Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required. Learn more
Read instantly on your browser with Kindle for Web.
Using your mobile phone camera - scan the code below and download the Kindle app.
Understanding and Deploying LDAP Directory Services, 2nd Edition 2nd Edition
| Price | New from | Used from |
| Hardcover, May 15, 2003 | $44.95 | — | $5.18 |
|
Textbook Binding
"Please retry" | $92.97 | $40.75 |
Lightweight Directory Access Protocol (LDAP) is the standard for directory information access and is the underlying protocol for a variety of email systems, Web systems, and enterprise applications. LDAP enables central management of users, groups, devices, and other data, thereby simplifying directory management and reducing the total cost of ownership. Understanding and Deploying LDAP Directory Services, written by the creators of the protocol, is known as the LDAP bible and is the classic text for learning about LDAP and how to utilize it effectively. The Second Edition builds on this success by acting as an exhaustive resource for designing, deploying, and maintaining LDAP directory services. Topics such as implementation pitfalls, establishing and maintaining user access to information, troubleshooting, and real-world scenarios will be thoroughly explored.
- ISBN-100672323168
- ISBN-13978-0672323164
- Edition2nd
- PublisherAddison-Wesley Professional
- Publication dateMay 15, 2003
- LanguageEnglish
- Dimensions7.75 x 2 x 9.75 inches
- Print length899 pages
Customers who viewed this item also viewed
Editorial Reviews
From the Back Cover
Increasingly, organizations are using Lightweight Directory Access Protocol (LDAP) directories as the nerve centers of their computing infrastructures. LDAP--the Internet standard for directory information access--now provides the naming, location, and security traditionally supplied by network operating systems.
In this expanded second edition of the seminal LDAP reference, Understanding and Deploying LDAP Directory Services, three LDAP experts explain the protocol and how to apply it effectively in numerous network environments. The book begins with an introduction to directory services and LDAP, including coverage of LDAPv3 extensions and the Netscape Directory Server. It then moves on to explore:
- Designing directory services, including data sources, schema, naming, topology, replication, privacy, and security
- Deploying directory services, including establishing user access to information, implementation pitfalls, and cost analysis
- Maintaining directory services, including backup, disaster recovery, and troubleshooting
- Creating and enabling directory-service applications
- Integrating directory services
Full of practical implementation advice and real-world examples, Understanding and Deploying LDAP Directory Services, Second Edition, will give you the necessary footing to successfully implement LDAP directory-service projects.
0672323168B03212003
About the Author
Timothy A. Howes, Ph.D., coinventor of the LDAP protocol, is the cofounder and chief technology officer of Opsware Inc., the leading provider of data center automation software. Previously, Dr. Howes served as vice president of technology for America Online, as chief technology officer of Netscape¿s Server Products division, and as chief architect of several Netscape server products.
Mark C. Smith is the chief architect for directory products at Netscape Communications Corporation, an AOL Time Warner company, where he is responsible for the technical evolution of Netscape Directory Server and several other products and services. Mr. Smith is coauthor of LDAP: Programming Directory-Enabled Applications with Lightweight Directory Access Protocol (Macmillan, 1997) and has written many RFCs and Internet Drafts.
Gordon S. Good is a senior software engineer at Opsware, Inc. Before joining Opsware, he worked at Netscape Communications Corporation, where he led the directory-server-replication development team. Gordon has written several RFCs and Internet Drafts.
0672323168AB03212003
Excerpt. © Reprinted by permission. All rights reserved.
In the past decade, LDAP directories have risen from a relatively obscure offshoot of an equally obscure field to become one of the linchpins of modern computing. Increasingly, LDAP directories are becoming the nerve center of an organization's computing infrastructure, providing naming, location, management, security, and other services that have traditionally been provided by network operating systems. Design and deployment of a successful LDAP directory service can be complex and challenging, yet little information is available explaining the ins and outs of this important task.
When two of us (Mark and Tim) finished writing a previous book, LDAP: Programming Directory-Enabled Applications with Lightweight Directory Access Protocol, in early 1997, we soon realized there was another, much bigger piece of the directory puzzle still to be addressed. The previous book was aimed at directory application programmers, but nothing similar was available to address the needs of directory decision makers, designers, and administrators. This book is aimed at that audience.
Recognizing the size of the task ahead of us and remembering the joys of giving up evenings and weekends for months at a time to meet deadlines for our first book, we quickly decided to expand our team. Just as quickly, we decided there was no one we'd rather share the fun with than our longtime friend and colleague, Gordon Good, at the time a senior directory developer at Netscape. Aside from being the third leg of the LDAP development team at the University of Michigan (U-M), Gordon brought a wealth of system administration experience from his past life as a directory and e-mail administrator and Web master for U-M. With Gordon on board, the three of us set about writing a book that we only half-jokingly referred to as the "LDAP Bible." The first edition of Understanding and Deploying LDAP Directory Services was published in 1999.
Two years later, we realized that it was time to update this book and publish a second edition. LDAPv3 work in the IETF was mostly complete. Numerous extensions to the basic LDAP protocol were being developed. LDAP support in commercial and open-source software was widespread. In this edition, we cover these recent directory services developments. In addition, in response to reader suggestions we have streamlined the text, added more hands-on examples, updated the examples to reflect currently available software versions, and updated the case studies to reflect current directory practice. We thank all the readers of the first edition who provided helpful suggestions, and we hope that you find this second edition even more valuable.
The Book's Organization
This book includes 26 chapters in 6 parts. Part I introduces directories and LDAP. Parts II through IV each address a different part of the directory life cycle. Part V discusses how to leverage your directory service after it's up and running. Finally, Part VI presents three directory services deployment case studies.
Part I, Introduction to Directory Services and LDAP, provides a comprehensive introduction to directories and LDAP. For readers unfamiliar with the topic, this section should bring them up to speed and provide the background necessary to understand the rest of the book. It also includes a section on the history of directories for readers interested in how all this technology came about.
Part II, Designing Your Directory Service, begins to delve into the directory life cycle by covering the first, and in many ways most important, phase: design. We cover all aspects of directory design, from determining your needs, to designing your data sources, schema, namespace, topology, replication, and finally privacy and security.
Part III, Deploying Your Directory Service, covers the next phase in the directory life cycle: deployment. We cover everything from choosing the right directory products to piloting your service to putting your service into production. We've also included a chapter about analyzing the cost of your service and how to help reduce those costs.
Part IV, Maintaining Your Directory Service, concludes our coverage of the directory life cycle with a look at the maintenance phase. We cover such topics as backups and disaster recovery, maintaining data, monitoring your directory system, and troubleshooting problems when they occur.
Part V, Leveraging Your Directory Service, talks about how to take advantage of the service you have designed and deployed. We discuss how to directory-enable existing applications, how to create new applications that use the directory, and how your directory can coexist with other data sources.
Part VI, Case Studies, closes the book by presenting several directory case studies. Some of the case studies presented are real, and some are fictitious, but all are designed to illustrate the concepts of directory design, deployment, and maintenance in action.
The Book's Audience
This book is intended for primarily three kinds of readers: decision makers, architects, and administrators. In addition, anyone who wants to know more about LDAP or directories in general will find the book useful, as will software engineers who develop directory applications.
Directory decision makers will find this book useful for aiding an understanding of directories and the kinds of business problems they help solve. Decision makers will find Part I useful for explaining the basics of directories. Part VI should also prove useful by providing some realistic examples of how directories are used and the benefits they can bring.
Directory architects will find this book useful in defining the design problem and providing a methodology for producing a comprehensive directory design. The design methodology is focused on a practical approach to design based on real-world requirements. We highly recommend that directory architects and designers read the whole book, paying special attention to Parts II, III, and IV. A good directory design results in large part from a clear understanding of the other aspects of the directory life cycle and how the directory will be used.
Directory administrators will find Part IV especially useful. It focuses on the maintenance phase of the directory life cycle, where administrators spend much of their lives. We also highly recommend that administrators read the rest of the book to get an idea of the directory big picture, as well as to understand some of the directory design decisions that are bound to make their lives either miserable or enjoyable.
Other interested readers can pick and choose from the sections of the book that interest them. We encourage all readers to at least skim Part I, to ensure that they have the background required to benefit from the rest of the book. We've tried to structure the book so that each chapter stands by itself as much as possible. Readers should be able to read the chapters covering topics that interest them, without wading through chapters of less interest.
Finally, we think all readers will find the case studies presented in Part VI interesting. They give different perspectives on directories designed to illustrate the trade-offs that different directory needs imply.
Contacting Us
If you have comments or suggestions about this book, or if you'd like to tell us about an interesting directory deployment or application you've developed, we'd like to hear from you. Feel free to drop us a line at the following addresses:
Tim Howes: howes@opsware.com
Mark Smith: mark@bradesmith.com
Gordon Good: ggood@opsware.com
We'll try our best to get back to you, but keep in mind that we all have day jobs!
0672323168P04142003
Product details
- Publisher : Addison-Wesley Professional; 2nd edition (May 15, 2003)
- Language : English
- Hardcover : 899 pages
- ISBN-10 : 0672323168
- ISBN-13 : 978-0672323164
- Item Weight : 3.36 pounds
- Dimensions : 7.75 x 2 x 9.75 inches
- Best Sellers Rank: #2,037,680 in Books (See Top 100 in Books)
- #20 in LDAP Networking
- #3,664 in Internet & Telecommunications
- #9,330 in Internet & Social Media
- Customer Reviews:
Important information
To report an issue with this product, click here.
About the author

Discover more of the author’s books, see similar authors, read author blogs and more
Customer reviews
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Learn more how customers reviews work on Amazon-
Top reviews
Top reviews from the United States
There was a problem filtering reviews right now. Please try again later.
While various implementations are covered as examples, this book primarily leans towards LDAP theory rather than practical How-To's.
The book is very standards oriented, but overall is easier to digest than an RFC. For one thing, there does seem to be a hint of personality ... an impressive feat considering the admittedly dry subject at hand. For another, there are nice diagrams.
Like anything LDAP related, this book is very dense ... a LOT of content is covered. People who WANT to learn LDAP will find this book more accommodating than those who are merely required to do so, as the subject itself is so deep and so archaic that it borders on the mysterious. Prepare yourself.
I would have to say this is my favorite LDAP book of all time.
If you want to deploy Active Directory or some other implementation, this may not be what you want as it isn't specific. However, I'd think it would be good to have for background.
It is academic in that it covers all aspects of LDAP in some degree--not getting into any specific implementation.
It does a good job in explaining what a directory is and isn't and when to use it versus a relational database.
Overall it is a great book on the topic of LDAP. More books may be needed to compliment it for specific implementations or programming.
This is not a programming book and this is not a product manual. For architects, this is a concept book rather than a reference book: After reading this book you will still need to spend hours pouring over your vendor's manuals figuring out how to implement your design. For a project manager, this book may deserve the "bible" moniker, with the checklists something that can be used to guide the deployment of many new systems. While there is one, quite good, chapter on application design, application design is not the focus. Tim and Mark's earlier book covers that topic in much more detail.
The book, at 850 pages, is long, but it should be easy going for a database professional. The book itself looks like it was laid out with an HTML browser's "Print" command.
If you are considering an LDAP deployment, using any LDAP server, you will find this book invaluable during the evaluation, planning and deployment process.
I found the first 3 chapters well explained, and conceptual enough for my purposes. I do intend to go back and read "Part II: Designing your directory service", though I probably skip the rest, which is more useful to implementors. (The rest of the book covers deployment, maintenance, using LDAP with applications, and case studies).
I found the book easy to read, and would recommend the book as a general overview of LDAP that covers many angles.
It very effectively describes LDAP as a strategic service, traces through complete details regarding design and implementation, and includes information on how small or large organizations can "survive" migration to directory-based computing.
Real-world practitioners will appreciate the sections on product selection, piloting an LDAP service, and costing. Finally, disaster recovery, long-term maintenance, monitoring, and application development in a directory-centric world complete the picture. As a bonus, several fairly deep case studies are presented, including very useful sidebars entitled "20/20 Hindsight".
For those of us who have lived through several large-scale LDAP designs/deployments, this book will be a great reference. For IT professionals and/or architects who are relatively new to the area, it will be invaluable.
The authors jokingly refer to the book as the "LDAP bible" - but that's not an altogether outlandish description.
While there isn't as much programming info that I would want, it is understandable, as teh book is quite indepth, and a programmer should be able to build on the knowledge he or she will gain from reading it.






