LDAP- Protocol and Applications. Role of LDAP Allow clients to access a directory service Directories hold hierarchical structured information Clients.

Slides:



Advertisements
Similar presentations
Authentication.
Advertisements

Chapter 14 – Authentication Applications
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Module 5: TLS and SSL 1. Overview Transport Layer Security Overview Secure Socket Layer Overview SSL Termination SSL in the Hosted Environment Load Balanced.
ECS and LDAP Karen Krivaa Product Marketing Manager.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
LDAP Lightweight Directory Access Protocol LDAP.
How to Succeed with Active Directory Robert Williams, PhD CEO Secure Logistix Corporation.
Naming Computer Engineering Department Distributed Systems Course Asst. Prof. Dr. Ahmet Sayar Kocaeli University - Fall 2014.
Information Technology Registry Services Security LDAP-based Attributes and Authentication.
Active Directory: Final Solution to Enterprise System Integration
1 30 September 1999 Concepts A directory is a hierarchical, searchable database for relatively stable data - Information about users and other global entities.
CS603 Directory Services January 30, Name Resolution: What would you like? Historical? –Mail –Telephone DNS? X.500 / LDAP? DCE? ActiveDirectory?
Computer Science Lecture 9, page 1 CS677: Distributed OS Today: Naming Names are used to share resources, uniquely identify entities and refer to locations.
CS603 Active Directory February 1, 2001.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 7: Planning a DNS Strategy.
Understanding Active Directory
A centralized system.  Active Directory is Microsoft's trademarked directory service, an integral part of the Windows architecture. Like other directory.
Understanding Active Directory
©Copyright 1999 Peter Shipley LDAP Security Peter Shipley Chief Security Architect
Directory and File Transfer Services Chapter 7. Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP.
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
(ITI310) SESSIONS : Active Directory By Eng. BASSEM ALSAID.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
23/4/2001LDAP Overview - HEPix - LAL 2001 LDAP Overview HEPix – LAL Apr Michel Jouvin
LIGHT WEIGHT DIRECTORY ACCESS PROTOCOL Presented by Chaithra H.T.
Module 2: Implementing DNS to Support Active Directory
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
The Directory A distributed database Distributed maintenance.
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
SUSE Linux Enterprise Desktop Administration Chapter 12 Administer Printing.
October 8, 2015 University of Tulsa - Center for Information Security Microsoft Windows 2000 DNS October 8, 2015.
Building Secure, Flexible and Scalable Environments using LDAP - SANS Orlando Sacha Faust PricewaterhouseCoopers
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Module 9: Fundamentals of Securing Network Communication.
Kerberos Named after a mythological three-headed dog that guards the underworld of Hades, Kerberos is a network authentication protocol that was designed.
Implementing LDAP Client/Server System for Directory Service By Maochun Sun Project Advisor: Dr. Chung-E Wang Department of Computer Science California.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
XML Web Services Architecture Siddharth Ruchandani CS 6362 – SW Architecture & Design Summer /11/05.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
 Identify Active Directory functions and Benefits.  Identify the major components that make up an Active Directory structure.  Identify how DNS relates.
Extending ISA/IAG beyond the limit. AGAT Security suite - introduction AGAT Security suite is a set of unique components that allow extending ISA / IAG.
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
TCP/IP (Transmission Control Protocol / Internet Protocol)
The HEP White Pages Project Ray Jackson CERN / IT - Internet Services Group 23rd April HEPiX/HEPNT Conference, LAL-Orsay, France.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
SOCKS By BITSnBYTES (Bhargavi, Maya, Priya, Rajini and Shruti)
15 May 2001© 2001 University of Salford1 Deficiencies in LDAP when used to support Public Key Infrastructures David W Chadwick
Introduction to Active Directory
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Directory Services CS5493/7493. Directory Services Directory services represent a technological breakthrough by integrating into a single management tool:
1 Introduction to Active Directory Directory Services Uniquely identify users and resources on a network Provide a single point of network management.
1 CEG 2400 Fall 2012 Directory Services Directory Services eDirLDAP Active Directory.
Unified Address Book Security Implications. Unified Address Book Overview –What are we talking about –What is the Risk –What are we doing to minimize.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
VIRTUAL SERVERS Chapter 7. 2 OVERVIEW Exchange Server 2003 virtual servers Virtual servers in a clustering environment Creating additional virtual servers.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
1 Directory Services  What is a Directory Service?  Directory Services model  Directory Services naming model  X.500 and LDAP  Implementations of.
LDAP
SUBMITTED BY: NAIMISHYA ATRI(7TH SEM) IT BRANCH
Working at a Small-to-Medium Business or ISP – Chapter 7
Working at a Small-to-Medium Business or ISP – Chapter 7
Working at a Small-to-Medium Business or ISP – Chapter 7
Architecture Competency Group
Introduction to Active Directory Directory Services
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

LDAP- Protocol and Applications

Role of LDAP Allow clients to access a directory service Directories hold hierarchical structured information Clients may be directly controlled by individuals, embedded in applications, or “agents” LDAP can be used when integrating multiple directory services

Advantages of LDAP Global naming model ensures unique entries Allows for multiple independent directories Extensible to meet future / local requirements Runs directly over TCP / IP and SSL Has broad industry support Based on existing deployed technologies

Overview Client-server architecture Global tree of entries, each server holds a portion of the tree Entry: set of attributes with distinguished name –Name: “cn=Mark Wahl,dc=critical-angle,dc=com” –Attributes: description, address, photograph, etc Operations –Bind: identify the client and optionally authenticate –Search: find entries in a portion of the tree matching a filter –Add, delete, modify, modify DN: modifies the tree –Extended operations: for application-specific functionality

Components LDAP-X.500 Gateway LDAP Server X.500 Server LDAP Client WWW-LDAP Gateway X.500 Server HTTP Client HTTP Client

Evolution 1988: X : Univ. Michigan starts developing LDAP 1993: LDAP first published as RFC 1995: Work begins on LDAPv3 specification 1996: Final call on LDAPv3 drafts 1997: LDAPv3 published as RFCs

New in LDAPv3 Referrals Character sets Schema definitions Schema publication Security features Extended operation framework Dynamic and paged search extensions

LDAPv3: Referrals LDAPv2 –Every server required to process any query –Based on initial use of LDAP as lightweight access to X.500 LDAPv3 –Server may process query itself, or return a referral –Referral: set of URLs of other servers to contact –Multiple URLs can be included, in case servers are inaccessible –Servers can also rewrite queries for clients –Referral processing is done inside client library and can be transparent to applications

LDAPv3: Character Sets LDAPv2 only allowed for ASCII and T.61 –Based on legacy of X.500 environment –T.61 can represent only some Western European characters LDAPv3: UTF-8 entry names and attribute values –UTF-8 is a variable-length encoding of ISO –ASCII characters are identical in UTF-8 –Unicode is a subset of ISO 10646

LDAPv3: Schema Definitions Schema –Aspects of a real-world object to be represented in entry –No schema defined for LDAPv2, but X.500 implied LDAPv3 suggests: –X.500(1993): people and organizations –RFC 1274 updated: Internet-specific attributes Vendor-defined schema –Netscape, Microsoft, Novell and others Application and administrator-defined schema –For local requirements

LDAPv3: Schema Publication Schema is extensible attribute type names are not globally unique Clients can check their semantic associations to an attribute type name match those of server Clients also need way to discover new schema LDAPv3 adds subschema subentries to the tree which contain description and unique identifiers Automatically maintained by servers themselves

LDAPv3: Security LDAPv3 can be carried over SSL –Provides connection authentication and confidentiality SASL Bind –Allows negotiation of services (e.g. Kerberos or GSS-API) Password encrypted with one-way hash –All servers must have a copy of client’s password –Suitable for environments with a single service Strong authentication with digital signature –Servers need only have client’s public key (via certificate) –Suitable for environments with multiple services

LDAPv3: Extension Framework Extension –Supports adding new features to LDAP without disruption Unique identifier, criticality, value –Server may ignore unrecognized non-critical extensions –Server rejects operation with unrecognized critical extensions Client can check server’s supported extensions –Published in the directory tree in a special entry

LDAPv3: Paged Search Results Optional server feature Server sorts result and caches it Clients can request arbitrary pages (subsets) of a recently gathered result Designed for UI clients: to support a user moving scrollbar around a long list of entries

LDAPv3: Dynamic Refresh Optional server feature Client adds information to the directory, and requests that the server time it out Server replies with time-to-live, based on its load Client sends UDP / IP refresh operation to server If client shuts down, server will delete information Designed for mobile and dial-up clients

Some Applications of LDAP Internet applications –Centralized or distributed white pages –ISP on-line subscriber directory Intranet applications –Internal white pages –Certificate and CRL distribution –System/network management database

Applications: White Pages For use by people through WWW gateways/clients Telephone number, address lookup Can also return photos, spoken names, URLs Naming and distribution model allows the directory to contain information from multiple organizations PARADISE: over 1,000,000 entries maintained by Universities and research organizations BigFoot, Four11, others provide LDAP access

Applications: White Pages Same data can be used by programs Sendmail extension checks LDAP for addressing Netscape, other WWW servers validate user Directory synchronization: combining address databases from multiple mail systems

Applications: Users Directory Dynamic directory extension can be used where information is frequently changing Microsoft NetMeeting and other clients will register user in directories of everyone on-line Other people can search for that user, based on their name or other attributes Terminal capabilities can be determined from directory before communication starts

Applications: Certificates Certificates and Revocation Lists are exchanged between components of Public Key Infrastructure Users and Certification Authorities (CAs) identified by Distinguished Names, as used in LDAP Programs can automatically retrieve this information from LDAP-capable directories LDAPv2 could not handle certificates correctly; fixed in LDAPv3

Application: System Database LDAP can be used to access directories of network components (servers, printers, etc) Novell has a gateway from LDAP to NDS Directories can also be built with other general- purpose servers

Implementations Few LDAPv3 implementations available –Critical Angle, Zoomit; and others LDAPv2 implementations: –Servers –Clients –Client libraries –Gateways to LDAP From HTTP, Ph / CCSO, whois++, X.500 –Gateways from LDAP To X.500, NDS –Firewalls

Some Implementations Clients –Univ. Michigan, Microsoft, Netscape Communicator Client libraries –C (RFC 1823), Java, Perl, Visual Basic, Tcl General-purpose servers –Most X.500 servers support LDAP –Netscape: LDAP-only Directory Server –Univ. Michigan, Critical Angle: free SLAPD Single-purpose servers –Provide LDAP view onto existing data structure –Often not able to handle modifications or extensions

Future Directions Replication and Indexing –Currently replication between servers not standardized –Replication will be defined using existing LDAP operations –Centroids: make wide-area searches more effective Standard Access Control –Unless two vendor’s servers implement access control in the same way, cannot replicate sensitive information –Currently only X.500 servers have a common model Additional Schemas –Applications will take advantage of directory infrastructure

Conclusions LDAP is key to the directory infrastructure LDAP will be used by many services, just like TCP and DNS are today LDAPv3 implementations are coming Be sure directory servers are suited for the service being deployed