13.07.2015 Views

Java™ Application Development on Linux - Dator

Java™ Application Development on Linux - Dator

Java™ Application Development on Linux - Dator

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

486Chapter 21Introducti<strong>on</strong> to Enterprise JavaBeansAt each node there is a type (c, cn, url, and so <strong>on</strong>) and a name (or value)for that type. The definiti<strong>on</strong>s of these types and the lists of types permitted ata particular level depend <strong>on</strong> a schema which is c<strong>on</strong>trolled by whoever c<strong>on</strong>trolsthe server that serves the given level of the hierarchy. In other words, as withDNS, if you want to be part of the public, global namespace, you have to playby the rules of the ancestor nodes. You can do what you want with your pointof c<strong>on</strong>trol and below, but you must obey the naming schema of all of yourancestors. 5This explains why so few organizati<strong>on</strong>s actually use LDAP globally(i.e., integrating directly with all other public LDAP servers in the world). Instead,they tend to use LDAP by setting up schema and servers that are completelyinternal and private so that they do not have to use the many requiredparent nodes it would take to hook up to the global LDAP namespace. 6LDAP can (and does) fill books of its own. The type/name pairs are bulkyto type and hard to remember, but they allow you to easily map in entire othernaming systems, by simply assigning a type to a naming system and allowingthat system’s names to be values at that level. Remember that these names arehierarchical, so everything under cn (normally used for “comm<strong>on</strong> name”) appliesto (in this case) Michael Schwarz. If I defined the schema for my space,I could put anything I wanted under that name.A comm<strong>on</strong> use of LDAP is for centralizing authenticati<strong>on</strong> and authorizati<strong>on</strong>data for users. Users authenticate to LDAP and all systems in an organizati<strong>on</strong>can validate a single credential to authenticate the user—the holy grail ofsingle sign-in. Alas, doing this right is n<strong>on</strong>trivial because LDAP doesn’t specifyany mandatory authenticati<strong>on</strong> and encrypti<strong>on</strong> scheme. (Thus it is often thehacker’s holy grail of single sniff-in and 0wn3d systems.)5. We want to be clear: You <strong>on</strong>ly have to do this if you wish to give those ancestors and outsideusers access to your directories. You are free to create entirely private directory structures thatneed not c<strong>on</strong>form to any<strong>on</strong>e else’s schema. It all depends <strong>on</strong> the purpose and audience of yourdirectory.6. Another reas<strong>on</strong> is that LDAP itself has no cryptographically secure authenticati<strong>on</strong> or transportmechanisms. That means that hooking up all your directory data to the global Internetgives hackers a <strong>on</strong>e-stop opportunity to steal your data. Not good. Of course, as with otherprotocols, there are several add-<strong>on</strong> security mechanisms for LDAP.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!