Access Control Requirements for LDAP
نویسندگان
چکیده
Access Control Requirements for LDAP Status of this Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract This document describes the fundamental requirements of an access control list (ACL) model for the Lightweight Directory Application Protocol (LDAP) directory service. It is intended to be a gathering place for access control requirements needed to provide authorized access to and interoperability between directories. The keywords "MUST", "SHOULD", and "MAY" used in this document are to be interpreted as described in [bradner97].
منابع مشابه
A Nested Transaction Model for LDAP Transactions
Lightweight Directory Access Protocol (LDAP) directories have recently proliferated with the growth of distributed computing. They are being used in a variety of network based applications to store information about not only people and organizations but also network resources and policies. Given the diversity of its applications and its frequent use in conjunction with transaction aware applica...
متن کاملRole-based Access Control on the Web Using LDAP
This paper gives a framework for how to leverage Lightweight Directory Access Protocol (LDAP) to implement Role-based Access Control (RBAC) on the Web in the server-pull architecture. LDAP-based directory services have recently received much attention because they can support object-oriented hierarchies of entries in which we can easily search and modify attributes over TCP/IP. To implement RBA...
متن کاملUsing Ontologies to Mitigate LDAP Deficiencies
Semantic technology powered access control schemes have been recently proposed to enhance the flexibility of role-based access control (RBAC) and its variants. These access control mechanisms depend heavily on rich, contextual data sourced from an identity attribute store. Unfortunately, most identity stores in use today use the Lightweight Directory Access Protocol (LDAP) representational sche...
متن کاملSecure Information Sharing Using Attribute Certificates and Role Based Access Control
In this paper, we explore the issues involved with the design and rapid deployment of large scale secure information sharing (SIS) systems for coordination involved with multiple agencies. Procedures and tools were developed for setting up quickly the public key infrastructure (PKI) and privilege management infrastructure (PMI) for the multi-agency SIS systems. A multi-agency SIS testbed based ...
متن کاملINTERNET DRAFT LDAP Standard and Pilot Attribute Definitions August 1996 4
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." To learn the current status of any Internet-Draft, please check the "1id-abstracts.txt" listing contained in the Internet-Drafts Shadow D...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- RFC
دوره 2820 شماره
صفحات -
تاریخ انتشار 2000