S 3.62 Training on the administration of directory services

Initiation responsibility: Head of IT, IT Security Officer

Implementation responsibility: Administrator, Head of IT

The administration of a directory service requires detailed knowledge of the technology, of the basic concepts, as well as of the product used. If the administrators do not possess such knowledge, then this could quickly result in faulty configurations having a serious impact on security in the organisation. For this reason, the corresponding administrators must receive adequate training in this area.

Contents of the training program

Depending on the size of the network, the administration of a directory tree will generally be performed by a whole group of administrators with special tasks and spheres of activity rather than by a single administrator. This means that not all administrators of a directory will require the same kind of training. However, to guarantee secure operation, every administrator will need to have sufficient knowledge of the basics of the underlying operating systems in order to place his/her own tasks within the overall context.

Training programs should always contain the following main points and explain each point. The depth to which a given administrator will need to study the individual aspects depends on his qualifications and on the type of work he will be performing.

If decisions regarding role-based administration and the delegation of administration tasks need to be made when planning directory services, then the administrators also need to be trained accordingly for their particular tasks. Special emphasis should be placed on the group of schema administrators because these administrators have the ability to change the entire design of the directory tree database.

Administration of the directory service client software and LDAP access requires detailed knowledge of the configuration options of the system. The underlying operating system also plays a role in the definition of a security environment, especially for the file system security.

Review questions: