X.500
X.500 is a compilation of standards developed for the directory services made to support electronic mail exchange. It is first developed by the ITU-T and was approved in 1988. Several protocols defined by the X.500 includes:
- DAP (Directory Access Protocol) - Protocol used to monitor the communication between the server and clients
- DSP (Directory System Protocl) - Protocol used to monitor the interaction between a Directory User Agent and a Directory System Agent or two or more Directory System Agents
- DISP (Directory Information Shadowing Protocol) - Used to monitor the shadowing of information within the Directory System Agent
- DOP (Directory Operational Bindings Management Protocol) - Protocol used to link up communications between two Directory System Agents
Some of the features of X.500 includes:
- Authentication
- Uses the X.509 Public Key Infrastructure (PKI) which allows for strong authentication
- Access Control - To prevent changes from being applied to data files and system resources
LDAP
The LDAP (Lightweight Directory Access Protocol) is an application protocol derived from the X.500 standard for accessing and maintaining distributed directory information through a Internet Protocol (IP) network. Some of the security features of LDAP includes:
- Limited authentication to authorized users only
- Secure Socket Layer (SSL) to protect data from being sniffed by hackers
- Non-intrusive data integration: Schema changes are not required and there are no data stored in the directory
- PKI (Public Key Infrastructure) - Allows for stronger authentication by utilizing strong encryption
Features of LDAP includes:
- Scalability: Allows for flexibility in scaling as it does not rely on a specific operating system; being vendor-independent, it allows for flexibility in upgrading hardware and software
- Availability: Retrieves information from different servers which stores the same directory contents. Should there be a problem in a certain server, other servers can still cater to the client.
- Security: By utilizing Secure Socket Layer (SSL) and access control lists (ACL), it increases security level by preventing unauthorized users from accessing into the network
- Manageability: Graphical User Interface (GUI) are implemented for simplicity and it is integrated into both the system administration and data administration. It also allows for changes in schema without extending into the directory schema.

Microsoft Active Directory
Microsoft Active Directory is a directory service created by Microsoft for Windows domain networks. It is designed to handle a large number of read and search operations in addition to implementing changes and updates. The active directory is a central location for network administration and security and it is responsible for authenticating and authorizing users into a Windows domain type network, implementing security policies for all devices and installing or updating software on network computers.
Some of the features of Microsoft Active Directory includes:
Some of the security features of Microsoft Active Directory includes:
Some of the features of Microsoft Active Directory includes:
- Simplified user and network resource management
- Directory consolidation
- Simple scalability
- Use of internet protocols and internet standards
- Interoperability with X.500 standard
- Compatible with LDAP
- Provides a single point for access in the network
Some of the security features of Microsoft Active Directory includes:
- Cross-Forest trust - Allows for trust between two different domains
- TLS support - Able to encrypt LDAP traffic
- WML filtering of Group Policy Object (GPOs) - Provide services that monitor the transmission between two different domains and WMI information can be used to determine whether a GPO should be applied.
- Delegation of administration - Simplified graphical user interface (GUI) for user account creation and account management.
- Directory object security
- Per property access control
- Per property auditing
- Organization units (OUs) - To separate users, groups and computers in separate containers.
References
http://searchnetworking.techtarget.com/definition/X500
http://docs.oracle.com/javase/jndi/tutorial/ldap/models/x500.html
http://support.novell.com/techcenter/articles/img/dnd1998070201.gif
http://msdn.microsoft.com/en-us/library/aa913688.aspx
http://searchmobilecomputing.techtarget.com/definition/LDAP
http://technet.microsoft.com/en-us/library/cc737139%28WS.10%29.aspx
http://www.centrify.com/downloads/public/centrify_wp_active_directory.pdf
http://technet.microsoft.com/en-us/library/cc737139%28WS.10%29.aspx
http://searchmobilecomputing.techtarget.com/definition/LDAP
http://technet.microsoft.com/en-us/library/cc737139%28WS.10%29.aspx
http://www.centrify.com/downloads/public/centrify_wp_active_directory.pdf
http://technet.microsoft.com/en-us/library/cc737139%28WS.10%29.aspx