Information technology – Open Systems Interconnection – The Directory: Use of systems management for administration of the Directory |
|
The Directory may support open systems applications such as message handling systems; file transfer, access and management (FTAM) systems; and transaction processing systems. Therefore, the Directory system may be manageable from an integrated system management platform.The purpose of Directory management is to assure that needed, accurate Directory information is available to users as scheduled with the expected response time, integrity, security and level of consistency. Furthermore, systems management may be accomplished with the minimum burden on processing time and memory on platforms and the communications system.This Recommendation | International Standard describes the requirements for Directory management, and analyses these requirements to identify those that may be realized by OSI systems management services (and protocols), those that are realized by Directory services (and protocols), and those that are realized by local means. |
|
Citation: |
https://handle.itu.int/11.1002/1000/9601 |
Series title: |
X series: Data networks, open system communications and security X.500-X.599: Directory |
Approval date: |
2008-11-13 |
Identical standard: | ISO/IEC 9594-10:2008 (Common) |
Approval process: | AAP |
Status: |
In force |
Maintenance responsibility: |
ITU-T Study Group 17 |
Further details: |
Patent statement(s)
Development history
|
|
|
Title |
Approved on |
Download |
Directory Implementers' Guide for ITU-T X.500-series - Version 15, August 2001
|
2001-09-07
|
here
|
Directory Implementers' Guide for ITU-T X.500-series - Version 14, March 2001
|
2001-03-01
|
here
|
X.530 (2008-11)
|
Index of all ASN.1 assignments defined in this Recommendation.
|
|
Click
here
to download all the modules of this Recommendation (zipped archive)
|
Click here to download all the modules needed to compile this Recommendation (zipped archive)
|
Title |
Approved on |
Download |
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
|