CONTENTS

SECTION  1  –  GENERAL
 1      Scope
2      Normative references
        2.1     Identical Recommendations | International Standards
 3     Definitions
        3.1     OSI Reference Model Definitions
        3.2     Basic Directory Definitions
        3.3     Directory Model Definitions
        3.4     DSA Information Model definitions
        3.5     Directory replication definitions
        3.6     Distributed operation definitions
 4     Abbreviations
 5     Conventions
SECTION  2  –  OVERVIEW
 6     Overview
SECTION  3  –  DISTRIBUTED  DIRECTORY  MODELS
 7     Distributed Directory System Model
 8     DSA Interactions Model
        8.1     Decomposition of a request
        8.2     Uni-chaining
        8.3     Multi-chaining
        8.4     Referral
        8.5     Mode Determination
SECTION  4  –  DSA  ABSTRACT  SERVICE
 9     Overview of DSA Abstract Service
10     Information types
       10.1     Introduction
       10.2     Information types defined elsewhere
       10.3     Chaining Arguments
       10.4     Chaining Results
       10.5     Operation Progress
       10.6     Trace Information
       10.7     Reference Type
       10.8     Access point information
       10.9     Exclusions
      10.10     Continuation Reference
11     Bind and Unbind
       11.1     DSA Bind
       11.2     DSA Unbind
12     Chained operations
       12.1     Chained operations
       12.2     Chained Abandon operation
       12.3     Chained operations and protocol version
13     Chained errors
       13.1     Introduction
       13.2     DSA Referral
SECTION  5  –  DISTRIBUTED  PROCEDURES
14     Introduction
       14.1     Scope and Limits
       14.2     Conformance
       14.3     Conceptual model
       14.4     Individual and cooperative operation of DSAs
       14.5     Cooperative agreements between DSAs
15     Distributed Directory behaviour
       15.1     Cooperative fulfilment of operations
       15.2     Phases of operation processing
       15.3     Managing Distributed Operations
       15.4     Loop handling
       15.5     Other considerations for distributed operation
       15.6     Authentication of Distributed Operations
16     The Operation Dispatcher
       16.1     General Concepts
       16.2     Procedures of the operation dispatcher
       16.3     Overview of procedures
17     Request Validation procedure
       17.1     Introduction
       17.2     Procedure parameters
       17.3     Procedure definition
18     Name Resolution procedure
       18.1     Introduction
       18.2     Find DSE procedure parameters
       18.3     Procedures
19     Operation evaluation
       19.1     Modification procedure
       19.2     Single entry interrogation procedure
       19.3     Multiple entry interrogation procedure
20     Continuation Reference procedures
       20.1     Chaining strategy in the presence of shadowing
       20.2     Issuing chained subrequests to a remote DSA
       20.3     Procedures’ parameters
       20.4     Definition of the Procedures
       20.5     Abandon procedure
21     Results Merging procedure
22     Procedures for distributed authentication
       22.1     Originator authentication
       22.2     Results authentication
SECTION  6  –  KNOWLEDGE  ADMINISTRATION
23     Knowledge administration overview
       23.1     Maintenance of Knowledge References
       23.2     Requesting cross reference
       23.3     Knowledge inconsistencies
       23.4     Knowledge References and contexts
24     Hierarchical operational bindings
       24.1     Operational binding type characteristics
       24.2     Operational binding information object Class definition
       24.3     DSA procedures for hierarchical operational binding management
       24.4     Procedures for operations
       24.5     Use of application contexts
25     Non-specific hierarchical operational binding
       25.1     Operational binding type characteristics
       25.2     Operational binding information object class definition
       25.3     DSA procedures for non-specific hierarchical operational binding management
       25.4     Procedures for operations
       25.5     Use of application contexts
Annex  A  –  ASN.1 for Distributed Operations
Annex  B  –  Example of distributed name resolution
Annex  C  –  Distributed use of authentication
        C.1     Summary
        C.2     Distributed protection model
        C.3     Signed Chained Operations
        C.4     Encrypted Chained Operations
        C.5     Signed and Encrypted Distributed Operations
Annex  D  –  Specification of hierarchical and non-specific hierarchical operational binding types
Annex  E  –  Knowledge maintenance example
Annex  F  –  Amendments and corrigenda






















­