UIT-T Rec. X.518 (11/1988) – THE DIRECTORY – PROCEDURES FOR DISTRIBUTED OPERATION
CONTENTS
0 Introduction
1 Scope and field of application
2 References
3 Definitions
3.1 OSI Reference Model Definitions
3.2 Basic Directory Definitions
3.3 Directory Model Definitions
3.4 Abstract Service Definition Conventions
3.5 Distributed Operation Definitions
4 Abbreviations
5 Notation
6 Overview
7 Distributed directory system model
8 DSA interactions model
8.1 Chaining
8.2 Multicasting
8.3 Referral
8.4 Mode determination
9 Directory distribution
10 Knowledge
10.1 Minimal knowledge references
10.2 Root context
10.3 Knowledge references
10.4 Knowledge administration
11 Overview of DSA abstract service
12 Information types
12.1 Introduction
12.2 Information types defined elsewhere
12.3 Chaining arguments
12.4 Chaining results
12.5 Operation progress
12.6 Trace information
12.7 Reference type
12.8 Access point
12.9 Continuation reference
13 Abstract-bind and abstract-unbind
13.1 DSA bind
13.2 DSA unbind
14 Chained abstract-operations
15 Chained abstract-errors
15.1 Introduction
15.2 DSA Referral
16 Introduction
16.1 Scope and limits
16.2 Conceptual model
16.3 Individual and cooperative operation of DSAs
17 Distributed directory behaviour
17.1 Cooperative fulfillment of operations
17.2 Phases of operation processing
17.3 Managing distributed operations
17.4 Other considerations for distributed operation
17.5 Authentication of distributed operations
18 DSA behaviour
18.1 Introduction
18.2 Overview of the DSA behaviour
18.3 Specific operations
18.4 Operation dispatcher
18.5 Looping
18.6 Name resolution procedure
18.7 Object evaluation procedures
18.8 Result merging procedure
18.9 Procedures for distributed authentication
ANNEX A – ASN.1 for distributed operations
ANNEX B – Modelling of knowledge
B.1 Example of knowledge modelling
B.2 Example of distributed name resolution
ANNEX C – Distributed use of authentication
C.1 Summary
C.2 Simple authentication
C.3 Distributed authentication model
C.4 DUA to DSA
C.5 Transference from the DAP to the DSP
C.6 Chaining through intermediate DSAs
C.7 Results authentication
ANNEX D – Distributed directory object identifiers