Red Hat DIRECTORY SERVER 8.1 - DEPLOYMENT Deployment Manual page 4

Hide thumbs Also See for DIRECTORY SERVER 8.1 - DEPLOYMENT:
Table of Contents

Advertisement

Deployment Guide
8.1. About Security Threats ............................................................................................. 111
8.2. Analyzing Security Needs ......................................................................................... 112
8.3. Overview of Security Methods ................................................................................... 114
8.4. Selecting Appropriate Authentication Methods ............................................................ 115
8.5. Preventing Authentication by Account Deactivation ..................................................... 118
8.6. Designing a Password Policy .................................................................................... 118
8.7. Designing Access Control ......................................................................................... 125
8.8. Database Encryption ................................................................................................. 133
8.9. Securing Server to Server Connections ..................................................................... 134
8.10. Other Security Resources ....................................................................................... 134
9.1. Design Example: A Local Enterprise .......................................................................... 137
9.2. Design Example: A Multinational Enterprise and Its Extranet ....................................... 143
iv
137

Advertisement

Table of Contents
loading

Table of Contents