Preview

Lightweight Directory Access Protocol

Powerful Essays
Open Document
Open Document
2626 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Lightweight Directory Access Protocol
DEPARTMENT OF LIBRARY AND INFORMATION SCIENCE

AHMADU BELLO UNIVERSITY, ZARIA

A PAPER PRESENTATION
ON

LIGHT WEIGHT DIRECTORY ACCESS PROTOCOL

BY
JUDITH N. AKOBUNDU
MSc./EDUC/11242/2010-2011

INFORMATION TECHNOLOGY

DR. EZRA S. GBAJE

JUNE, 2011

INTRODUCTION
LDAP, Light Weight Directory Access Protocol, is an application protocol for reading and editing directories over an IP network. Wiki (2010). It is a standard technology for network directories. Network directories on the other hand are specialized databases that store information about devices, applications, people and other aspects of a computer network.
It is an Internet protocol that e mail and other programs use to look up information from a server. It is not limited to contact information or information about people. It is appropriate for any kind of directory like information where fast look-ups and less frequent updates exist.
It was created in 1995 as an academic university project, and then commercialized by Netscape in the late 1990’s. it is finding much acceptance because of its status as an Internet standard. It can also be customized to store any type of text or binary data.
It is important to note that it is not a directory but a protocol. However, it organizes information in a hierarchical manner using directories. And these directories can store a variety of information and can even be used like a Network Information Service (NIS). Hence, enabling anyone to access their account from any machine on the LDAP enabled network.
In many cases, it is used as a virtual phone directory, allowing users to easily access contact information of other users. But it is more flexible than a phone directory. This is because it is capable of referring a query to other LDAP servers throughout the world. Thus, providing an ad-hoc global repository of information.

OBJECTIVE

It is hoped that at the end of this discourse on LDAP even a layman would have a simple yet clear



References: Michael Donnelly (2008) “An Introduction to LDAP”. Retrieved 03/06/11 http://www.openldap.org/faq/data/cache/595.html S.O Sybase (2004) “User authentication using LDAP and active directory services for Sybase Adaptive Server enterprise Ukoha O Unknown (2010), What does LDAP do? Retrieved 03/06/11 http://wiki.answers.com/Q/What_does_LDAP_do Unknown (2010), What is LDAP? Retrieved 03/06/11 http://www.gracian.com/sever/whatldap.html Unknown (2010), An LDAP Roadmap &FAQ. Retrieved 03/06/11 http://www.kingsmountain.com/ldapRoadmap.shtml Unknown (2010), What is a directory? Retrieved 03/06/11 http://engedi.net/Glossary.html Unknown (2010), Concept of LDAP. Retrieved 04/06/11 http://hitachi-id.com/concepts/ldap.html Unknown (2010), LDAP Terminology Unknown (2010), What is LDAP? Retrieved 04/06/11 http://www.ask.com/wiki/LDAP

You May Also Find These Documents Helpful

  • Good Essays

    References: Ballad, B. Ballad, T. and Banks, Erin. Access Control, Authentication, and Public Key Infrastructure. 2011. Jones and Bartlett Learning…

    • 575 Words
    • 2 Pages
    Good Essays
  • Best Essays

    Nt1110 Unit 11 Lab

    • 2482 Words
    • 10 Pages

    In 1969, the first message, “login”, was sent over ARPANET, the predecessor of today’s internet (Kleinrock, 2008). ARPANET was designed as a communication system that would allow researchers to access information from other researcher’s computers around the country, therefore allowing information to flow more freely (Kleinrock, 2008). Computers and the internet have become intertwined into our daily lives.…

    • 2482 Words
    • 10 Pages
    Best Essays
  • Good Essays

    The LAN Domain will include all data closets, physical elements of the LAN, as well as logical elements to be designated by authorized personnel. Authorized personnel will be properly…

    • 471 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 1 Assignment

    • 604 Words
    • 3 Pages

    6. What is the basic unit of information in an LDAP directory? What is the…

    • 604 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    There are two very important tools to use in Networking. They are Domain Name System (DNS) and Dynamic Host Configuration Protocol (DHCP). These help keep your Network organized while building it. A DNS is a system used to name computers and network services that is organized into a hierarchy of domains. It can help locate computers and services through user names. Dynamic Host Configuration Protocol allows a server to automatically assign IP addresses to a computer from a certain range of numbers configured for that network. These two tools work as the foundation for IT-Management.…

    • 370 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 7 Chapter Exercises

    • 458 Words
    • 3 Pages

    References: Sobell, Mark G. A Practical Guide to Fedora™ and Red Hat® Enterprise Linux®, 6th Edition. Prentice Hall, 2012. VitalBook file.…

    • 458 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Active Directory Microsoft’s directory Microsoft’s directory service that automates network management, such as user data, resources, and security.…

    • 4603 Words
    • 19 Pages
    Good Essays
  • Satisfactory Essays

    is3230 week1 assgnmnt1

    • 362 Words
    • 3 Pages

    References: Ballad, Bill, Tricia Ballad, and Erin K. Banks. 2011. Access Control, Authentication, and Public Key Infrastructure. Sudbury: Jones & Bartlett Learning.…

    • 362 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Ch05EOCAs

    • 2578 Words
    • 13 Pages

    You can use the __LDIFDE__ command-line utility to create and modify Active Directory objects. P114…

    • 2578 Words
    • 13 Pages
    Satisfactory Essays
  • Satisfactory Essays

    1. A) Active Directory Federation Services provides a way for users to access multiple services within a network using a single sign-on process that authenticates for all the services. This eliminates the need for the user to sign-on to multiple services and/or maintain multiple user accounts…

    • 285 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Week 3 Ntc 362

    • 664 Words
    • 3 Pages

    May refer only to the access method in a LAN, such as Ethernet or Token Ring…

    • 664 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Lesson 4

    • 772 Words
    • 3 Pages

    1. What is the Active Directory component that contains a reference to all objects within Active Directory called?…

    • 772 Words
    • 3 Pages
    Better Essays
  • Good Essays

    It244 Access Control

    • 648 Words
    • 3 Pages

    Describe how and why authentication credentials are used to identify and control access to files, screens, and systems. Include a discussion of the principles of authentication such as passwords, multifactor authentication, biometrics, and single-sign-on.…

    • 648 Words
    • 3 Pages
    Good Essays
  • Better Essays

    NT1430 Linux Networking

    • 1121 Words
    • 5 Pages

    • NFS (Network File System) allows you to share directories and files with other Linux systems.…

    • 1121 Words
    • 5 Pages
    Better Essays
  • Good Essays

    As a member of the Information Security team for a small community college I have been tasked with providing an access control system which will monitor the access of students in and out of the college dormitory. This access control system is needed to provide increased security to the students and decrease the access of unauthorized students to their respective dormitories.…

    • 366 Words
    • 2 Pages
    Good Essays