Specifications
4 Contents
36 Custom Search Policies
36 Search Policies for Authentication and Contacts
37 Chapter 3: Open Directory Authentication
37 About Password Types
38 Authentication and Authorization
38 About Open Directory Passwords
39 About Shadow Passwords
39 About Crypt Passwords
40 Providing Secure Authentication for Windows Users
40 Oine Attacks on Passwords
41 Determining Which Authentication Option to Use
42 About Password Policies
43 About Single Sign-On Authentication
43 About Kerberos Authentication
44 Breaking the Barriers to Kerberos Deployment
45 Single Sign-On Experience
45 Secure Authentication
46 Moving Beyond Passwords
47 Multiplatform Authentication
47 Centralized Authentication
47 About Kerberized Services
47 Conguring Services for Kerberos After Upgrading
48 About Kerberos Principals and Realms
49 About the Kerberos Authentication Process
50 About Open Directory Password Server and Shadow Password Authentication
Methods
52 Disabling Open Directory Authentication Methods
53 Disabling Shadow Password Authentication Methods
54 Contents of the Open Directory Password Server Database
54 LDAP Bind Authentication
55 Chapter 4: Open Directory Planning and Management Tools
55 General Planning Guidelines
58 Estimating Directory and Authentication Requirements
59 Identifying Servers for Hosting Shared Domains
60 Replicating Open Directory Services
61 Replica Sets
61 Cascading Replication
62 Planning the Upgrade of Multiple Open Directory Replicas
63 Load Balancing in Small, Medium, and Large Environments
63 Replication in a Multibuilding Campus
64 Using an Open Directory Master, Replica, or Relay with NAT