Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
INTRODUCTION What is a Web-Enabled Database? Problem and its Importance Two-tier Architecture Three-tier Architecture Need for a compatible centralized directory service REPRESENTATIVE EXAMPLE NASA maintains a very huge database of users. Two-tier cannot be applied because of sensitive information. Three-tier suits it but querying is complex X.500 (Directory Service) is now used. RELATED WORKS The three-tier architecture implementation With new requirements of Internet computing and new e-business technologies, there is a growing need for a common infrastructure to serve as a foundation for management and configuration of all data and resources on the network What could be the solution to this countless increase?? RELATED WORKS ..contd A directory service provides a key part of this common foundation, by providing a centralized vehicle for managing and configuring distributed, Heterogeneous networks most organizations today are not looking for another directory service Organizations are facing security concerns such as how to expose only the information they want to, as well as access control RELATED WORKS ..contd decentralized, incompatible directory services do not make it easy to articulate and enforce security policies There are many different ways to provide a Centralized directory service directory services are local, providing service to a restricted context , other services are global, providing service to a much broader context, RELATED WORKS ..contd. One useful directory service is the X.500. . Called the Directory Access Protocol (DAP), it is layered on top of the Open Systems Interconnection (OSI) protocol stack LIMITATIONS There is a need for a X.500 type of directory Internet runs over TCP/IP X.500 runs over OSI Need to include the features of X.500 in a new directory service and still run over TCP/IP The Directory Access Protocol (DAP) was improved into a Lightweight Directory Access Protocol (LDAP). SOLUTION- LDAP All Internet applications have a common problem: Security . Also the need for centralization. The solution is Directory Services which can be used to administer Internet, intranet or extranet. It should also reduce the total cost and points of failure ( because of 3 tier architecture) Lightweight Directory Access Protocol (LDAP) represents the emerging solution SOLUTION - OID Many LDAP compliant directories are Oracle Internet Directory(OID), Microsoft Active Directory, Novell Directory Service and the Netscape Directory Server. Chosen Directory is the Oracle Internet Directory Features Scalable: It scales to support over half a billion real-world directory entries High Availability: administrators have the ability to administer the directory from other server to perform functions Secure: It offers comprehensive and flexible support for directory access control. . OID implements three levels of user authentication SOLUTION-ILLUSTRATION Example of a person say “X” staying in Columbia The method he uses to reveal his details in India to a known person The Intermediate involved here in another place, say Chicago SOLUTION- CLIENT ACCESS TO A DATABASE A Client initiates a connect request providing a connect identifier The connect identifier retrieves a connect descriptor (eg. Port number hostname, protocol, instance,…) stored in Oracle Internet Directory, which is sent back to the client. The client makes the connect request to the address provided in the connect descriptor.\ A listener receives the request and directs it to the server SOLUTION-LDAP The concept of Oracle Internet Directory, a virtual directory, is an additional feature to this architecture to enhance its security An LDAP directory service provides a number of stringent security mechanisms. Directory users must first authenticate themselves to the directory using either a username and password or an SSL/X.509 release 3 certificate (through a bind operation). Once the user has been authenticated, the information he can access is still further constrained by using an access control list. SOLUTION-IMPLEMENTATION OF LDAP Directory Information Tree SOLUTION-AUTHENTICATION AND ACCESS CONTROL IN LDAP Initiation of a request by a client The LDAP searches in the OID to check whether the client actually exists or not. Accordingly it sends or doesn’t send an instance back. The privileges that are ascribed to the particular user are then enabled and sent back through the instance. It doesn’t allow unauthorized access privileges since the privileges were enabled prior to the client accessing the database. PRACTICAL IMPLEMENTATION- DATABASE CREATION Create a database Global database name: miracle1 SID: miracle1 Oracle Enterprise Edition 8.1.7 was installed in a typical installation mode the Oracle Internet Directory in the database was custom installed. CHECK THE DATABASE To check whether the database has been created and could be started or not. Use the server manager to perform administrative functions Server manager in line mode: svrmgrl ; Password: internal LISTENER The listener has to be started here. The name of the listener configured here is :LISTENER Type lsnrctl at the command prompt CONNECTION TO THE DATABASE It has to be ensured whether it is possible to logon to the database using the net service (here net8) Test Connect as system/manager LDAP STARTS To enable the creation of variables and commands of LDAP run the newldap.sql file from the svrmgrl prompt. It will create all the variables. At this stage, the server is running, the net service (miracle1.engr.sc.edu) is running and the client can connect to the database as seen from the test. OID CONFIGURATION Run a batch file postconfig.bat from the command prompt for the OID to start configuring. The OID configuration starts. MONITOR AND SERVER Start the OID monitor using the command oidmon connect=miracle1(database name) sleep =10 start. Start the LDAP server oidctl connect=miracle1.engr.sc.edu server=oidldapd instance=3 configset=5 start ORACLE DIRECTORY MANAGER Once this is started, it is now possible to add entries into the OID There are three kinds of logons – anonymous, simple and SSL. Simple login is orcladmin/welcome ORACLE DIRECTORY MANAGER ODM ADDING ENTRIES It can now be used to add entries. Entries added through the command line. ADDING ENTRIES The LDAP Data Interchange Format (LDIF ) file. NEW ENTRY The added entries NEW ENTRY New Entries ACCESS CONTROL Specifying Access Controls ACCESS CONTROL Failed attempt. CREATIONS Possibility to create new object classes as well as attributes ORACLE DIRECTORY MANAGER Schema Management CONCLUSION Lightweight Directory Access Protocol (LDAP) seems to be the most probable solution in the present scenario The database can be easily configured with LDAP than any other independent directory service LDAP offers a very good authentication service CONCLUSION Reduces the chance of a denial of service attack Example: say a billion users are there 50 million are genuine users 50 million are non-genuine LDAP also implements the access control policy of the enterprise LIMITATIONS IN LDAP The protocol cannot and will not supplant relational databases It does not offer two-phase commits, true relational structure, or a relational query language like SQL. It is not reasonable to expect LDAP to serve as a file system LIMITATIONS IN LDAP It is developed mainly to serve as a simple look-up protocol . LDAP for specific applications which involve frequent updates, etc… wouldn’t be the right choice. Research should be concentrated on developing a similar protocol, which is equally simple and able to overcome the limitations cited above. LDAP at GMU LDAP at GMU Shooooot !!!