SECTION 1
– GENERAL
1 Scope
2 Normative
references
2.1
Identical Recommendations | International
Standards
2.2
Other references
3 Definitions
3.1
Communication Model Definitions
3.2
Basic Directory Definitions
3.3
Directory Model
Definitions
3.4
DSA Information Model definitions
3.5
Abstract Service definitions
3.6
Directory replication
definitions
3.7
Distributed operation
definitions
4 Abbreviations
SECTION 2 – OVERVIEW
5 Conventions
6 Overview
7 Distributed
Directory System Model
8 DSA
Interactions Model
8.1
Decomposition of a request
8.2
Uni-chaining
8.3
Multi-chaining
8.4
Referral
8.5 Mode
determination
SECTION 4 – DSA ABSTRACT SERVICE
9 Overview of DSA
Abstract Service
10 Information
types
10.1
Introduction
10.2
Information types defined
elsewhere
10.3
Chaining
Arguments
10.4
Chaining Results
10.5
Operation
Progress
10.6
Trace Information
10.7
Reference Type
10.8
Access point information
10.9
DIT Bridge
knowledge
10.10
Exclusions
10.11 Continuation
Reference
11 Bind and
Unbind
11.1
DSA Bind
11.2
DSA
Unbind
12 Chained
operations
12.1
Chained
operations
12.2
Chained Abandon operation
12.3
Chained operations and protocol
version
13 Chained
errors
13.1
Introduction
13.2
DSA Referral
SECTION 5 – DISTRIBUTED PROCEDURES
14 Introduction
14.1
Scope and Limits
14.2
Conformance
14.3
Conceptual model
14.4
Individual and cooperative operation of
DSAs
14.5
Cooperative agreements between DSAs
15 Distributed
Directory behaviour
15.1
Cooperative fulfilment of
operations
15.2
Phases of operation
processing
15.3
Managing Distributed Operations
15.4
Loop handling
15.5
Other considerations for distributed
operation
15.6
Authentication of Distributed
Operations
16 The
Operation
Dispatcher
16.1
General Concepts
16.2
Procedures of the Operation
Dispatcher
16.3
Overview of procedures
17 Request
Validation procedure
17.1
Introduction
17.2
Procedure
parameters
17.3
Procedure
definition
18 Name
Resolution procedure
18.1
Introduction
18.2
Find DSE procedure parameters
18.3
Procedures
19 Operation
evaluation
19.1
Modification procedure
19.2
Single entry interrogation
procedure
19.3
Multiple entry interrogation
procedure
20 Continuation
Reference procedures
20.1
Chaining strategy in the presence of
shadowing
20.2
Issuing chained subrequests to a remote
DSA
20.3
Procedures' parameters
20.4
Definition of the
procedures
20.5
Abandon
procedure
21 Results
Merging procedure
22 Procedures
for distributed authentication
22.1
Originator authentication
22.2
Results
authentication
SECTION 6 – KNOWLEDGE ADMINISTRATION
23 Knowledge administration
overview
23.1
Maintenance of knowledge
references
23.2
Requesting cross reference
23.3
Knowledge inconsistencies
23.4
Knowledge references and
contexts
24 Hierarchical
operational bindings
24.1
Operational binding type
characteristics
24.2
Operational binding information object Class
definition
24.3
DSA procedures for hierarchical operational binding
management
24.4
Procedures for operations
Page
24.5 Use of application
contexts
25 Non-specific
hierarchical operational binding
25.1
Operational binding type
characteristics
25.2
Operational binding information object class
definition
25.3
DSA procedures for non-specific hierarchical operational
binding management
25.4
Procedures for operations
25.5
Use of application
contexts
Annex A – ASN.1 for Distributed Operations
Annex B – Example of distributed name
resolution
Annex C – Distributed use of authentication
C.1
Summary
C.2
Distributed protection
model
C.3
Signed chained operations
C.4
Encrypted chained
operations
C.5
Signed and encrypted distributed
operations
Annex D – Specification of hierarchical and non-specific
hierarchical operational binding types
Annex E – Knowledge maintenance example
Annex F – Amendments and corrigenda