Posts

Showing posts from December, 2021

LDAP: A Guide for Beginners

Image
This blog post is for people who are looking for a guide to LDAP . We will discuss what LDAP is, how it works, and some of its advantages. Furthermore, we will introduce you to the basics of setting up an LDAP server and give you some tips on troubleshooting common issues. What does LDAP stand for? How does LDAP work? Advantages of using an LDAP server? If you want to know the answers to these questions, continue reading, and let’s get started! What is LDAP? For starters, LDAP is a protocol for accessing and updating directory information that can be found on an LDAP server . Because it is a standard, users don’t need to worry about compatibility issues with LDAP servers. How Does LDAP Work?     There are two components of the system: clients and servers. The client (such as Outlook or Mozilla Thunderbird) connects to the server and requests information. The server then responds with a list of all the entries that match the client’s search criteria. The client can then choose which ent

RBAC And Access Control Systems

Image
RBAC or Role Based Access Control is a network security system  designed to restrict system access depending on the designation/ role of a person in an organization.  The working mechanism of RBAC involves setting permissions and privileges, which defines the user access to the systems and automatically restricts it. The main idea behind using role based access control is to safeguard sensitive and crucial information. When using RBAC, the leading authorities of an organization assign each working employee a role and determine their position in the functional space, hence deciding how much data access needs to be provided to them. However, this security system is mostly used in big institutions.   Depending on a role one has occupied in the RBAC, one can read, edit, or delete articles in a writing application. Role-based access control has two roles, namely: Writer: A writer has the right to edit, delete and read.  Reader: A reader can only read the documents.   ACCESS CONTROL   When