Mapping the LDAP entries to the ACDB

Enterprise Security provides three mapping implementations that transform data from Enterprise Security to LDAP and back, during the authentication process. Each mapping implementation performs a distinct function in the LDAP authentication process. The implementations are:

This section describes these mapping implementations.