Directory Services as the Foundation of Organizational Infrastructures

If you have followed any of my last six installments about LDAP, then you know we've taken a technical approach to the subject. I wrote the majority of the material in this series as part of an O'Reilly book entitled "Linux System Administration" or simply LSA. You can find a write-up on the book at this link.

The material on LDAP did not make it into LSA for a number of reasons. First, O'Reilly already has an excellent book on LDAP written by Gerald Carter. A 600 page book on Linux system administration doesn't need a repeat of existing work. Secondly, I found open source LDAP a strange animal with which to deal.

And that animal conjures up some interesting observations.

Linux and the open source community has many great projects. However, those projects have limitations in the context of a boundary based enterprise infrastructure. While Linux, as an example, does a beautiful job as an application platform, it lacks some essential elements for creating an enterprise environment capable of serving the needs of organizations. I blame that on a lack of vision and resources by and in the community. I see that as a niche in the competitive landscape.

Perhaps we know what to do to create a secure, manageable environment using Linux but others with extensive resources need to take on that monumental set of tasks required to turn the vision into reality. This is where we can discuss the context of a directory (LDAP) based infrastructure further.

An enterprise infrastructure is a collection of user accounts, groups, computers and other resources that share a common security boundary. Within that boundary, architects and system engineers must establish an environment that insures security and provides a concept known as least privilege. Least privilege and least rights means that any user has only those rights required for him or her to do their jobs and no more.

Directory based management does not always provide a common security boundary or the ability to lock down least privilege within the boundary. I look at Novell as a company with the tools necessary to provides an entire infrastructure with a common security boundary. But, Open Enterprise Server (OES) and Open Workgroup Suite are products for knowledge workers does not an enterprise make.

We can also vary for a moment from the enterprise and go right down to the local Linux PC. We could say that the lack of lock down policies at the local level are missing too. Also, where in the collection of computers users and accounts that would make up common security boundary does an administrator have the ability to provide a hierarchical set of policies that can carry through and override local and/or workgroup policies.Without that structure you can have an organization running amuck.

Going forward in the LDAP series, I want to tease out a theoretical model out further. We can call it a blue print, if you would like. It's an idea, in my opinion, whose time has come.

In this blog entry, I just wanted to make you aware of the possibilities.

Comments

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

Just to be sure:

Anonymous's picture

Just to be sure:
LDAP - lightweight directory access potocol, right?

Group Policy

Josiah's picture

I think something that touches on what you are talking about is group policy. The management capabilities related to group policy in AD is what eventually caused our switch from LDAP to AD. I'd like to see LDAP capable of handling that sort of thing easily and across platforms.

eDirectory and LDAP

kr_line's picture

We are using Novell Netware since more then 10 years in our world-wide company WAN. eDirectory is a GREAT advantage for ease of user rights management. With Novell moving slowly but steadily to Linux, we are looking forward to a more tightly integration of eDirectory (or LDAP) into Linux. Once a centralised and company-wide user-rights and security management is integrated with the distribution, this could be the most important leap forward for Linux to become the OS of choice for large companies.

Webinar
One Click, Universal Protection: Implementing Centralized Security Policies on Linux Systems

As Linux continues to play an ever increasing role in corporate data centers and institutions, ensuring the integrity and protection of these systems must be a priority. With 60% of the world's websites and an increasing share of organization's mission-critical workloads running on Linux, failing to stop malware and other advanced threats on Linux can increasingly impact an organization's reputation and bottom line.

Learn More

Sponsored by Bit9

Webinar
Linux Backup and Recovery Webinar

Most companies incorporate backup procedures for critical data, which can be restored quickly if a loss occurs. However, fewer companies are prepared for catastrophic system failures, in which they lose all data, the entire operating system, applications, settings, patches and more, reducing their system(s) to “bare metal.” After all, before data can be restored to a system, there must be a system to restore it to.

In this one hour webinar, learn how to enhance your existing backup strategies for better disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible bare-metal recovery solution for UNIX and Linux systems.

Learn More

Sponsored by Storix