JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Oracle Directory Server Enterprise Edition Deployment Planning Guide 11g Release 1 (11.1.1.5.0)
search filter icon
search icon

Document Information

Preface

Part I Overview of Deployment Planning for Directory Server Enterprise Edition

1.  Introduction to Deployment Planning for Directory Server Enterprise Edition

2.  Business Analysis for Directory Server Enterprise Edition

Part II Technical Requirements

3.  Usage Analysis for Directory Server Enterprise Edition

4.  Defining Data Characteristics

5.  Defining Service Level Agreements

6.  Tuning System Characteristics and Hardware Sizing

7.  Identifying Security Requirements

Security Threats

Overview of Security Methods

Determining Authentication Methods

Anonymous Access

Simple Password Authentication

Simple Password Authentication Over a Secure Connection

Certificate-Based Client Authentication

SASL-Based Client Authentication

Preventing Authentication by Account Inactivation

Preventing Authentication by Using Global Account Lockout

External Authentication Mappings and Services

Proxy Authorization

Designing Password Policies

Password Policy Options

Password Policies in a Replicated Environment

Password Policy Migration

Password Synchronization With Windows

Determining Encryption Methods

Securing Connections With SSL

Encrypting Stored Attributes

What Is Attribute Encryption?

Attribute Encryption Implementation

Attribute Encryption and Performance

Designing Access Control With ACIs

Default ACIs

ACI Scope

Obtaining Effective Rights Information

Tips on Using ACIs

Designing Access Control With Connection Rules

Designing Access Control With Directory Proxy Server

How Connection Handlers Work

Grouping Entries Securely

Using Roles Securely

Using CoS Securely

Using Firewalls

Running as Non-Root

Other Security Resources

8.  Identifying Administration and Monitoring Requirements

Part III Logical Design

9.  Designing a Basic Deployment

10.  Designing a Scaled Deployment

11.  Designing a Global Deployment

12.  Designing a Highly Available Deployment

Part IV Advanced Deployment Topics

13.  Using LDAP-Based Naming With Solaris

14.  Deploying a Virtual Directory

15.  Designing a Deployment With Synchronized Data

Index

Proxy Authorization

Proxy authorization is a special form of access control. Proxy authorization or proxy authentication is when an application is forced to use a specific username/password combination to gain access to the server.

With proxy authorization, an administrator can request access to Directory Server by assuming the identity of a regular user. The administrator binds to the directory with his own credentials and is granted the rights of the regular user. This assumed identity is called the proxy user. The DN of that user is called the proxy DN. The proxy user is evaluated as a regular user. Access is denied if the proxy user entry is locked or inactivated or if the password has expired.

An advantage of the proxy mechanism is that you can enable an LDAP application to use a single bind to service multiple users who are accessing Directory Server. Instead of each user having to bind and authenticate, the client application binds to Directory Server and uses proxy rights.

For more information, see Chapter 6, Directory Server Access Control, in Oracle Directory Server Enterprise Edition Administration Guide.