| 153021169001182127177100019128036004029190136140232051053054012006219238130126083250070 Looking Ahead Now that you've used directory replication to provide your users with a reliable and high-performance directory, it's time to think about how to protect the data in your directory service and ensure that persons can only view and modify the data they are authorized to work with. Chapter 11, "Privacy and Security Design," describes directory privacy, security, and access control in detail. | | Understanding and Deploying LDAP Directory Services, 2002 New Riders Publishing | |