{"id":327,"date":"2015-10-09T12:03:02","date_gmt":"2015-10-09T12:03:02","guid":{"rendered":"http:\/\/ldapcon.org\/2015\/?page_id=327"},"modified":"2019-06-26T13:11:03","modified_gmt":"2019-06-26T13:11:03","slug":"tutorial-downloads-2","status":"publish","type":"page","link":"https:\/\/ldapcon.org\/2015\/tutorial-downloads-2\/","title":{"rendered":"Tutorial Downloads"},"content":{"rendered":"<p>Files and documents for tutorial sessions will be placed here.<\/p>\n<p><a href=\"http:\/\/ldapcon.org\/2015\/wp-content\/uploads\/2015\/10\/The_Power_of_ACI.zip\">The_Power_of_ACI<\/a>&nbsp;&#8211; zipfile with examples, and: <a href=\"http:\/\/ldapcon.org\/2015\/wp-content\/uploads\/2015\/10\/Addendum_The_Power_of_ACI.pdf\">Addendum<\/a> &#8211; Alban Meunier<\/p>\n<p><a href=\"http:\/\/ldapcon.org\/2015\/wp-content\/uploads\/2015\/10\/AD_and_LDAP-slides.pdf\">AD_and_LDAP-slides<\/a> &#8211; Alban Meunier<\/p>\n<p><a href=\"http:\/\/shortlinks.smartwavesa.com\/OpenDJ_forACI\">OpenDJ for ACI tutorial<\/a><\/p>\n<p><a href=\"http:\/\/ldapcon.org\/2015\/wp-content\/uploads\/2015\/10\/The-LDAP-Directory-Schema-a-guide-for-the-newcomer-v3.pdf\">The LDAP Directory Schema a guide for the newcomer<\/a> &#8211; text &#8211; Giovanni Baruzzi<\/p>\n<p><a href=\"http:\/\/ldapcon.org\/2015\/wp-content\/uploads\/2015\/10\/The-LDAP-Directory-Schema-slides.pdf\">The LDAP Directory Schema<\/a> &#8211; slides &#8211; Giovanni Baruzzi<\/p>\n<p><a href=\"http:\/\/ldapcon.org\/2015\/wp-content\/uploads\/2015\/10\/ldap-basics-exercises.pdf\">ldap-basics-exercises <\/a>&#8211; Andrew Findlay<\/p>\n<p><a href=\"http:\/\/ldapcon.org\/2015\/wp-content\/uploads\/2015\/10\/ldap-basics-notes.pdf\">ldap-basics-notes<\/a> &#8211; Andrew Findlay<\/p>\n<p><a href=\"http:\/\/ldapcon.org\/2015\/wp-content\/uploads\/2015\/10\/ldap-basics-exercises-20151026.zip\">ldap-basics-exercises-20151026.zip<\/a> &#8211; Andrew Findlay<\/p>\n<p><a href=\"http:\/\/ldapcon.org\/2015\/wp-content\/uploads\/2015\/10\/McKinney-Security-Tutorial-v2.pdf\">Applying End-to-End Security Across a Java Web Environment Using LDAP and Apache Fortress<\/a> &#8211; slides &#8211; Shawn McKinney<\/p>\n<p><a href=\"http:\/\/ldapcon.org\/2015\/wp-content\/uploads\/2015\/10\/SECURITY-TUTORIAL-README.txt\">Java-Web-SECURITY-TUTORIAL-README <\/a>&#8211; instructions &#8211; Shawn McKinney<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Files and documents for tutorial sessions will be placed here. The_Power_of_ACI&nbsp;&#8211; zipfile with examples, and: Addendum &#8211; Alban Meunier AD_and_LDAP-slides &#8211; Alban Meunier OpenDJ for ACI tutorial The LDAP Directory Schema a guide for the newcomer &#8211; text &#8211; Giovanni&#8230; <a class=\"read-more-button\" href=\"https:\/\/ldapcon.org\/2015\/tutorial-downloads-2\/\">(READ MORE)<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-327","page","type-page","status-publish","hentry"],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/ldapcon.org\/2015\/wp-json\/wp\/v2\/pages\/327","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ldapcon.org\/2015\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ldapcon.org\/2015\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ldapcon.org\/2015\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ldapcon.org\/2015\/wp-json\/wp\/v2\/comments?post=327"}],"version-history":[{"count":18,"href":"https:\/\/ldapcon.org\/2015\/wp-json\/wp\/v2\/pages\/327\/revisions"}],"predecessor-version":[{"id":724,"href":"https:\/\/ldapcon.org\/2015\/wp-json\/wp\/v2\/pages\/327\/revisions\/724"}],"wp:attachment":[{"href":"https:\/\/ldapcon.org\/2015\/wp-json\/wp\/v2\/media?parent=327"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}