Table of Contents

 1     Scope          
 2     Normative references             
        2.1     Identical Recommendations | International Standards       
        2.2     Other references           
 3     Definitions 
        3.1     Basic Directory definitions        
        3.2     Directory model definitions      
        3.3     DSA information model definitions        
        3.4     Abstract service definitions       
        3.5     Protocol definitions     
        3.6     Directory replication definitions             
        3.7     Distributed operation definitions            
 4     Abbreviations           
 5     Conventions             
 6     Overview    
 7     Distributed Directory system model   
 8     DSA interactions model         
        8.1     Decomposition of a request       
        8.2     Uni-chaining  
        8.3     Multi-chaining              
        8.4     Referral           
        8.5     Mode determination     
 9     Overview of DSA abstract service      
10     Information types   
       10.1     Introduction  
       10.2     Information types defined elsewhere    
       10.3     Chaining arguments    
       10.4     Chaining results           
       10.5     Operation progress      
       10.6     Trace information       
       10.7     Reference type             
       10.8     Access point information          
       10.9     DIT bridge knowledge
      10.10     Exclusions    
      10.11     Continuation reference            
11     Bind and Unbind    
       11.1     DSA Bind       
       11.2     DSA Unbind  
12     Chained operations
       12.1     Chained operations     
       12.2     Chained Abandon operation    
       12.3     Chained operations and protocol version            
13     Chained errors        
       13.1     Introduction  
       13.2     DSA referral  
14     Introduction            
       14.1     Scope and limits          
       14.2     Conformance
       14.3     Conceptual model       
       14.4     Individual and cooperative operation of DSAs   
       14.5     Cooperative agreements between DSAs
15     Distributed Directory behaviour        
       15.1     Cooperative fulfilment of operations    
       15.2     Phases of operation processing
       15.3     Managing Distributed Operations          
       15.4     Loop handling              
       15.5     Other considerations for distributed operation   
       15.6     Authentication of Distributed operations            
16     The Operation Dispatcher    
       16.1     General concepts         
       16.2     Procedures of the Operation Dispatcher              
       16.3     Overview of procedures            
17     Request Validation procedure            
       17.1     Introduction  
       17.2     Procedure parameters 
       17.3     Procedure definition   
18     Name Resolution procedure
       18.1     Introduction  
       18.2     Find DSE procedure parameters             
       18.3     Procedures     
19     Operation evaluation            
       19.1     Modification procedures          
       19.2     Single entry interrogation procedure     
       19.3     Multiple entry interrogation procedure 
20     Continuation Reference procedures  
       20.1     Chaining strategy in the presence of shadowing 
       20.2     Issuing chained subrequests to a remote DSA or LDAP server      
       20.3     Procedures' parameters             
       20.4     Definition of the procedures    
       20.5     Abandon procedures  
       20.6     DAP request to LDAP request procedure             
       20.7     LDAP result to DAP reply procedure     
21     Results Merging procedure  
22     Procedures for distributed authentication       
       22.1     Requester authentication          
       22.2     Results authentication
23     Knowledge administration overview
       23.1     Maintenance of knowledge references  
       23.2     Requesting cross reference       
       23.3     Knowledge inconsistencies      
24     Hierarchical operational bindings     
       24.1     Operational binding type characteristics             
       24.2     Operational binding information object Class definition 
       24.3     DSA procedures for hierarchical operational binding management             
       24.4     Procedures for operations         
       24.5     Use of application contexts      
25     Non-specific hierarchical operational binding              
       25.1     Operational binding type characteristics             
       25.2     Operational binding information object class definition  
       25.3     DSA procedures for non-specific hierarchical operational binding management     
       25.4     Procedures for operations         
       25.5     Use of application contexts      
      Page
Annex A – ASN.1 for Distributed Operations    
Annex B – Specification of hierarchical and non-specific hierarchical  operational binding types    
Annex C – Example of distributed name resolution    
Annex D – Distributed use of authentication    
        D.1     Summary        
        D.2     Distributed protection model    
        D.3     Signed chained operations        
Annex E – Knowledge maintenance example    
Annex F – Amendments and corrigenda