Directory Services as the Foundation of Organizational Infrastructures
If you have followed any of my last six installments about LDAP, then you know we've taken a technical approach to the subject. I wrote the majority of the material in this series as part of an O'Reilly book entitled "Linux System Administration" or simply LSA. You can find a write-up on the book at this link.
The material on LDAP did not make it into LSA for a number of reasons. First, O'Reilly already has an excellent book on LDAP written by Gerald Carter. A 600 page book on Linux system administration doesn't need a repeat of existing work. Secondly, I found open source LDAP a strange animal with which to deal.
And that animal conjures up some interesting observations.
Linux and the open source community has many great projects. However, those projects have limitations in the context of a boundary based enterprise infrastructure. While Linux, as an example, does a beautiful job as an application platform, it lacks some essential elements for creating an enterprise environment capable of serving the needs of organizations. I blame that on a lack of vision and resources by and in the community. I see that as a niche in the competitive landscape.
Perhaps we know what to do to create a secure, manageable environment using Linux but others with extensive resources need to take on that monumental set of tasks required to turn the vision into reality. This is where we can discuss the context of a directory (LDAP) based infrastructure further.
An enterprise infrastructure is a collection of user accounts, groups, computers and other resources that share a common security boundary. Within that boundary, architects and system engineers must establish an environment that insures security and provides a concept known as least privilege. Least privilege and least rights means that any user has only those rights required for him or her to do their jobs and no more.
Directory based management does not always provide a common security boundary or the ability to lock down least privilege within the boundary. I look at Novell as a company with the tools necessary to provides an entire infrastructure with a common security boundary. But, Open Enterprise Server (OES) and Open Workgroup Suite are products for knowledge workers does not an enterprise make.
We can also vary for a moment from the enterprise and go right down to the local Linux PC. We could say that the lack of lock down policies at the local level are missing too. Also, where in the collection of computers users and accounts that would make up common security boundary does an administrator have the ability to provide a hierarchical set of policies that can carry through and override local and/or workgroup policies.Without that structure you can have an organization running amuck.
Going forward in the LDAP series, I want to tease out a theoretical model out further. We can call it a blue print, if you would like. It's an idea, in my opinion, whose time has come.
In this blog entry, I just wanted to make you aware of the possibilities.
Practical Task Scheduling Deployment
One of the best things about the UNIX environment (aside from being stable and efficient) is the vast array of software tools available to help you do your job. Traditionally, a UNIX tool does only one thing, but does that one thing very well. For example, grep is very easy to use and can search vast amounts of data quickly. The find tool can find a particular file or files based on all kinds of criteria. It's pretty easy to string these tools together to build even more powerful tools, such as a tool that finds all of the .log files in the /home directory and searches each one for a particular entry. This erector-set mentality allows UNIX system administrators to seem to always have the right tool for the job.
Cron traditionally has been considered another such a tool for job scheduling, but is it enough? This webinar considers that very question. The first part builds on a previous Geek Guide, Beyond Cron, and briefly describes how to know when it might be time to consider upgrading your job scheduling infrastructure. The second part presents an actual planning and implementation framework.
Join Linux Journal's Mike Diehl and Pat Cameron of Help Systems.
Free to Linux Journal readers.View Now!
|The Firebird Project's Firebird Relational Database||Jul 29, 2016|
|Stunnel Security for Oracle||Jul 28, 2016|
|SUSE LLC's SUSE Manager||Jul 21, 2016|
|My +1 Sword of Productivity||Jul 20, 2016|
|Non-Linux FOSS: Caffeine!||Jul 19, 2016|
|Murat Yener and Onur Dundar's Expert Android Studio (Wrox)||Jul 18, 2016|
- Stunnel Security for Oracle
- The Firebird Project's Firebird Relational Database
- SUSE LLC's SUSE Manager
- Murat Yener and Onur Dundar's Expert Android Studio (Wrox)
- Managing Linux Using Puppet
- My +1 Sword of Productivity
- Non-Linux FOSS: Caffeine!
- Doing for User Space What We Did for Kernel Space
- Google's SwiftShader Released
- SuperTuxKart 0.9.2 Released
With all the industry talk about the benefits of Linux on Power and all the performance advantages offered by its open architecture, you may be considering a move in that direction. If you are thinking about analytics, big data and cloud computing, you would be right to evaluate Power. The idea of using commodity x86 hardware and replacing it every three years is an outdated cost model. It doesn’t consider the total cost of ownership, and it doesn’t consider the advantage of real processing power, high-availability and multithreading like a demon.
This ebook takes a look at some of the practical applications of the Linux on Power platform and ways you might bring all the performance power of this open architecture to bear for your organization. There are no smoke and mirrors here—just hard, cold, empirical evidence provided by independent sources. I also consider some innovative ways Linux on Power will be used in the future.Get the Guide