SECTION� 1� ��
GENERAL
�1���� Scope
�2���� Normative references
������� 2.1���� Identical Recommendations |
International Standards
�3���� Definitions
������� 3.1���� OSI Reference Model Definitions
������� 3.2���� Basic Directory Definitions
� ������3.3���� Directory
Model Definitions
������� 3.4���� DSA Information Model definitions
������� 3.5���� Directory replication definitions
������� 3.6���� Distributed operation definitions
�4���� Abbreviations
�5���� Conventions
SECTION� 2� ��
OVERVIEW
�6���� Overview
SECTION� 3� ��
DISTRIBUTED� DIRECTORY� MODELS
�7���� Distributed Directory System Model
�8���� DSA Interactions Model
������� 8.1���� Decomposition of a request
������� 8.2���� Uni-chaining
������� 8.3���� Multi-chaining
������� 8.4���� Referral
������� 8.5���� Mode
Determination
SECTION� 4� ��
DSA� ABSTRACT� SERVICE
�9���� Overview of DSA Abstract Service
10���� Information types
������ 10.1���� Introduction
������ 10.2���� Information types defined
elsewhere
������ 10.3���� Chaining Arguments
������ 10.4���� Chaining Results
������ 10.5���� Operation Progress
������ 10.6���� Trace Information
������ 10.7���� Reference Type
������ 10.8���� Access point information
������ 10.9���� Exclusions
����� 10.10���� Continuation Reference
11���� Bind and Unbind
������ 11.1���� DSA Bind
������ 11.2���� DSA Unbind
12���� Chained operations
������ 12.1���� Chained operations
������ 12.2���� Chained Abandon operation
������ 12.3���� Chained operations and protocol
version
13���� Chained errors
������ 13.1���� Introduction
������ 13.2���� DSA Referral
SECTION� 5� ��
DISTRIBUTED� PROCEDURES
14���� Introduction
������ 14.1���� Scope and Limits
������ 14.2���� Conformance
������ 14.3���� Conceptual model
������ 14.4���� Individual and cooperative
operation of DSAs
������ 14.5���� Cooperative agreements between
DSAs
15���� Distributed Directory behaviour
������ 15.1���� Cooperative fulfilment of
operations
������ 15.2���� Phases of operation processing
������ 15.3���� Managing Distributed Operations
������ 15.4���� Loop handling
������ 15.5���� Other considerations for
distributed operation
������ 15.6���� Authentication of Distributed
Operations
16���� The Operation Dispatcher
������ 16.1���� General Concepts
������ 16.2���� Procedures of the Operation Dispatcher
������ 16.3���� Overview of procedures
17���� Request Validation procedure
������ 17.1���� Introduction
������ 17.2���� Procedure parameters
������ 17.3���� Procedure definition
18���� Name Resolution procedure
������ 18.1���� Introduction
������ 18.2���� Find DSE procedure parameters
������ 18.3���� Procedures
19���� Operation evaluation
������ 19.1���� Modification procedure
������ 19.2���� Single entry interrogation
procedure
������ 19.3���� Multiple entry interrogation
procedure
20���� Continuation Reference procedures
������ 20.1���� Chaining strategy in the presence
of shadowing
������ 20.2���� Issuing chained subrequests to a
remote DSA
������ 20.3���� Procedures' parameters
������ 20.4���� Definition of the Procedures
������ 20.5���� Abandon procedure
21���� Results Merging procedure
22���� Procedures for distributed authentication
������ 22.1���� Originator authentication
������ 22.2���� Results authentication
SECTION� 6� ��
KNOWLEDGE� ADMINISTRATION
23���� Knowledge administration overview
������ 23.1���� Maintenance of Knowledge
References
������ 23.2���� Requesting cross reference
������ 23.3���� Knowledge inconsistencies
������ 23.4���� Knowledge References and contexts
24���� Hierarchical operational bindings
������ 24.1���� Operational binding type
characteristics
������ 24.2���� Operational binding information
object Class definition
������ 24.3���� DSA procedures for hierarchical
operational binding management
������ 24.4���� Procedures for operations
������ 24.5���� Use of application contexts
25���� Non-specific hierarchical operational binding
������ 25.1���� Operational binding type
characteristics
������ 25.2���� Operational binding information
object class definition
������ 25.3���� DSA procedures for non-specific
hierarchical operational binding management
������ 25.4���� Procedures for operations
������ 25.5���� Use of application contexts
Annex� A� �
ASN.1 for Distributed Operations
Annex� B� �
Example of distributed name resolution
Annex� C� � Distributed
use of authentication
������� C.1���� Summary
������� C.2���� Distributed protection model
������� C.3���� Signed Chained Operations
������� C.4���� Encrypted Chained Operations
������� C.5���� Signed and Encrypted Distributed
Operations
Annex �D� �
Specification of hierarchical and non-specific hierarchical operational binding
types
Annex� E� �
Knowledge maintenance example
Annex� F� �
Amendments and corrigenda