• UIT-T Rec. X.518 (11/1988) – THE DIRECTORY – PROCEDURES FOR DISTRIBUTED OPERATION
  • CONTENTS
  • 0 Introduction
  • 1 Scope and field of application
  • 2 References
  • 3 Definitions
    • 3.1 OSI Reference Model Definitions
    • 3.2 Basic Directory Definitions
    • 3.3 Directory Model Definitions
    • 3.4 Abstract Service Definition Conventions
    • 3.5 Distributed Operation Definitions
  • 4 Abbreviations
  • 5 Notation
  • 6 Overview
  • 7 Distributed directory system model
  • 8 DSA interactions model
    • 8.1 Chaining
    • 8.2 Multicasting
    • 8.3 Referral
    • 8.4 Mode determination
  • 9 Directory distribution
  • 10 Knowledge
    • 10.1 Minimal knowledge references
    • 10.2 Root context
    • 10.3 Knowledge references
    • 10.4 Knowledge administration
  • 11 Overview of DSA abstract service
  • 12 Information types
    • 12.1 Introduction
    • 12.2 Information types defined elsewhere
    • 12.3 Chaining arguments
    • 12.4 Chaining results
    • 12.5 Operation progress
    • 12.6 Trace information
    • 12.7 Reference type
    • 12.8 Access point
    • 12.9 Continuation reference
  • 13 Abstract-bind and abstract-unbind
    • 13.1 DSA bind
    • 13.2 DSA unbind
  • 14 Chained abstract-operations
  • 15 Chained abstract-errors
    • 15.1 Introduction
    • 15.2 DSA Referral
  • 16 Introduction
    • 16.1 Scope and limits
    • 16.2 Conceptual model
    • 16.3 Individual and cooperative operation of DSAs
  • 17 Distributed directory behaviour
    • 17.1 Cooperative fulfillment of operations
    • 17.2 Phases of operation processing
    • 17.3 Managing distributed operations
    • 17.4 Other considerations for distributed operation
    • 17.5 Authentication of distributed operations
  • 18 DSA behaviour
    • 18.1 Introduction
    • 18.2 Overview of the DSA behaviour
    • 18.3 Specific operations
    • 18.4 Operation dispatcher
    • 18.5 Looping
    • 18.6 Name resolution procedure
    • 18.7 Object evaluation procedures
    • 18.8 Result merging procedure
    • 18.9 Procedures for distributed authentication
  • ANNEX A – ASN.1 for distributed operations
  • ANNEX B – Modelling of knowledge
  • B.1 Example of knowledge modelling
  • B.2 Example of distributed name resolution
  • ANNEX C – Distributed use of authentication
  • C.1 Summary
  • C.2 Simple authentication
  • C.3 Distributed authentication model
  • C.4 DUA to DSA
  • C.5 Transference from the DAP to the DSP
  • C.6 Chaining through intermediate DSAs
  • C.7 Results authentication
  • ANNEX D – Distributed directory object identifiers