The Netscape/Sun/iPlanet LDAP servers were some of the lowest-performing 
servers around, especially when used for authentication/authorisation 
service. They were particularly poor at delivering the same relatively 
small set of data repeatedly to many servers - they performed better 
when used for large telephone-directory-like services, where requests 
were for scattered entries among millions.

AD used to be terrible at the 'telephone directory' (large data set) 
LDAP applications, but was tuned especially for the 'need the same small 
set of data delivered over and over' needs of authc/authz service. With 
Windows 2003 they improved the telephone directory style service, but 
have seriously improved the authc/authz performance as well (and removed 
some of the annoying data size limitations too).

If you have a large infrastructure to serve, I heartily recommend doing 
side-by-side comparisons of all proposed LDAP servers, using data that 
is as close to your production data set as possible, and simulating the 
probable client load.

And if you do this, pleases publish the results! I did my last tests a 
few years ago, and at that time nothing came close to AD for throughput, 
reliability, and scalability. However, I'm quite willing to be blown 
away by the next new kid on the block (or old kid with new Turbocharger :-)

I'd be especially thrilled to hear about an Open Source solution that 
really delivers in this area.

- Richard


Clif Smith wrote:
> I'm in a similar situation and am wondering if anyone has tried using the 389 
> Directory Server and it's AD password and group sync?  The 389 project is the 
> defendant to the Netscape|Sun|iPlanet|Fedora Directory Server and the open 
> source basis that the Red Hat Directory Server is built from.
>   - http://directory.fedoraproject.org/
>   - http://directory.fedoraproject.org/wiki/Howto:WindowsSync 
>
>  cjs
>
> On Jul 10, 2010, at 1:19 AM, Michael D. Parker wrote:
>
>   
>> The company that I am working for is embarking on replacing the current
>> locally developed NIS/YP structure with something LDAPish.
>>
>> We already have AD in house for the Windows stuff and would like to consider
>> using the AD system. The AD people are quite restrictive and would not
>> easily support extensive modifications.
>>
>> We have needs to have the replacement include the support the full
>> capabilities of the NIS/YP suite include netgroups, login restrictions to
>> specific servers for specific users or groups of users, consistent passwords
>> between the *nix and Windows environment,etc. Our environment is a mixture
>> of Linux (suse, RH, Debian), Sun, IBM, HP and MPRAS as well as a NETAPP. So
>> whatever we use must be totally inclusive to all environment.
>>
>> We have looked at Likewise, but our management wants other alternatives to
>> compare with.
>>
>> What other things should I be looking at and what is you assessment of the
>> alternative?
>>
>> Thanks for your assistance.
>>
>> _______________________________________________
>> Tech mailing list
>> Tech@lopsa.org
>> http://lopsa.org/cgi-bin/mailman/listinfo/tech
>> This list provided by the League of Professional System Administrators
>> http://lopsa.org/
>>     
>
>
> _______________________________________________
> Tech mailing list
> Tech@lopsa.org
> http://lopsa.org/cgi-bin/mailman/listinfo/tech
> This list provided by the League of Professional System Administrators
>  http://lopsa.org/
>   

_______________________________________________
Tech mailing list
Tech@lopsa.org
http://lopsa.org/cgi-bin/mailman/listinfo/tech
This list provided by the League of Professional System Administrators
 http://lopsa.org/

Reply via email to