- #LDAP QUERY USER SID HOW TO#
- #LDAP QUERY USER SID INSTALL#
- #LDAP QUERY USER SID PASSWORD#
- #LDAP QUERY USER SID MAC#
King, dc=dartmouth, dc=edu dndGid: 45939 46170 62446 67313 80885 userCertificate binary::MIIEgDCCA2igAwIBQYJcNAQEFBQA.
#LDAP QUERY USER SID INSTALL#
#LDAP QUERY USER SID PASSWORD#
#LDAP QUERY USER SID MAC#
No support for current (Intel) Mac hardware.firewalls and NAT devices (home routers) may block port 913.Sidecar listener obtains Kerberos ticket, returns it to server for validation.to authenticate, server process makes an out-of-band connection to the user's machine to Sidecar listener (port 913).Older web-based single-sign-on solution.- redirection involved in a webAuth login can be problem with HTTP POST (solution is to webAuth just your "login" page, then use a session).- browser-based only (limited to web apps).- also checks against alumni directory, DHMC.+ also checks against Alumni directory, DHMC.+ can support multiple authentication methods.++ application developer no longer has to do authentication directly.webAuth support is built in at web server (apache) level application developer doesn’t need to do authentication directly.webAuth redirects browser back to theWeb application.User authenticates to webAuth using PKI cert, or name/pw.to authenticate, browser is redirected to login screen (unless user is already signed in).webAuth = CAS+Dartmouth-specific attributes, PKI support.All Dartmouth web apps are encouraged to migrate to webAuth.Password is not stored in DNDPERSON - strict policy of not exporting passwords.No password expiration enforced by LDAP, but applications can query the "pwchanged" attribute and enforce their own policy.Same password used for DND, LDAP and Active Directory.SSN is present but not released to any application.eduPersonAffiliation (Student, Faculty, Staff).Affiliation (DART, SPON, DEPT, DHMC, etc.).Name (full name, and broken-out parts)."sponsored" accounts (contractors, non-paid research assistants.).all students, faculty, staff (sourced from HR and Banner).Also used in the feed of HR/Banner info to DND/LDAP directory.May be more convenient for a native Oracle app to query against DNDPERSON instead of doing an external DND or LDAP operation.A "shadow" Oracle table replicating the data visible through the DND interface.Best practice is to resolve name using DND, then use LDAP.Greater range of data storage & access control possible with LDAP.LDAP is the open standard for Enterprise directories.
DND does flexible, standardized name/nickname matching.#1 point: DND is a custom interface on underlying LDAP directory.
#LDAP QUERY USER SID HOW TO#
Dartmouth’s Directory and Authentication Infrastructure …and how to use it from an Oracle application