Overview #
LDAP is a method of communication protocol not an implementation of a server.NO Server implementation has all the features of LDAP v3 protocol implemented.
All Server implementation have there anomalies and features that may not return results as another Server implementation would.
Virtual Directory Vendors #
Vendor | Product |
---|---|
BMC Software | Acquired Calendra |
Oracle IDM | Acquired Octet String |
SAP | Acquired MaXware |
Radiant Logic | |
Symlabs | |
Optimal IDM![]() | Virtual Identity Server by Optimal IDM |
Privileged Account Management Vendors #
These products restrict access to the password associated with the account by enforcing its checkout and changing it frequently.Vendor | Product |
---|---|
Cloakware | |
Cyber-Ark | |
e-DMZ | |
Novell | Privileged User Management (now known as Privileged Account Management (PAM)) |
Enterprise Access Manager Product#
Vendor | Product |
---|---|
ActivIdentity | was ActivCard-acquired Protocom |
Passlogix | |
Computer Associates | eSSO - result of its acquisition of Platinum (which had acquired Memco) |
Novell | Novell Secure Login |
A History of LDAP #
Determine LDAP Server Vendor #
How can you tell which LDAP server is being used.More Information #
There might be more information for this subject on one of the following:- 1.3.6.1.4.1.4203.1.5.1
- A Schema for Logging the LDAP Protocol
- AMBIGUOUS_RESPONSE
- APPROXIMATE
- Access Control
- Access Log
- Account Expiration
- Administratively Disabled
- Alias
- Anonymous bind
- Apache Directory Project
- ApacheDS
- ApproxMatch
- AttributeSelection
- AttributeTypes
- Audio
- Best Practices For LDAP Naming Attributes
- Best Practices for LDAP Security
- BooleanMatch
- CA Directory
- COLLECTIVE Flag
- Changelog
- Cn=Monitor
- CollectiveAttributeSubentry
- Common Edirectory Bind Errors
- Comparing LDAP and SQL
- Component Syntax
- Connection ID
- Count Of Subordinates
- Counting Entries Within A LDAP Container
- DIT Chaining
- DIT Content Rule
- DIT Structure Rule
- DN Syntax
- DeathDate
- Determine LDAP Server Vendor
- Device Restrictions
- Differences between LDAP 2 and 3 Protocols
- DirectReports
- Directory System Agent
- DisplayName
- Distinguished Name Case Sensitivity
- Distinguished Names
- Draft-behera-ldap-password-policy
- Draft-howard-rfc2307bis
- Draft-sermersheim-ldap-subordinate-scope
- DynamicGroup
- EDirectory Synchronization
- ERROR_PASSWORD_EXPIRED
- Edirectory Anomalies
- Enable UserPassword in Microsoft Active Directory
- EntryUUID
- Extended Flags
- ExtensibleMatch
- ExtensibleObject
- Filtering for Bit Fields
- FirstChangeNumber
- GroupOfNames
- GroupOfUniqueNames vs groupOfNames
- InetOrgPerson
- Intruder Detection
- KeywordMatch
- LDAP
- LDAP Authentication
- LDAP Group
- LDAP Modify-Increment Extension
- LDAP Overview
- LDAP Query For Schema
- LDAP Referral
- LDAP Schema Element Extensions
- LDAP Search Scopes
- LDAP Searches
- LDAP and Bind Throttling
- LDAP filters Syntax and Choices
- LDAPSEARCH
- LDAP_CONSTRAINT_VIOLATION
- LDAP_INAPPROPRIATE_AUTH
- LDAP_MATCHING_RULE_BIT_AND
- LDAP_MATCHING_RULE_BIT_OR
- LDAP_MATCHING_RULE_IN_CHAIN
- LDAP_SERVER_PERMISSIVE_MODIFY
- LDAP_SERVER_RANGE_OPTION_OID
- LDAP_TYPE_OR_VALUE_EXISTS
- LDAP_UNWILLING_TO_PERFORM
- LDAPv3
- LDIF Sort Tools
- Last Login Time
- LdapStdCompliance
- Location Restrictions
- MatchingRule
- MemberOf
- Microsoft Active Directory
- Microsoft Active Directory Anomalies
- ModifyDNRequest
- Modrdn
- Monitor Entry
- NO-USER-MODIFICATION
- Not Synchronized
- Object Class Description
- Obtain a Certificate from Server
- OpenDJ
- Password
- Password Change
- Password Expiration
- Password History
- Password Maximum Age
- Password Policy
- Password Reset
- Password Storage Scheme
- Passwords
- Postal Address_LDAPSyntax
- Protocol Restrictions
- Pwd-Last-Set attribute
- PwdChangedTime
- PwdInHistory
- PwdLastSet
- Reliability
- Replication
- Retrieving All Attributes
- SLAPD
- Schema Checking
- Schema Extensions
- SchemaFlagsEx
- Search Filters Limitations
- Simple Authentication
- Simple and Protected GSSAPI Negotiation Mechanism
- SizeLimit
- SubordinateSubtree
- Subtree Delete Control
- Supported Extensions List
- SupportedSASLMechanisms
- Synchronization
- TelephoneNumberMatch
- Time Restrictions
- TimeLimit
- Understanding Name Forms
- Universally Unique Identifier
- VendorName
- VendorVersion
- Virtual Attribute
- X-HIDDEN
- X-ORIGIN