25.02.2013 Views

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

12.4.5 LDAP security<br />

Time Limit The maximum number of seconds allowed to perform the<br />

search. Specifying zero indicates that there is no time<br />

limit.<br />

Types Only This parameter has two possible values:<br />

TRUE Only attribute descriptions are returned.<br />

FALSE Attribute descriptions <strong>and</strong> values are<br />

returned.<br />

Search filter Specifies the criteria an entry must match to be returned<br />

from a search. The search filter is a Boolean combination<br />

of attribute value assertions. An attribute value assertion<br />

tests the value of an attribute for equality, less than or<br />

equal, <strong>and</strong> so on.<br />

Attributes to return Specifies which attributes to retrieve from entries that<br />

match the search criteria. Because an entry can have<br />

many attributes, this allows the user to only see the<br />

attributes in which they are interested.<br />

Security is of great importance in the networked world of computers, <strong>and</strong> this is<br />

true for LDAP as well. When sending data over insecure networks, internally or<br />

externally, sensitive information might need to be protected during<br />

transportation. There is also a need to know who is requesting the information<br />

<strong>and</strong> who is sending it. This is especially important when it comes to the update<br />

operations on a directory. RFC 4513 discusses the authentication methods <strong>and</strong><br />

security mechanisms available in LDAPv3, which can be divided into the<br />

following sections:<br />

Authentication Assurance that the opposite party (machine or person)<br />

really is who he/she/it claims to be.<br />

Integrity Assurance that the information that arrives is really the<br />

same as what was sent.<br />

Confidentiality Protection against information disclosure, by means of<br />

data encryption, to those who are not intended to receive<br />

it.<br />

Authorization Assurance that a party is really allowed to do what it is<br />

requesting to do, usually checked after user<br />

authentication. Authorization is achieved by assigning<br />

access controls, such as read, write, or delete, for user<br />

IDs or common names to the resources being accessed.<br />

Because these attributes are usually platform-specific,<br />

LDAP does not provide specific controls. Instead, it has<br />

Chapter 12. Directory <strong>and</strong> naming protocols 471

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!