⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 intro.sdf

📁 OpenLdap是LDAP的开源项目
💻 SDF
📖 第 1 页 / 共 2 页
字号:
Initially, LDAP clients accessed gateways to the X.500 directory service.This gateway ran LDAP between the client and gateway and X.500's{{TERM[expand]DAP}} ({{TERM:DAP}}) between the gateway and theX.500 server.  DAP is a heavyweight protocol that operates over afull OSI protocol stack and requires a significant amount ofcomputing resources.  LDAP is designed to operate over{{TERM:TCP}}/{{TERM:IP}} and provides most of the functionality ofDAP at a much lower cost.While LDAP is still used to access X.500 directory service viagateways, LDAP is now more commonly directly implemented in X.500servers. The stand-alone LDAP daemon, or {{slapd}}(8), can be viewed as a{{lightweight}} X.500 directory server.  That is, it does notimplement the X.500's DAP nor does it support the complete X.500models.If you are already running a X.500 DAP service and you want tocontinue to do so, you can probably stop reading this guide.  Thisguide is all about running LDAP via {{slapd}}(8), without runningX.500 DAP.  If you are not running X.500 DAP, want to stop runningX.500 DAP, or have no immediate plans to run X.500 DAP, read on.It is possible to replicate data from an LDAP directory server toa X.500 DAP {{TERM:DSA}}.  This requires an LDAP/DAP gateway.OpenLDAP does not provide such a gateway, but our replication daemoncan be used to replicate to such a gateway.  See the {{SECT:Replicationwith slurpd}} chapter of this document for information regardingreplication.H2: What is the difference between LDAPv2 and LDAPv3?LDAPv3 was developed in the late 1990's to replace LDAPv2.LDAPv3 adds the following features to LDAP: - Strong authentication and data security services via {{TERM:SASL}} - Certificate authentication and data security services via {{TERM:TLS}} (SSL) - Internationalization through the use of Unicode - Referrals and Continuations - Schema Discovery - Extensibility (controls, extended operations, and more)LDAPv2 is historic ({{REF:RFC3494}}).  As most {{so-called}} LDAPv2implementations (including {{slapd}}(8)) do not conform to theLDAPv2 technical specification, interoperatibility amongstimplementations claiming LDAPv2 support is limited.  As LDAPv2differs significantly from LDAPv3, deploying both LDAPv2 and LDAPv3simultaneously is quite problematic.  LDAPv2 should be avoided.LDAPv2 is disabled by default.H2: What is slapd and what can it do?{{slapd}}(8) is an LDAP directory server that runs on many differentplatforms. You can use it to provide a directory service of yourvery own.  Your directory can contain pretty much anything you wantto put in it. You can connect it to the global LDAP directoryservice, or run a service all by yourself. Some of slapd's moreinteresting features and capabilities include:{{B:LDAPv3}}: {{slapd}} implements version 3 of {{TERM[expand]LDAP}}.{{slapd}} supports LDAP over both IPv4 and IPv6 and Unix IPC.{{B:{{TERM[expand]SASL}}}}: {{slapd}} supports strong authenticationand data security (integrity and confidentiality) services throughthe use of SASL.  {{slapd}}'s SASL implementation utilizes {{PRD:Cyrus}}{{PRD:SASL}} software which supports a number of mechanisms includingDIGEST-MD5, EXTERNAL, and GSSAPI.{{B:{{TERM[expand]TLS}}}}: {{slapd}} supports certificate-basedauthentication and data security (integrity and confidentiality)services through the use of TLS (or SSL).  {{slapd}}'s TLSimplementation utilizes {{PRD:OpenSSL}} software.{{B:Topology control}}: {{slapd}} can be configured to restrictaccess at the socket layer based upon network topology information.This feature utilizes {{TCP wrappers}}.{{B:Access control}}: {{slapd}} provides a rich and powerful accesscontrol facility, allowing you to control access to the informationin your database(s). You can control access to entries based onLDAP authorization information, {{TERM:IP}} address, domain nameand other criteria.  {{slapd}} supports both {{static}} and {{dynamic}}access control information.{{B:Internationalization}}: {{slapd}} supports Unicode and languagetags.{{B:Choice of database backends}}: {{slapd}} comes with a varietyof different database backends you can choose from. They include{{TERM:BDB}}, a high-performance transactional database backend;{{TERM:HDB}}, a hierarchical high-performance transactional backend;{{TERM:LDBM}}, a lightweight DBM based backend; {{SHELL}}, a backendinterface to arbitrary shell scripts; and PASSWD, a simple backendinterface to the {{passwd}}(5) file.  The BDB and HDB backendsutilize {{ORG:Sleepycat}} {{PRD:Berkeley DB}}.  The LDBM utilizeseither {{PRD:Berkeley DB}} or {{PRD:GDBM}}.{{B:Multiple database instances}}: {{slapd}} can be configured toserve multiple databases at the same time. This means that a single{{slapd}} server can respond to requests for many logically differentportions of the LDAP tree, using the same or different databasebackends.{{B:Generic modules API}}:  If you require even more customization,{{slapd}} lets you write your own modules easily. {{slapd}} consistsof two distinct parts: a front end that handles protocol communicationwith LDAP clients; and modules which handle specific tasks such asdatabase operations.  Because these two pieces communicate via awell-defined {{TERM:C}} {{TERM:API}}, you can write your owncustomized modules which extend {{slapd}} in numerous ways.  Also,a number of {{programmable database}} modules are provided.  Theseallow you to expose external data sources to {{slapd}} using popularprogramming languages ({{PRD:Perl}}, {{shell}}, {{PRD:SQL}}, and{{PRD:TCL}}).{{B:Threads}}: {{slapd}} is threaded for high performance.  A singlemulti-threaded {{slapd}} process handles all incoming requests usinga pool of threads.  This reduces the amount of system overheadrequired while providing high performance.{{B:Replication}}: {{slapd}} can be configured to maintain shadowcopies of directory information.  This {{single-master/multiple-slave}}replication scheme is vital in high-volume environments where asingle {{slapd}} just doesn't provide the necessary availabilityor reliability. {{slapd}} supports two replication methods: {{LDAPSync}}-based and {{slurpd}}(8)-based replication.{{B:Proxy Cache}}: {{slapd}} can be configured as a cachingLDAP proxy service.{{B:Configuration}}: {{slapd}} is highly configurable through asingle configuration file which allows you to change just abouteverything you'd ever want to change.  Configuration options havereasonable defaults, making your job much easier.H2: What is slurpd and what can it do?{{slurpd}}(8) is a daemon that, with {{slapd}} help, providesreplicated service.  It is responsible for distributing changesmade to the master {{slapd}} database out to the various {{slapd}}replicas.  It frees {{slapd}} from having to worry that some replicasmight be down or unreachable when a change comes through; {{slurpd}}handles retrying failed requests automatically.  {{slapd}} and{{slurpd}} communicate through a simple text file that is used tolog changes.See the {{SECT:Replication with slurpd}} chapter for informationabout how to configure and run {{slurpd}}(8).Alternatively, {{LDAP-Sync}}-based replication may be used to providea replicated service.  See the {{SECT:LDAP Sync Replication}} chapterfor details.

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -