{"id":353217,"date":"2024-10-20T00:56:46","date_gmt":"2024-10-20T00:56:46","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-9594-42017\/"},"modified":"2024-10-26T01:02:29","modified_gmt":"2024-10-26T01:02:29","slug":"bs-iso-iec-9594-42017","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-9594-42017\/","title":{"rendered":"BS ISO\/IEC 9594-4:2017"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
2<\/td>\nNational foreword <\/td>\n<\/tr>\n
11<\/td>\n1 Scope
2 References
2.1 Normative references
2.1.1 Identical Recommendations | International Standards
2.1.2 Other references <\/td>\n<\/tr>\n
12<\/td>\n2.2 Non-normative reference
3 Definitions
3.1 Basic Directory definitions
3.2 Directory model definitions
3.3 DSA information model definitions <\/td>\n<\/tr>\n
13<\/td>\n3.4 Abstract service definitions
3.5 Protocol definitions
3.6 Directory replication definitions
3.7 Distributed operation definitions <\/td>\n<\/tr>\n
15<\/td>\n4 Abbreviations
5 Conventions <\/td>\n<\/tr>\n
17<\/td>\n6 Overview <\/td>\n<\/tr>\n
18<\/td>\n7 Distributed Directory system model <\/td>\n<\/tr>\n
19<\/td>\n8 DSA interactions model
8.1 Decomposition of a request
8.1.1 NSSR decomposition
8.1.2 Request decomposition
8.2 Uni-chaining <\/td>\n<\/tr>\n
20<\/td>\n8.3 Multi-chaining
8.3.1 Parallel multi-chaining
8.3.2 Sequential multi-chaining <\/td>\n<\/tr>\n
21<\/td>\n8.4 Referral <\/td>\n<\/tr>\n
22<\/td>\n8.5 Mode determination <\/td>\n<\/tr>\n
23<\/td>\n9 Overview of DSA abstract service
10 Information types
10.1 Introduction
10.2 Information types defined elsewhere <\/td>\n<\/tr>\n
24<\/td>\n10.3 Chaining arguments <\/td>\n<\/tr>\n
27<\/td>\n10.4 Chaining results
10.5 Operation progress <\/td>\n<\/tr>\n
28<\/td>\n10.6 Trace information
10.7 Reference type
10.8 Access point information <\/td>\n<\/tr>\n
29<\/td>\n10.9 DIT bridge knowledge <\/td>\n<\/tr>\n
30<\/td>\n10.10 Exclusions
10.11 Continuation reference <\/td>\n<\/tr>\n
31<\/td>\n11 Bind and Unbind
11.1 DSA Bind
11.1.1 DSA Bind syntax <\/td>\n<\/tr>\n
32<\/td>\n11.1.2 DSA Bind arguments
11.1.3 DSA Bind results
11.1.4 DSA Bind errors
11.2 DSA Unbind
12 Chained operations <\/td>\n<\/tr>\n
33<\/td>\n12.1 Chained operations
12.2 Chained Abandon operation <\/td>\n<\/tr>\n
34<\/td>\n12.3 Chained operations and protocol version
13 Chained errors
13.1 Introduction
13.2 DSA referral <\/td>\n<\/tr>\n
35<\/td>\n14 Introduction
14.1 Scope and limits
14.2 Conformance
14.2.1 Interaction involving a first edition DSA
14.3 Conceptual model
14.4 Individual and cooperative operation of DSAs <\/td>\n<\/tr>\n
36<\/td>\n14.5 Cooperative agreements between DSAs
15 Distributed Directory behaviour
15.1 Cooperative fulfilment of operations
15.2 Phases of operation processing
15.2.1 Name Resolution phase <\/td>\n<\/tr>\n
37<\/td>\n15.2.2 Evaluation phase
15.2.3 Results Merging phase
15.3 Managing Distributed Operations
15.3.1 Request decomposition
15.3.2 DSA as Request Responder <\/td>\n<\/tr>\n
38<\/td>\n15.3.3 Completion of operations
15.4 Loop handling
15.4.1 Loop detection
15.4.2 Loop avoidance <\/td>\n<\/tr>\n
39<\/td>\n15.5 Other considerations for distributed operation
15.5.1 Service controls
15.5.2 Extensions <\/td>\n<\/tr>\n
40<\/td>\n15.5.3 Alias dereferencing
15.5.4 Paged results
15.5.5 Handling requests from LDAP client
15.6 Authentication of Distributed operations <\/td>\n<\/tr>\n
41<\/td>\n16 The Operation Dispatcher
16.1 General concepts
16.1.1 Procedures
16.1.2 Use of common data structures <\/td>\n<\/tr>\n
43<\/td>\n16.1.3 Errors
16.1.4 Asynchronous events
16.1.4.1 Time limit <\/td>\n<\/tr>\n
44<\/td>\n16.1.4.2 Loss of an application-association <\/td>\n<\/tr>\n
45<\/td>\n16.1.4.3 Abandoning the operation
16.1.4.4 Administrative Limits
16.1.4.5 Size limit <\/td>\n<\/tr>\n
46<\/td>\n16.2 Procedures of the Operation Dispatcher <\/td>\n<\/tr>\n
47<\/td>\n16.3 Overview of procedures
16.3.1 Request Validation procedure
16.3.2 Abandon procedures
16.3.3 Find DSE procedure
16.3.3.1 Target Not Found sub-procedure
16.3.3.2 Target Found sub-procedure
16.3.4 Single entry interrogation procedure
16.3.5 Modification procedures <\/td>\n<\/tr>\n
48<\/td>\n16.3.6 Multiple entry interrogation procedures
16.3.7 Name Resolution Continuation Reference procedure
16.3.8 List and Search Continuation Reference procedure
16.3.9 Results Merging procedure
17 Request Validation procedure
17.1 Introduction <\/td>\n<\/tr>\n
49<\/td>\n17.2 Procedure parameters
17.2.1 Arguments
17.2.2 Results <\/td>\n<\/tr>\n
50<\/td>\n17.3 Procedure definition
17.3.1 Abandon processing
17.3.2 Security checks
17.3.3 Input preparation
17.3.3.1 DUA request <\/td>\n<\/tr>\n
51<\/td>\n17.3.3.2 LDAP request <\/td>\n<\/tr>\n
52<\/td>\n17.3.3.3 DSA request
17.3.4 Validity assertion
17.3.5 Loop detection
17.3.6 Unable or unwilling to perform
17.3.7 Output processing
18 Name Resolution procedure
18.1 Introduction <\/td>\n<\/tr>\n
53<\/td>\n18.2 Find DSE procedure parameters
18.2.1 Arguments
18.2.2 Results
18.2.3 Errors
18.2.4 Global variables
18.2.5 Local and shared variables <\/td>\n<\/tr>\n
54<\/td>\n18.3 Procedures <\/td>\n<\/tr>\n
55<\/td>\n18.3.1 Find DSE procedure <\/td>\n<\/tr>\n
58<\/td>\n18.3.2 Target Not Found sub-procedure <\/td>\n<\/tr>\n
60<\/td>\n18.3.3 Target Found sub-procedure <\/td>\n<\/tr>\n
61<\/td>\n18.3.4 Check Suitability procedure <\/td>\n<\/tr>\n
62<\/td>\n18.3.4.1 Procedure parameters <\/td>\n<\/tr>\n
63<\/td>\n18.3.4.2 Procedure definition
19 Operation evaluation <\/td>\n<\/tr>\n
64<\/td>\n19.1 Modification procedures
19.1.1 Add Entry operation <\/td>\n<\/tr>\n
65<\/td>\n19.1.2 Remove Entry operation <\/td>\n<\/tr>\n
66<\/td>\n19.1.3 Modify Entry, Change Password and Administer Password operations <\/td>\n<\/tr>\n
67<\/td>\n19.1.4 Modify DN operation <\/td>\n<\/tr>\n
69<\/td>\n19.1.5 Modify operations and non-specific subordinate references <\/td>\n<\/tr>\n
70<\/td>\n19.1.6 LDAP Modify operations <\/td>\n<\/tr>\n
71<\/td>\n19.2 Single entry interrogation procedure
19.3 Multiple entry interrogation procedure
19.3.1 List procedures
19.3.1.1 Procedure parameters
19.3.1.1.1 Arguments
19.3.1.1.2 Results
19.3.1.2 Procedure definition
19.3.1.2.1 List (I) procedure <\/td>\n<\/tr>\n
73<\/td>\n19.3.1.2.2 List (II) procedure <\/td>\n<\/tr>\n
74<\/td>\n19.3.2 Search procedures
19.3.2.1 Procedure parameters
19.3.2.1.1 Arguments <\/td>\n<\/tr>\n
75<\/td>\n19.3.2.1.2 Results
19.3.2.2 Procedure definition
19.3.2.2.1 Related Entry Argument procedure <\/td>\n<\/tr>\n
76<\/td>\n19.3.2.2.2 Search-rule check procedure (I) <\/td>\n<\/tr>\n
77<\/td>\n19.3.2.2.3 Search-rule check procedure (II) <\/td>\n<\/tr>\n
78<\/td>\n19.3.2.2.4 Entry information selection
19.3.2.2.5 Search (I) procedure <\/td>\n<\/tr>\n
81<\/td>\n19.3.2.2.6 Search (II) procedure
19.3.2.2.7 LDAP Search (I) procedure <\/td>\n<\/tr>\n
83<\/td>\n19.3.2.2.8 LDAP Search (II) procedure
19.3.2.2.9 Search Alias procedure <\/td>\n<\/tr>\n
84<\/td>\n19.3.2.2.10 Hierarchy Selection procedure (I) <\/td>\n<\/tr>\n
85<\/td>\n20 Continuation Reference procedures
20.1 Chaining strategy in the presence of shadowing <\/td>\n<\/tr>\n
87<\/td>\n20.1.1 Master only strategy
20.1.2 Parallel strategy
20.1.3 Sequential strategy
20.2 Issuing chained subrequests to a remote DSA or LDAP server
20.3 Procedures’ parameters
20.3.1 Arguments <\/td>\n<\/tr>\n
88<\/td>\n20.3.2 Results
20.3.3 Errors
20.4 Definition of the procedures
20.4.1 Name Resolution Continuation Reference procedure <\/td>\n<\/tr>\n
91<\/td>\n20.4.2 List Continuation Reference procedure <\/td>\n<\/tr>\n
92<\/td>\n20.4.3 Search Continuation Reference procedure <\/td>\n<\/tr>\n
94<\/td>\n20.4.4 APInfo procedure <\/td>\n<\/tr>\n
97<\/td>\n20.5 Abandon procedures
20.5.1 DAP\/DSP Abandon procedure <\/td>\n<\/tr>\n
98<\/td>\n20.5.2 LDAP Abandon procedure <\/td>\n<\/tr>\n
99<\/td>\n20.6 DAP request to LDAP request procedure
20.6.1 Introduction
20.6.2 General on conversion
20.6.3 Converting a DAP read request <\/td>\n<\/tr>\n
100<\/td>\n20.6.4 Converting a DAP compare request
20.6.5 Handling and converting a DAP abandon request
20.6.6 Converting a DAP list request <\/td>\n<\/tr>\n
101<\/td>\n20.6.7 Converting a DAP search request <\/td>\n<\/tr>\n
102<\/td>\n20.6.8 Converting a DAP addEntry request
20.6.9 Converting a DAP removeEntry request
20.6.10 Converting a DAP modifyEntry request
20.6.11 Converting a DAP modifyDN request <\/td>\n<\/tr>\n
103<\/td>\n20.7 LDAP result to DAP reply procedure
20.7.1 Introduction
20.7.2 General on conversion
20.7.3 Converting LDAP search results to DAP read result
20.7.4 Converting LDAP compare result to a DAP compare result <\/td>\n<\/tr>\n
104<\/td>\n20.7.5 Converting LDAP search results to DAP list result
20.7.6 Converting LDAP search results to DAP search result <\/td>\n<\/tr>\n
105<\/td>\n20.7.7 Converting LDAP AddResponse to DAP addEntry result
20.7.8 Converting LDAP DelResponse to DAP removeEntry result
20.7.9 Converting LDAP ModifyResponse to DAP modifyEntry result
20.7.10 Converting LDAP ModifyDNResponse to DAP modifyDN result
21 Results Merging procedure <\/td>\n<\/tr>\n
107<\/td>\n22 Procedures for distributed authentication <\/td>\n<\/tr>\n
108<\/td>\n22.1 Requester authentication
22.1.1 Identity-based authentication
22.1.2 Signature-based requester authentication
22.2 Results authentication <\/td>\n<\/tr>\n
109<\/td>\n23 Knowledge administration overview
23.1 Maintenance of knowledge references
23.1.1 Maintenance of consumer knowledge by supplier and master DSAs <\/td>\n<\/tr>\n
110<\/td>\n23.1.2 Maintenance of subordinate and immediate superior knowledge in master DSAs
23.1.3 Maintenance of subordinate and immediate superior knowledge in consumer DSAs
23.2 Requesting cross reference <\/td>\n<\/tr>\n
111<\/td>\n23.3 Knowledge inconsistencies
23.3.1 Detection of knowledge inconsistencies
23.3.2 Reporting of knowledge inconsistencies
23.3.3 Treatment of inconsistent knowledge references <\/td>\n<\/tr>\n
112<\/td>\n24 Hierarchical operational bindings
24.1 Operational binding type characteristics
24.1.1 Symmetry and roles
24.1.2 Agreement
24.1.3 Initiator
24.1.3.1 Establishment
24.1.3.2 Modification
24.1.3.3 Termination
24.1.4 Establishment parameters <\/td>\n<\/tr>\n
113<\/td>\n24.1.4.1 Superior DSA establishment parameter
24.1.4.1.1 Context prefix information
24.1.4.1.2 Entry information
24.1.4.1.3 Immediate superior entry information
24.1.4.2 Subordinate DSA establishment parameter <\/td>\n<\/tr>\n
114<\/td>\n24.1.5 Modification parameters
24.1.6 Termination parameters
24.1.7 Type identification
24.2 Operational binding information object Class definition <\/td>\n<\/tr>\n
115<\/td>\n24.3 DSA procedures for hierarchical operational binding management
24.3.1 Establishment procedure
24.3.1.1 Establishment initiated by superior DSA <\/td>\n<\/tr>\n
116<\/td>\n24.3.1.2 Establishment initiated by subordinate DSA
24.3.2 Modification procedure <\/td>\n<\/tr>\n
117<\/td>\n24.3.2.1 Modification procedure initiated by superior
24.3.2.2 Modification procedure initiated by subordinate <\/td>\n<\/tr>\n
118<\/td>\n24.3.3 Termination procedure
24.3.3.1 Termination initiated by superior DSA
24.3.3.2 Termination initiated by subordinate DSA
24.4 Procedures for operations <\/td>\n<\/tr>\n
119<\/td>\n24.5 Use of application contexts
25 Non-specific hierarchical operational binding
25.1 Operational binding type characteristics
25.1.1 Symmetry and roles
25.1.2 Agreement
25.1.3 Initiator
25.1.3.1 Establishment
25.1.3.2 Modification
25.1.3.3 Termination <\/td>\n<\/tr>\n
120<\/td>\n25.1.4 Establishment parameters
25.1.5 Modification parameters
25.1.6 Termination parameters
25.1.7 Type identification
25.2 Operational binding information object class definition
25.3 DSA procedures for non-specific hierarchical operational binding management <\/td>\n<\/tr>\n
121<\/td>\n25.3.1 Establishment procedure
25.3.2 Modification procedure
25.3.3 Termination procedure
25.3.3.1 Termination initiated by superior DSA <\/td>\n<\/tr>\n
122<\/td>\n25.3.3.2 Termination initiated by subordinate DSA
25.4 Procedures for operations
25.5 Use of application contexts <\/td>\n<\/tr>\n
131<\/td>\nD.1 Summary
D.2 Distributed protection model
D.3 Signed chained operations <\/td>\n<\/tr>\n
132<\/td>\nD.3.1 Chained signed arguments
D.3.2 Chained signed results
D.3.3 Merging of Signed List or Search Results <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Information technology. Open Systems Interconnection. The Directory – Procedures for distributed operation<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2017<\/td>\n140<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":353222,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[675,2641],"product_tag":[],"class_list":{"0":"post-353217","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-35-100-70","7":"product_cat-bsi","9":"first","10":"instock","11":"sold-individually","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/353217","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/353222"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=353217"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=353217"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=353217"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}