IST346:  Namespaces  Directories  Documentation.

Slides:



Advertisements
Similar presentations
COMP091 OS1 Active Directory. Some History Early 1990s Windows for Workgroups introduced peer-to-peer networking based on SMB over netbios (tcp/ip still.
Advertisements

Access Control Chapter 3 Part 3 Pages 209 to 227.
How to Succeed with Active Directory Robert Williams, PhD CEO Secure Logistix Corporation.
Naming Computer Engineering Department Distributed Systems Course Asst. Prof. Dr. Ahmet Sayar Kocaeli University - Fall 2014.
Active Directory: Final Solution to Enterprise System Integration
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory, Enhanced Chapter 1: Introduction to Active Directory.
3.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 3: Introducing Active Directory.
CS603 Directory Services January 30, Name Resolution: What would you like? Historical? –Mail –Telephone DNS? X.500 / LDAP? DCE? ActiveDirectory?
CS603 Active Directory February 1, 2001.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
1 Chapter 1 Introduction to Windows Server Two main goals for Net Admin Make network resources available to users Files, folders, printers, etc.
Windows 2000 Remote Access. Remote Access Overview With Windows 2000 remote access, remote access clients connect to remote access servers and are transparently.
3.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 3: Introducing Active Directory.
© N. Ganesan, Ph.D., All rights reserved. Active Directory Nanda Ganesan, Ph.D.
By Karan Oberoi.  A directory service (DS) is a software application- or a set of applications - that stores and organizes information about a computer.
CIT 470: Advanced Network and System Administration
Understanding Active Directory
A centralized system.  Active Directory is Microsoft's trademarked directory service, an integral part of the Windows architecture. Like other directory.
1 CSIT 320. Just as the combination of a database and a database management system collects and organizes information about an institution/company/… as.
Hands-On Microsoft Windows Server 2008
Active Directory Lecture 3 – Domain Services Primer.
Introduction to Active Directory Services Completely integrated with Microsoft Windows 2000 Server Integrates the Internet concept of namespace with the.
03/07/08 © 2008 DSR and LDAP Authentication Avocent Technical Support.
(ITI310) SESSIONS : Active Directory By Eng. BASSEM ALSAID.
Chapter 11: Directory Services. Directory Services A directory service is a database that contains information about all objects on the network. Directory.
BZUPAGES.COM An Introduction to. BZUPAGES.COM Introduction Large corporations today face the following problems Finding a certain file. Seeing everything.
Directory services Unit objectives
Session 6 Windows Platform Dina Alkhoudari. Learning Objectives What is Active Directory Logical components of active directory Physical components of.
Windows Server 2008 Chapter 4 Last Update
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
Chapter 6: Windows Servers
Windows 2000 Operating System -- Active Directory Service COSC 516 Yuan YAO 08/29/2000.
Active Directory Windows2003 Server. Agenda What is Active Directory What is Active Directory Building an Active Directory Building an Active Directory.
September 18, 2002 Windows 2000 Server Active Directory By Jerry Haggard.
Module 7 Active Directory and Account Management.
CIT 470: Advanced Network and System AdministrationSlide #1 CIT 470: Advanced Network and System Administration Accounts and Namespaces.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Implementing LDAP Client/Server System for Directory Service By Maochun Sun Project Advisor: Dr. Chung-E Wang Department of Computer Science California.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
 Identify Active Directory functions and Benefits.  Identify the major components that make up an Active Directory structure.  Identify how DNS relates.
Page 1 Active Directory and DNS Lecture 2 Hassan Shuja 09/14/2004.
Chapter 10: Rights, User, and Group Administration.
Hands-On Microsoft Windows Server 2008 Chapter 4-Part 1 Introduction to Active Directory and Account Manager.
OVERVIEW OF ACTIVE DIRECTORY
LDAP- Protocol and Applications. Role of LDAP Allow clients to access a directory service Directories hold hierarchical structured information Clients.
Introduction to Active Directory
Module 1: Introduction to Active Directory
Hussain Ali Department of Computer Engineering KFUPM, Dhahran, Saudi Arabia Active Directory.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
CEG 2400 Fall 2012 Directory Services Active Directory Tree Domain.
Windows 2003 Architecture, Active Directory & DNS Lecture # 3 Hassan Shuja 02/14/2006.
Directory Services CS5493/7493. Directory Services Directory services represent a technological breakthrough by integrating into a single management tool:
1 Introduction to Active Directory Directory Services Uniquely identify users and resources on a network Provide a single point of network management.
1 CEG 2400 Fall 2012 Directory Services Directory Services eDirLDAP Active Directory.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
1 Directory Services  What is a Directory Service?  Directory Services model  Directory Services naming model  X.500 and LDAP  Implementations of.
Name and Address Resolution Domain Name System (DNS)
Introduction to LDAP Frank A. Kuse.
ACTIVE DIRECTORY ADMINISTRATION
(ITI310) SESSIONS 6-7-8: Active Directory.
CONFIGURING LDAP Authentication (rsso 9.1)
Active Directory Administration
Active Directory Stored collection of information about objects
Introduction to Name and Directory Services
CIT 470: Advanced Network and System Administration
Active Directory (November 7, 2016) © Abdou Illia, Fall 2016.
IST346: Namespaces, Identity Management
Windows Active Directory Environment
ACTIVE DIRECTORY An Overview.. By Karan Oberoi.
Presentation transcript:

IST346:  Namespaces  Directories  Documentation

Today’s Agenda  Namespaces – what is a namespace? Why is it important?  Examples of namespace policies  Directories and Directory services  LDAP – lightweight directory access protocol  Active Directory

Namespaces

So, what is a namespace?  A namespace consists of : 1. A set of defined and named keys 2. The attributes associated with each of the keys  For example, the linux and windows user accounts we’ve created in our labs are namespaces 1. The have defined names (the user accounts themselves) tom, dick, harry, etc… 2. Each account has attributes associated with it: password, home directory, default shell, etc…

All sorts of namespaces: Computer Names Printers Service Names IP Addresses User Accounts addresses

Two type of namespaces  Flat  No duplicates can exist in a flat namespace.  SU NetID is a flat namespace: no two people have the named key: mafudge, sjrieks, mrwunder  User accounts are a flat namespace.  Hierarchical  Namespace is organized in a tree  Duplicates can exist at nodes in the tree, but the overall name is globally unique.  DNS is an example of such a namespace:

Namespace Policy  Consistent namespaces make everyone’s job easier.  Helps your users and admins find resources  A well-governed policy is the key to a consistent and reliable namespace.  The policy should have collision prevention for flat namespaces.  Once you decide on a naming convention, it is difficult to change it.  If there’s one thing you should do by committee, its namespace policy creation!  IST-Printer-H010-DELL5310C

Issues Surrounding Namespaces Where should they be used? How does one formulate the named keys? How long should entries remain? When should they be removed? Does the namespace contain sensitive data? ProtectionLongevity Scope Naming Convention

Naming Conventions  Formulaic  Based on an algorithm, generic look and feel  Student001, student1002, server0001  Themeatic  Planets, Constellations, Cartoon charaters  Gamera.syr.edu, rodan.syr.edu  Functional  Name matches function  smtp-host.syr.edu, help.syr.edu, clock.syr.edu  Descriptive  By location, resource, type, device class  How SU names its objects in Active Directory.  No Method  Everyone picks their own, first come first serve.  This is how DNS registrars allocate names on the Internet.  Applied uses are usually a combination of multiple approaches.

Some Examples of namespaces. And their naming conventions

Example namespace: NetID  What is it?  Represents accounts for all users on campus  Rules and Constraints:  Legacy systems require the account to be no more than 8 characters.  Flat namespace for all users associated with SU.  No two people can have the same NetID  Convention:  Named keys are created via a combination of formulaic and functional approaches  Examples:  Michael A Fudge - mafudge  Peggy M Brown – pmbro01

iSchool Workstation Naming (AD)  What is it?  The method the iSchool uses to identify user workstations  Rules and Constraints  For legacy windows computers, 15 characters maximum  Must begin with IST- to avoid conflicts with other organizations on campus (flat namespace)  Convention:  Named keys are created from the user’s netid and machine type (fac/staff desktop/laptop)  Examples:  IST-SD-MAFUDGE  IST-FL-DJMOLTA

DNS Namespace  What is it?  Used for registering names of computers on the internet.   Rules and Constrains  Except for.edu,.gov and.mil there aren’t any  DNS is a heirarchy, duplicates allowed within different contexts, but not globally.   Convention  Top level, org level, hostname  Top level:

DNS Hierarchy www host Syr domain Edu gtld

Descriptive Namespaces  Descriptive names are the friendliest namespace.  They are usually “self-explanatory”  The should be governed carefully within the organization, for obvious reasons.  Examples:  forwards to user barak.obama  forwards to user ncantor  gives you information about all the printers in google  The wireless networks AirOrangeHelp, AirOrange, AirOrangeX

Managing Namespaces  Let’s suppose your organization has  10 Linux,10 windows servers, and 100’s of workstations.  100’s of Users  An established a naming convention for user accounts and computers.  How can you:  Avoid collisions of named keys?  E.g. mafudge = Mary Alice Fudge on a Linux host, Michael A Fudge on a Windows host.  Manage the user and computer namespaces so that your system admins follow the conventions?  Create user fudgema, instead of mafudge for example.  These are real-world issues… ideas?

Meta-Directory  A Meta-Directory is a unified database of your namespaces.  To create a named key for a namespace, such as a new user:  The information is added to the meta-directory  The account is provisioned from the meta-directory to the resource itself. (Account created on the Windows or Linux Server or both)  Meta-Directories are namespace management.  You can buy identity management software to implement a meta-directory or build your own.  These solutions require a lot of planning, design and testing.

Directories Directories offer a database for your namespaces.

Directories 101  Directory  A collection of information that is primarily searched and read, but rarely modified.  Named keys from namespaces are ideal storage candidates for directories.  Directory Service  Provides access to directory information.  Directory Server  Application that provides a directory service.  Note:  Directories are not Meta-directories. Directories store named keys, but do not provision them.

Advantages of Directories  Make administration easier.  Change data only once: people, accounts, hosts.  Unify access to network resources.  Single sign on.  Single place for users to search (address book)  Improve data management  Improve consistency (one location vs many)  Secure data through only one server.

LDAP  Lightweight Directory Access Protocol  Lightweight version of the DAP based on X.500 directories.  Just an Access protocol, not a directory itself.  The directory must be implemented on the server end.  Directory services which implement LDAP  OpenLDAP  Fedora Directory Server (formerly Sun, Netscape)  Mac Open Directory  Microsoft Active Directory  Novell eDirectory (NDS)

LDAP Structure  Hierarchal structure  Containers are called organizational units  An LDAP directory is made of entries.  Entries may be employee records, hosts, accounts etc.  Each entry consists of attributes.  Attributes can be names, phone numbers, etc.  objectClass attribute identifies entry type, or schema  Schema determines the available attributes for the entry  Each attribute is a type / value pair.  Type is a label for the information stored (name)  Value is value for the attribute in this entry.  Attributes can be multi-valued.

LDAP DN  The DN, or distinguished name represents the path from the root of the directory to the entry.  (In this example the rectangle is a user objectClass, and the trapezoid is a computer objectClass) dc=syr, dc=edu ou=IST cn=maufgde cn=ist-sd- mafudge ou=WHIT cn=jadaley Dn: cn=mafudge,ou=IST,dc=syr,dc=edu  my account Dn: cn=ist-s-mafudge,ou=IST,dc=syr,dc=edu  my computer

LDAP Authentication  Anonymous Authentication  Binds with empty DN and password.  Simple Authentication  Binds with DN and password. Cleartext. Bad.  Simple Authentication over SSL/TLS  Use SSL to encrypt simple authentication.  Simple Authentication and Security Layer  SASL is an extensible security scheme.  SASL mechanisms: Kerberos, GSSAPI, SKEY

Active Directory  Microsoft’s Directory service  Used to manage users and computers in the enterprise.  Hierarchy: Forest, Trees, Domains  The Namespace is flat at the domain level  AD Implemented using LDAP + DNS + Kerberos  LDAP used for user, group, computer, policies and more.  Kerberos used for computers on the domain and user logons  DNS is used for naming computers on the domain

Active Directory and LDAP demos

Questions?