T 2.71 Lack of, or inadequate, planning of LDAP access to Novell eDirectory

The LDAP access option to a directory service of eDirectory is an essential feature of the software product. Access by the users is performed using the LDAP v3 protocol constituting a widely spread internet standard. Operators using eDirectory as an eBusiness platform normally provide their users with special clients. Simple web browsers or email clients may also act as LDAP clients, however.

The LDAP interface is also suitable to be used by network applications and their services for accessing the directory service. This access requires detailed planning, particularly in terms of the eDirectory rights needed to use the applications reasonably.

Therefore, planning the LDAP access mainly depends on the operation scenario of the eDirectory. As a matter of principle, there are three different types of connection for an LDAP client from the eDirectory's point of view:

During the planning phase, it must be taken into consideration whether and which data may be transmitted in plain text in accordance with the organisation's internal security policies. This is applicable for the use on the intranet and particularly for connection to the internet.

For example, this is a question as to whether user passwords may be transmitted in plain text and how consistently the use of SSL encryption is implemented. This way, eDirectory supports two types of connection in accordance with the LDAP v3 standard:

Additionally, LDAP is protected with the help of SSL. On the eDirectory, it must be configured whether or not the first two types of connection are supported.

Furthermore, SSL is supported on two modes: unilingual and bilingual authentication. For bilateral authentication, the required credentials must be generally accessible; amongst other things, the root certificate of the certificate authority.

The variety of the configuration options for LDAP access to the eDirectory directory service described above may quickly result in misconfigurations. Consequences of such misconfigurations may include: