123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

How Does Ldap Work

Profile Picture
By Author: Robert Spencer
Total Articles: 3764
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Lightweight Directory Access Protocol or LDAP is a TCP/IP-based Internet protocol used by email programs and a few other applications to search and fetch information from a directory stored on a server. A directory is a data repository storing identical chunks of information in a hierarchical and logical sequence.

For instance, a telephone directory that has various subscriber names indexed alphabetically with associated telephone numbers and addresses is an example of a directory. This kind of a structure can easily be implemented using LDAP. However, this protocol is not limited to accessing just contact information about people. It can locate shared resources on a network like printers and scanners, and allow people to use the resources and other shared services using a single password.

LDAP can be successfully implemented where identical forms of sequentially stored information need to be accessed quickly and where updates are done very rarely. Email clients frequently use LDAP to access directory information from a server. Since LDAP does not support encryption, processes like updating and modifying information ...
... on the server from the client needs to be done using a secure SSL connection.

LDAP can also use DNS or Domain Name System to structure the top-level of its hierarchy. This enables the system to have a wide scope at the top end of the hierarchy, but at the same time funnel down to a single specific entity at the lower end of the hierarchy. For instance, the top level may represent countries, states or other large geographical boundaries, whereas the bottom end might point to a single document on a computer, a shared resource on a network or a particular individual's information. This makes the protocol very versatile in dealing with a large variety of applications.

The University of Michigan developed the LDAP protocol and its current version is LDAPv3.

Total Views: 207Word Count: 300See All articles From Author

Add Comment

Computers Articles

1. Devopsin Hallinnoimat Palvelut: Tietoturva Ja Tiedon Hallinta
Author: harju

2. Hyödynnä Pilvesi Täysi Potentiaali Google Cloud Monitoring Solutions -ratkaisuilla
Author: harju

3. Pysy Kyberuhkien Edellä Google Cloud Security Services -palvelun Avulla
Author: harju

4. Mullista Yrityksesi Nopeilla Ja Turvallisilla Googlen Pilvipalveluratkaisuilla
Author: harju

5. Googlen Pilvi-identiteetin Hallintapalvelut Pienille Ja Keskisuurille Yrityksille
Author: harju

6. Google Cloud -konsultointi: Tukea, Strategiaa Ja Kehitystä Yrityksellesi
Author: harju

7. Iot Edge -laskentapalvelut Ja Ai – Älykkään Datankäsittelyn Tulevaisuus
Author: harju

8. Älykäs Reunalaskenta: Tehokkuutta Ja Kilpailuetua Yrityksellesi
Author: harju

9. Cloud Change -palvelut – Tulevaisuuden It-ratkaisu Liiketoiminnallesi
Author: harju

10. Aws-tietokannan Siirtopalvelu Ja Hybridiympäristöt – Miten Ne Toimivat Yhdessä?
Author: harju

11. What Makes Google Ads Management Services Better Than Other Digital Marketing Campaigns?
Author: Digital Agency

12. Things You Should Know About Nema And International Plug Adapters
Author: Jennifer Truong

13. The Best 8 Tools For Data Analysis
Author: goodcoders

14. Top 5 Customer Experience Management Problems And Solution
Author: goodcoders

15. How To Create A Framework-agnostic Application In Php?
Author: goodcoders

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: