{"id":343774,"date":"2024-10-20T00:08:04","date_gmt":"2024-10-20T00:08:04","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-179632013\/"},"modified":"2024-10-25T23:27:17","modified_gmt":"2024-10-25T23:27:17","slug":"bs-iso-iec-179632013","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-179632013\/","title":{"rendered":"BS ISO\/IEC 17963:2013"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
9<\/td>\n | CONTENTS <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | Figures Tables <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 1 Scope 2 Normative References <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 3 Terms and Definitions <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 4 Symbols and Abbreviated Terms SOAP <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 5 Addressing 5.1 Management Addressing 5.1.1 Introduction <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 5.1.2 Endpoint References 5.1.2.1 Format of Endpoint References <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 5.1.2.2 Binding Endpoint References <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 5.1.3 Message Information Headers <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 5.1.3.1 Formulating a Reply Message <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 5.1.3.2 Associating Action with WSDL Operations 5.1.3.2.1 Explicit Association 5.1.3.2.2 Default Action Pattern <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 5.2 Versions of Addressing 5.2.1 Technical Differences 5.3 Requirements for Compatibility <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 5.3.1 Discovery or Negotiation 5.3.2 Client Negotiation Strategies 5.3.3 Initiating Message Exchanges <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 5.3.4 Normative Rules 5.4 Use of Addressing in WS-Management 5.4.1 Use of Endpoint References <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | 5.4.2 WS-Management Default Addressing Model <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | 5.4.2.1 ResourceURI <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | 5.4.2.2 Selectors <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | 5.4.2.3 Faults for Default Addressing Model 5.4.3 Service-Specific Endpoint References 5.4.4 mustUnderstand <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | 5.4.5 wsa:To <\/td>\n<\/tr>\n | ||||||
44<\/td>\n | 5.4.6 Other Addressing Headers 5.4.6.1 Processing Addressing Headers <\/td>\n<\/tr>\n | ||||||
45<\/td>\n | 5.4.6.2 wsa:ReplyTo <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | 5.4.6.3 wsa:FaultTo <\/td>\n<\/tr>\n | ||||||
47<\/td>\n | 5.4.6.4 wsa:MessageID and wsa:RelatesTo <\/td>\n<\/tr>\n | ||||||
48<\/td>\n | 5.4.6.5 wsa:Action <\/td>\n<\/tr>\n | ||||||
50<\/td>\n | 5.4.6.6 wsa:From 6 WS-Management Control Headers 6.1 wsman:OperationTimeout <\/td>\n<\/tr>\n | ||||||
51<\/td>\n | 6.2 wsman:MaxEnvelopeSize <\/td>\n<\/tr>\n | ||||||
52<\/td>\n | 6.3 wsman:Locale <\/td>\n<\/tr>\n | ||||||
53<\/td>\n | 6.4 wsman:OptionSet <\/td>\n<\/tr>\n | ||||||
56<\/td>\n | 6.5 wsman:RequestEPR <\/td>\n<\/tr>\n | ||||||
57<\/td>\n | 7 Resource Access 7.1 General <\/td>\n<\/tr>\n | ||||||
59<\/td>\n | 7.2 Addressing Uniformity <\/td>\n<\/tr>\n | ||||||
60<\/td>\n | 7.3 Get <\/td>\n<\/tr>\n | ||||||
61<\/td>\n | 7.4 Put <\/td>\n<\/tr>\n | ||||||
65<\/td>\n | 7.5 Delete <\/td>\n<\/tr>\n | ||||||
67<\/td>\n | 7.6 Create <\/td>\n<\/tr>\n | ||||||
70<\/td>\n | 7.7 Fragment-Level Access <\/td>\n<\/tr>\n | ||||||
72<\/td>\n | 7.8 Fragment-Level Get <\/td>\n<\/tr>\n | ||||||
73<\/td>\n | 7.9 Fragment-Level Put <\/td>\n<\/tr>\n | ||||||
76<\/td>\n | 7.10 Fragment-Level Delete <\/td>\n<\/tr>\n | ||||||
77<\/td>\n | 7.11 Fragment-Level Create <\/td>\n<\/tr>\n | ||||||
79<\/td>\n | 8 Enumeration of Datasets 8.1 General <\/td>\n<\/tr>\n | ||||||
81<\/td>\n | 8.2 Enumerate <\/td>\n<\/tr>\n | ||||||
83<\/td>\n | 8.2.1 General <\/td>\n<\/tr>\n | ||||||
84<\/td>\n | 8.2.2 Enumeration “Count” Option <\/td>\n<\/tr>\n | ||||||
85<\/td>\n | 8.2.3 Optimization for Enumerations with Small Result Sets <\/td>\n<\/tr>\n | ||||||
88<\/td>\n | 8.3 Filter Interpretation <\/td>\n<\/tr>\n | ||||||
90<\/td>\n | 8.4 Pull <\/td>\n<\/tr>\n | ||||||
94<\/td>\n | 8.5 Release <\/td>\n<\/tr>\n | ||||||
96<\/td>\n | 8.6 Ad-Hoc Queries and Fragment-Level Enumerations 8.7 Enumeration of EPRs <\/td>\n<\/tr>\n | ||||||
98<\/td>\n | 8.8 Renew <\/td>\n<\/tr>\n | ||||||
100<\/td>\n | 8.9 GetStatus 8.10 EnumerationEnd <\/td>\n<\/tr>\n | ||||||
101<\/td>\n | 9 Custom Actions (Methods) <\/td>\n<\/tr>\n | ||||||
102<\/td>\n | 10 Notifications (Eventing) 10.1 General <\/td>\n<\/tr>\n | ||||||
103<\/td>\n | 10.2 Subscribe <\/td>\n<\/tr>\n | ||||||
106<\/td>\n | 10.2.1 General <\/td>\n<\/tr>\n | ||||||
108<\/td>\n | 10.2.2 Filtering <\/td>\n<\/tr>\n | ||||||
110<\/td>\n | 10.2.3 Connection Retries <\/td>\n<\/tr>\n | ||||||
111<\/td>\n | 10.2.4 SubscribeResponse 10.2.5 Heartbeats <\/td>\n<\/tr>\n | ||||||
113<\/td>\n | 10.2.6 Bookmarks <\/td>\n<\/tr>\n | ||||||
115<\/td>\n | 10.2.7 Delivery Modes <\/td>\n<\/tr>\n | ||||||
116<\/td>\n | 10.2.8 Event Action URI 10.2.9 Delivery Sequencing and Acknowledgement <\/td>\n<\/tr>\n | ||||||
117<\/td>\n | 10.2.9.1 General 10.2.9.2 Push Mode <\/td>\n<\/tr>\n | ||||||
118<\/td>\n | 10.2.9.3 PushWithAck Mode 10.2.9.4 Batched Delivery Mode <\/td>\n<\/tr>\n | ||||||
122<\/td>\n | 10.2.9.5 Pull Delivery Mode <\/td>\n<\/tr>\n | ||||||
123<\/td>\n | 10.3 GetStatus <\/td>\n<\/tr>\n | ||||||
124<\/td>\n | 10.4 Unsubscribe <\/td>\n<\/tr>\n | ||||||
125<\/td>\n | 10.5 Renew <\/td>\n<\/tr>\n | ||||||
126<\/td>\n | 10.6 SubscriptionEnd <\/td>\n<\/tr>\n | ||||||
128<\/td>\n | 10.7 Acknowledgement of Delivery <\/td>\n<\/tr>\n | ||||||
129<\/td>\n | 10.8 Refusal of Delivery <\/td>\n<\/tr>\n | ||||||
130<\/td>\n | 10.9 Dropped Events <\/td>\n<\/tr>\n | ||||||
131<\/td>\n | 10.10 Access Control <\/td>\n<\/tr>\n | ||||||
132<\/td>\n | 10.11 Implementation Considerations 10.12 Advertisement of Notifications 11 Metadata and Discovery <\/td>\n<\/tr>\n | ||||||
135<\/td>\n | 12 Security 12.1 General <\/td>\n<\/tr>\n | ||||||
136<\/td>\n | 12.2 Security Profiles 12.3 Security Considerations for Event Subscriptions <\/td>\n<\/tr>\n | ||||||
137<\/td>\n | 12.4 Including Credentials with a Subscription <\/td>\n<\/tr>\n | ||||||
138<\/td>\n | 12.5 Correlating Events with a Subscription 12.6 Transport-Level Authentication Failure 12.7 Security Implications of Third-Party Subscriptions <\/td>\n<\/tr>\n | ||||||
139<\/td>\n | 13 Transports and Message Encoding 13.1 SOAP <\/td>\n<\/tr>\n | ||||||
140<\/td>\n | 13.2 Lack of Response 13.3 Replay of Messages 13.4 Encoding Limits <\/td>\n<\/tr>\n | ||||||
141<\/td>\n | 13.5 Binary Attachments 13.6 Case-Sensitivity <\/td>\n<\/tr>\n | ||||||
142<\/td>\n | 14 Faults 14.1 Introduction 14.2 Fault Encoding <\/td>\n<\/tr>\n | ||||||
143<\/td>\n | 14.3 NotUnderstood Faults <\/td>\n<\/tr>\n | ||||||
144<\/td>\n | 14.4 Degenerate Faults 14.5 Fault Extensibility <\/td>\n<\/tr>\n | ||||||
145<\/td>\n | 14.6 Master Faults <\/td>\n<\/tr>\n | ||||||
166<\/td>\n | ANNEX A (informative) Notational Conventions A.1 XML Namespaces <\/td>\n<\/tr>\n | ||||||
168<\/td>\n | ANNEX B (normative) Conformance <\/td>\n<\/tr>\n | ||||||
169<\/td>\n | ANNEX C (normative) HTTP(S) Transport and Security Profile C.1 General C.2 HTTP(S) Binding <\/td>\n<\/tr>\n | ||||||
171<\/td>\n | C.3 HTTP(S) Security Profiles C.3.1 http:\/\/schemas.dmtf.org\/wbem\/wsman\/1\/wsman\/secprofile\/http\/basic <\/td>\n<\/tr>\n | ||||||
172<\/td>\n | C.3.2 http:\/\/schemas.dmtf.org\/wbem\/wsman\/1\/wsman\/secprofile\/http\/digest C.3.3 http:\/\/schemas.dmtf.org\/wbem\/wsman\/1\/wsman\/secprofile\/https\/basic <\/td>\n<\/tr>\n | ||||||
173<\/td>\n | C.3.4 http:\/\/schemas.dmtf.org\/wbem\/wsman\/1\/wsman\/secprofile\/https\/digest C.3.5 http:\/\/schemas.dmtf.org\/wbem\/wsman\/1\/wsman\/secprofile\/https\/ mutual C.3.6 http:\/\/schemas.dmtf.org\/wbem\/wsman\/1\/wsman\/secprofile\/https\/ mutual\/basic <\/td>\n<\/tr>\n | ||||||
174<\/td>\n | C.3.7 http:\/\/schemas.dmtf.org\/wbem\/wsman\/1\/wsman\/secprofile\/https\/ mutual\/digest C.3.8 http:\/\/schemas.dmtf.org\/wbem\/wsman\/1\/wsman\/secprofile\/https\/ spnego-kerberos <\/td>\n<\/tr>\n | ||||||
175<\/td>\n | C.3.9 http:\/\/schemas.dmtf.org\/wbem\/wsman\/1\/wsman\/secprofile\/https\/ mutual\/spnego-kerberos <\/td>\n<\/tr>\n | ||||||
176<\/td>\n | C.3.10 http:\/\/schemas.dmtf.org\/wbem\/wsman\/1\/wsman\/secprofile\/http\/spnego-kerberos C.4 IPSec and HTTP <\/td>\n<\/tr>\n | ||||||
177<\/td>\n | ANNEX D (informative) XPath Support D.1 General <\/td>\n<\/tr>\n | ||||||
178<\/td>\n | D.2 Level 1 <\/td>\n<\/tr>\n | ||||||
180<\/td>\n | D.3 Level 2 <\/td>\n<\/tr>\n | ||||||
183<\/td>\n | ANNEX E (normative) Selector Filter Dialect <\/td>\n<\/tr>\n | ||||||
185<\/td>\n | ANNEX F (informative) Identify XML Schema <\/td>\n<\/tr>\n | ||||||
188<\/td>\n | ANNEX G (informative) Resource Access Operations XML Schema and WSDL <\/td>\n<\/tr>\n | ||||||
193<\/td>\n | ANNEX H (informative) Enumeration Operations XML Schema and WSDL <\/td>\n<\/tr>\n | ||||||
202<\/td>\n | ANNEX I (informative) Notification OperationsXML Schema and WSDL <\/td>\n<\/tr>\n | ||||||
210<\/td>\n | ANNEX J (informative) Addressing XML Schema <\/td>\n<\/tr>\n | ||||||
213<\/td>\n | ANNEX K (informative) WS-Management XML Schema <\/td>\n<\/tr>\n | ||||||
223<\/td>\n | ANNEX L (informative) Change Log <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Web Services for Management (WS-Management) Specification<\/b><\/p>\n |