Free Downloads
Deploying OpenLDAP

For all the work and time invested in using LDAP, not enough time has been spent designing the layout and the logic of directories. End users and system architects often do not give appropriate attention to the deployment of LDAP as a standards-based system with interfacing ability. Thus, many of LDAPs best features—especially OpenLDAP—become unusable. As a remedy, Deploying OpenLDAP delves into the logic, theories and fundamentals of directories. The text focuses on open standards, rather than proprietary systems, which are expensive and incompatible with other systems. If you already know advanced programming implementation, but don't fully understand how all pieces fit together, then this book will go beyond explaining “what is,” and instead show you “how to.” Table of Contents Assessing Your Environment Understanding Data Definitions Implementing Deployment, Operations, and Administration Strategies Installing OpenLDAP Implementing OpenLDAP Scripting and Programming LDAP  Integrating at the System Level Integrating OpenLDAP with Applications, User Systems, and Client Tools

Paperback: 344 pages

Publisher: Apress; 1st ed. edition (November 4, 2004)

Language: English

ISBN-10: 1590594134

ISBN-13: 978-1590594131

Product Dimensions: 7 x 0.8 x 9.2 inches

Shipping Weight: 1.5 pounds (View shipping rates and policies)

Average Customer Review: 3.2 out of 5 stars  See all reviews (12 customer reviews)

Best Sellers Rank: #2,973,501 in Books (See Top 100 in Books) #42 in Books > Computers & Technology > Networking & Cloud Computing > Networks, Protocols & APIs > LDAP #1216 in Books > Computers & Technology > Networking & Cloud Computing > Data in the Enterprise > Client-Server Systems #3066 in Books > Textbooks > Computer Science > Networking

This is a book produced by merging numerous publicly available materials without too much input from the author. The author seems at a loss what to say when the good stuff is already said by others (other than changing "does not" to "doesn't", etc). Here're some suggestions, in case he plans to write a new edition. For instance, p.77, the first two search filter examples are too easy. But the third one needs a few seconds' thinking. Why not keep building progressively more complicated filters? They would be guaranteed not to be in existing materials. p.144, ACI parameter realm suddenly appears. This "realm" sounds different from that in SASL (p.98 and p.115). But "realm" is never explained anywhere in the book. There're other terms that mean differently but are not explained, such as NSS (p.136 for "Network Security Services" and p.249 for "Name Service Switch"). There're other places in the book that mention something only explained in later chapters, but they're not warned with "We'll explain this in Chapter XXX". The reason is simply that he copies a man page or somebody's article without thinking of adding anything to it. Arrangement of the text is sometimes unexpected. After about 20 pages of Perl methods copied from documentation, p.164 suddenly shows a program in C, not Perl.This 2005 book discusses technologies of as early as 1998 (not in history section). It may be true that AuthLDAP and TransLDAP modules are not updated since then and C. Donley's web site is gone (pp.264-8). But a responsible book author should tell us anything new around this technology. You shouldn't duplicate Mr. Donley's 1998 article with no comments (and no credit).

Deploying OpenLDAP Active Directory: Designing, Deploying, and Running Active Directory Using Docker: Developing and Deploying Software with Containers Exam Ref 70-345 Designing and Deploying Microsoft Exchange Server 2016 Microsoft Azure: Planning, Deploying, and Managing Your Data Center in the Cloud Deploying Voice over Wireless LANs LDAP in the Solaris Operating Environment: Deploying Secure Directory Services Designing and Deploying 802.11 Wireless Networks: A Practical Guide to Implementing 802.11n and 802.11ac Wireless Networks For Enterprise-Based Applications (2nd Edition) (Networking Technology) Microsoft Windows 7 Administrator's Reference: Upgrading, Deploying, Managing, and Securing Windows 7 Extreme Programming with Ant: Building and Deploying Java Applications with JSP, EJB, XSLT, XDoclet, and JUnit Enterprise Integration Patterns: Designing, Building, and Deploying Messaging Solutions (Addison-Wesley Signature Series (Fowler)) White Reign: Deploying Whiteness in America