HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual S 2.151 Design of an NDS concept

S 2.151 Design of an NDS concept

Initiation responsibility: Head of IT Section, IT Security Management

Implementation responsibility: IT Security Management, Administrators

One of the most important new features in Novell Netware  4.x are the Novell Directory Services (NDS). NDS are used to manage the logical structure of a network and all the resources contained therein, such as users, groups, printers and Netware servers.

NDS technology replaces the bindery which was used in Netware 2.x and Netware  3.x. The bindery contains a one-dimensional list of all users, groups etc. However, if several Netware  3.x servers are in use, the administrator faces the "problem" of having to manually perform every modification (for example, the addition of a user) on every Netware  3.x server, that is to say on all servers for which a user is to be granted access rights.

In contrast, the Novell directory services are independent of any particular server and based exclusively on the underlying network. This means that administrative activities, such as configuration of a user account, are performed by the Novell directory services on all affected servers, without the need for manual intervention by the administrator.

The resources are managed in a database using a tree structure; this structure is thus also termed NDS tree. In this tree, all users, groups, printers, Netware servers etc. are managed as objects of an NDS directory database. A distinction is made between two types of objects here: container objects and leaf objects. Whereas a leaf object is located at the end of a branch and does not contain any further objects, a container object can contain additional containers or leaf objects.

The following container objects exist, among others:

Leaf objects include, for example, users, groups, printers, servers and data volumes. It is not possible to create additional objects under leaf objects. The following leaf objects are used most frequently:

A detailed description of the remaining leaf objects is provided in Netware manuals. There are no restrictions on the number of objects, as objects can be added or deleted by applications.

As already mentioned, the directory objects and their attributes are managed in a database which constitutes an essential element of the NDS. In networks possessing WAN links, it is advisable to partition this database into logical segments which are then copied to various Netware servers. When planning the replications, it is important to take slow WAN links into account.

This logical segmentation is termed partitioning. The process of copying logical segments to Netware servers is termed replication.

Every partition consists of at least one container object and any additional objects contained therein. Additionally, several read or read/write copies of a partition, but only one master partition, can exist.

The physical partitioning of the NDS is transparent for users, i.e. internal Netware mechanisms ensure that this partitioning is not noticed by the users.

In principle, the design of a NDS directory tree is not subject to any restrictions, so that any type of form and degree of complexity is possible. However, careful and thorough planning is required here in compliance with the following basic guidelines:

Planning of the NDS is decisively influenced not by the size of the network, but by the characteristics of the environment, such as the hardware, communications links, LAN/WAN topology and organisational structure. For example, a greater amount of planning is required for a small network with several WAN links than for a large network without any WAN links, as unique physical attributes are related to the different types of WAN architecture. At least the following items should be covered during planning:

For more information on NDS planning, refer to Novell's Manual on Netware 4 networks, which provides a detailed description of the implementation of a Netware  4.x network.

Additional controls:


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
July 1999
home