123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

How Does Ldap Work

Profile Picture
By Author: Robert Spencer
Total Articles: 3764
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Lightweight Directory Access Protocol or LDAP is a TCP/IP-based Internet protocol used by email programs and a few other applications to search and fetch information from a directory stored on a server. A directory is a data repository storing identical chunks of information in a hierarchical and logical sequence.

For instance, a telephone directory that has various subscriber names indexed alphabetically with associated telephone numbers and addresses is an example of a directory. This kind of a structure can easily be implemented using LDAP. However, this protocol is not limited to accessing just contact information about people. It can locate shared resources on a network like printers and scanners, and allow people to use the resources and other shared services using a single password.

LDAP can be successfully implemented where identical forms of sequentially stored information need to be accessed quickly and where updates are done very rarely. Email clients frequently use LDAP to access directory information from a server. Since LDAP does not support encryption, processes like updating and modifying information ...
... on the server from the client needs to be done using a secure SSL connection.

LDAP can also use DNS or Domain Name System to structure the top-level of its hierarchy. This enables the system to have a wide scope at the top end of the hierarchy, but at the same time funnel down to a single specific entity at the lower end of the hierarchy. For instance, the top level may represent countries, states or other large geographical boundaries, whereas the bottom end might point to a single document on a computer, a shared resource on a network or a particular individual's information. This makes the protocol very versatile in dealing with a large variety of applications.

The University of Michigan developed the LDAP protocol and its current version is LDAPv3.

Total Views: 197Word Count: 300See All articles From Author

Add Comment

Computers Articles

1. Few Good Insights To Follow With Pc Gaming In Australia!
Author: Jack Williams

2. Transform Your Online Store With Australia's Leading Ecommerce Developers
Author: themerchantbuddy

3. How To Choose The Right Technology For Your mobile App?
Author: goodcoders

4. The Rise Of User Centered Web Design
Author: goodcoders

5. Reasons Why Laravel Perfect For Web Development?
Author: goodcoders

6. Ssd Vs Sas Vs Sata Drives: Which Is Better For Your Dedicated Server Hardware?
Author: The CyberTech

7. Raid Servers And Data Protection: Common Myths About Raid Servers
Author: The CyberTech

8. Top 8 Do's And Don’ts When Dealing With A Corrupted Sd Card
Author: The CyberTech

9. Nvme Vs Ssd: What To Choose For Your Storage Solutions?
Author: The CyberTech

10. 8 Common Data Recovery Myths Exposed!
Author: The CyberTech

11. Understanding Ssd Lifespan: Signs, Durability, Data Recovery, And Factors Affecting The Life Of An Ssd
Author: The CyberTech

12. Server Data Recovery Solutions: When Your Raid Server Is Crashed!
Author: The CyberTech

13. Data Recovery Solutions For Undetected Ssd On Bios
Author: The CyberTech

14. Problems Faced By Mobile Phone Users: Green Line Issue, Motherboard Failure, Phone Stuck On Logo And Mobile Data Recovery Possibilities
Author: The CyberTech

15. Ssd Vs Hdd: Weaknesses, Data Recovery Factors And Failure Rates
Author: The CyberTech

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: