JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Oracle Directory Server Enterprise Edition Developer's Guide 11 g Release 1 (
search filter icon
search icon

Document Information


Part I Directory Server Plug-In API Guide

1.  Before You Start Writing Plug-Ins

2.  Changes to the Plug-In API Since Directory Server 5.2

3.  Getting Started With Directory Server Plug-Ins

4.  Working With Entries Using Plug-Ins

5.  Extending Client Request Handling Using Plug-Ins

6.  Handling Authentication Using Plug-Ins

How Authentication Works

Support for Standard Methods

Client Identification During the Bind

Bind Processing in Directory Server

How Directory Server Processes the Bind

How a Plug-In Modifies Authentication

Bypassing Authentication

Using Custom SASL Mechanisms

Developing a Simple Authentication Plug-In

Locating the Simple Authentication Example

Seeing the Plug-In Work

To Set Up an Example Suffix

To Register the Plug-In

To Bypass the Plug-In

To Bind as an User

Developing a SASL Authentication Plug-In

Locating SASL Examples

Registering the SASL Mechanism

Developing the SASL Client

Trying the SASL Client

7.  Performing Internal Operations With Plug-Ins

8.  Writing Entry Store and Entry Fetch Plug-Ins

9.  Writing Extended Operation Plug-Ins

10.  Writing Matching Rule Plug-Ins

11.  Writing Password Storage Scheme Plug-Ins

12.  Writing Password Quality Check Plug-Ins

13.  Writing Computed Attribute Plug-Ins

Part II Directory Server Plug-In API Reference

14.  Data Type and Structure Reference

15.  Function Reference, Part I

16.  Function Reference, Part II

17.  Parameter Block Reference

A.  NameFinder Application

Prerequisite Software

Deploying NameFinder

Configuring NameFinder to Access Your Directory

Customizing NameFinder


Chapter 6

Handling Authentication Using Plug-Ins

This chapter explains how to write a plug-in that adds to, bypasses, or replaces the authentication mechanisms that Directory Server supports. The chapter demonstrates the use of existing mechanisms for authentication. You must adapt the code examples to meet your particular authentication requirements.


Caution - The examples alone do not provide secure authentication methods.

This chapter covers the following topics: