目 录
第一章信息模型....................................................................................................................................1
1.1 LDIF......................................................................................................................................................1
1.2模式(SCHEMAS)....................................................................................................................................2
第二章命名模型....................................................................................................................................2
2.1 命名模型..............................................................................................................................................2
2.2 命名为什么重要?...............................................................................................................................4
2.3 凌乱的RDN主题: 多值RDN和引证.....................................................................................................4
2.4 别名(ALIASES).................................................................................................................................5
第三章功能模型和API使用...................................................................................................................5
3.1 LDAP 查询类操作...............................................................................................................................6
3.1.1 查询操作................................................................................................................................6
3.1.2 比较操作................................................................................................................................8
3.2 LDAP更新类操作................................................................................................................................8
3.2.1 添加操作.................................................................................................................................8
3.2.2 删除操作................................................................................................................................8
3.2.3 修改操作.................................................................................................................................8
3.2.4 重命名(修改RDN)操作.....................................................................................................8
3.3 认证和控制类操作...............................................................................................................................9
3.3.1 绑定操作................................................................................................................................9
3.3.2 解绑定操作.............................................................................................................................9
3.3.3 放弃操作.................................................................................................................................9
第四章 安全模型....................................................................................................................................9
4.1 安全模型..............................................................................................................................................9
4.1.1 简介........................................................................................................................................9
4.1.2 需要的安全机制....................................................................................................................10
4.1.3 LDAP绑定操作......................................................................................................................10
4.2 与目录安全性相关的协议..................................................................................................................11
4.2.1 关于安全的核心协议:.......................................................................................................11
4.2.2 关于LDAP的最新进展。......................................................................................................12
第五章 SCHEMA........................................................................................................................................13
5.1 SCHEMA的目的..............................................................................................................................13
5.2 SCHEMA构成元素..........................................................................................................................13
5.3 SCHEMA准备知识..........................................................................................................................13
5.3.1 OID(object identifer,对象标志符).........................................................................................13
5.3.2 schema元素的名称................................................................................................................13
5.4 SCHEMA元素的格式......................................................................................................................14
5.4.1 属性类型(attribute types)......................................................................................................14
5.4.2 对象类(object classes)...........................................................................................................15
5.4.3 语法(syntaxes)......................................................................................................................15
5.4.4 匹配规则(matching rules).....................................................................................................16
5.4.5 目录信息树内容规则(DIT content rules).............................................................................16
5.4.6 目录信息树结构规则(DIT strctural rules)...........................................................................17
5.4.7 命名形式(name forms)..........................................................................................................17
第六章 LDIF................................................................................................................................................18
6.1 概要..............................................................................................................................................18
6.2 背景及预期结果............................................................................................................................18
6.3 定义LDAP数据交换格式.............................................................................................................18
6.3.1 LDIF的形式语法定义...........................................................................................................18
6.3.2 LDIF语法的注意事项...........................................................................................................20
6.3.3 LDAP数据交换格式示例......................................................................................................21
6.4 安全考虑......................................................................................................................................25
第七章 LDAP查询过滤...............................................................................................................................25
7.1 概述..............................................................................................................................................25
7.2 LDAP查询过滤定义.....................................................................................................................26
7.3 字符串查询过滤定义....................................................................................................................27
7.4 示例..............................................................................................................................................28
7.5 安全考虑......................................................................................................................................28
5
56
470KB
2009-07-07
4