Shopping Cart

No products in the cart.

BS ISO/IEC 9594-4:2017

$215.11

Information technology. Open Systems Interconnection. The Directory – Procedures for distributed operation

Published By Publication Date Number of Pages
BSI 2017 140
Guaranteed Safe Checkout
Categories: ,

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

PDF Catalog

PDF Pages PDF Title
2 National foreword
11 1 Scope
2 References
2.1 Normative references
2.1.1 Identical Recommendations | International Standards
2.1.2 Other references
12 2.2 Non-normative reference
3 Definitions
3.1 Basic Directory definitions
3.2 Directory model definitions
3.3 DSA information model definitions
13 3.4 Abstract service definitions
3.5 Protocol definitions
3.6 Directory replication definitions
3.7 Distributed operation definitions
15 4 Abbreviations
5 Conventions
17 6 Overview
18 7 Distributed Directory system model
19 8 DSA interactions model
8.1 Decomposition of a request
8.1.1 NSSR decomposition
8.1.2 Request decomposition
8.2 Uni-chaining
20 8.3 Multi-chaining
8.3.1 Parallel multi-chaining
8.3.2 Sequential multi-chaining
21 8.4 Referral
22 8.5 Mode determination
23 9 Overview of DSA abstract service
10 Information types
10.1 Introduction
10.2 Information types defined elsewhere
24 10.3 Chaining arguments
27 10.4 Chaining results
10.5 Operation progress
28 10.6 Trace information
10.7 Reference type
10.8 Access point information
29 10.9 DIT bridge knowledge
30 10.10 Exclusions
10.11 Continuation reference
31 11 Bind and Unbind
11.1 DSA Bind
11.1.1 DSA Bind syntax
32 11.1.2 DSA Bind arguments
11.1.3 DSA Bind results
11.1.4 DSA Bind errors
11.2 DSA Unbind
12 Chained operations
33 12.1 Chained operations
12.2 Chained Abandon operation
34 12.3 Chained operations and protocol version
13 Chained errors
13.1 Introduction
13.2 DSA referral
35 14 Introduction
14.1 Scope and limits
14.2 Conformance
14.2.1 Interaction involving a first edition DSA
14.3 Conceptual model
14.4 Individual and cooperative operation of DSAs
36 14.5 Cooperative agreements between DSAs
15 Distributed Directory behaviour
15.1 Cooperative fulfilment of operations
15.2 Phases of operation processing
15.2.1 Name Resolution phase
37 15.2.2 Evaluation phase
15.2.3 Results Merging phase
15.3 Managing Distributed Operations
15.3.1 Request decomposition
15.3.2 DSA as Request Responder
38 15.3.3 Completion of operations
15.4 Loop handling
15.4.1 Loop detection
15.4.2 Loop avoidance
39 15.5 Other considerations for distributed operation
15.5.1 Service controls
15.5.2 Extensions
40 15.5.3 Alias dereferencing
15.5.4 Paged results
15.5.5 Handling requests from LDAP client
15.6 Authentication of Distributed operations
41 16 The Operation Dispatcher
16.1 General concepts
16.1.1 Procedures
16.1.2 Use of common data structures
43 16.1.3 Errors
16.1.4 Asynchronous events
16.1.4.1 Time limit
44 16.1.4.2 Loss of an application-association
45 16.1.4.3 Abandoning the operation
16.1.4.4 Administrative Limits
16.1.4.5 Size limit
46 16.2 Procedures of the Operation Dispatcher
47 16.3 Overview of procedures
16.3.1 Request Validation procedure
16.3.2 Abandon procedures
16.3.3 Find DSE procedure
16.3.3.1 Target Not Found sub-procedure
16.3.3.2 Target Found sub-procedure
16.3.4 Single entry interrogation procedure
16.3.5 Modification procedures
48 16.3.6 Multiple entry interrogation procedures
16.3.7 Name Resolution Continuation Reference procedure
16.3.8 List and Search Continuation Reference procedure
16.3.9 Results Merging procedure
17 Request Validation procedure
17.1 Introduction
49 17.2 Procedure parameters
17.2.1 Arguments
17.2.2 Results
50 17.3 Procedure definition
17.3.1 Abandon processing
17.3.2 Security checks
17.3.3 Input preparation
17.3.3.1 DUA request
51 17.3.3.2 LDAP request
52 17.3.3.3 DSA request
17.3.4 Validity assertion
17.3.5 Loop detection
17.3.6 Unable or unwilling to perform
17.3.7 Output processing
18 Name Resolution procedure
18.1 Introduction
53 18.2 Find DSE procedure parameters
18.2.1 Arguments
18.2.2 Results
18.2.3 Errors
18.2.4 Global variables
18.2.5 Local and shared variables
54 18.3 Procedures
55 18.3.1 Find DSE procedure
58 18.3.2 Target Not Found sub-procedure
60 18.3.3 Target Found sub-procedure
61 18.3.4 Check Suitability procedure
62 18.3.4.1 Procedure parameters
63 18.3.4.2 Procedure definition
19 Operation evaluation
64 19.1 Modification procedures
19.1.1 Add Entry operation
65 19.1.2 Remove Entry operation
66 19.1.3 Modify Entry, Change Password and Administer Password operations
67 19.1.4 Modify DN operation
69 19.1.5 Modify operations and non-specific subordinate references
70 19.1.6 LDAP Modify operations
71 19.2 Single entry interrogation procedure
19.3 Multiple entry interrogation procedure
19.3.1 List procedures
19.3.1.1 Procedure parameters
19.3.1.1.1 Arguments
19.3.1.1.2 Results
19.3.1.2 Procedure definition
19.3.1.2.1 List (I) procedure
73 19.3.1.2.2 List (II) procedure
74 19.3.2 Search procedures
19.3.2.1 Procedure parameters
19.3.2.1.1 Arguments
75 19.3.2.1.2 Results
19.3.2.2 Procedure definition
19.3.2.2.1 Related Entry Argument procedure
76 19.3.2.2.2 Search-rule check procedure (I)
77 19.3.2.2.3 Search-rule check procedure (II)
78 19.3.2.2.4 Entry information selection
19.3.2.2.5 Search (I) procedure
81 19.3.2.2.6 Search (II) procedure
19.3.2.2.7 LDAP Search (I) procedure
83 19.3.2.2.8 LDAP Search (II) procedure
19.3.2.2.9 Search Alias procedure
84 19.3.2.2.10 Hierarchy Selection procedure (I)
85 20 Continuation Reference procedures
20.1 Chaining strategy in the presence of shadowing
87 20.1.1 Master only strategy
20.1.2 Parallel strategy
20.1.3 Sequential strategy
20.2 Issuing chained subrequests to a remote DSA or LDAP server
20.3 Procedures’ parameters
20.3.1 Arguments
88 20.3.2 Results
20.3.3 Errors
20.4 Definition of the procedures
20.4.1 Name Resolution Continuation Reference procedure
91 20.4.2 List Continuation Reference procedure
92 20.4.3 Search Continuation Reference procedure
94 20.4.4 APInfo procedure
97 20.5 Abandon procedures
20.5.1 DAP/DSP Abandon procedure
98 20.5.2 LDAP Abandon procedure
99 20.6 DAP request to LDAP request procedure
20.6.1 Introduction
20.6.2 General on conversion
20.6.3 Converting a DAP read request
100 20.6.4 Converting a DAP compare request
20.6.5 Handling and converting a DAP abandon request
20.6.6 Converting a DAP list request
101 20.6.7 Converting a DAP search request
102 20.6.8 Converting a DAP addEntry request
20.6.9 Converting a DAP removeEntry request
20.6.10 Converting a DAP modifyEntry request
20.6.11 Converting a DAP modifyDN request
103 20.7 LDAP result to DAP reply procedure
20.7.1 Introduction
20.7.2 General on conversion
20.7.3 Converting LDAP search results to DAP read result
20.7.4 Converting LDAP compare result to a DAP compare result
104 20.7.5 Converting LDAP search results to DAP list result
20.7.6 Converting LDAP search results to DAP search result
105 20.7.7 Converting LDAP AddResponse to DAP addEntry result
20.7.8 Converting LDAP DelResponse to DAP removeEntry result
20.7.9 Converting LDAP ModifyResponse to DAP modifyEntry result
20.7.10 Converting LDAP ModifyDNResponse to DAP modifyDN result
21 Results Merging procedure
107 22 Procedures for distributed authentication
108 22.1 Requester authentication
22.1.1 Identity-based authentication
22.1.2 Signature-based requester authentication
22.2 Results authentication
109 23 Knowledge administration overview
23.1 Maintenance of knowledge references
23.1.1 Maintenance of consumer knowledge by supplier and master DSAs
110 23.1.2 Maintenance of subordinate and immediate superior knowledge in master DSAs
23.1.3 Maintenance of subordinate and immediate superior knowledge in consumer DSAs
23.2 Requesting cross reference
111 23.3 Knowledge inconsistencies
23.3.1 Detection of knowledge inconsistencies
23.3.2 Reporting of knowledge inconsistencies
23.3.3 Treatment of inconsistent knowledge references
112 24 Hierarchical operational bindings
24.1 Operational binding type characteristics
24.1.1 Symmetry and roles
24.1.2 Agreement
24.1.3 Initiator
24.1.3.1 Establishment
24.1.3.2 Modification
24.1.3.3 Termination
24.1.4 Establishment parameters
113 24.1.4.1 Superior DSA establishment parameter
24.1.4.1.1 Context prefix information
24.1.4.1.2 Entry information
24.1.4.1.3 Immediate superior entry information
24.1.4.2 Subordinate DSA establishment parameter
114 24.1.5 Modification parameters
24.1.6 Termination parameters
24.1.7 Type identification
24.2 Operational binding information object Class definition
115 24.3 DSA procedures for hierarchical operational binding management
24.3.1 Establishment procedure
24.3.1.1 Establishment initiated by superior DSA
116 24.3.1.2 Establishment initiated by subordinate DSA
24.3.2 Modification procedure
117 24.3.2.1 Modification procedure initiated by superior
24.3.2.2 Modification procedure initiated by subordinate
118 24.3.3 Termination procedure
24.3.3.1 Termination initiated by superior DSA
24.3.3.2 Termination initiated by subordinate DSA
24.4 Procedures for operations
119 24.5 Use of application contexts
25 Non-specific hierarchical operational binding
25.1 Operational binding type characteristics
25.1.1 Symmetry and roles
25.1.2 Agreement
25.1.3 Initiator
25.1.3.1 Establishment
25.1.3.2 Modification
25.1.3.3 Termination
120 25.1.4 Establishment parameters
25.1.5 Modification parameters
25.1.6 Termination parameters
25.1.7 Type identification
25.2 Operational binding information object class definition
25.3 DSA procedures for non-specific hierarchical operational binding management
121 25.3.1 Establishment procedure
25.3.2 Modification procedure
25.3.3 Termination procedure
25.3.3.1 Termination initiated by superior DSA
122 25.3.3.2 Termination initiated by subordinate DSA
25.4 Procedures for operations
25.5 Use of application contexts
131 D.1 Summary
D.2 Distributed protection model
D.3 Signed chained operations
132 D.3.1 Chained signed arguments
D.3.2 Chained signed results
D.3.3 Merging of Signed List or Search Results
BS ISO/IEC 9594-4:2017
$215.11