Show Table of Contents
Chapter 9. Designing a Secure Directory
How the data in Red Hat Directory Server are secured affects all of the previous design areas. Any security design needs to protect the data contained by the directory and meet the security and privacy needs of the users and applications.
This chapter describes how to analyze the security needs and explains how to design the directory to meet these needs.
9.1. About Security Threats
There are many potential threats to the security of the directory. Understanding the most common threats helps outline the overall security design. Threats to directory security fall into three main categories:
- Unauthorized access
- Unauthorized tampering
- Denial of service
9.1.3. Denial of Service
In a denial of service attack, the attacker's goal is to prevent the directory from providing service to its clients. For example, an attacker might use all of the system's resources, thereby preventing these resources from being used by anyone else.
Directory Server can prevent denial of service attacks by setting limits on the resources allocated to a particular bind DN. For more information about setting resource limits based on the user's bind DN, see the "User Account Management" chapter in the Red Hat Directory Server Administration Guide.