1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
-BARSIC- [3]
2 years ago
6

Active directory and 389 directory server are both compatible with which directory access protocol?

Computers and Technology
1 answer:
bulgar [2K]2 years ago
5 0

Active directory and 389 directory server are both compatible with Lightweight Directory Access Protocol.

<h3>What is Lightweight Directory Access Protocol?</h3>

The Lightweight Directory Access Protocol exists as an open, vendor-neutral, industry standard application protocol for accessing and supporting distributed directory information services over an Internet Protocol network.

LDAP stands used in Microsoft's Active Directory, but can also be utilized in other tools such as Open LDAP, Red Hat Directory Servers, and IBM Tivoli Directory Servers for example. Open LDAP exists as an open source LDAP application. It is a Windows LDAP client and admin tool designed for LDAP database control.

It reserves usernames, passwords, and other core user identities. It utilizes this data to authenticate users when it receives requests or queries and shares the requests with other DSAs.

Hence, Active directory and 389 directory server are both compatible with Lightweight Directory Access Protocol.

To learn more about Lightweight Directory Access Protocol refer to:

brainly.com/question/27960956

#SPJ4

You might be interested in
You've finished programming the app! Now your company has to decide whether to use an open source
pishuonlain [190]

Answer:

Proprietary License gives you full ownership and trademark/patent opportunites. Open source allows for code donation and a community based development for your app. Generally speaking, if your a private entity creating an app for a client, you'll need the Proprietary Licence, which will allow you to sell the codebase to your client.

If your creating an app for your company as itself, you go either way, sell the license in licensing agreements, or have your companies community contribute and better your app from the inside.

Its entirely based on the agreements you set for the app.

5 0
3 years ago
Alice's public key, and sends back the number R encrypted with his private key. Alice decrypts the message and verifies that the
Agata [3.3K]

There are different kinds of keys. The identities of Alice and Bob are verified in this protocol.

<h3>What is public and private key in SSL?</h3>

These keys are known to be a kind of related pair of text files and they are often made together as a pair if one makes their Certificate Signing Request (CSR).

Note that the private key is different file that is often used in the encryption/decryption of data so as to sent a file between one's server and the connecting clients.

Learn more about  public/private key from

brainly.com/question/8782374

3 0
2 years ago
Objectives ** WILL GIVE BRAINIST PLEASE**
mamaluj [8]

Answer:

of which std this question is

8 0
3 years ago
Read 2 more answers
Low-level languages allow programmers to concentrate on the tasks they want to perform with their program rather than the detail
Gnom [1K]

Answer:

False.

Explanation:

The answer is the opposite, low level languagues are intended to allow the programmer full control of the cpu process, and perfomance.

But the disadvantages are: requires high level of expertise, its hard to program complex task.

High level languages allow programmers to concentrate in the task.

5 0
3 years ago
Susie lives alone in New York where is her family lives in Florida
snow_tiger [21]

Answer:

susie moved from her family

Explanation:

3 0
3 years ago
Read 2 more answers
Other questions:
  • A person can receive an electric shock by
    15·2 answers
  • What does a company’s code of ethics cover
    8·2 answers
  • A bitmap picture can be represented by hexadecimal numbers. Each two-digit hexadecimal number represents a row. To convert a num
    14·1 answer
  • When you right-click a word with a red squiggly line under it, which of the following displays?
    12·2 answers
  • Network administrators use _______ technology to get antivirus updates to be automatically downloaded on employees' workstations
    15·1 answer
  • ) The _____ method of a radio button returns true if that button is on.
    13·1 answer
  • SOMEBODY HELP ME ASAP PLEASE AND THANK YOU
    14·2 answers
  • Window is a very popular operating system becouse of its _ environment .​
    14·2 answers
  • Select the correct answer.
    5·1 answer
  • What are some of the key system-oriented trends that have fostered is-supported decision making to a new level?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!