Using Domains in LDAP/X.500 Distinguished Names



Similar documents
Implementazione dell autenticazione con LDAP

KACE Appliance LDAP Reference Guide V1.4

November X.500 and Domains

Category: Informational January The Network Solutions Personal Internet Name (PIN): A URN Namespace for People and Organizations

Network Working Group. Category: Standards Track Novell November 1997

Request for Comments: 3491 Category: Standards Track Viagenie March 2003

Network Working Group Request for Commments: Category: Standards Track May 1998

Obsoletes: 2487 February 2002 Category: Standards Track. SMTP Service Extension for Secure SMTP over Transport Layer Security. Status of this Memo

Request for Comments: March 2001

Category: Standards Track Cisco Systems, Inc. March 1999

Version 9. Active Directory Integration in Progeny 9

J. Zawinski Netscape Communications July 1998

Request for Comments: Category: Experimental NSA February 2000

Network Working Group. Category: Standards Track Nortel Networks September 1999

Copyright (C) The Internet Society (2002). All Rights Reserved. This document defines a basic set of requirements for reliable server pooling.

A Directory Application Level Firewall - the Guardian DSA

[MS-FSADSA]: Active Directory Search Authorization Protocol Specification

IBM Enterprise Marketing Management. Domain Name Options for

Importing data from Linux LDAP server to HA3969U

Network Working Group. Ohio University May 1999

Copyright 2016 Lexmark. All rights reserved. Lexmark is a trademark of Lexmark International, Inc., registered in the U.S. and/or other countries.

rackspace.com/cloud/private

4.0. Attribute Mapping Rules

Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP

Network Working Group. E. Guttman Sun Microsystems C. Bisdikian W. Jerome IBM July 2004

Forests, trees, and domains

In this chapter, we will introduce works related to our research. First, we will

Introduction Installing and Configuring the LDAP Server Configuring Yealink IP Phones Using LDAP Phonebook...

Category: Standards Track October 2005

The following gives an overview of LDAP from a user's perspective.

Internet infrastructure. Prof. dr. ir. André Mariën

LDAP Schema Design. Andrew Findlay Skills 1st Ltd. February

Technical Bulletin 005 Revised 2010/12/10

Configuring Apache Web Server for x509 User Authentication

The Five Minute RCS Tutorial (Perl for System Administration

CORPORATE HEADQUARTERS Elitecore Technologies Ltd. 904 Silicon Tower, Off. C.G. Road, Ahmedabad , INDIA

Novell Identity Manager

Outline. Definition. Name spaces Name resolution Example: The Domain Name System Example: X.500, LDAP. Names, Identifiers and Addresses

Category: Informational Liberate Technologies, Inc. May Uniform Resource Identifiers for Television Broadcasts

Network Working Group

Chris Smith, Platform Computing Marvin Theimer, Microsoft Glenn Wasson, UVA July 14, 2006 Updated: October 2, 2006

Universal Business Process Part 2: ebcppa

Returning Values from Forms: multipart/form-data

How to Use Microsoft Active Directory as an LDAP Source with the Oracle ZFS Storage Appliance

Technical Overview. Active Directory Synchronization

How To Search For An Active Directory On Goprint Ggprint Goprint.Org (Geoprint) (Georgos4) (Goprint) And Gopprint.Org Gop Print.Org

Public-Root Name Server Operational Requirements

Oracle Communications Unified Communications Suite

MATLAB Toolbox implementation for LDAP based Server accessing

MACE-Dir SAML Attribute Profiles

How To Manage Em Sourceone In Windows Exchange

Configuring and Using the TMM with LDAP / Active Directory

Active Directory Synchronization with Lotus ADSync

CA Identity Manager. Glossary. r12.5 SP8

Novell Identity Manager

Technical Bulletin 41137

Network Working Group Request for Comments: J. Ferraiolo IBM April 2007

LDAP Directory Integration with Cisco Unity Connection

CA SiteMinder. Directory Configuration - OpenLDAP. r6.0 SP6

PHIN DIRECTORY EXCHANGE IMPLEMENTATION GUIDE. Version 1.0

Scan Features Minimum Requirements Guide WorkCentre M123/M128 WorkCentre Pro 123/ P42081

Trouble Ticket Exchange Specification. This draft invites discussions and suggestions for improvements. The distribution of the document is unlimited.

Release Notes. IBM Tivoli Identity Manager Oracle Database Adapter. Version First Edition (December 7, 2007)

SonicOS Enhanced 3.2 LDAP Integration with Microsoft Active Directory and Novell edirectory Support

Exploring LDAP. By Valmiki Mukherjee Seethal Nagalla Hemakumar Rangineni. Seminar Series on Computer Network Protocols CSCI 5780 Spring 2005

Chapter 1 Manage Users, Computers and Groups...2. Chapter 2 Managing and Maintaining Access to Resources...43

Network Working Group Request for Comments: 2810 April 2000 Updates: 1459 Category: Informational

EMC ViPR Controller. Version 2.4. User Interface Virtual Data Center Configuration Guide REV 01 DRAFT

CA Unified Infrastructure Management Server

Step-by-Step Guide to Active Directory Bulk Import and Export

Ecma/TC39/2013/NN. 4 th Draft ECMA-XXX. 1 st Edition / July The JSON Data Interchange Format. Reference number ECMA-123:2009

How to integrate hp OpenView Service Desk with Microsoft Active Directory

How To Authenticate On An Xtma On A Pc Or Mac Or Ipad (For A Mac) On A Network With A Password Protected (For An Ipad) On An Ipa Or Ipa (For Mac) With A Log

Table of Contents. Chapter Case Study Chapter Case Study Chapter Case Study

Category: Informational Consulintel October 2004

Network Working Group. Switch October Session Initiation Protocol (SIP) Extension Header Field for Service Route Discovery During Registration

Category: Informational World Wide Web Consortium October 2005

Upgrading User-ID. Tech Note PAN-OS , Palo Alto Networks, Inc.

Security Digital Certificate Manager

Security Digital Certificate Manager

Using LDAP Authentication in a PowerCenter Domain

Heinz Johner, Larry Brown, Franz-Stefan Hinner, Wolfgang Reis, Johan Westman. International Technical Support Organization

New Security Features

ECMA-400. Smart Data Centre Resource Monitoring and Control. 1 st Edition / December Reference number ECMA-123:2009

Service Availability TM Forum Application Interface Specification

Managing Users and Identity Stores

Module 3: Implementing an Organizational Unit Structure

Tivoli Endpoint Manager for Configuration Management. User s Guide

Chapter 3 Authenticating Users

Novell LDAP Proxy Server

FTP Site for Restricted Symbols NASDAQ OMX Nordic

RTI Monitor. Release Notes

X.500 and LDAP Page 1 of 8

Setup Reset Password Portal. CloudAnywhere. Auteur Emmanuel Dreux

Apache Directory Studio LDAP Browser. User's Guide

MS Skype for Business and Lync. Integration Guide

Driver for Active Directory Implementation Guide. Identity Manager 4.0.2

TS-003 Tool Resource. Revision: 01 Revision date August 2013

Network Working Group Request for Comments: G. Tsirtsis Flarion Technologies E. Klovning Birdstep Technology ASA December 2005

Configuring LDAP Directory Search on SPA SIP IP Phones

Transcription:

Network Working Group Request for Comments: 2247 Category: Standards Track S. Kille Isode Ltd. M. Wahl Critical Angle Inc. A. Grimstad R. Huber S. Sataluri January 1998 Using Domains in LDAP/X.500 Distinguished Names Status of this Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Copyright Notice Copyright (C) The Internet Society (1998). All Rights Reserved. 1. Abstract The Lightweight Directory Access Protocol (LDAP) uses X.500- compatible distinguished names [3] for providing unique identification of entries. This document defines an algorithm by which a name registered with the Internet Domain Name Service [2] can be represented as an LDAP distinguished name. 2. Background The Domain (Nameserver) System (DNS) provides a hierarchical resource labeling system. A name is made up of an ordered set of components, each of which are short strings. An example domain name with two components would be "CRITICAL-ANGLE.COM". Kille, et. al. Standards Track [Page 1]

LDAP-based directories provide a more general hierarchical naming framework. A primary difference in specification of distinguished names from domain names is that each component of an distinguished name has an explicit attribute type indication. X.500 does not mandate any particular naming structure. It does contain suggested naming structures which are based on geographic and national regions, however there is not currently an established registration infrastructure in many regions which would be able to assign or ensure uniqueness of names. The mechanism described in this document automatically provides an enterprise a distinguished name for each domain name it has obtained for use in the Internet. These distinguished names may be used to identify objects in an LDAP directory. An example distinguished name represented in the LDAP string format [3] is "DC=CRITICAL-ANGLE,DC=COM". As with a domain name, the most significant component, closest to the root of the namespace, is written last. This document does not define how to represent objects which do not have domain names. Nor does this document define the procedure to locate an enterprise s LDAP directory server, given their domain name. Such procedures may be defined in future RFCs. 3. Mapping Domain Names into Distinguished Names This section defines a subset of the possible distinguished name structures for use in representing names allocated in the Internet Domain Name System. It is possible to algorithmically transform any Internet domain name into a distinguished name, and to convert these distinguished names back into the original domain names. The algorithm for transforming a domain name is to begin with an empty distinguished name (DN) and then attach Relative Distinguished Names (RDNs) for each component of the domain, most significant (e.g. rightmost) first. Each of these RDNs is a single AttributeTypeAndValue, where the type is the attribute "DC" and the value is an IA5 string containing the domain name component. Thus the domain name "CS.UCL.AC.UK" can be transformed into DC=CS,DC=UCL,DC=AC,DC=UK Kille, et. al. Standards Track [Page 2]

Distinguished names in which there are one or more RDNs, all containing only the attribute type DC, can be mapped back into domain names. Note that this document does not define a domain name equivalence for any other distinguished names. 4. Attribute Type Definition The DC (short for domaincomponent) attribute type is defined as follows: ( 0.9.2342.19200300.100.1.25 NAME dc EQUALITY caseignoreia5match SUBSTR caseignoreia5substringsmatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 SINGLE-VALUE ) The value of this attribute is a string holding one component of a domain name. The encoding of IA5String for use in LDAP is simply the characters of the string itself. The equality matching rule is case insensitive, as is today s DNS. 5. Object Class Definitions An object with a name derived from its domain name using the algorithm of section 3 is represented as an entry in the directory. The "DC" attribute is present in the entry and used as the RDN. An attribute can only be present in an entry held by an LDAP server when that attribute is permitted by the entry s object class. This section defines two object classes. The first, dcobject, is intended to be used in entries for which there is an appropriate structural object class. For example, if the domain represents a particular organization, the entry would have as its structural object class organization, and the dcobject class would be an auxiliary class. The second, domain, is a structural object class used for entries in which no other information is being stored. The domain object class is typically used for entries that are placeholders or whose domains do not correspond to real-world entities. 5.1. The dcobject object class The dcobject object class permits the dc attribute to be present in an entry. This object class is defined as auxiliary, as it would typically be used in conjunction with an existing structural object class, such as organization, organizationalunit or locality. The following object class, along with the dc attribute, can be added to any entry. Kille, et. al. Standards Track [Page 3]

( 1.3.6.1.4.1.1466.344 NAME dcobject SUP top AUXILIARY MUST dc ) An example entry would be: dn: dc=critical-angle,dc=com objectclass: top objectclass: organization objectclass: dcobject dc: critical-angle o: Critical Angle Inc. 5.2. The domain object class If the entry does not correspond to an organization, organizational unit or other type of object for which an object class has been defined, then the "domain" object class can be used. The "domain" object class requires that the "DC" attribute be present, and permits several other attributes to be present in the entry. The entry will have as its structural object class the "domain" object class. ( 0.9.2342.19200300.100.4.13 NAME domain SUP top STRUCTURAL MUST dc MAY ( userpassword $ searchguide $ seealso $ businesscategory $ x121address $ registeredaddress $ destinationindicator $ preferreddeliverymethod $ telexnumber $ teletexterminalidentifier $ telephonenumber $ internationalisdnnumber $ facsimiletelephonenumber $ street $ postofficebox $ postalcode $ postaladdress $ physicaldeliveryofficename $ st $ l $ description $ o $ associatedname ) ) The optional attributes of the domain class are used for describing the object represented by this domain, and may also be useful when searching. These attributes are already defined for use with LDAP [4]. An example entry would be: dn: dc=tcp,dc=critical-angle,dc=com objectclass: top objectclass: domain dc: tcp description: a placeholder entry used with SRV records The DC attribute is used for naming entries of the domain class, and this can be represented in X.500 servers by the following name form rule. Kille, et. al. Standards Track [Page 4]

( 1.3.6.1.4.1.1466.345 NAME domainnameform OC domain MUST ( dc ) ) 6. References [1] The Directory: Selected Attribute Types. ITU-T Recommendation X.520, 1993. [2] Mockapetris, P., " Domain Names - Concepts and Facilities," STD 13, RFC 1034, November 1987. [3] Kille, S., and M. Wahl, " Lightweight Directory Access Protocol (v3): UTF-8 String Representation of Distinguished Names", RFC 2253, December 1997. [4] Wahl, M., "A Summary of the X.500(96) User Schema for use with LDAP", RFC 2256, December 1997. 7. Security Considerations This memo describes how attributes of objects may be discovered and retrieved. Servers should ensure that an appropriate security policy is maintained. An enterprise is not restricted in the information which it may store in DNS or LDAP servers. A client which contacts an untrusted server may have incorrect or misleading information returned (e.g. an organization s server may claim to hold naming contexts representing domain names which have not been delegated to that organization). 8. Authors Addresses Steve Kille Isode Ltd. The Dome The Square Richmond, Surrey TW9 1DT England Phone: +44-181-332-9091 EMail: S.Kille@ISODE.COM Kille, et. al. Standards Track [Page 5]

Mark Wahl Critical Angle Inc. 4815 W. Braker Lane #502-385 Austin, TX 78759 Phone: (1) 512 372 3160 EMail: M.Wahl@critical-angle.com Al Grimstad Room 1C-429, 101 Crawfords Corner Road Holmdel, NJ 07733-3030 EMail: alg@att.com Rick Huber Room 1B-433, 101 Crawfords Corner Road Holmdel, NJ 07733-3030 EMail: rvh@att.com Sri Sataluri Room 4G-202, 101 Crawfords Corner Road Holmdel, NJ 07733-3030 EMail: sri@att.com Kille, et. al. Standards Track [Page 6]

9. Full Copyright Statement Copyright (C) The Internet Society (1998). All Rights Reserved. This document and translations of it may be copied and furnished to others, and derivative works that comment on or otherwise explain it or assist in its implementation may be prepared, copied, published and distributed, in whole or in part, without restriction of any kind, provided that the above copyright notice and this paragraph are included on all such copies and derivative works. However, this document itself may not be modified in any way, such as by removing the copyright notice or references to the Internet Society or other Internet organizations, except as needed for the purpose of developing Internet standards in which case the procedures for copyrights defined in the Internet Standards process must be followed, or as required to translate it into languages other than English. The limited permissions granted above are perpetual and will not be revoked by the Internet Society or its successors or assigns. This document and the information contained herein is provided on an "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Kille, et. al. Standards Track [Page 7]