Abstract
Directory services are a critical part of your identity infrastructure. Many components in the identity stack need to either read or write data. While any database could work, a popular choice for many identity projects is LDAP. This chapter is not a comprehensive guide to LDAP. If you are deploying LDAP in your environment, study the documentation for your LDAP Server of choice. Like other chapters in this book, the goal here is to give an overview of the technology and brief descriptions of some open source software tools.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2018 Michael Schwartz, Maciej Machulak
About this chapter
Cite this chapter
Schwartz, M., Machulak, M. (2018). LDAP. In: Securing the Perimeter. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-2601-8_2
Download citation
DOI: https://doi.org/10.1007/978-1-4842-2601-8_2
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-2600-1
Online ISBN: 978-1-4842-2601-8
eBook Packages: Professional and Applied ComputingProfessional and Applied Computing (R0)Apress Access Books