Enterprise Security provides three mapping implementations that transform data from Enterprise Security to LDAP and back, during the authentication process. Each mapping implementation performs a distinct function in the LDAP authentication process. The implementations are:
Attribute mapping – determines how to populate the subject’s ACDB record based on the data in the LDAP data store.
Certificate mapping – takes certificate data presented by a client and determines the DN of the LDAP entry that corresponds to that certificate data.
Organization mapping – determines the organization in which the replicated ACDB record should be placed, based on the LDAP entry.
This section describes these mapping implementations.