AZSAGE Wednesday July 10 th: LDAP as an Authentication Method in the Enterprise (fwd)

der.hans plug-discuss@lists.plug.phoenix.az.us
Wed, 10 Jul 2002 01:50:06 -0700 (MST)


  This message is in MIME format.  The first part should be readable text,
  while the remaining parts are likely unreadable without MIME-aware tools.
  Send mail to mime@docserver.cac.washington.edu for more info.

------_=_NextPart_000_01C22225.7BB41910
Content-Type: TEXT/PLAIN; CHARSET=US-ASCII
Content-ID: <Pine.LNX.4.44.0207100149241.7677@spliff.LuftHans.com>

moin, moin,

talk on LDAP tonight.

Info below.

ciao,

der.hans

-- 
#  https://www.LuftHans.com/
#  It's up to the reader to make the book interesting.
#  An author has only the opportunity to make it uninteresting. - der.hans

---------- Forwarded message ----------
Date: Tue, 2 Jul 2002 17:06:30 -0700
From: terry.krueger@honeywell.com, AZSAGE <steering@azsage.org>
Reply-To: steering@azsage.org
To: azsagel@pcslink.com
Subject: AZSAGE Wednesday July 10 th: LDAP as an Authentication Method in
    the Enterprise

**********************************
If you or your business would be interested in assisting AZSAGE, it is
greatly appreciated...
	- The use of facilities for events.
	- Donations of small gifts (books, t-shirts, Company Logo Goodies,
etc.)
	that can be given-a-way to members during our educational events.
	- Food/Beverages - AZSAGE members are always happy to have a small
snack to eat at events.

********************************
Event Information:

	September 11 (Wednesday)
	RISK Management Security by Carol Urban

	November 13 (Wednesday)
	Highlighting Disaster Recovery Opportunities by Steve Greenberg

********************************
****AZSAGE Wednesday July 10th***************************
LDAP as an Authentication Method in the Enterprise

Sponsored by: IBM - http://www.ibm.com/us/

**********************************************************************
Date:			Wednesday, July 10th , 2002

TIME:            		6:30 - 7:00 PM Sign-in
                		7:00 - 7:10 PM AZSAGE Announcements
                		7:10 - 8:30 PM LDAP as an Authentication
Method in the Enterprise

LOCATION:  		IBM

ADDRESS:		2929 N. Central Ave., Phoenix AZ 85012
			Room 202
			Note:  Parking fees (tickets) are not be validated.
			Therefore, parking fees are the responsibility of
the individual.

CONTACTS:		steering@azsage.org

PRESENTERS:     	Zach Parker

BEVS/FOOD:		Sponsor by SCB - http://www.scb.com/

PRIZES:

				 THANKS EVERYONE !
		*****
				O'Reilly & Associates -
http://www.oreilly.com/
*	Managing NFS and NIS
*	Solaris 8
*	UNIX in a Nutshell
*	Free as in Freedom
				 <<Newsletter from O'Reilly UG Program, June
28>>
				To Review Press releases
http://press.oreilly.com/
				Don't forget about the 20% User Group
discount from O'Reilly 1-800-998-9938 x339 code DSUG
			*****
				SCB - http://www.scb.com/
*	Misc. gift give-a- ways
				SCB Computer Technology, through its
Phoenix-based Enterprise ServiceSolutions[sm] Group, provides application
infrastructure management and dedicated online computing services for
several Fortune 1000 companies located in the Phoenix area.
				*****
		StorNet, Inc. - www.StorNet.com
*	Misc. gift give-a- ways
				StorNet is a leading nationwide provider of
storage services - focused on delivering  comprehensive storage solutions to
solve today's business problems.
				*****
				Sun Microsystems - www.sun.com
*	Sun Hardware Tool Box Kits

				"Sun Microsystems is a leading provider of
industrial-strength hardware, software, and services worldwide."


FOR YOUR INTEREST...
 <<11th USENIX Security Symposium, August 5-9>>

********************
TOPIC SUMMARY:
Whether the environment is five servers or five hundred servers, controlling
user and group accounts from a centralized vantage point greatly eases
overall administration.  While NIS and NIS+ have historically been the only
choices for most UNIX admins, a third choice, the use of an LDAP Directory
Server, is becoming more and more common.  Offering flexibility,
scalability, and ease of use, it is easy to understand LDAP's increasingly
widespread popularity.

This session will introduce the attendees to some of the basic concepts of
LDAP, and describe how to go about implementing an LDAP solution in a UNIX
environment.

A brief outline of the topics to be covered:
- Introduction
- Structure
- Implementation
- Example
- Closing

*********************
ABOUT THE PRESENTERS:
A refugee from the dot-com world, Zach Parker is a Unix Systems
Administrator for SCB Computer Technology, an outsourcing and solutions
provider.  A self-confessed Perl addict, he has five years UNIX experience
on platforms ranging from HP-UX and Solaris, to BSDI and Linux.  While new
to AZSAGE,  Zach looks forward to sharing his experiences in implementing an
LDAP solution.


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Finding your way to IBM...

    Interstate 17    19th Ave.         7th Ave.    Central Ave.  3rd St.
     |                       |            |             |
     |                       |            |             |
     |                       |            |             |
    _|_____Indian School Rd._|____________|_____________|___________
     |                       |            |             |          |
     |                       |            |             |          |
     |                       |            | Park        |          |
     |                       |            | Central     |          |
     |          N            |            | Mall        |          |
     |          |            |            |             |          |
     |       W__|__E         |            |             |          |
     |          |            |            |Catalina Dr._|__________|
     |          S            |            |             |Parking   |
     |                       |            |             |XX IBM    |
    _|_____Thomas Rd.________|____________|_____________|__________|
     |                       |            |             |          |
     |                       |            |             |          |
    _|_____Mc Dowell Rd._____|____________|_____________|__________|
     |                       |            |             |          |
     |                       |            |             |          |
    _|_____Interstate 10_____|____________|_____________|__________|
     |                       |            |             |          |

--





------_=_NextPart_000_01C22225.7BB41910
Content-Type: MESSAGE/RFC822; CHARSET=US-ASCII
Content-ID: <Pine.LNX.4.44.0207100149242.7677@spliff.LuftHans.com>
Content-Description: Newsletter from O'Reilly UG Program, June 28

Message-ID: <200206290119.g5T1JNS12078@smtp.oreilly.com>
From: marsee@oreilly.com
To: terry.krueger@honeywell.com
Subject: Newsletter from O'Reilly UG Program, June 28
Date: Fri, 28 Jun 2002 18:19:23 -0700
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"

O'Reilly User Group Program
NEWSLETTER
June 28, 2002


HIGHLIGHTS THIS WEEK:
NEWS:
-The Strange Case of the Disappearing Open Source Vendors
-Wearable Computers
-O'Reilly's Improved Shopping Cart
-Colin Moock on Flash MX
-ActiveState Active Awards 2002-Today is the Last Day to Submit
Nominations
-Seven Common SSL Pitfalls
-I've Switched From Windows, Now What?
-Pizza, HoHos, and MacHack 2002
-User Controls and Custom Server Controls, Part 1

CONFERENCE NEWS
-New Presentations Added to OSCON
-Julian Cash's Amazing Photos From Last Year's Open Source Convention

BOOK NEWS:
-VB.NET Core Classes in a Nutshell
-Perl & LWP
-Java Management Extensions
-XML in a Nutshell, 2nd Edition
-Network Security with OpenSSL
-sed & awk Pocket Reference, 2nd Edition

================================================
NEWS FROM O'REILLY & BEYOND
================================================
 
Spread the word to your members....
 
-------------------------------
GENERAL NEWS
-------------------------------
THE STRANGE CASE OF THE DISAPPEARING OPEN SOURCE VENDORS
Tim O'Reilly explains why open source is good for businesses even if it
isn't always good for software vendors. "Customer lock-in is the real
enemy of business, not the GPL," Tim says.
http://www.oreillynet.com/pub/a/network/2002/06/28/vendor.html

For the latest on open source, don't miss O'Reilly's upcoming Open
Source Convention in July.  http://conferences.oreilly.com/oscon/

User Group members are eligible for the "User Group" discount of 20%. 
The User Group discount code is DSUG.

To register go to:
http://conferences.oreillynet.com/cs/os2002/create/ord_os02


WEARABLE COMPUTERS
Remember when the Dick Tracy communicator watch seemed like something
out of science fiction? Well here we are. Now what? Tim O'Reilly and
Jon Orwant write about the fashion potential of wearable computers in
the latest Ask Tim.  http://www.oreilly.com/ask_tim/


O'REILLY'S IMPROVED SHOPPING CART
We've streamlined our online ordering process and added features that
make it quicker and easier to shop on oreilly.com
(http://www.oreilly.com/catalog/prdindex.html), check the status of
your order, and manage your O'Reilly account.  
To create or modify your account, go to:
https://epoch.oreilly.com/account/accountmanagement.asp?retUrl=http://www.or
eilly.com

Remember, User Group members get a 20% discount on orders direct from
O'Reilly. When ordering, be sure to use the User Group discount code:
DSUG

---------------------
FLASH
---------------------
COLIN MOOCK ON FLASH MX
Colin Moock talks about Macromedia's re-christened suite of MX
applications, and how they can be used to develop web services and
richer interfaces.
http://www.oreillynet.com/pub/a/javascript/2002/06/18/flashmx.html

Colin is the author of "ActionScript: The Definitive Guide."
Order Number: 8520
http://www.oreilly.com/catalog/actscript/index.html

---------------------
OPEN SOURCE
---------------------
ACTIVESTATE ACTIVE AWARDS 2002
-TODAY IS THE LAST DAY TO SUBMIT NOMINATIONS
Programmers' Choice: Nominations
Do you know someone who's really made a difference to open language
programming? Maybe it's the author of your favorite module, or the guy
who maintains your favorite advocacy site. Maybe it's the person that
has made the most bug fixes, or simply someone that writes really cool
code. Now's your chance to give them the recognition they deserve.
Nominate your favorites for the Programmers' Choice Active Awards.
Until June 28, 2002, you can select the one programmer that you think
has done the most for each language.

Perl, PHP, Python and XSLT winners will be announced at O'Reilly's Open
Source Conference July 23, 2002. Tcl winners will be announced at the
Tcl conference in September.
http://www.activestate.com/Corporate/Awards/ActiveAwards.html


SEVEN COMMON SSL PITFALLS
If you are deploying SSL-enabled applications with OpenSSL here are
seven pitfalls you'll want to avoid, by the authors of "Network
Security with OpenSSL."
http://www.onlamp.com/pub/a/onlamp/2002/06/27/openssl.html

Network Security with OpenSSL
Order Number: 270x
http://www.oreilly.com/catalog/openssl/

---------------------
MAC
---------------------
I'VE SWITCHED FROM WINDOWS, NOW WHAT?
Terrie Miller is a full-time web producer who is documenting her switch
to Mac OS X. Here she covers some of the issues she's found related to
keyboard commands, shortcuts, andnavigation.
http://www.macdevcenter.com/pub/a/mac/2002/06/25/wintomac_one.html

For more information on Mac OS X, get a copy of David Pogue's 
"Mac OS X: The Missing Manual."
Order Number: 0820
http://www.oreilly.com/catalog/macosxmm/


PIZZA, HOHOS, AND MACHACK 2002
Here's what you don't go to MacHack 2002 for: 1) sleep, 2) lose weight,
and 3) try out your new Dell laptop. But if you miss all-nighters from
your college days and love a good geek fest, this is the place to be.
http://www.macdevcenter.com/pub/a/mac/2002/06/21/machack_report.html

---------------------
.NET
---------------------
USER CONTROLS AND CUSTOM SERVER CONTROLS, PART 1
G. Andrew Duthie and Matthew MacDonald provide an overview of ASP.NET
controls in this excerpt from "ASP.NET in a Nutshell."
http://www.oreillynet.com/pub/a/dotnet/excerpt/aspdotnetian_6/index1.html

ASP.NET in a Nutshell
Order Number: 1169
http://www.oreillynet.com/catalog/aspdotnetnut/

================================================
CONFERENCE NEWS
================================================
NEW PRESENTATIONS ADDED TO OSCON
We've added many new exciting presentations to our OSCON program.  See
what's new, and take advantage of a great program
http://conferences.oreillynet.com/pub/w/15/whats_new.html


CHECK OUT JULIAN CASH'S AMAZING PHOTOS FROM LAST YEAR'S 
OPEN SOURCE CONVENTION.
http://www.spidereyeballs.com/os5/

================================================
BOOK NEWS
================================================
REVIEW COPIES ARE AVAILABLE, email me for a copy.
If you need your books by a certain date, please allow at least three
weeks for shipping.

Please email or send me copies of your newsletters and book reviews.

Don't forget, your members get 20% off any O'Reilly book they purchase
directly from O'Reilly. Just use Code DSUG when ordering.

Press releases are available on our press page: http://press.oreilly.com/

VB.NET CORE CLASSES IN A NUTSHELL
Order Number: 2572
The .NET platform gives Visual Basic developers access to an entirely
new and comprehensive class library that promises to further simplify
and speed VB application development. In "VB.NET Core Classes in a
Nutshell," VB Programmers will find a concise and thorough reference to
the types found in the core namespaces of the .NET Framework Class
Library.  http://www.oreilly.com/catalog/vbdotnetcore/


PERL & LWP
Order Number: 1789
Perl soared to popularity as a language for creating and managing web
content, but with LWP (Library for WWW in Perl), Perl is equally adept
at consuming information on the Web. LWP is a suite of modules for
fetching and processing web pages. The Web is a vast data source that
contains everything from stock prices to movie credits, and with LWP
all that data is just a few lines of code away. Anything you do on the
Web, whether it's buying or selling, reading or writing, uploading or
downloading, news to e-commerce, can be controlled with Perl and LWP.
You can automate Web-based purchase orders as easily as you can set up
a program to download MP3 files from a web site.
http://www.oreilly.com/catalog/perllwp/

Chapter 7, "HTML Processing with Tokens," is available online:
http://www.oreilly.com/catalog/perllwp/chapter/index.html


JAVA MANAGEMENT EXTENSIONS 
Order Number: 2459
"Java Management Extensions" is a practical, hands-on guide to using
the JMX APIs, Sun Microsystems new Java-based tool for managing
enterprise applications. This one-of-a kind book is a complete
treatment of the JMX architecture (both the instrumentation level and
the agent level), and its loaded with real-world examples for
implementing Management Extensions. It also contains useful information
at the higher level about JMX (the big picture) to help technical
managers and architects who are evaluating various application
management approaches and are considering JMX.
http://www.oreilly.com/catalog/javamngext/

Chapter 2, "Standard Mbeans," is available online:
http://www.oreilly.com/catalog/javamngext/chapter/index.html


XML IN A NUTSHELL, 2ND EDITION
Order Number: 2920
This powerful new edition provides developers with a comprehensive
guide to the rapidly evolving XML space. Serious users of XML will find
topics on just about everything they need, from fundamental syntax
rules, to details of DTD and XML Schema creation, to XSLT
transformations, to APIs used for processing XML documents. Simply put,
this is the only reference of its kind among XML books.
http://www.oreilly.com/catalog/xmlnut2/

Chapter 9, "Xpath," is available online:
http://www.oreilly.com/catalog/xmlnut2/chapter/index.html


NETWORK SECURITY WITH OPENSSL
Order Number: 270x
"Network Security with OpenSSL" enables developers to use this protocol
much more effectively. Traditionally, getting something simple done in
OpenSSL could easily take weeks. This concise book gives you the
guidance you need to avoid pitfalls, while allowing you to take
advantage of the librarys advanced features. And, instead of bogging
you down in the technical details of how SSL works under the hood, this
book provides only the information that is necessary to use OpenSSL
safely and effectively. In step-by-step fashion, the book details the
challenges in securing network communications, and shows you how to use
OpenSSL tools to best meet those challenges.
http://www.oreilly.com/catalog/openssl/

Chapter 1, "Introduction," is available online:
http://www.oreilly.com/catalog/openssl/chapter/index.html


SED & AWK POCKET REFERENCE, 2ND EDITION
Order Number: 3528
For people who create and modify text files, sed and awk are power
tools for editing. sed, awk, and regular expressions allow programmers
and system administrators to automate editing tasks that need to be
performed on one or more files, to simplify the task of performing the
same edits on multiple files, and to write conversion programs.
http://www.oreilly.com/catalog/sedawkrepr2/

The "sed & awk Pocket Reference" is a companion volume to "sed & awk,
Second Edition," "Unix in a Nutshell, Third Edition," and "Effective
awk Programming, Third Edition." These books are still available for
review copies, just let me know.

Effective awk Programming, 3rd Edition
Order Number: 0707
http://www.oreilly.com/catalog/awkprog3/

sed & awk, 2nd Edition
Order Number: 2255
http://www.oreilly.com/catalog/sed2/

Unix in a Nutshell: System V Edition, 3rd Edition
Order Number: 4274
http://www.oreilly.com/catalog/unixnut3/


Until next time,

Marsee

------_=_NextPart_000_01C22225.7BB41910
Content-Type: MESSAGE/RFC822; CHARSET=US-ASCII
Content-ID: <Pine.LNX.4.44.0207100149243.7677@spliff.LuftHans.com>
Content-Description: 11th USENIX Security Symposium, August 5-9

Message-ID: <3D20DDED.9000702@usenix.org>
From: alex@usenix.org
Reply-To: alex@usenix.org, alex@usenix.org
To: Webmaster@aklug.org, yocum@fnal.gov, ale-admin@ale.org, 
	randy@cc.gatech.edu, jean@staffing.com, jep@jephill.com, stugreen@bga.com, 
	steering@azsage.org, majordomo@baylisa.org, japerry@bigfoot.com
Subject: 11th USENIX Security Symposium, August 5-9
Date: Mon, 1 Jul 2002 15:55:41 -0700 
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"

Attend the 11th USENIX Security Symposium being held August 5-9 in
San Francisco. Check out http://www.usenix.org/sec02 for our early
registration and student discounts.

This year's program brings together an exceptional group of speakers
to inform and educate including Keynote speaker Whitfield Diffie,
co-inventor of public key cryptography and Chief Security Officer at
Sun Microsystems.  Diffie will talk about security policy and
challenges for the 21st century.  Other Invited Talks teach you why
common security systems fail; how to validate and test security
designs; how to make biometrics authentication work; legal aspects of
the DMCA; and much more.

Benefit from our security tutorials where you can learn the latest
techniques and the most effective strategies from the experts
including: Building Honey Pots, IPSs, UNIX Security Solutions, and
Building Secure Software.
http://www.usenix.org/events/sec02/tutorials/

Want to learn new ideas for adding security hooks to software
systems? Find out how to sandbox malicious applications? Understand
how to secure new Web services? Learn about privacy issues or dealing
with law enforcement?  Take away practical solutions to these topics
and more at the USENIX Security Symposium.

For detailed information and to register, please visit our Web site
at: http://www.usenix.org/sec02

Don't miss our FREE VENDOR EXHIBITION!  Your exhibit pass also
includes access to our Keynote presentation, by Whitfield Diffie on
Wednesday, August 7, 9am.

We look forward to seeing you in San Francisco!


-- 
Alex Walker
Production Editor
USENIX Association
2560 Ninth Street, Suite 215
Berkeley, CA 94710
510/528-8649 x33





------_=_NextPart_000_01C22225.7BB41910--