Table of Contents

LDAP Controlled Access Point Systems

—Brian J. Ewanyk

Objectives

Background

Utilizing an LDAP database, construct a multi virtual machine system to take input from an outside perhipheral (RFID Reader), verify the signature, log the activity, and permit or deny access based on the results of the query…

Prerequisites

Materials

Procedure

  1. Configure Server
  2. Install Unix Server OS on Server
  3. Install LDAP packets on Server
  4. Swear
  5. Patch
  6. Pray
  7. Swear
  8. Throw Things
  9. Give up
  10. Take a deep breath and start again.
  11. Pay a professional company for a preconstructed system.
  12. Try to return it without a receipt.
  13. Swear More.
  14. Wipe the system and start again…

References

LDAP Wikipedia

What is LDAP?

Open LDAP Main Page

Introduction to LDAP

An LDAP Roadmap

Tech Notes : RJ Systems