LDAP Options, Subtrees and Composite attributes for Identity

DATE and TIME: Friday 26 May 2001, 10:00 - 11:00 am

CONVENER: Roland Hedberg, Michael Gettes

SCRIBE: Keith Hazelton

# of ATTENDEES: 10

Attendee

Institution

Roland Hedberg

Umea University

Benn Oshrin

Internet2 Middleware

Todd Piket

UMN

Michael Gettes

CMU

Billy Cook

Clemson U

Jeremy Grieshop

Clemson U

Jim Green

Michigan State

Michael Pelikan

Penn State

Emily Eisbruch

Internet2

Keith Hazelton

UW-Madison

MAIN ISSUES DISCUSSED

Take email address: (the "attribute option" specifies the intended use or purpose of each value of email address)

We agreed to call these structured attribute values "Guises", which is the term that Roland Hedberg popularized in Scandinavia

MichaelP We took a vote: Implement a separate DB that has same data as directory, use DB to provide "operational data store" services

KeithH: What about the Subentry approach, putting subtrees under the person object?

Roland, MichaelG: attribute options are SO much easier for the app developer; it also works with LDAP Browswer

Keith: Python module to get/set guises? The essential RESTfulness of subentries

MichaelP: person orgUnitDN, orgUnitPrimaryDN pointers to entries in the organizational hierarchy

Todd: I appreciate that...but

MichaelG: DSGW in 389directory; templating file for options...

Todd: ePPA from 8 institutions in the system

eduPersonScopedPrimaryAffiliation ? New eP attribute??

Billy Cook: The CU Vault at Clemson University

RolandH: we've been running directory services for 23 years. Sweden ended up with some not-very-specific guidelines on how to implement. Everyone does it differently still today. Lots of apps have very specific views of what should be in the LDAP directory. App-specific LDAP directories. We did it, but apps are becoming more intelligent, and don't assume they can dictate what is in the directory nowdays. Our LDAP directory is read-only except for SuperAdmins. Our ADs are provisioned from same source as LDAP. That's where writes happen.

JeremyG: Plugins to OpenLDAP seems to work well for transformation of attribute values

MichaelG: Big fan of 389; OpenLDAP is riddled with problems in a production env. Indices that get broken; Multi-master replication doesn't work. It's the code and not doing the proper locks, etc. 389 is open source.  There's a plug-in that does Kerberos right.

389 Directory Server, descended from Fedora Directory (Red Hat), descended from AOL, iPlanet, netscape, Dixie (Howes, Smith, Good). 389DS implementation is very close to Sun LDAP implementation.

KeithH: I'll ask RobCarter for permission to publish that Kerberos plugin for 389DS that he and Michael did.

Benn: Ordering of multivalued attributes would be a win, too.

MichaelG: Do you really want to standardize on the values or do you want people to pay attention to the capabilities and let them come up with their own solutions

Benn and Michael argue about standards and their value.

SUMMARY FROM REPORT OUT TO THE LARGER GROUP : Multiple approaches for handling structured data in LDAP, including composite attributes. OpenLDAP v. 389 v. others, and comparisons will be written up for reference...

ACTIVITIES GOING FORWARD / NEXT STEPS

[ACAMPScribe:Todd Piket] Send writeup of issue statement for eP{Scoped}PA

[ACAMPScribe:Roland, MichaelG, Keith] Writeup The Options: 1) Why would you ever want to do this in LDAP? attr. options, composite attributes, sub-entries, ... Start with use cases. Bake-off.

[ACAMPScribe:Keith] Ask Rob Carter for permission to use the 389DS plugin that he & Michael Gettes wrote to handle Kerberos "the right way".

REQUESTS

 
RESOURCES

 

 

  • No labels