Replication of an X.500 Directory Service to Microsoft’s Active Directory.

Slides:



Advertisements
Similar presentations
Extern name server - translates addresses of s messages - enables users to use aliases - … ID cards system - controls entrance to buildings,
Advertisements

Data Modeling and Database Design Chapter 1: Database Systems: Architecture and Components.
Active Directory: Final Solution to Enterprise System Integration
Introduction to Active Directory
Hands-On Microsoft Windows Server 2003 Administration Chapter 5 Administering File Resources.
Chapter 4 Relational Databases Copyright © 2012 Pearson Education 4-1.
ADVANCED LINUX SECURITY. Abstract : Using mandatory access control greatly increases the security of an operating system. SELinux, which is an implementation.
Understanding Active Directory
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
Vikram Thakur Introduction to Active Directory Structure.
TIBCO Designer TIBCO BusinessWorks is a scalable, extensible, and easy to use integration platform that allows you to develop, deploy, and run integration.
Firewalls CS158B Don Tran. What is a Firewall? A firewall can be a program or a device that controls access to a network.
ADVANCED MICROSOFT ACTIVE DIRECTORY CONCEPTS
Guide to MCSE , Enhanced 1 Activity 4-1: Creating and Adding Members to Global Groups Objective: Use Active Directory Users and Computers to create.
Ch 11 Managing System Reliability and Availability 1.
Overview of Active Directory Domain Services Lesson 1.
(ITI310) SESSIONS : Active Directory By Eng. BASSEM ALSAID.
Module 1 Introduction to Managing Microsoft® Windows Server® 2008 Environment.
70-270: MCSE Guide to Microsoft Windows XP Professional Chapter 5: Users, Groups, Profiles, and Policies.
Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit.
9.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
Module 12: Designing an AD LDS Implementation. AD LDS Usage AD LDS is most commonly used as a solution to the following requirements: Providing an LDAP-based.
1 1 Definitions and basic concepts Statistical Training Course Use of Administrative Registers in Production of Statistics Warzaw 14 – 17 October 2014.
Chapter 7: WORKING WITH GROUPS
Chapter 2 CIS Sungchul Hong
Database Architecture Introduction to Databases. The Nature of Data Un-structured Semi-structured Structured.
ACTIVE DIRECTORY The Desktop Team Raphael Perez MVP: Enterprise Client Management, MCT RFL Systems Ltd |
Designing Group Security Designing security groups Designing user rights.
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory, Enhanced Chapter 4: Active Directory Architecture.
Directories, Databases and Decisions A CTO’s view of Enterprise Management Solutions.
P RESENTED B Y - Subhomita Gupta Roll no: 10 T OPICS TO BE DISCUSS ARE : Introduction to Firewalls  History Working of Firewalls Needs Advantages and.
Eurotrace Hands-On The Eurotrace File System. 2 The Eurotrace file system Under MS ACCESS EUROTRACE generates several different files when you create.
1 Adapted from Pearson Prentice Hall Adapted form James A. Senn’s Information Technology, 3 rd Edition Chapter 7 Enterprise Databases and Data Warehouses.
Module 8: Implementing the Placement of Domain Controllers.
Company Confidential 1 A Course on Global Catalog And Flexible Single Master Operations (Fsmo) Roles Prepared for: *Stars* New Horizons Certified Professional.
1 Administering Shared Folders Understanding Shared Folders Planning Shared Folders Sharing Folders Combining Shared Folder Permissions and NTFS Permissions.
Module 11: Read-Only Domain Controllers. Overview Describe the Read-Only Domain Controllers role Use Read-Only Domain Controllers.
 Identify Active Directory functions and Benefits.  Identify the major components that make up an Active Directory structure.  Identify how DNS relates.
Chapter 8 Configuring and Managing Shared Folder Security.
Module 4: Configuring Active Directory Sites and Replication.
Session 8 Windows Platform Dina Alkhoudari. Learning Objectives Read Only Domain Controller Active Directory Certificate Service Group Policy.
Chapter 4- Part3. 2 Implementing User Profiles A local user profile is automatically created at the local computer when you log on with an account for.
Introduction to Active Directory
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
1 AHM, 2–4 Sept 2003 e-Science Centre GRID Authorization Framework for CCLRC Data Portal Ananta Manandhar.
Microsoft Active Directory Presented by Sherese Harrell, Rebecca Meinhold, and Brenden Tourelle
1 Configuring Sites Configuring Site Settings Configuring Inter-Site Replication Troubleshooting Replication Maintaining Server Settings.
Module 4: Configuring Active Directory ® Domain Sevices Sites and Replication.
11 GLOBAL CATALOG AND FLEXIBLE SINGLE MASTER OPERATIONS (FSMO) ROLES Chapter 4.
7.1 © 2004 Pearson Education, Inc. Exam Designing a Microsoft ® Windows ® Server 2003 Active Directory and Network Infrastructure Lesson 7: Planning.
Unified Address Book Security Implications. Unified Address Book Overview –What are we talking about –What is the Risk –What are we doing to minimize.
Overview of Active Directory Domain Services Lesson 1.
LDAP: Synchronizing LDAP Information CNS 4650 Fall 2004 Rev. 2.
11 IMPLEMENTING ACTIVE DIRECTORY Chapter 2. Chapter 2: IMPLEMENTING ACTIVE DIRECTORY2 REQUIREMENTS FOR ACTIVE DIRECTORY  Microsoft Windows Server 2003.
Overview of Active Directory Domain Services
Overview of Active Directory Domain Services
Active Directory Administration
Azure Identity Premier Fast Start
(ITI310) SESSIONS 6-7-8: Active Directory.
Current Campus Issues – From My Horizon
Braindumps Questions Answers
Database Design Using the REA Data Model
Batch Parties Changes.
Active Directory Overview
Manage the Active Directory Database
ACTIVE DIRECTORY An Overview.. By Karan Oberoi.
UF Directory Coordinator Training
SQL – Constraints & Triggers
DBA Workflow Diagram Template
INTRODUCTION A Database system is basically a computer based record keeping system. The collection of data, usually referred to as the database, contains.
Presentation transcript:

Replication of an X.500 Directory Service to Microsoft’s Active Directory

Business Drivers Active Directory is a requirement for desktop management, and the security which comes with it The cost of maintaining two separate data sets (one for the enterprise services, and one for the desktops), in any kind of consistent state, would have been prohibitive

Scope and Goals Unidirectional replication of data in OpenLDAP (an X.500 directory service) to Active Directory Full replication of users and groups Real time Adaptable, and low maintenance

Method

My Definition of a Translating Proxy A normal proxy server lets data through verbatim in most cases (though it may make authorization decisions) A translating proxy server strives to let meaning through verbatim, but it may change the data’s representation.

Translation Process, General Flow Given an object to add, or a modification to apply Compute the set of attributes which are allowed based on the AD schema. Remove attributes which are not allowed Compute the set of attributes which are required, but missing, generate values for them if possible, otherwise reject the change Perform AD specific translations (address AD quirks), and apply the change

A Small Example

Tdir at csun

So How About Those Goals Tdir is currently able to replicate 99.9% of our user and group objects Tdir is fast enough that real time replication is the rule instead of the exception Because Tdir understands the schema, and the directory, at a high level it has proven very adaptable to changes