共用方式為


1.6 Applicability Statement

This protocol is useful for manipulating an account database consisting of users, groups, and other security principals. This protocol can be used equally well for a database that is backed by a distributed, replicated system, as well as a small, single-instance scenario, such as a single machine.<2><3>