Section 16.1, Leveraging the Built-in Security of eDirectory and Active Directory
Section 16.2, Provisioning Users and Groups
Section 16.3, LDAP Proxy User Role and Rights