SECTION 1
– GENERAL
1 Scope
2 Normative references
2.1 Identical Recommendations | International Standards
3
Definitions
3.1 OSI Reference Model Definitions
3.2 Basic Directory Definitions
3.3 Directory
Model Definitions
3.4 DSA Information Model definitions
3.5 Directory replication definitions
3.6 Distributed operation definitions
4
Abbreviations
5
Conventions
SECTION 2 – OVERVIEW
6
Overview
SECTION 3 – DISTRIBUTED DIRECTORY
MODELS
7
Distributed Directory System Model
8
DSA Interactions Model
8.1 Decomposition of a request
8.2 Uni-chaining
8.3 Multi-chaining
8.4 Referral
8.5 Mode
Determination
SECTION 4 – DSA ABSTRACT
SERVICE
9 Overview of DSA Abstract Service
10 Information types
10.1 Introduction
10.2 Information types defined elsewhere
10.3 Chaining Arguments
10.4 Chaining Results
10.5 Operation Progress
10.6 Trace Information
10.7 Reference Type
10.8 Access point
information
10.9 Exclusions
10.10 Continuation Reference
11 Bind and Unbind
11.1 DSA Bind
11.2 DSA Unbind
12 Chained operations
12.1 Chained operations
12.2 Chained Abandon operation
12.3 Chained operations and protocol version
13 Chained errors
13.1 Introduction
13.2 DSA Referral
SECTION 5 – DISTRIBUTED PROCEDURES
14 Introduction
14.1 Scope and Limits
14.2 Conformance
14.3 Conceptual model
14.4 Individual and cooperative operation of DSAs
14.5 Cooperative agreements between DSAs
15 Distributed Directory behaviour
15.1 Cooperative fulfilment of operations
15.2 Phases of operation processing
15.3 Managing Distributed Operations
15.4 Loop handling
15.5 Other considerations for distributed operation
15.6 Authentication of Distributed Operations
16 The Operation Dispatcher
16.1 General Concepts
16.2 Procedures of the operation dispatcher
16.3 Overview of procedures
17 Request Validation procedure
17.1 Introduction
17.2 Procedure parameters
17.3 Procedure definition
18 Name Resolution procedure
18.1 Introduction
18.2 Find DSE procedure
parameters
18.3 Procedures
19 Operation evaluation
19.1 Modification procedure
19.2 Single entry interrogation procedure
19.3 Multiple entry interrogation procedure
20 Continuation Reference procedures
20.1 Chaining strategy in the presence of shadowing
20.2 Issuing chained subrequests to a remote DSA
20.3 Procedures’ parameters
20.4 Definition of the Procedures
20.5 Abandon procedure
21 Results Merging procedure
22 Procedures for distributed
authentication
22.1 Originator authentication
22.2 Results authentication
SECTION 6 – KNOWLEDGE ADMINISTRATION
23 Knowledge administration overview
23.1 Maintenance of Knowledge References
23.2 Requesting cross reference
23.3 Knowledge inconsistencies
23.4 Knowledge References and contexts
24 Hierarchical operational bindings
24.1 Operational binding type characteristics
24.2 Operational binding information object Class definition
24.3 DSA procedures for hierarchical operational binding management
24.4 Procedures for operations
24.5 Use of application contexts
25 Non-specific hierarchical
operational binding
25.1 Operational binding type characteristics
25.2 Operational binding information object class definition
25.3 DSA procedures for non-specific hierarchical operational
binding management
25.4 Procedures for operations
25.5 Use of application contexts
Annex A – ASN.1 for Distributed
Operations
Annex B – Example of distributed
name resolution
Annex C – Distributed use of
authentication
C.1 Summary
C.2 Distributed protection model
C.3 Signed Chained Operations
C.4 Encrypted Chained Operations
C.5 Signed and Encrypted Distributed Operations
Annex D – Specification of
hierarchical and non-specific hierarchical operational binding types
Annex E – Knowledge maintenance
example
Annex F – Amendments and
corrigenda