SECTION 1 –
GENERAL
1 Scope
2 Normative references
2.1 Identical Recommendations |
International Standards
3 Definitions
3.1 OSI Reference Model Definitions
3.2 Basic Directory Definitions
3.3 Directory
Model Definitions
3.4 DSA Information Model definitions
3.5 Directory replication definitions
3.6 Distributed operation definitions
4 Abbreviations
5 Conventions
SECTION 2 –
OVERVIEW
6 Overview
SECTION 3 –
DISTRIBUTED DIRECTORY MODELS
7 Distributed Directory System Model
8 DSA Interactions Model
8.1 Decomposition of a request
8.2 Uni-chaining
8.3 Multi-chaining
8.4 Referral
8.5 Mode
Determination
SECTION 4 –
DSA ABSTRACT SERVICE
9 Overview of DSA Abstract Service
10 Information types
10.1 Introduction
10.2 Information types defined
elsewhere
10.3 Chaining Arguments
10.4 Chaining Results
10.5 Operation Progress
10.6 Trace Information
10.7 Reference Type
10.8 Access point information
10.9 Exclusions
10.10 Continuation Reference
11 Bind and Unbind
11.1 DSA Bind
11.2 DSA Unbind
12 Chained operations
12.1 Chained operations
12.2 Chained Abandon operation
12.3 Chained operations and protocol
version
13 Chained errors
13.1 Introduction
13.2 DSA Referral
SECTION 5 –
DISTRIBUTED PROCEDURES
14 Introduction
14.1 Scope and Limits
14.2 Conformance
14.3 Conceptual model
14.4 Individual and cooperative
operation of DSAs
14.5 Cooperative agreements between
DSAs
15 Distributed Directory behaviour
15.1 Cooperative fulfilment of
operations
15.2 Phases of operation processing
15.3 Managing Distributed Operations
15.4 Loop handling
15.5 Other considerations for
distributed operation
15.6 Authentication of Distributed
Operations
16 The Operation Dispatcher
16.1 General Concepts
16.2 Procedures of the Operation Dispatcher
16.3 Overview of procedures
17 Request Validation procedure
17.1 Introduction
17.2 Procedure parameters
17.3 Procedure definition
18 Name Resolution procedure
18.1 Introduction
18.2 Find DSE procedure parameters
18.3 Procedures
19 Operation evaluation
19.1 Modification procedure
19.2 Single entry interrogation
procedure
19.3 Multiple entry interrogation
procedure
20 Continuation Reference procedures
20.1 Chaining strategy in the presence
of shadowing
20.2 Issuing chained subrequests to a
remote DSA
20.3 Procedures' parameters
20.4 Definition of the Procedures
20.5 Abandon procedure
21 Results Merging procedure
22 Procedures for distributed authentication
22.1 Originator authentication
22.2 Results authentication
SECTION 6 –
KNOWLEDGE ADMINISTRATION
23 Knowledge administration overview
23.1 Maintenance of Knowledge
References
23.2 Requesting cross reference
23.3 Knowledge inconsistencies
23.4 Knowledge References and contexts
24 Hierarchical operational bindings
24.1 Operational binding type
characteristics
24.2 Operational binding information
object Class definition
24.3 DSA procedures for hierarchical
operational binding management
24.4 Procedures for operations
24.5 Use of application contexts
25 Non-specific hierarchical operational binding
25.1 Operational binding type
characteristics
25.2 Operational binding information
object class definition
25.3 DSA procedures for non-specific
hierarchical operational binding management
25.4 Procedures for operations
25.5 Use of application contexts
Annex A –
ASN.1 for Distributed Operations
Annex B –
Example of distributed name resolution
Annex C – Distributed
use of authentication
C.1 Summary
C.2 Distributed protection model
C.3 Signed Chained Operations
C.4 Encrypted Chained Operations
C.5 Signed and Encrypted Distributed
Operations
Annex D –
Specification of hierarchical and non-specific hierarchical operational binding
types
Annex E –
Knowledge maintenance example
Annex F –
Amendments and corrigenda