CONTENTS

SECTION 1 GENERAL     
 1
     Scope 
 2     Normative references       
        2.1     Identical Recommendations | International Standards          
        2.2     Other references    
 3     Definitions  
        3.1     Communication Model Definitions  
        3.2     Basic Directory Definitions 
        3.3     Directory Model Definitions           
        3.4     DSA Information Model definitions
        3.5     Abstract Service definitions
        3.6     Directory replication definitions      
        3.7     Distributed operation definitions     
 4     Abbreviations   
SECTION 2 OVERVIEW     
 5
     Conventions     
 6     Overview   
 7     Distributed Directory System Model        
 8     DSA Interactions Model  
        8.1     Decomposition of a request
        8.2     Uni-chaining          
        8.3     Multi-chaining        
        8.4     Referral  
        8.5     Mode determination           
SECTION 4 DSA ABSTRACT SERVICE     
 9
     Overview of DSA Abstract Service         
10     Information types
       10.1     Introduction          
       10.2     Information types defined elsewhere          
       10.3     Chaining Arguments          
       10.4     Chaining Results   
       10.5     Operation Progress           
       10.6     Trace Information 
       10.7     Reference Type    
       10.8     Access point information   
       10.9     DIT Bridge knowledge     
      10.10     Exclusions           
      10.11     Continuation Reference    
11     Bind and Unbind 
       11.1     DSA Bind
       11.2     DSA Unbind        
12     Chained operations         
       12.1     Chained operations           
       12.2     Chained Abandon operation         
       12.3     Chained operations and protocol version   
13     Chained errors 
       13.1     Introduction          
       13.2     DSA Referral       
SECTION 5 DISTRIBUTED PROCEDURES     
14
     Introduction     
       14.1     Scope and Limits  
       14.2     Conformance        
       14.3     Conceptual model 
       14.4     Individual and cooperative operation of DSAs       
       14.5     Cooperative agreements between DSAs   
15     Distributed Directory behaviour   
       15.1     Cooperative fulfilment of operations          
       15.2     Phases of operation processing     
       15.3     Managing Distributed Operations  
       15.4     Loop handling       
       15.5     Other considerations for distributed operation        
       15.6     Authentication of Distributed Operations   
16     The Operation Dispatcher           
       16.1     General Concepts 
       16.2     Procedures of the Operation Dispatcher    
       16.3     Overview of procedures   
17     Request Validation procedure     
       17.1     Introduction          
       17.2     Procedure parameters       
       17.3     Procedure definition          
18     Name Resolution procedure        
       18.1     Introduction          
       18.2     Find DSE procedure parameters   
       18.3     Procedures           
19     Operation evaluation       
       19.1     Modification procedure     
       19.2     Single entry interrogation procedure          
       19.3     Multiple entry interrogation procedure       
20     Continuation Reference procedures         
       20.1     Chaining strategy in the presence of shadowing      
       20.2     Issuing chained subrequests to a remote DSA        
       20.3     Procedures' parameters    
       20.4     Definition of the procedures          
       20.5     Abandon procedure          
21     Results Merging procedure         
22     Procedures for distributed authentication 
       22.1     Originator authentication   
       22.2     Results authentication        
SECTION 6 KNOWLEDGE ADMINISTRATION     
23
     Knowledge administration overview        
       23.1     Maintenance of knowledge references       
       23.2     Requesting cross reference
       23.3     Knowledge inconsistencies
       23.4     Knowledge references and contexts          
24     Hierarchical operational bindings 
       24.1     Operational binding type characteristics     
       24.2     Operational binding information object Class definition       
       24.3     DSA procedures for hierarchical operational binding management  
       24.4     Procedures for operations 
      Page
       24.5
     Use of application contexts           
25     Non-specific hierarchical operational binding       
       25.1     Operational binding type characteristics     
       25.2     Operational binding information object class definition        
       25.3     DSA procedures for non-specific hierarchical operational binding management       
       25.4     Procedures for operations 
       25.5     Use of application contexts           
Annex A ASN.1 for Distributed Operations     
Annex B Example of distributed name resolution     
Annex C Distributed use of authentication     
        C.1     Summary  
        C.2     Distributed protection model         
        C.3     Signed chained operations 
        C.4     Encrypted chained operations        
        C.5     Signed and encrypted distributed operations          
Annex D Specification of hierarchical and non-specific hierarchical  operational binding types     
Annex E Knowledge maintenance example     
Annex F Amendments and corrigenda