LDAP System Administration - O'Reilly Ser. (Paperback)
  • LDAP System Administration - O'Reilly Ser. (Paperback)
zoom

LDAP System Administration - O'Reilly Ser. (Paperback)

(author)
£31.99
Paperback 308 Pages
Published: 29/04/2003
Free UK delivery on orders over £25
  • We can order this from the publisher

Usually dispatched within 3 weeks

Free UK delivery on orders over £25
  • This item has been added to your basket

System administrators often spend a great deal of time managing configuration information located on many different machines: usernames, passwords, printer configurations, email client configurations, and network filesystem configurations, to name a few. LDAPv3 provides tools for centralizing all of the configuration information and placing it under your control. Rather than maintaining several administrative databases (NIS, Active Directory, Samba, and NFS configuration files), you can make changes in only one place and have all your systems immediately "see" the updated information. Practically platform independent, this book uses the widely available, open source OpenLDAP 2 directory server as a premise for examples, showing you how to use it to help you manage your configuration information effectively and securely. OpenLDAP 2 ships with most Linux distributions and Mac OS X, and can be easily downloaded for most Unix-based systems.

After introducing the workings of a directory service and the LDAP protocol, all aspects of building and installing OpenLDAP, plus key ancillary packages like SASL and OpenSSL, this book discusses: configuration and access control; distributed directories - replication and referral; using OpenLDAP to replace NIS; using OpenLDAP to manage email configurations; using LDAP for abstraction with FTP and HTTP servers, Samba, and Radius; interoperating with different LDAP servers, including Active Directory; and programming using Net::LDAP.

Publisher: O'Reilly Media
ISBN: 9781565924918
Number of pages: 308


MEDIA REVIEWS

"This is a clearly written and well structured book with good use of example and figures... I thoroughly commend the text to those who are looking to centralise information directories." - Raza Rizvi, news@UK, December 2003

You may also be interested in...

Understanding Cryptography
Added to basket
A Brief Guide to Cloud Computing
Added to basket
Best Practices in Computer Network Defense
Added to basket
BizTalk 2013 Recipes
Added to basket
The Sustainable Network
Added to basket
Networks, Crowds, and Markets
Added to basket
The Art of Intrusion
Added to basket
The Moderator's Survival Guide
Added to basket
Network Security Assessment 3e
Added to basket
Professional SharePoint 2010 Development
Added to basket
CSA Guide to Cloud Computing
Added to basket
Communicating Systems with UML 2
Added to basket
Using MPI and Using MPI-2
Added to basket

Please sign in to write a review

Your review has been submitted successfully.