Table of Contents

SECTION 1 – GENERAL    
 1     Scope          
 2     References
        2.1     Normative references               
        2.2     Non-normative reference       
 3     Definitions 
        3.1     Basic Directory definitions        
        3.2     Directory model definitions     
        3.3     DSA information model definitions      
        3.4     Abstract service definitions     
        3.5     Protocol definitions    
        3.6     Directory replication definitions            
        3.7     Distributed operation definitions          
 4     Abbreviations          
 5     Conventions             
SECTION 2 – OVERVIEW    
 6     Overview   
SECTION 3 – DISTRIBUTED DIRECTORY MODELS    
 7     Distributed Directory system model               
 8     DSA interactions model       
        8.1     Decomposition of a request    
        8.2     Uni-chaining   
        8.3     Multi-chaining               
        8.4     Referral            
        8.5     Mode determination 
SECTION 4 – DSA ABSTRACT SERVICE    
 9     Overview of DSA abstract service    
10     Information types 
       10.1     Introduction 
       10.2     Information types defined elsewhere              
       10.3     Chaining arguments  
       10.4     Chaining results           
       10.5     Operation progress   
       10.6     Trace information       
       10.7     Reference type           
       10.8     Access point information        
       10.9     DIT bridge knowledge              
      10.10     Exclusions     
      10.11     Continuation reference          
11     Bind and Unbind    
       11.1     DSA Bind        
       11.2     DSA Unbind  
12     Chained operations              
       12.1     Chained operations   
       12.2     Chained Abandon operation 
       12.3     Chained operations and protocol version        
13     Chained errors       
       13.1     Introduction 
       13.2     DSA referral  
SECTION 5 – DISTRIBUTED PROCEDURES    
14     Introduction            
       14.1     Scope and limits          
       14.2     Conformance               
       14.3     Conceptual model      
       14.4     Individual and cooperative operation of DSAs
       14.5     Cooperative agreements between DSAs         
15     Distributed Directory behaviour     
       15.1     Cooperative fulfilment of operations
       15.2     Phases of operation processing           
       15.3     Managing Distributed Operations       
       15.4     Loop handling              
       15.5     Other considerations for distributed operation             
       15.6     Authentication of Distributed operations        
16     The Operation Dispatcher 
       16.1     General concepts       
       16.2     Procedures of the Operation Dispatcher          
       16.3     Overview of procedures         
17     Request Validation procedure         
       17.1     Introduction 
       17.2     Procedure parameters             
       17.3     Procedure definition 
18     Name Resolution procedure            
       18.1     Introduction 
       18.2     Find DSE procedure parameters          
       18.3     Procedures   
19     Operation evaluation          
       19.1     Modification procedures         
       19.2     Single entry interrogation procedure 
       19.3     Multiple entry interrogation procedure            
20     Continuation Reference procedures            
       20.1     Chaining strategy in the presence of shadowing           
       20.2     Issuing chained subrequests to a remote DSA or LDAP server
       20.3     Procedures' parameters          
       20.4     Definition of the procedures 
       20.5     Abandon procedures
       20.6     DAP request to LDAP request procedure         
       20.7     LDAP result to DAP reply procedure   
21     Results Merging procedure              
22     Procedures for distributed authentication 
       22.1     Requester authentication       
       22.2     Results authentication             
SECTION 6 – KNOWLEDGE ADMINISTRATION     
23     Knowledge administration overview            
       23.1     Maintenance of knowledge references           
       23.2     Requesting cross reference   
       23.3     Knowledge inconsistencies    
24     Hierarchical operational bindings    
       24.1     Operational binding type characteristics           
       24.2     Operational binding information object Class definition            
       24.3     DSA procedures for hierarchical operational binding management      
       24.4     Procedures for operations     
       24.5     Use of application contexts    
      Page
25     Non-specific hierarchical operational binding            
       25.1     Operational binding type characteristics           
       25.2     Operational binding information object class definition             
       25.3     DSA procedures for non-specific hierarchical operational binding management             
       25.4     Procedures for operations     
       25.5     Use of application contexts    
Annex A – ASN.1 for Distributed Operations    
Annex B – Specification of hierarchical and non-specific hierarchical  operational binding types    
Annex C – Example of distributed name resolution    
Annex D – Distributed use of authentication    
        D.1     Summary        
        D.2     Distributed protection model
        D.3     Signed chained operations      
Annex E – Knowledge maintenance example    
Annex F – Amendments and corrigenda