Comparison of the LDAP and JNDI Models X.500 Overview LDAP v2 LDAP v3 JNDI Mapping LDAP Operations and JNDI Mapping LDAP Status Codes and JNDI Exceptions Security LDAP Authentication Authentication Mechanisms Anonymous Authentication Simple Authentication SASL Authentication Digest-MD5 Authentication CRAM-MD5 Authentication Callbacks for SASL Mechanisms GSS-API/Kerberos v5 Authentication Using Arbitrary SASL Mechanisms SSL and Custom Sockets Miscellaneous Protocol Versions Attributes Dereferencing Aliases Renaming Objects Storing Objects LDAP URLs Searches Context Search Methods Other Context Methods The LDAP "Compare" Operation Search Results Batch Size Referrals Referrals in the LDAP Referrals in the JNDI Ignoring Referrals Automatically Following Referrals Manually Following Referrals Creating and Updating Referrals Schema Overview Schema in the JNDI Object Class Definitions Attribute Type Definitions Attribute Syntax Definitions Attribute Matching Rule Definitions Two Practical Examples Controls and Extensions Controls Request Controls Context Request Controls Connection Request Controls Response Controls "Extended" Operations The Start TLS Extension Frequently Asked Questions Contexts Attributes Searches Names