A Reference Schema for LDAP-based Identity Management Systems
|
|
|
- Buddy McCormick
- 10 years ago
- Views:
Transcription
1 A Reference Schema for LDAP-based Identity Management Systems Frank Tröger Regional Computing Center Erlangen (RRZE) Department of Computer Science 6 Friedrich-Alexander University of Erlangen-Nuremberg 1st International Conference on LDAP Frank Tröger (RRZE) Reference Schema for LDAP-based IDM Systems LDAPcon / 20
2 Project IDMone IDMone The project IDMone aims at reconstructing the existent user management. Novell as the solution partner LDAP is the key technology One task: schema design for metadirectory Frank Tröger (RRZE) Reference Schema for LDAP-based IDM Systems LDAPcon / 20
3 Four Steps of Schema Design 1 Locate application, standard and directory vendor-provided schemas 2 Choose other predefined schema elements 3 Develop schema extensions 4 Document the whole schema design Frank Tröger (RRZE) Reference Schema for LDAP-based IDM Systems LDAPcon / 20
4 Step 2 Choose other predefined schema elements Provides a basis for a decision through... 1 gathering information about existing LDAP schemas 2 consolidating gathered LDAP schemas Problems multiple schemas define equivalent elements own schema extensions apply better Frank Tröger (RRZE) Reference Schema for LDAP-based IDM Systems LDAPcon / 20
5 The Idea of a Reference Schema Idea What is it? IDM-related reference schema focus on higher education one place for finding public schemas comparing public schemas derivating own schema extensions Frank Tröger (RRZE) Reference Schema for LDAP-based IDM Systems LDAPcon / 20
6 Standard Schemas defined by RFCs White Pages Schema A basis for many other so called white pages schemas. person organizationalperson inetorgperson RFC 2256 A Summary of the X.500(96) User Schema for use with LDAPv3 provides a basic set of attributes defines person, organizationalperson, et al. RFC 2789 Definition of the inetorgperson LDAP Object Class found in most user management directories defines inetorgperson, et al. Frank Tröger (RRZE) Reference Schema for LDAP-based IDM Systems LDAPcon / 20
7 Public Schemas General Middleware Arena Two schemas with rather generic characteristics. Internet2 MACE-Dir: eduperson de facto standard in higher education focus on the U.S. still attributes missing defines eduperson, et al. TERENA TF-EMC2: SChema Harmonisation Committee (SCHAC) Task Force European Middleware Coordination and Collaboration refers to inetorgperson and eduperson Frank Tröger (RRZE) Reference Schema for LDAP-based IDM Systems LDAPcon / 20
8 Public Schemas Specific Higher Education Schemas for a single domain of purposes. WA Libraries Authentication Project (WALAP) extensive use of subtypes Integrierende Benutzer- und Ressourcenverwaltung an den Thüringer Hochschulen (Codex Meta Directory) good documentation Higher Education Information System (HIS) deployed in the majority of German universities Frank Tröger (RRZE) Reference Schema for LDAP-based IDM Systems LDAPcon / 20
9 Step 2 Choose other predefined schema elements Provides a basis for a decision through... 1 Gathering information about existing LDAP schemas sources and tools available 2 Consolidating gathered LDAP schemas available tools provide no help This drawback should be eliminated as part of the IDMone project in the sector of identity management. Perhaps in collaboration with already existing tools. Frank Tröger (RRZE) Reference Schema for LDAP-based IDM Systems LDAPcon / 20
10 A Reference Schema What is it not? not yet another schema already enough schemas available no unique schema for all circumstances not a general purpose schema What is it? IDM-related reference schema an assistance for directory architects in finding public schemas comparing public schemas getting an overview Frank Tröger (RRZE) Reference Schema for LDAP-based IDM Systems LDAPcon / 20
11 Reference Schema Basics attribute-based, object classes are not considered no problem in most cases either structural with inetorgperson as superior or auxiliary matching rules are not taken into account subordinate in the decision process The reference schema emerges from integrating attribute types of existing schemas. Frank Tröger (RRZE) Reference Schema for LDAP-based IDM Systems LDAPcon / 20
12 Method of Integration new AT if equivalent RefAT exists true false if new AT subset of RefAT create new RefAT false expand RefAT reset mapping(s) of assigned AT(s) At Present each step is executed manually. true assign new AT to RefAT set mapping of new AT Frank Tröger (RRZE) Reference Schema for LDAP-based IDM Systems LDAPcon / 20
13 Categories 1 Personal Characteristics 2 Contact / Local Information 3 Student Information 4 Employee Information 5 Linkage Identifiers / Foreign Keys 6 Entry Metadata / Administration Information 7 Security Attributes and Keys 8 Confidentiality / Attribute Release (Visibility) 9 Authorization, Entitlements 10 Group-related Attributes helps in locating the searched for attribute giving a first anticipation about the semantics 11 Other Miscellaneous Attributes Frank Tröger (RRZE) Reference Schema for LDAP-based IDM Systems LDAPcon / 20
14 Single-valued vs Multi-valued & Atomic vs Decomposable Single-valued vs Multi-valued if at least one attribute is multi-valued reference attribute is multi-valued exceptions: attribute that are single-valued by nature Atomic vs Decomposable handle composed attributes A Composed Attribute Reference Schema reference attribute A Public Schemas composed attribute A composed-of assigned-to reference attribute B reference attribute C reference attribute D attribute B attribute C attribute D Frank Tröger (RRZE) Reference Schema for LDAP-based IDM Systems LDAPcon / 20
15 Mapping Basics At present all mappings are described informal. reference schema is always a superset reference schema public schema: lossless reference schema public schema: possible with loss Frank Tröger (RRZE) Reference Schema for LDAP-based IDM Systems LDAPcon / 20
16 Mapping Directory Syntax & Additional Constraints Directory Syntax occurred mappings: Generalized Time Numeric String Directory String Printable String Integer Additional Constraints rule-based constraints (proprietary or RFCs) controlled vocabularies (enumeration types) Frank Tröger (RRZE) Reference Schema for LDAP-based IDM Systems LDAPcon / 20
17 Usage and Examples Date Of Birth Example (Date Of Birth) single-valued lossless mapping single-valued Reference Schema WALAP Codex HIS eduperson SCHAC composed loss s Date Of Birth X X X Codex: YYYY-MM-DD (Directory String syntax; RFC 3339) SCHAC: YYYYMMDD (Numeric String syntax) HIS: YYYYMMDD00Z (Generalized Time syntax; 00Z is constant) Frank Tröger (RRZE) Reference Schema for LDAP-based IDM Systems LDAPcon / 20
18 Usage and Examples Affiliation Example (Affiliation) controlled vocabulary mapping with loss single-valued Reference Schema WALAP Codex HIS eduperson SCHAC composed loss s Date Of Birth X X X loss Affiliation (X) (X) (X) WALAP: student, staff, others Codex: Mitarbeiter, Student, Bibliotheksbenutzer, Gast, Alumni eduperson: faculty, student, staff, alum, member, affiliate, employee Frank Tröger (RRZE) Reference Schema for LDAP-based IDM Systems LDAPcon / 20
19 Conclusions Summary The reference schema supports the reuse of common schema elements and provides mappings for locally adapted ones. Outlook formal mapping of equivalent attributes translate values automatically on the fly Frank Tröger (RRZE) Reference Schema for LDAP-based IDM Systems LDAPcon / 20
20 Reference Schema Online Reference Schema A pilot service is linked on the project s website. Project s Website Mailingliste send subscribe to [email protected] Frank Tröger (RRZE) Reference Schema for LDAP-based IDM Systems LDAPcon / 20
Attribute definitions for individual data
Attribute definitions for individual data Version 1.0.0 November 22, 2005 Page 1/12 1 Introduction These schema definitions are intended to facilitate information exchange among European, and possibly
Typical Directory Implementations at Institutions in Higher Education
Typical Directory Implementations at Institutions in Higher Education Brendan Bellina Identity Services Architect Mgr, Enterprise Middleware Development Information Technology Services University of Southern
Oracle Communications Unified Communications Suite
Oracle Communications Unified Communications Suite Schema Reference Release 8.0 July 2015 Oracle Communications Unified Communications Suite Schema Reference, Release 8.0 Copyright 2007, 2015, Oracle and/or
A terminology model approach for defining and managing statistical metadata
A terminology model approach for defining and managing statistical metadata Comments to : R. Karge (49) 30-6576 2791 mail [email protected] Content 1 Introduction... 4 2 Knowledge presentation...
Current Environment Assessment Specification. Single Sign On Customer Relation Management Workstation Support
Current Environment Assessment Specification Single Sign On Customer Relation Management Workstation Support Georgia State University By: Team #2 Members: Igor Wolbers Tony Yuan Saeed Nadjariun Team2 Version
Java (12 Weeks) Introduction to Java Programming Language
Java (12 Weeks) Topic Lecture No. Introduction to Java Programming Language 1 An Introduction to Java o Java as a Programming Platform, The Java "White Paper" Buzzwords, Java and the Internet, A Short
Profile synchronization guide for Microsoft SharePoint Server 2010
Profile synchronization guide for Microsoft SharePoint Server 2010 Microsoft Corporation Published: August 2011 Author: Microsoft Office System and Servers Team ([email protected]) Abstract This book
Directory Interface for User Management via LDAP BC-LDAP-USR 6.30 Test Catalog
Directory Interface for User Management via LDAP BC-LDAP-USR 6.30 Test Catalog Version 6.3 Test Catalog Page 1 of 30 Copyright(c) 2005 SAP AG. All rights reserved. Neither this document nor any part of
Novell Identity Manager
AUTHORIZED DOCUMENTATION Driver for LDAP Implementation Guide Novell Identity Manager 3.6.1 December 04, 2009 www.novell.com Legal Notices Novell, Inc. makes no representations or warranties with respect
Applying Data Governance in Identity Management: To Serve and Protect"
Applying Data Governance in Identity Management: To Serve and Protect" Brendan Bellina Identity Services Architect Information Technology Services University of Southern California [email protected]" Distributed
Directory Configuration Guide
Entrust IdentityGuard 8.1 Directory Configuration Guide Document issue: 1.0 Date of Issue: June 2006 Copyright 2006 Entrust. All rights reserved. Entrust is a trademark or a registered trademark of Entrust,
Windows.NET Beta 3 Active Directory New Features
Windows.NET Beta 3 Active Directory New Features Wolfgang Werner Compaq Decus Bonn 2002 Agenda Install Replica from Media Domain Controller Rename Domain Rename Universal Group Membership Caching Linked
MACE-Dir SAML Attribute Profiles
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 MACE-Dir SAML Attribute Profiles April 2008 Document identifier: internet2-mace-dir-saml-attributes-200804a Location: http://middleware.internet2.edu/dir Editors:
estatistik.core: COLLECTING RAW DATA FROM ERP SYSTEMS
WP. 2 ENGLISH ONLY UNITED NATIONS STATISTICAL COMMISSION and ECONOMIC COMMISSION FOR EUROPE CONFERENCE OF EUROPEAN STATISTICIANS Work Session on Statistical Data Editing (Bonn, Germany, 25-27 September
Network Working Group
Network Working Group Request for Comments: 2413 Category: Informational S. Weibel OCLC Online Computer Library Center, Inc. J. Kunze University of California, San Francisco C. Lagoze Cornell University
Enterprise Digital Identity Architecture Roadmap
Enterprise Digital Identity Architecture Roadmap Technical White Paper Author: Radovan Semančík Date: April 2005 (updated September 2005) Version: 1.2 Abstract: This document describes the available digital
Introduction to Service Oriented Architectures (SOA)
Introduction to Service Oriented Architectures (SOA) Responsible Institutions: ETHZ (Concept) ETHZ (Overall) ETHZ (Revision) http://www.eu-orchestra.org - Version from: 26.10.2007 1 Content 1. Introduction
Oracle Privileged Account Manager 11gR2. Karsten Müller-Corbach [email protected]
R2 Oracle Privileged Account Manager 11gR2 Karsten Müller-Corbach [email protected] The following is intended to outline our general product direction. It is intended for information purposes
Privilege and Access Management. Jan Tax Identity Management Specialist UNC Chapel Hill
Privilege and Access Management Jan Tax Identity Management Specialist UNC Chapel Hill The Big Picture Overview of Presentation Start with the basics of access management definitions stages and evolution
X.500 and LDAP Page 1 of 8
X.500 and LDAP Page 1 of 8 Introduction OCLC has completed its investigation of the two proposed electronic access protocols for the ILL Policies Directory. The first is X.500, a directory protocol standard
Identity Management with midpoint. Radovan Semančík FOSDEM, January 2016
Management with midpoint Radovan Semančík FOSDEM, January 2016 Radovan Semančík Current: Software Architect at Evolveum Architect of Evolveum midpoint Contributor to ConnId and Apache Directory API Past:
Internet infrastructure. Prof. dr. ir. André Mariën
Internet infrastructure Prof. dr. ir. André Mariën 1 Lightweight Directory Access Protocol 2 Object Identifier Representation: dotted decimal OID not intended for end-users Universally unique Example:
Data Modeling. Database Systems: The Complete Book Ch. 4.1-4.5, 7.1-7.4
Data Modeling Database Systems: The Complete Book Ch. 4.1-4.5, 7.1-7.4 Data Modeling Schema: The structure of the data Structured Data: Relational, XML-DTD, etc Unstructured Data: CSV, JSON But where does
DirX Identity V8.5. Secure and flexible Password Management. Technical Data Sheet
Technical Data Sheet DirX Identity V8.5 Secure and flexible Password Management DirX Identity provides a comprehensive password management solution for enterprises and organizations. It delivers self-service
A Database-based Email System
Rukma Prabhu Verlekar Neela Sawant Meghana Kshirsagar Computer Science and Engineering IIT Bombay Oct 31, 2004 A Bird s Eye View of our System Goal To build a database-based email-system. Motivation: Short-comings
THE ENTITY- RELATIONSHIP (ER) MODEL CHAPTER 7 (6/E) CHAPTER 3 (5/E)
THE ENTITY- RELATIONSHIP (ER) MODEL CHAPTER 7 (6/E) CHAPTER 3 (5/E) 2 LECTURE OUTLINE Using High-Level, Conceptual Data Models for Database Design Entity-Relationship (ER) model Popular high-level conceptual
Database Design Patterns. Winter 2006-2007 Lecture 24
Database Design Patterns Winter 2006-2007 Lecture 24 Trees and Hierarchies Many schemas need to represent trees or hierarchies of some sort Common way of representing trees: An adjacency list model Each
DirX Identity V8.4. Secure and flexible Password Management. Technical Data Sheet
Technical Data Sheet DirX Identity V8.4 Secure and flexible Password Management DirX Identity provides a comprehensive password management solution for enterprises and organizations. It delivers self-service
SERVICE-ORIENTED MODELING FRAMEWORK (SOMF ) SERVICE-ORIENTED SOFTWARE ARCHITECTURE MODEL LANGUAGE SPECIFICATIONS
SERVICE-ORIENTED MODELING FRAMEWORK (SOMF ) VERSION 2.1 SERVICE-ORIENTED SOFTWARE ARCHITECTURE MODEL LANGUAGE SPECIFICATIONS 1 TABLE OF CONTENTS INTRODUCTION... 3 About The Service-Oriented Modeling Framework
SEARCH The National Consortium for Justice Information and Statistics. Model-driven Development of NIEM Information Exchange Package Documentation
Technical Brief April 2011 The National Consortium for Justice Information and Statistics Model-driven Development of NIEM Information Exchange Package Documentation By Andrew Owen and Scott Came Since
Open Source Identity Management
Open Source Management OpenAlt 2015 Radovan Semančík November 2015 Ing. Radovan Semančík, PhD. Software architect Co-owner of Evolveum (open source company) Architect of midpoint project Apache committer
Kenneth Hee Director, Business Development Security & Identity Management. Oracle Identity Management 11g R2 Securing The New Digital Experience
Kenneth Hee Director, Business Development Security & Identity Management Oracle Identity Management 11g R2 Securing The New Digital Experience This document is for informational purposes. It is not a
Best Practices: Extending Enterprise Applications to Mobile Devices
Best Practices: Extending Enterprise Applications to Mobile Devices by Kulathumani Hariharan Summary: Extending enterprise applications to mobile devices is increasingly becoming a priority for organizations
SERVICE-ORIENTED MODELING FRAMEWORK (SOMF ) SERVICE-ORIENTED BUSINESS INTEGRATION MODEL LANGUAGE SPECIFICATIONS
SERVICE-ORIENTED MODELING FRAMEWORK (SOMF ) VERSION 2.1 SERVICE-ORIENTED BUSINESS INTEGRATION MODEL LANGUAGE SPECIFICATIONS 1 TABLE OF CONTENTS INTRODUCTION... 3 About The Service-Oriented Modeling Framework
Demystifying Privilege and Access Management Strategies for Local, Federated, and Cloud Environments
Demystifying Privilege and Access Management Strategies for Local, Federated, and Cloud Environments Wednesday, August 8, 2012 3 p.m. ET Chris Phillips, Technical Architect, Canadian Access Federation
Table of Contents. Testimonials from the MDM Alliance Group... Introduction to MDM...
Testimonials from the MDM Alliance Group... Foreword... xiii xxv Preface... xxix Acknowledgements... xxxix Introduction to MDM... xli PART ONE: THE MDM APPROACH... 1 Chapter 1. A Company and its Data...
UML PROFILING AND DSL
UML PROFILING AND DSL version 17.0.1 user guide No Magic, Inc. 2011 All material contained herein is considered proprietary information owned by No Magic, Inc. and is not to be shared, copied, or reproduced
Lecture 5: Foundation of Network Management
Lecture 5: Foundation of Network Management Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4395 5-1 Network Management Standards OSI: Common Management Information
Normalization in OODB Design
Normalization in OODB Design Byung S. Lee Graduate Programs in Software University of St. Thomas St. Paul, Minnesota [email protected] Abstract When we design an object-oriented database schema, we need
AAI - Authentication and Authorization Infrastructure
AAI - Authentication and Authorization Infrastructure Attribute Specification 1 September 2015 Version 1.5 / final Table of Contents 1. Introduction... 4 1.1. Privacy and data protection... 4 1.2. Security...
Shibboleth : An Open Source, Federated Single Sign-On System David E. Martin [email protected]
Shibboleth : An Open Source, Federated Single Sign-On System David E. Martin [email protected] International Center for Advanced Internet Research Outline Security Mechanisms Access Control Schemes
Microsoft Active Directory Authentication with SonicOS 3.0 Enhanced and SonicOS SC 1.0 (CSM 2100CF)
Microsoft Active Directory Authentication with SonicOS 3.0 Enhanced and SonicOS SC 1.0 (CSM 2100CF) Introduction SonicWALL Unified Threat Management (UTM) appliances running SonicOS Enhanced 3.0 support
IAM, Enterprise Directories and Shibboleth (oh my!)
IAM, Enterprise Directories and Shibboleth (oh my!) Gary Windham Senior Enterprise Systems Architect University Information Technology Services [email protected] What is IAM? Identity and Access
f...-. I enterprise Amazon SimpIeDB Developer Guide Scale your application's database on the cloud using Amazon SimpIeDB Prabhakar Chaganti Rich Helms
Amazon SimpIeDB Developer Guide Scale your application's database on the cloud using Amazon SimpIeDB Prabhakar Chaganti Rich Helms f...-. I enterprise 1 3 1 1 I ; i,acaessiouci' cxperhs;;- diotiilea PUBLISHING
Digital Library for Multimedia Content Management
Digital Library for Multimedia Content Management Cezary Mazurek, Maciej Stroinski, Sebastian Szuber Pozna_ Supercomputing and Networking Centre, ul. Noskowskiego 10, 61-704 Pozna_, POLAND tel. +48 61
Service Oriented Architecture
Service Oriented Architecture Version 9 2 SOA-2 Overview Ok, now we understand the Web Service technology, but how about Service Oriented Architectures? A guiding analogy Terminology excursion Service,
Novell Identity Manager
Driver for Active Directory* Implementation Guide AUTHORIZED DOCUMENTATION Novell Identity Manager 3.6.1 July 01, 2010 www.novell.com Identity Manager 3.6.1 Driver for Active Directory Implementation Guide
Trust but Verify: Best Practices for Monitoring Privileged Users
Trust but Verify: Best Practices for Monitoring Privileged Users Olaf Stullich, Product Manager ([email protected]) Arun Theebaprakasam, Development Manager Chirag Andani, Vice President, Identity
WebSphere IBM Product Lifecycle Management Content Pack for IBM WebSphere Business Services Fabric version 6.2. Reference Architecture Guide
WebSphere IBM Product Lifecycle Management Content Pack for IBM WebSphere Business Services Fabric version 6.2 Reference Architecture Guide Note Before using this information and the product it supports,
ClearPath Enterprise Servers
ClearPath Enterprise Servers Lightweight Directory Access Protocol (LDAP) Programming Guide ClearPath MCP 12.0 April 2008 . unisys imagine it. done. ClearPath Enterprise Servers Lightweight Directory Access
ADAM (AD LDS) Pass thru Authentication. Idalia Torres STC 2012- Using ADAM to Keep AD out of Harm s Way
ADAM (AD LDS) Pass thru Authentication Idalia Torres STC 2012- Using ADAM to Keep AD out of Harm s Way Overview What is it? What s New in ADLDS? Instal ADAM Instance Extend ADAM Schema Select Target Class
The Designer's Guide to VHDL
The Designer's Guide to VHDL Third Edition Peter J. Ashenden EDA CONSULTANT, ASHENDEN DESIGNS PTY. LTD. ADJUNCT ASSOCIATE PROFESSOR, ADELAIDE UNIVERSITY AMSTERDAM BOSTON HEIDELBERG LONDON m^^ yj 1 ' NEW
SOA REFERENCE ARCHITECTURE: WEB TIER
SOA REFERENCE ARCHITECTURE: WEB TIER SOA Blueprint A structured blog by Yogish Pai Web Application Tier The primary requirement for this tier is that all the business systems and solutions be accessible
SAP User and Access Management with Microsoft Identity Integration Server
Collaboration Technology Support Center Microsoft Collaboration Brief August 2005 SAP User and Access Management with Microsoft Identity Integration Server Authors Rüdiger Berndt, IdM Lead Architect, Oxford
RELATIONAL DATABASE DESIGN
RELATIONAL DATABASE DESIGN g Good database design - Avoiding anomalies g Functional Dependencies g Normalization & Decomposition Using Functional Dependencies g 1NF - Atomic Domains and First Normal Form
Driver for JDBC Implementation Guide
www.novell.com/documentation Driver for JDBC Implementation Guide Identity Manager 4.0.2 January 2014 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use
User Management Resource Administrator. Managing LDAP directory services with UMRA
User Management Resource Administrator Managing LDAP directory services with UMRA Copyright 2005, Tools4Ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted
SAAS. Best practices for SAAS implementation using an Open Source Portal (JBoss)
SAAS Best practices for SAAS implementation using an Open Source Portal (JBoss) Introduction JBoss Portal is a very popular open source portal offering from Red Hat. It is JSR-168 compliant and provides
Software Architecture
Cairo University Faculty of Computers and Information Computer Science Department Premasters Studies Software Architecture Report on Software Product Line Submitted to: Dr. Hany Ammar Submitted by: Hadeel
www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012
www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,
Actalis Object Identifiers (OIDs)
Actalis Object Identifiers (OIDs) Author: Verified by: Riccardo Minet Actalis S.p.A. Egidio Casati Actalis S.p.A. Fulvio Parisi Actalis S.p.A. Approved by: Adriano Santoni Actalis S.p.A. Document code:
Hewlett-Packard Company. Standard Operating Procedure for Operations Service Architecture Philips. Password Management Procedure
Hewlett-Packard Company for Operations Service Architecture Password Management Procedure Prepared by: Patrik Schrey Solution Architect Date Prepared: 25-Sept-2012 Document Information Project Name: Operations
Identity Governance Evolution
Identity Governance Evolution Paola Marino Principal Sales Consultant Agenda Oracle Identity Governance Innovation Cloud Scenarios enabled by Oracle Identity Platform Agenda Oracle
Everything Developers Need to. and/or ADAM, and/or LDAP
Everything Developers Need to Know About Active Directory and/or ADAM, and/or LDAP My Boring & Generic Bio Slide Working with Active Directory since Oct 1999 (RTM date) Currently run large Active Directory
Information and documentation The Dublin Core metadata element set
ISO TC 46/SC 4 N515 Date: 2003-02-26 ISO 15836:2003(E) ISO TC 46/SC 4 Secretariat: ANSI Information and documentation The Dublin Core metadata element set Information et documentation Éléments fondamentaux
The Way to SOA Concept, Architectural Components and Organization
The Way to SOA Concept, Architectural Components and Organization Eric Scholz Director Product Management Software AG Seite 1 Goals of business and IT Business Goals Increase business agility Support new
Configuring idrac6 for Directory Services
Configuring idrac6 for Directory Services Instructions for Setting Up idrac6 with Active Directory, Novell, Fedora, OpenDS and OpenLDAP Directory Services. A Dell Technical White Paper Dell Product Group
IDENTITY MANAGEMENT ROLLOUT: IN A HURRY. Jason Blackader, UNIX Systems Administrator
IDENTITY MANAGEMENT ROLLOUT: IN A HURRY Jason Blackader, UNIX Systems Administrator Undergraduate, Graduate, Continuing Ed Industrial Design, Communication Design, Design Sciences, Arts & Media Two Campuses
An Introduction to Relational Database Management System
History The concept of relational databases was first described by Edgar Frank Codd (almost exclusively referenced as E. F. Codd in technical literature) in the IBM research report RJ599, dated August
Chapter 7 Data Modeling Using the Entity- Relationship (ER) Model
Chapter 7 Data Modeling Using the Entity- Relationship (ER) Model Copyright 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 7 Outline Using High-Level Conceptual Data Models for
Fraunhofer FOKUS. Fraunhofer Institute for Open Communication Systems Kaiserin-Augusta-Allee 31 10589 Berlin, Germany. www.fokus.fraunhofer.
Fraunhofer Institute for Open Communication Systems Kaiserin-Augusta-Allee 31 10589 Berlin, Germany www.fokus.fraunhofer.de 1 Identification and Utilization of Components for a linked Open Data Platform
EXPLORING THE CAVERN OF DATA GOVERNANCE
EXPLORING THE CAVERN OF DATA GOVERNANCE AUGUST 2013 Darren Dadley Business Intelligence, Program Director Planning and Information Office SIBI Overview SIBI Program Methodology 2 Definitions: & Governance
MATLAB Toolbox implementation for LDAP based Server accessing
SHIV SHAKTI International Journal in Multidisciplinary and Academic Research (SSIJMAR) Vol. 2, No. 3, May-June (ISSN 2278 5973) MATLAB Toolbox implementation for LDAP based Server accessing Prof Manav
