Shopping Cart

No products in the cart.

BS ISO/IEC 9594-4:2014

$215.11

Information technology. Open Systems Interconnection. The Directory – Procedures for distributed operation

Published By Publication Date Number of Pages
BSI 2014 142
Guaranteed Safe Checkout
Categories: ,

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

PDF Catalog

PDF Pages PDF Title
3 ITU-T Rec. X.518 (10/2012) –
Information technology – Open Systems Interconnection – The Directory: Procedures for distributed operation
5 Summary
History
6 Blank Page
7 CONTENTS
10 Introduction
11 1 Scope
2 Normative references
2.1 Identical Recommendations | International Standards
12 2.2 Other references
3 Definitions
3.1 Basic Directory definitions
3.2 Directory model definitions
3.3 DSA information model definitions
13 3.4 Abstract service definitions
3.5 Protocol definitions
3.6 Directory replication definitions
3.7 Distributed operation definitions
15 4 Abbreviations
5 Conventions
17 6 Overview
18 7 Distributed Directory system model
19 8 DSA interactions model
8.1 Decomposition of a request
8.2 Uni-chaining
20 8.3 Multi-chaining
21 8.4 Referral
22 8.5 Mode determination
23 9 Overview of DSA abstract service
10 Information types
10.1 Introduction
10.2 Information types defined elsewhere
24 10.3 Chaining arguments
27 10.4 Chaining results
10.5 Operation progress
28 10.6 Trace information
10.7 Reference type
29 10.8 Access point information
30 10.9 DIT bridge knowledge
10.10 Exclusions
31 10.11 Continuation reference
32 11 Bind and Unbind
11.1 DSA Bind
33 11.2 DSA Unbind
12 Chained operations
12.1 Chained operations
34 12.2 Chained Abandon operation
12.3 Chained operations and protocol version
13 Chained errors
13.1 Introduction
13.2 DSA referral
36 14 Introduction
14.1 Scope and limits
14.2 Conformance
14.3 Conceptual model
14.4 Individual and cooperative operation of DSAs
37 14.5 Cooperative agreements between DSAs
15 Distributed Directory behaviour
15.1 Cooperative fulfilment of operations
15.2 Phases of operation processing
38 15.3 Managing Distributed Operations
39 15.4 Loop handling
40 15.5 Other considerations for distributed operation
41 15.6 Authentication of Distributed operations
42 16 The Operation Dispatcher
16.1 General concepts
47 16.2 Procedures of the Operation Dispatcher
48 16.3 Overview of procedures
49 17 Request Validation procedure
17.1 Introduction
50 17.2 Procedure parameters
51 17.3 Procedure definition
54 18 Name Resolution procedure
18.1 Introduction
18.2 Find DSE procedure parameters
55 18.3 Procedures
64 19 Operation evaluation
65 19.1 Modification procedures
72 19.2 Single entry interrogation procedure
19.3 Multiple entry interrogation procedure
87 20 Continuation Reference procedures
20.1 Chaining strategy in the presence of shadowing
89 20.2 Issuing chained subrequests to a remote DSA or LDAP server
90 20.3 Procedures’ parameters
20.4 Definition of the procedures
99 20.5 Abandon procedures
101 20.6 DAP request to LDAP request procedure
105 20.7 LDAP result to DAP reply procedure
107 21 Results Merging procedure
109 22 Procedures for distributed authentication
110 22.1 Requester authentication
22.2 Results authentication
111 23 Knowledge administration overview
23.1 Maintenance of knowledge references
112 23.2 Requesting cross reference
113 23.3 Knowledge inconsistencies
114 24 Hierarchical operational bindings
24.1 Operational binding type characteristics
117 24.2 Operational binding information object Class definition
24.3 DSA procedures for hierarchical operational binding management
121 24.4 Procedures for operations
24.5 Use of application contexts
25 Non-specific hierarchical operational binding
25.1 Operational binding type characteristics
122 25.2 Operational binding information object class definition
123 25.3 DSA procedures for non-specific hierarchical operational binding management
124 25.4 Procedures for operations
25.5 Use of application contexts
125 Annex A –
ASN.1 for Distributed Operations
129 Annex B –
Specification of hierarchical and non-specific hierarchical operational binding types
131 Annex C –
Example of distributed name resolution
133 Annex D –
Distributed use of authentication
D.1 Summary
D.2 Distributed protection model
D.3 Signed chained operations
135 Annex E –
Knowledge maintenance example
138 Annex F –
Amendments and corrigenda
139 Blank Page
BS ISO/IEC 9594-4:2014
$215.11