22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

346 Lotus Security Handbook<br />

DN= uid=bhinkle2,cn=users,dc=acme,dc=com<br />

cn=Bill Hinkle<br />

mail=b_hinkle@acme.com<br />

Note in the example entries that it is difficult, or even impossible, to know which<br />

user we intend to select based on the DN. Our applications, such as e-mail, need<br />

to incur extra overhead to retrieve attributes for the entry in addition to the DN so<br />

the user or application can determine the proper entry. In the example, the<br />

common name would allow us to distinguish the person we want to select. But in<br />

large organizations, duplicate or similar common names will exist with significant<br />

frequency. So another attribute, such as department or location, would then need<br />

to also be queried. So if we revisit the tree to make it “taller” (or less “flat”), we<br />

can easily create DNs that provide more granular information for the entries<br />

without the need to access additional attributes:<br />

DN= uid=bhinkle,ou=sales,dc=acme,dc=com<br />

mail=b_c_hinkle@acme.com<br />

DN= uid=bhinkle2,ou=hr,dc=acme,dc=com<br />

mail=b_hinkle@acme.com<br />

Using either OU or DC branches beneath the root is typically advisable in smaller<br />

organizations (under 10,000 entries) only if the user administration is distributed.<br />

This is because access controls are easier to implement at a branch node rather<br />

than on each individual leaf (user) node. As for whether the traditional X.500<br />

country root or a DNS domain component root is better, this is the subject of<br />

debate. Considering that an international X.500 service has never materialized to<br />

link the country roots together in a unified manner, a domain structure has<br />

become the more popular approach. In theory, using the DNS domain<br />

components might eventually support the ability to obtain someone’s X.500<br />

public certificate for sending encrypted SMIME messages. But we feel that this<br />

will not realistically happen for at least three to five years, if it happens at all. Our<br />

experience has been that commercial organizations are unlikely to ever provide<br />

a publicly accessible directory service for their internal users. The concerns over<br />

misuse, such as SPAM, are most certainly justifiable. But given the ubiquity of<br />

DNS, we would most likely recommend a domain component DIT for<br />

organizations that are contemplating a new LDAP implementation.<br />

Defining the DIT requires a great deal of planning. It usually involves a trade-off<br />

between granular organization and ease of administration. And it is very often<br />

difficult to change once in place and the directory populated. The DIT that proves<br />

to be a good “fit” for one organization may be completely inappropriate for<br />

another organization, even though both might be in the same industry.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!