1    
Scope           
 2    
Normative references              
        2.1    
Identical Recommendations | International Standards        
        2.2    
Paired Recommendations | International Standards equivalent in technical
content  
        2.3    
Other references            
 3    
Definitions  
        3.1    
Communication definitions        
        3.2    
Basic Directory definitions         
        3.3    
Distributed operation definitions             
        3.4    
Replication definitions 
 4    
Abbreviations            
 5    
Conventions              
 6    
Directory Models      
        6.1    
Definitions       
        6.2    
The Directory and its users         
        6.3    
Directory and DSA Information Models 
        6.4    
Directory Administrative Authority Model           
 7    
Directory Information Base   
        7.1
    Definitions       
        7.2    
Objects             
        7.3    
Directory entries            
        7.4    
Directory Information Tree (DIT)            
 8    
Directory entries       
        8.1    
Definitions       
        8.2    
Overall structure            
        8.3     Object
classes 
        8.4     Attribute
types               
        8.5     Attribute
values             
        8.6     Attribute
type hierarchies           
        8.7     Friend attributes            
        8.8     Contexts           
        8.9    
Matching rules               
       8.10    
Entry collections          
       8.11    
Compound entries and families of entries            
 9    
Names          
        9.1    
Definitions       
        9.2    
Names in general           
        9.3    
Relative distinguished name       
        9.4    
Name matching              
        9.5    
Distinguished names     
        9.6    
Alias names     
10     Hierarchical
groups 
       10.1    
Definitions     
       10.2    
Hierarchical relationship           
       10.3    
Sequential ordering of a hierarchical group         
11    
Directory Administrative Authority model      
       11.1    
Definitions     
       11.2    
Overview        
       11.3    
Policy              
       11.4    
Specific administrative authorities         
       11.5    
Administrative areas and administrative points   
       11.6     DIT
Domain policies   
       11.7     DMD
policies 
12    
Model of Directory Administrative and Operational Information            
       12.1    
Definitions     
       12.2    
Overview        
       12.3    
Subtrees          
       12.4    
Operational attributes  
       12.5    
Entries             
       12.6    
Subentries       
       12.7    
Information model for collective attributes          
       12.8    
Information model for context defaults 
13    
Directory Schema    
       13.1    
Definitions     
       13.2    
Overview        
       13.3    
Object class definition               
       13.4    
Attribute type definition            
       13.5    
Matching rule definition            
       13.6    
Relaxation and tightening          
       13.7     DIT
structure definition             
       13.8     DIT
content rule definition        
       13.9    
Context type definition              
      13.10    
DIT Context Use definition      
      13.11    
Friends definition       
      13.12    
Syntax definitions       
14    
Directory System Schema     
       14.1    
Overview        
       14.2    
System schema supporting the administrative and operational information
model   
       14.3    
System schema supporting the administrative model        
       14.4    
System schema supporting general administrative and operational
requirements     
       14.5    
System schema supporting access control            
       14.6    
System schema supporting the collective attribute model               
       14.7    
System schema supporting context assertion defaults       
       14.8    
System schema supporting the service administration model         
       14.9    
System schema supporting password administration         
      14.10    
System schema supporting hierarchical groups  
      14.11    
Maintenance of system schema              
      14.12    
System schema for first-level subordinates         
15    
Directory schema administration        
       15.1    
Overview        
       15.2    
Policy objects               
       15.3    
Policy parameters         
       15.4    
Policy procedures        
       15.5    
Subschema modification procedures      
       15.6    
Entry addition and modification procedures        
       15.7    
Subschema policy attributes     
16    
Service Administration Model            
       16.1    
Definitions     
       16.2    
Service-type/user-class model  
       16.3    
Service-specific administrative areas     
       16.4    
Introduction to search-rules      
       16.5    
Subfilters        
       16.6    
Filter requirements       
       16.7    
Attribute information selection based on search-rules      
       16.8    
Access control aspects of search-rules   
      Page
       16.9    
Contexts aspects of search-rules             
      16.10    
Search-rule specification          
      16.11    
Matching restriction definition               
      16.12    
Search-validation function       
17    
Security model         
       17.1    
Definitions     
       17.2    
Security policies           
       17.3    
Protection of Directory operations          
18    
Basic Access Control             
       18.1    
Scope and application 
       18.2    
Basic Access Control model      
       18.3    
Access control administrative areas       
       18.4    
Representation of Access Control Information    
       18.5    
ACI operational attributes         
       18.6    
Protecting the ACI        
       18.7    
Access control and Directory operations              
       18.8    
Access Control Decision Function          
       18.9    
Simplified Access Control         
19    
Rule-based Access Control   
       19.1    
Scope and application 
       19.2    
Rule-based Access Control model          
       19.3    
Access control administrative areas       
       19.4    
Security Label               
       19.5    
Clearance        
       19.6    
Access Control and Directory operations             
       19.7    
Access Control Decision Function          
       19.8    
Use of Rule-based and Basic Access Control       
20    
Data Integrity in Storage       
       20.1    
Introduction   
       20.2    
Protection of an Entry or Selected Attribute Types            
       20.3    
Context for Protection of a Single Attribute Value             
21    
DSA Models             
       21.1    
Definitions     
       21.2   
 Directory Functional Model      
       21.3    
Directory Distribution Model   
22    
Knowledge 
       22.1    
Definitions     
       22.2    
Introduction   
       22.3    
Knowledge References               
       22.4    
Minimum Knowledge  
       22.5    
First Level DSAs          
       22.6    
Knowledge references to LDAP servers 
23    
Basic Elements of the DSA Information Model             
       23.1    
Definitions     
       23.2    
Introduction   
       23.3    
DSA Specific Entries and their Names   
       23.4    
Basic Elements             
24    
Representation of DSA Information   
       24.1    
Representation of Directory User and Operational Information     
       24.2    
Representation of Knowledge References            
       24.3    
Representation of Names and Naming Contexts  
25    
Overview   
       25.1    
Definitions     
       25.2    
Introduction   
26    
Operational bindings             
       26.1    
General           
       26.2    
Application of the operational framework            
       26.3    
States of cooperation   
27    
Operational binding specification and management     
       27.1    
Operational binding type specification  
       27.2    
Operational binding management            
       27.3    
Operational binding specification templates        
28    
Operations for operational binding management           
       28.1    
Application-context definition 
       28.2    
Establish Operational Binding operation              
       28.3    
Modify Operational Binding operation  
       28.4    
Terminate Operational Binding operation            
       28.5    
Operational Binding Error         
       28.6    
Operational Binding Management Bind and Unbind         
29    
Overview   
       29.1    
Definitions     
       29.2    
Introduction   
30    
LDAP interworking model    
       30.1    
LDAP interworking scenarios   
       30.2    
Overview of bound DSA handling LDAP operations         
       30.3    
General LDAP requestor characteristics               
       30.4    
LDAP extension mechanisms    
31    
LDAP specific system schema            
       31.1    
Operational Attribute types from IETF RFC 4512              
Annex A – Object identifier usage     
Annex B – Information framework in ASN.1     
Annex C – Subschema administration in ASN.1     
Annex D – Service administration in ASN.1     
Annex E – Basic Access Control in ASN.1     
Annex F – DSA operational attribute types in ASN.1     
Annex G – Operational binding management in ASN.1     
Annex H – Enhanced security in ASN.1     
Annex I – LDAP system schema     
Annex J – The mathematics of trees     
Annex K – Name design criteria     
Annex L – Examples of various aspects of schema     
        L.1    
Example of an attribute hierarchy            
        L.2    
Example of a subtree specification          
        L.3    
Schema specification    
        L.4    
DIT content rules          
        L.5    
DIT context use             
Annex M – Overview of basic access control permissions     
        M.1    
Introduction   
        M.2    
Permissions required for operations       
        M.3    
Permissions affecting error       
        M.4    
Entry level permissions             
        M.5    
Entry level permissions             
Annex N – Examples of access control     
      Page
        N.1    
Introduction    
        N.2    
Design principles for Basic Access Control          
        N.3    
Introduction to example             
        N.4    
Policy affecting the definition of specific and inner areas               
        N.5    
Policy affecting the definition of Directory Access Control Domains
(DACDs)        
        N.6    
Policy expressed in prescriptiveACI attributes    
        N.7    
Policy expressed in subentryACI attributes          
        N.8    
Policy expressed in entryACI attributes 
        N.9    
ACDF examples            
       N.10    
Rule-based access control        
Annex O – DSE type combinations     
Annex P – Modelling of knowledge     
Annex Q – Subfilters     
Annex R – Compound entry name patterns and their use     
Annex S – Naming concepts and considerations     
        S.1
    History tells us …          
        S.2    
A new look at name resolution   
Annex T – Alphabetical index of definitions     
Annex U – Amendments and corrigenda