1 |
Security Policy
-
defines how and who can access and change data
-
users must "authenticate" when "binding" to the directory
-
password based authentication
-
certificate based authentication
-
anonymous access is possible
-
Access Control Lists: permissions (read, write, search, add, delete), filters, users, groups
-
LDAPS - SSL encrypted LDAP connections
|