IBM Redbook - Ldap Active Directory (2000).pdf

(2932 KB) Pobierz
SG246163.book
Directory Integration
A Look at IBM SecureWay Directory,
Active Directory and Domino
LDAP integration guidelines for
systems administrators
Referrals and schema
extensions
Examples to help you
integrate directories
Harri Levanen
Bernard Freund
Hani Mansi
Using LDAP for
29887633.001.png
SG24-6163-00
International Technical Support Organization
Using LDAP for Directory Integration
A Look at IBM SecureWay Directory,
Active Directory and Domino
December 2000
29887633.002.png
Take Note!
Before using this information and the product it supports, be sure to read the general information in
Appendix K, “Special notices” on page 213.
First Edition (December 2000)
This edition applies to LDAP Version 3 compliant directories.
Comments may be addressed to:
IBM Corporation, International Technical Support Organization
Dept. HZ8 Building 678
P.O. Box 12195
Research Triangle Park, NC 27709-2195
When you send information to IBM, you grant IBM a non-exclusive right to use or distribute the
information in any way it believes appropriate without incurring any obligation to you.
© Copyright International Business Machines Corporation 2000. All rights reserved.
Note to U.S Government Users – Documentation related to restricted rights – Use, duplication or disclosure is
subject to restrictions set forth in GSA ADP Schedule Contract with IBM Corp.
29887633.003.png
Contents
Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii
The team that wrote this redbook . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii
Comments welcome. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix
Chapter 1. Introduction of the components . . . . . . . . . . . . . . . . . . . . . . 1
1.1 What is a directory? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.1.1 Why is a directory service important? . . . . . . . . . . . . . . . . . . . . . . 2
1.1.2 Directory clients and servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.1.3 Distributed directories. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.1.4 Directory security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
1.1.5 Users, platforms, and networks . . . . . . . . . . . . . . . . . . . . . . . . . . 7
1.1.6 Directory versus database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
1.2 Directory standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
1.2.1 X.500 - the directory service standard . . . . . . . . . . . . . . . . . . . . 10
1.2.2 LDAP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
1.3 Enterprise directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
1.3.1 Directory synchronization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
1.3.2 Organizational units (OUs) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
1.4 Metadirectory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
1.4.1 Metadirectory systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
1.4.2 Metadirectory product architecture . . . . . . . . . . . . . . . . . . . . . . . 31
1.5 The IBM SecureWay Directory and Client SDK . . . . . . . . . . . . . . . . . 32
1.6 Lotus Domino R5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
1.7 Microsoft Active Directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
1.7.1 Naming contexts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
1.7.2 Logical elements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
1.7.3 Physical elements: sites and domain controllers . . . . . . . . . . . . . 40
1.7.4 Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
1.7.5 The role of DNS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
1.7.6 Special roles. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Chapter 2. Scenario1: Integrating SecureWay with Active Directory .45
2.1 About our test environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
2.2 How we tested . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
2.3 Configuring SecureWay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
2.4 Creating a referral in SecureWay . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
2.5 Creating a referral in Active Directory . . . . . . . . . . . . . . . . . . . . . . . . . 50
2.6 Bringing it all together . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
2.6.1 Searching for data in the Active Directory . . . . . . . . . . . . . . . . . . 61
2.6.2 Searching for SecureWay data through Active Directory. . . . . . . 70
2.6.3 Searching for data in the SecureWay Directory . . . . . . . . . . . . . 72
© Copyright IBM Corp. 2000
iii
Zgłoś jeśli naruszono regulamin