Add to Book Shelf
Flag as Inappropriate
Email this Book

An Ldap Control and Schema for Holding Operation Signatures

By Greenblatt, B.

Click here to view

Book Id: WPLBN0000693729
Format Type: PDF eBook:
File Size: 0.1 MB
Reproduction Date: 2005

Title: An Ldap Control and Schema for Holding Operation Signatures  
Author: Greenblatt, B.
Volume:
Language: English
Subject: Accounting (Financial Record Keeping), Language, Finance Management
Collections: Technical eBooks and Manuals Collection, Technical eBooks Collection
Historic
Publication Date:
Publisher:

Citation

APA MLA Chicago

Greenblatt, B. B. (n.d.). An Ldap Control and Schema for Holding Operation Signatures. Retrieved from http://gutenberg.us/


Description
Technical Reference Publication

Excerpt
Introduction: In many environments clients require the ability to validiate the source and integrity of information provided by the directory. This document describes an LDAP message control which allows for the retrieval of digitally signed information. The perspective of this document is that the origin of the information that is stored in LDAP v3 accessible directories is the LDAP v3 client that creates the information. The source and integrity of the information is guaranteed by allowing for the digital signing of the operations that make changes to entries in the directory. The source and integrity of an individual LDAP connection can be guaranteed by making use of an underlying session layer that provides such services, such as TLS. Note that the integrity of an individual connection does not, in and of itself guarantee the integrity of the data that comes across the connection. This is due to the fact that the LDAP server is only capable of providing information that it has stored. In distributed and replicated environments, the fact that an entry has been successfully retrieved from a server may not be completely reassuring, if the entry in question was replicated from an untrusted domain.

Table of Contents
Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 1.1 Audit Trail Mechanism . . . . . . . . . . . . . . . . . . . 2 1.2. Handling the Delete Operation . . . . . . . . . . . . . . . 5 2. Signed Results Mechanism . . . . . . . . . . . . . . . . . . 6 3. Security Considerations and Other Notes . . . . . . . . . . 7 4. References . . . . . . . . . . . . . . . . . . . . . . . . . 8 5. Authors' Addresses . . . . . . . . . . . . . . . . . . . . . 9 6. Full Copyright Statement . . . . . . . . . . . . . . . . . . 10

 
 



Copyright © World Library Foundation. All rights reserved. eBooks from Project Gutenberg are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.