LDAP AND ITS DIFFERENT MODELS
Lightweight Directory Access Protocol, or we can refer to it as LDAP, is a security software system that is designed to store and arrange the data to make it easily searchable.
Sort of information that can be stored by LDAP is -
1) Information about organizations
2) Devices
3) Users stored in directories
Servers mainly use LDAP to speak with on-premise directories.
The information stored in an LDAP system is framed in a hierarchical structure, and it is known as Directory Information Tree (DIT). All the organizing, and structuring of data, which make it easier to navigate directories, find specific data, and administer user access policies is done by DIT.
LDAP functions to serve as the central hub, or we can source for authentication and authorization.
Apart from data and information, LDAP also stores user credentials (username/password) and then accesses them later to authenticate the user.
LDAP is based and functions on a client-server interaction.
Let us talk about different LDAP models, and they are mentioned below. So let's have a look at them.
LDAP Models
There are four different types of LDAP models based on the services LDAP offers.
INFORMATION MODEL
As the name suggests, this model determines what information to store in LDAP.
The information stored in this LDAP model is done in an entry form, and an entry is identified by the real-world object (servers, devices, users) in a network through attributes describing the object. Users are able to get access based on the entries.
NAMING MODEL
The naming model is responsible for assigning the entries their name, and it is done based on their position in the DIT hierarchy.
FUNCTIONAL MODEL
The functional model has the role of assigning functions in an LDAP server.
These functions can be broken down into three main categories, and each of them further has its own subcategories.
Query
Update
Authentication
SECURITY MODEL
The last model, i.e., the security model, gives clients an opportunity to provide their identity for authentication. After the authentication process, servers can determine the level of data one can access based on the policies.
Comments
Post a Comment