Download Active Directory Programming by Gil Kirkpatrick PDF

By Gil Kirkpatrick

Lively listing Programming offers you the entire details had to faucet into the energetic listing out of your personal courses. After being supplied with the basis of the way the energetic listing works, you can be taught either the way to layout and the way to create energetic listing enabled functions. This comprises precise discussions at the diverse programming interfaces that may be used. The ebook additionally comprises ADSI and LDAP references that make this a convenient source if you are imposing energetic listing recommendations. assurance contains: lively listing basics, gaining access to energetic listing with LDAP, getting access to energetic listing with the energetic listing providers Interface (ADSI), The Contents of lively listing, lively listing protection, and extra.

Show description

Read or Download Active Directory Programming PDF

Similar windows desktop books

Windows Administration Resource Kit: Productivity Solutions for IT Professionals

Get the excellent, crucial source for making improvements to home windows administrator productiveness. This ebook can provide options to the typical concerns home windows directors face on a daily basis. in contrast to different administrator assets to be had that conceal gains and performance of home windows Server® and the home windows purchaser working approach, this exact consultant offers the instruments that assist you do extra with much less and utilize some time.

Windows 7: in Unternehmensnetzen mit Service Pack 1, IPv4, IPv6

Der Autor stellt die Systemarchitektur, die Einrichtung und den Betrieb von home windows 7 in Unternehmensumgebungen sowie Änderungen und Neuerungen im Vergleich zu früheren Windows-Versionen dar. Das Buch wendet sich an Systemadministratoren und specialists, die bereits Erfahrung mit der Verwaltung von Windows-Systemen haben und die neue Windows-Version kennenlernen möchten.

Microsoft Exchange Server for Windows 2000 : planning, design and implementation

Offers innovations and strategies to layout, set up and mange an alternate Server operation. Describes trade " top practices" built by means of writer and his colleagues at Compaq. summary: presents strategies and techniques to layout, installation and mange an alternate Server operation. Describes alternate " most sensible practices" constructed by way of writer and his colleagues at Compaq

Extra info for Active Directory Programming

Sample text

211 Why COM? 212 What's the Big Idea? 212 The Components of COM 212 Getting Started with ADSI 220 Setting Up Your Machine 220 The ''Hello, World" ADSI Program 222 Special COM Data Classes 226 A Note on Exceptions with _bstr_t and _variant_t 227 The _bstr_t Class 228 The _variant_t Class 228 The _com_error Class 228 Binding to Active Directory Objects 228 ADsPaths 228 Serverless Binding with ADSI 230 Binding to a Directory Object by GUID 231 What Happens When You Bind to a Directory Object? 231 Fast Binding with ADSI 232 Binding with the Helper Functions ADsGetObject() 232 Binding with the Helper Functions ADsOpenObject() 237 Binding with the IADsOpenDSObject::OpenDSObject() Function 241 12 Basic Active Directory ADSI Interfaces 245 The ADSI Directory Object Interfaces 246 The IADs Interface 246 The IADsPropertyList Interface 271 Page xi The IADsPropertyEntry Interface 276 The IADsPropertyValue Interface 277 The IADsPropertyValue2 Interface 279 The IDirectoryObject Interface 279 The IADsContainer Interface 287 The IADsDeleteOps Interface 303 13 Searching Active Directory with ADSI 307 Introduction to Searching with ADSI 307 Specifying a Search Base 308 Search Filter 308 Specifying Attributes to Return 309 Objects as Rows 309 Attributes as Columns 309 The IDirectorySearch Interface 309 Starting and Ending a Search with IDirectorySearch 310 Terminating a Search with IDirectorySearch::CloseSearchHandle() 313 Retrieving Objects with IDirectorySearch::GetNextRow() 314 Retrieving Attributes with IDirectorySearch::GetNextCol() and IDirectorySearch::GetColumn() 316 A Simple Search Using IDirectorySearch 319 Extended Searches Using Search Preferences 322 Synchronous and Asynchronous Searching with IDirectorySearch 327 Paged Searches Using IDirectorySearch 329 Sorting Search Results with IDirectorySearch 330 Enabling and Disabling the Results Cache with IDirectorySearch 333 Setting Limits on Searches with IDirectorySearch 334 14 Accessing Users, Groups, and Organizations with ADSI 341 Accessing User Objects with ADSI 342 The IADsUser Interface 342 Getting a User's Name with IADsUser 347 Locking a User Account with IADsUser 350 Setting a User Password with IADsUser 352 Accessing Groups with ADSI 353 The IADsGroup Interface 354 The IADsMembers Interface 359 Accessing Organizations, Localities, and Organizational Units with ADSI 367 The IADsO, IADsOU, and IADsLocality Interfaces 367 Getting the Description of an Organization 369 Enumerating the Contents of an O or OU 371 Page xii 15 Accessing the Active Directory Schema with ADSI 373 A Tale of Two Schemas 373 Which Version of the Schema Should You Use?

3 subject : Application software--Development, Directory services (Computer network technology) Page i Active DirectoryTM Programming Gil Kirkpatrick Page ii Disclaimer: This netLibrary eBook does not include the ancillary media that was packaged with the original printed version of the book. Active DirectoryTM Programming Copyright ©2000 by Sams Publishing All rights reserved. No part of this book shall be reproduced, stored in a retrieval system, or transmitted by any means, electronic, mechanical, photocopying, recording, or otherwise, without written permission from the publisher.

It provided VINES with several significant advantages over its nondirectory-enabled competition. Ultimately, all these advantages boiled down to reducing the costs of running a large enterprise network (referred to now as TCO, Total Cost of Ownership). This is still the primary reason for deploying network directories today. Single Sign-On The ability to log in to a network once, with a single user name and password, has been a goal of corporate network administrators since the first network-enabled applications hit the market in the early 1980s.

Download PDF sample

Rated 4.82 of 5 – based on 22 votes