2000.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Systems and Network Design Professional Services for NT Server and NetWare Networks.
P2P Search COP6731 Advanced Database Systems. P2P Computing  Powerful personal computer Share computing resources P2P Computing  Advantages: Shared.
Directory Services CS5493/7493. Directory Services Directory services represent a technological breakthrough by integrating into a single management tool:
SQL Server 2012 Session: 1 Session: 4 SQL Azure Data Management Using Microsoft SQL Server.
MCSE: Windows Server 2003 Active Directory Planning, Implementation, and Maintenance Study Guide, Second Edition (70-294) Chapter 1: Overview of the Active.
Unified Address Book Security Implications. Unified Address Book Overview –What are we talking about –What is the Risk –What are we doing to minimize.
1 (c) 2013 FabSoft. MOST Cloud Service What is a Cloud Service? A cloud service is internet-based, meaning that MOST is hosted on a server farm on the.
EZAccess User Guide. EZAccess is a web proxy server that allows authorized users to access IP-restricted electronic resources subscribed by UiTM library.
COMP1321 Digital Infrastructure Richard Henson March 2016.
Overview of Active Directory Domain Services Lesson 1.
LDAP Overview Kevin Moseley Server Team Manager Walgreen Co.
CIS Host Manager Bryce Johnston CIS 597 May 8, 2009.
Overview of Active Directory Domain Services
Overview of Active Directory Domain Services
Access Portal
Local MAC Address Protocol
Active Directory Stored collection of information about objects
Gary Thom President, Delta Information Systems, Inc.
Modular Object Scanning Technology (MOST)
Windows Active Directory Environment
ACTIVE DIRECTORY An Overview.. By Karan Oberoi.
SAML/SIP Profiles and Call Initiation
Presentation transcript:

ECS and LDAP Karen Krivaa Product Marketing Manager

LDAP: Lightweight Directory Access Protocol  LDAP serves as a flexible, scalable user- and security- management infrastructure to store and manage user profiles and to serve as the basis for site-wide user authentication and security  Allows for one central database to be updated for authentication via multiple ECSs on the network  LDAP is an IETF standard defined by the Accessing and Indexing Directories (ASID) working group.

LDAP – Main Features today  Authentication  When an endpoint registers to the ECS, it is authenticated according to its alias/es and or IP address.  Location of Endpoint (using static/online info)  If ECS cannot find the destination in its zone, it searches the static info or the online info directory  Update  The ECS updates the LDAP server with information about online endpoints, such as aliases, call signaling address and RAS address.  Retrieve neighbor GK list  The ECS reads the neighbor list from the LDAP server every fixed time

LDAP – Tree Structure

New LDAP Schema Based on Draft H.350.x recommendations (February 2003)  Authentication  At registration to the ECS, the endpoint will be authenticated according to its H.235 sender Id and password  Fixed aliases from LDAP  Successful registration will utilize aliases as defined in LDAP and NOT in the endpoint  Authorization  Different service level groups will be utilized for authorization of the call by the ECS at the ARQ stage