22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

340 Lotus Security Handbook<br />

Identify authoritative sources<br />

The information stored in a user's directory record is organized by discrete<br />

attributes or fields. The scope of information stored in a directory is often set by<br />

the requirements of an application or a set of applications. An authoritative<br />

source is defined as the highest organizational authority that creates, generates,<br />

or validates the data attribute values. Data validation may occur at initial data<br />

entry, or any time the data is updated or maintained. Each attribute may have<br />

been validated or generated by a different part of the organization.<br />

An example of an authoritative source would be an HR employee directory where<br />

the unique employee ID number gets generated.<br />

Identify unique keys<br />

Unique keys are the unique identifying attributes for each person, computer, or<br />

other resource. An attribute must be globally used and globally unique in order to<br />

be a key. If a single unique key is not used, a combination of attributes can be<br />

used to form a unique key. Note that what appears to be an ideal unique key may<br />

in fact have limitations. For example, an SMTP e-mail address is generally<br />

unique for each employee; however, not all employees might have e-mail.<br />

A second aspect of identifying the unique keys is to define the bounds of the data<br />

the key may be applied to. While an organizational employee ID number might<br />

be unique within the U.S., it may not be present or available in other countries.<br />

When multiple keys are available in a given repository, they should be classified<br />

into primary keys and secondary keys, based on their reliability. For example, a<br />

primary key might be Employee ID, a secondary key the corporate SMTP e-mail<br />

address, and a third key the fullname combined with the telephone number and<br />

work location.<br />

Determine the integration strategy<br />

Once the existing data sources and correlation keys have been identified and<br />

inventoried, the next step is to select a strategy for merging (or integrating) the<br />

data. As we previously mentioned, there are basically two types of directory<br />

integration strategies:<br />

► Metadirectory<br />

► Central master directory<br />

For most organizations, a metadirectory is quicker and easier to implement than<br />

a new central, multipurpose master directory. It is important to understand the<br />

distinction between a metadirectory and a central master directory.<br />

A metadirectory defines the relationships and data flows between the different<br />

existing directories. They typically have connectors that are specifically designed<br />

for particular directories, such as Domino, Active Directory, PeopleSoft HRMS,

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!