{"id":343774,"date":"2024-10-20T00:08:04","date_gmt":"2024-10-20T00:08:04","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-179632013\/"},"modified":"2024-10-25T23:27:17","modified_gmt":"2024-10-25T23:27:17","slug":"bs-iso-iec-179632013","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-179632013\/","title":{"rendered":"BS ISO\/IEC 17963:2013"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
9<\/td>\nCONTENTS <\/td>\n<\/tr>\n
11<\/td>\nFigures
Tables <\/td>\n<\/tr>\n
13<\/td>\nForeword <\/td>\n<\/tr>\n
16<\/td>\n1 Scope
2 Normative References <\/td>\n<\/tr>\n
18<\/td>\n3 Terms and Definitions <\/td>\n<\/tr>\n
21<\/td>\n4 Symbols and Abbreviated Terms
SOAP <\/td>\n<\/tr>\n
22<\/td>\n5 Addressing
5.1 Management Addressing
5.1.1 Introduction <\/td>\n<\/tr>\n
23<\/td>\n5.1.2 Endpoint References
5.1.2.1 Format of Endpoint References <\/td>\n<\/tr>\n
25<\/td>\n5.1.2.2 Binding Endpoint References <\/td>\n<\/tr>\n
26<\/td>\n5.1.3 Message Information Headers <\/td>\n<\/tr>\n
28<\/td>\n5.1.3.1 Formulating a Reply Message <\/td>\n<\/tr>\n
29<\/td>\n5.1.3.2 Associating Action with WSDL Operations
5.1.3.2.1 Explicit Association
5.1.3.2.2 Default Action Pattern <\/td>\n<\/tr>\n
31<\/td>\n5.2 Versions of Addressing
5.2.1 Technical Differences
5.3 Requirements for Compatibility <\/td>\n<\/tr>\n
32<\/td>\n5.3.1 Discovery or Negotiation
5.3.2 Client Negotiation Strategies
5.3.3 Initiating Message Exchanges <\/td>\n<\/tr>\n
33<\/td>\n5.3.4 Normative Rules
5.4 Use of Addressing in WS-Management
5.4.1 Use of Endpoint References <\/td>\n<\/tr>\n
34<\/td>\n5.4.2 WS-Management Default Addressing Model <\/td>\n<\/tr>\n
37<\/td>\n5.4.2.1 ResourceURI <\/td>\n<\/tr>\n
39<\/td>\n5.4.2.2 Selectors <\/td>\n<\/tr>\n
42<\/td>\n5.4.2.3 Faults for Default Addressing Model
5.4.3 Service-Specific Endpoint References
5.4.4 mustUnderstand <\/td>\n<\/tr>\n
43<\/td>\n5.4.5 wsa:To <\/td>\n<\/tr>\n
44<\/td>\n5.4.6 Other Addressing Headers
5.4.6.1 Processing Addressing Headers <\/td>\n<\/tr>\n
45<\/td>\n5.4.6.2 wsa:ReplyTo <\/td>\n<\/tr>\n
46<\/td>\n5.4.6.3 wsa:FaultTo <\/td>\n<\/tr>\n
47<\/td>\n5.4.6.4 wsa:MessageID and wsa:RelatesTo <\/td>\n<\/tr>\n
48<\/td>\n5.4.6.5 wsa:Action <\/td>\n<\/tr>\n
50<\/td>\n5.4.6.6 wsa:From
6 WS-Management Control Headers
6.1 wsman:OperationTimeout <\/td>\n<\/tr>\n
51<\/td>\n6.2 wsman:MaxEnvelopeSize <\/td>\n<\/tr>\n
52<\/td>\n6.3 wsman:Locale <\/td>\n<\/tr>\n
53<\/td>\n6.4 wsman:OptionSet <\/td>\n<\/tr>\n
56<\/td>\n6.5 wsman:RequestEPR <\/td>\n<\/tr>\n
57<\/td>\n7 Resource Access
7.1 General <\/td>\n<\/tr>\n
59<\/td>\n7.2 Addressing Uniformity <\/td>\n<\/tr>\n
60<\/td>\n7.3 Get <\/td>\n<\/tr>\n
61<\/td>\n7.4 Put <\/td>\n<\/tr>\n
65<\/td>\n7.5 Delete <\/td>\n<\/tr>\n
67<\/td>\n7.6 Create <\/td>\n<\/tr>\n
70<\/td>\n7.7 Fragment-Level Access <\/td>\n<\/tr>\n
72<\/td>\n7.8 Fragment-Level Get <\/td>\n<\/tr>\n
73<\/td>\n7.9 Fragment-Level Put <\/td>\n<\/tr>\n
76<\/td>\n7.10 Fragment-Level Delete <\/td>\n<\/tr>\n
77<\/td>\n7.11 Fragment-Level Create <\/td>\n<\/tr>\n
79<\/td>\n8 Enumeration of Datasets
8.1 General <\/td>\n<\/tr>\n
81<\/td>\n8.2 Enumerate <\/td>\n<\/tr>\n
83<\/td>\n8.2.1 General <\/td>\n<\/tr>\n
84<\/td>\n8.2.2 Enumeration “Count” Option <\/td>\n<\/tr>\n
85<\/td>\n8.2.3 Optimization for Enumerations with Small Result Sets <\/td>\n<\/tr>\n
88<\/td>\n8.3 Filter Interpretation <\/td>\n<\/tr>\n
90<\/td>\n8.4 Pull <\/td>\n<\/tr>\n
94<\/td>\n8.5 Release <\/td>\n<\/tr>\n
96<\/td>\n8.6 Ad-Hoc Queries and Fragment-Level Enumerations
8.7 Enumeration of EPRs <\/td>\n<\/tr>\n
98<\/td>\n8.8 Renew <\/td>\n<\/tr>\n
100<\/td>\n8.9 GetStatus
8.10 EnumerationEnd <\/td>\n<\/tr>\n
101<\/td>\n9 Custom Actions (Methods) <\/td>\n<\/tr>\n
102<\/td>\n10 Notifications (Eventing)
10.1 General <\/td>\n<\/tr>\n
103<\/td>\n10.2 Subscribe <\/td>\n<\/tr>\n
106<\/td>\n10.2.1 General <\/td>\n<\/tr>\n
108<\/td>\n10.2.2 Filtering <\/td>\n<\/tr>\n
110<\/td>\n10.2.3 Connection Retries <\/td>\n<\/tr>\n
111<\/td>\n10.2.4 SubscribeResponse
10.2.5 Heartbeats <\/td>\n<\/tr>\n
113<\/td>\n10.2.6 Bookmarks <\/td>\n<\/tr>\n
115<\/td>\n10.2.7 Delivery Modes <\/td>\n<\/tr>\n
116<\/td>\n10.2.8 Event Action URI
10.2.9 Delivery Sequencing and Acknowledgement <\/td>\n<\/tr>\n
117<\/td>\n10.2.9.1 General
10.2.9.2 Push Mode <\/td>\n<\/tr>\n
118<\/td>\n10.2.9.3 PushWithAck Mode
10.2.9.4 Batched Delivery Mode <\/td>\n<\/tr>\n
122<\/td>\n10.2.9.5 Pull Delivery Mode <\/td>\n<\/tr>\n
123<\/td>\n10.3 GetStatus <\/td>\n<\/tr>\n
124<\/td>\n10.4 Unsubscribe <\/td>\n<\/tr>\n
125<\/td>\n10.5 Renew <\/td>\n<\/tr>\n
126<\/td>\n10.6 SubscriptionEnd <\/td>\n<\/tr>\n
128<\/td>\n10.7 Acknowledgement of Delivery <\/td>\n<\/tr>\n
129<\/td>\n10.8 Refusal of Delivery <\/td>\n<\/tr>\n
130<\/td>\n10.9 Dropped Events <\/td>\n<\/tr>\n
131<\/td>\n10.10 Access Control <\/td>\n<\/tr>\n
132<\/td>\n10.11 Implementation Considerations
10.12 Advertisement of Notifications
11 Metadata and Discovery <\/td>\n<\/tr>\n
135<\/td>\n12 Security
12.1 General <\/td>\n<\/tr>\n
136<\/td>\n12.2 Security Profiles
12.3 Security Considerations for Event Subscriptions <\/td>\n<\/tr>\n
137<\/td>\n12.4 Including Credentials with a Subscription <\/td>\n<\/tr>\n
138<\/td>\n12.5 Correlating Events with a Subscription
12.6 Transport-Level Authentication Failure
12.7 Security Implications of Third-Party Subscriptions <\/td>\n<\/tr>\n
139<\/td>\n13 Transports and Message Encoding
13.1 SOAP <\/td>\n<\/tr>\n
140<\/td>\n13.2 Lack of Response
13.3 Replay of Messages
13.4 Encoding Limits <\/td>\n<\/tr>\n
141<\/td>\n13.5 Binary Attachments
13.6 Case-Sensitivity <\/td>\n<\/tr>\n
142<\/td>\n14 Faults
14.1 Introduction
14.2 Fault Encoding <\/td>\n<\/tr>\n
143<\/td>\n14.3 NotUnderstood Faults <\/td>\n<\/tr>\n
144<\/td>\n14.4 Degenerate Faults
14.5 Fault Extensibility <\/td>\n<\/tr>\n
145<\/td>\n14.6 Master Faults <\/td>\n<\/tr>\n
166<\/td>\nANNEX A (informative) Notational Conventions
A.1 XML Namespaces <\/td>\n<\/tr>\n
168<\/td>\nANNEX B (normative) Conformance <\/td>\n<\/tr>\n
169<\/td>\nANNEX C (normative) HTTP(S) Transport and Security Profile
C.1 General
C.2 HTTP(S) Binding <\/td>\n<\/tr>\n
171<\/td>\nC.3 HTTP(S) Security Profiles
C.3.1 http:\/\/schemas.dmtf.org\/wbem\/wsman\/1\/wsman\/secprofile\/http\/basic <\/td>\n<\/tr>\n
172<\/td>\nC.3.2 http:\/\/schemas.dmtf.org\/wbem\/wsman\/1\/wsman\/secprofile\/http\/digest
C.3.3 http:\/\/schemas.dmtf.org\/wbem\/wsman\/1\/wsman\/secprofile\/https\/basic <\/td>\n<\/tr>\n
173<\/td>\nC.3.4 http:\/\/schemas.dmtf.org\/wbem\/wsman\/1\/wsman\/secprofile\/https\/digest
C.3.5 http:\/\/schemas.dmtf.org\/wbem\/wsman\/1\/wsman\/secprofile\/https\/ mutual
C.3.6 http:\/\/schemas.dmtf.org\/wbem\/wsman\/1\/wsman\/secprofile\/https\/ mutual\/basic <\/td>\n<\/tr>\n
174<\/td>\nC.3.7 http:\/\/schemas.dmtf.org\/wbem\/wsman\/1\/wsman\/secprofile\/https\/ mutual\/digest
C.3.8 http:\/\/schemas.dmtf.org\/wbem\/wsman\/1\/wsman\/secprofile\/https\/ spnego-kerberos <\/td>\n<\/tr>\n
175<\/td>\nC.3.9 http:\/\/schemas.dmtf.org\/wbem\/wsman\/1\/wsman\/secprofile\/https\/ mutual\/spnego-kerberos <\/td>\n<\/tr>\n
176<\/td>\nC.3.10 http:\/\/schemas.dmtf.org\/wbem\/wsman\/1\/wsman\/secprofile\/http\/spnego-kerberos
C.4 IPSec and HTTP <\/td>\n<\/tr>\n
177<\/td>\nANNEX D (informative) XPath Support
D.1 General <\/td>\n<\/tr>\n
178<\/td>\nD.2 Level 1 <\/td>\n<\/tr>\n
180<\/td>\nD.3 Level 2 <\/td>\n<\/tr>\n
183<\/td>\nANNEX E (normative) Selector Filter Dialect <\/td>\n<\/tr>\n
185<\/td>\nANNEX F (informative) Identify XML Schema <\/td>\n<\/tr>\n
188<\/td>\nANNEX G (informative) Resource Access Operations XML Schema and WSDL <\/td>\n<\/tr>\n
193<\/td>\nANNEX H (informative) Enumeration Operations XML Schema and WSDL <\/td>\n<\/tr>\n
202<\/td>\nANNEX I (informative) Notification OperationsXML Schema and WSDL <\/td>\n<\/tr>\n
210<\/td>\nANNEX J (informative) Addressing XML Schema <\/td>\n<\/tr>\n
213<\/td>\nANNEX K (informative) WS-Management XML Schema <\/td>\n<\/tr>\n
223<\/td>\nANNEX L (informative) Change Log <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Web Services for Management (WS-Management) Specification<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2013<\/td>\n226<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":343778,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-343774","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/343774","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/343778"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=343774"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=343774"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=343774"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}