25.02.2013 Views

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

together in some way in order to form a distributed directory that contains the<br />

entire DIT. This is accomplished with referrals. A referral acts as a pointer to an<br />

entry on another LDAP server where requested information is stored. A referral is<br />

an entry of objectClass referral. It has an attribute, ref, whose value is the LDAP<br />

URL of the referred entry on another LDAP server. See 12.4.6, “LDAP URLs” on<br />

page 474 for further information. Referrals allow a DIT to be partitioned <strong>and</strong><br />

distributed across multiple servers. Portions of the DIT can also be replicated.<br />

This can improve performance <strong>and</strong> availability.<br />

Note: When an application uses LDAP to request directory information from a<br />

server, but the server only has a referral for that information, the LDAP URL<br />

for that information is passed to the client. It is then the responsibility of that<br />

client to contact the new server to obtain the information. This is unlike the<br />

st<strong>and</strong>ard mechanisms of both DCE <strong>and</strong> X.500, where a directory server, if it<br />

does not contain the requested information locally, will always obtain the<br />

information from another server <strong>and</strong> pass it back to the client.<br />

The functional model<br />

LDAP defines operations for accessing <strong>and</strong> modifying directory entries. LDAP<br />

operations can be divided into the following three categories:<br />

Query Includes the search <strong>and</strong> compare operations used to<br />

retrieve information from a directory.<br />

Update Includes the add, delete, modify, modify RDN, <strong>and</strong><br />

unsolicited notification operations used to update stored<br />

information in a directory. These operations will normally<br />

be carried out by an administrator.<br />

Authentication Includes the bind, unbind, ab<strong>and</strong>on, <strong>and</strong> startTLS<br />

operations used to connect <strong>and</strong> disconnect to <strong>and</strong> from an<br />

LDAP server, establish access rights, <strong>and</strong> protect<br />

information. For further information, see 12.4.5, “LDAP<br />

security” on page 471.<br />

The search operation<br />

The most common operation is the search. This operation is very flexible <strong>and</strong><br />

therefore has some of the most complex options. The search operation allows a<br />

client to request that an LDAP server search through some portion of the DIT for<br />

information meeting user-specified criteria in order to read <strong>and</strong> list the results.<br />

The search can be very general or very specific. The search operation allows the<br />

specification of the starting point within the DIT, how deep within the DIT to<br />

search, the attributes an entry must have to be considered a match, <strong>and</strong> the<br />

attributes to return for matched entries.<br />

Chapter 12. Directory <strong>and</strong> naming protocols 469

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!