The Ldap Protocol
The Ldap Protocol
THELDAP
LDAPPROTOCOL
PROTOCOL
BY:
AJITAV BASAK
Branch-IT
Roll-07602
Regd.-0701287182
Origin of LDAP
Introduction of concept of directory services
X.500 or CCITT first approved in 1988.
X.500 used DAP
LDAP was originally intended to be a
lightweight alternative protocol
LDAP became popular
Today, X.500 directory protocols including
DAP can also be used directly over TCP/IP
Origin of LDAP(contd…)
Origin of LDAP(contd…)
it was primarily known as Lightweight Directory
Browsing Protocol, or LDBP
It was renamed with the expansion of the scope
of the protocol beyond directory browsing and
searching, to include directory update
functions
The latest version of LDAP is Version 3, which
is specified in a series of Internet Engineering
Task Force (IETF)
By whom was it developed?
The protocol was created by Tim Howes of
the University of Michigan, Steve Killes
of Isode Limited, and Wengyik
Yeong of Performance Systems International,
circa in 1993
Further development has come through
the Internet Engineering Task Force
What is LDAP?
Lightweight Directory Access Protocol
Used to access and update information in a
directory built on the X.500 model
Specification defines the content of messages
between the client and the server
Includes operations to establish and disconnect
a session from the server
How LDAP works?
How LDAP works?(contd…)
A client starts an LDAP session by connecting
to an LDAP server, called a Directory System
Agent (DSA), by default on TCP port 389
The client then sends an operation request to
the server, and the server sends responses in
return
With some exceptions, the client does not need
to wait for a response before sending the next
request, and the server may send the responses
in any order
LDAP
Information
Structure of information stored in an LDAP
directory.
Naming
How information is organized and identified.
Functional / Operations
Describes what operations can be performed on the
information stored in an LDAP directory.
Security
Describes how the information can be protected
from unauthorized access.
LDAP Information Storage
LDAP Information Storage(contd…)
Each attribute has a type/syntax and a value
Can define how values behave during
searches/directory operations
Syntax: bin, ces, cis, tel, dn etc.
Usage limits:
ssn – only one, jpeg Photo – 10K
LDAP Information Storage(contd…)
Each ‘entry’ describes an object (Class)
Person, Server, Printer etc.
Example Entry:
InetOrgPerson(cn, sn, ObjectClass)
Example Attributes:
cn (cis), sn (cis), telephone Number (tel), ou (cis),
owner (dn), jpegPhoto (bin)
LDAP Naming
DNs(distinguished names) consist of sequence
of Relative DN
cn=John Smith,ou=Austin,o=IBM,c=US (Leaf 2 Root)
(~use \ for special)
Directory Information Tree (DIT)
Follow geographical or organizational scheme
Aliases: Tree-like
Aliases can link non-leaf nodes
May not store entire DIT
LDAP Functions/Operations
Authentication
BIND/UNBIND
ABANDON
Query
Search
Compare entry
Update
Add an entry
Delete an entry (Only Leaf nodes, no aliases)
Modify an entry, Modify DN/RDN
Client and Server Interaction
Client establishes session with server (BIND)
Hostname/IP and port number
Security
User-id/password based authentication
Anonymous connection - default access rights
Encryption/Kerberos also supported