{"id":353212,"date":"2024-10-20T00:56:45","date_gmt":"2024-10-20T00:56:45","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-9594-22017\/"},"modified":"2024-10-26T01:02:23","modified_gmt":"2024-10-26T01:02:23","slug":"bs-iso-iec-9594-22017","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-9594-22017\/","title":{"rendered":"BS ISO\/IEC 9594-2:2017"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
2<\/td>\nNational foreword <\/td>\n<\/tr>\n
15<\/td>\n1 Scope <\/td>\n<\/tr>\n
16<\/td>\n2 References
2.1 Normative references
2.1.1 Identical Recommendations | International Standards
2.1.2 Paired Recommendations | International Standards equivalent in technical content
2.1.3 Other references <\/td>\n<\/tr>\n
17<\/td>\n2.2 Non-normative references
3 Definitions
3.1 Communication definitions
3.2 Basic Directory definitions
3.3 Distributed operation definitions
3.4 Replication definitions <\/td>\n<\/tr>\n
18<\/td>\n4 Abbreviations <\/td>\n<\/tr>\n
19<\/td>\n5 Conventions <\/td>\n<\/tr>\n
20<\/td>\n6 Directory Models
6.1 Definitions
6.2 The Directory and its users <\/td>\n<\/tr>\n
21<\/td>\n6.3 Directory and DSA Information Models
6.3.1 Generic Models
6.3.2 Specific information models <\/td>\n<\/tr>\n
22<\/td>\n6.4 Directory Administrative Authority Model <\/td>\n<\/tr>\n
23<\/td>\n7 Directory Information Base
7.1 Definitions <\/td>\n<\/tr>\n
24<\/td>\n7.2 Objects
7.3 Directory entries
7.4 Directory Information Tree (DIT) <\/td>\n<\/tr>\n
25<\/td>\n8 Directory entries
8.1 Definitions <\/td>\n<\/tr>\n
27<\/td>\n8.2 Overall structure <\/td>\n<\/tr>\n
28<\/td>\n8.3 Object classes
8.3.1 Abstract object class <\/td>\n<\/tr>\n
29<\/td>\n8.3.2 Structural object class
8.3.3 Auxiliary object class
8.3.4 Object class definition and the first edition of this Directory Specification <\/td>\n<\/tr>\n
30<\/td>\n8.4 Attribute types
8.5 Attribute values
8.6 Attribute type hierarchies <\/td>\n<\/tr>\n
31<\/td>\n8.7 Friend attributes
8.8 Contexts <\/td>\n<\/tr>\n
32<\/td>\n8.9 Matching rules
8.9.1 Overview <\/td>\n<\/tr>\n
33<\/td>\n8.9.2 Attribute value assertion
8.9.2.1 Evaluation of an AVA
8.9.2.2 Use of assertedContexts or context assertion defaults <\/td>\n<\/tr>\n
34<\/td>\n8.9.2.3 Evaluation of assertedContexts
8.9.2.4 Evaluation of a ContextAssertion
8.9.3 Attribute Type Assertions
8.9.3.1 Evaluation of an attribute type assertion
8.9.3.2 Use of assertedContexts or context assertion defaults
8.9.4 Built-in matching rule assertions <\/td>\n<\/tr>\n
35<\/td>\n8.9.5 Matching rule requirements
8.9.6 Object Identifier and Distinguished Name equality matching rules <\/td>\n<\/tr>\n
36<\/td>\n8.10 Entry collections
8.10.1 Overview
8.10.2 Collective attributes
8.11 Compound entries and families of entries <\/td>\n<\/tr>\n
37<\/td>\n9 Names
9.1 Definitions <\/td>\n<\/tr>\n
38<\/td>\n9.2 Names in general
9.3 Relative distinguished name <\/td>\n<\/tr>\n
39<\/td>\n9.4 Name matching
9.5 Distinguished names <\/td>\n<\/tr>\n
40<\/td>\n9.6 Alias names
10 Hierarchical groups
10.1 Definitions <\/td>\n<\/tr>\n
41<\/td>\n10.2 Hierarchical relationship <\/td>\n<\/tr>\n
42<\/td>\n10.3 Sequential ordering of a hierarchical group <\/td>\n<\/tr>\n
43<\/td>\n11 Directory Administrative Authority model
11.1 Definitions
11.2 Overview <\/td>\n<\/tr>\n
44<\/td>\n11.3 Policy
11.4 Specific administrative authorities <\/td>\n<\/tr>\n
45<\/td>\n11.5 Administrative areas and administrative points
11.5.1 Autonomous administrative areas
11.5.2 Specific administrative areas <\/td>\n<\/tr>\n
46<\/td>\n11.5.3 Inner administrative areas
11.5.4 Administrative points <\/td>\n<\/tr>\n
47<\/td>\n11.5.5 Administrative entries
11.6 DIT Domain policies
11.7 DMD policies <\/td>\n<\/tr>\n
49<\/td>\n12 Model of Directory Administrative and Operational Information
12.1 Definitions
12.2 Overview <\/td>\n<\/tr>\n
50<\/td>\n12.3 Subtrees
12.3.1 Overview
12.3.2 Subtree specification <\/td>\n<\/tr>\n
51<\/td>\n12.3.3 Base
12.3.4 Chop Specification <\/td>\n<\/tr>\n
52<\/td>\n12.3.4.1 Specific Exclusions
12.3.4.2 Minimum and Maximum
12.3.5 Specification Filter
12.4 Operational attributes <\/td>\n<\/tr>\n
53<\/td>\n12.5 Entries
12.5.1 Overview
12.5.2 Access to operational attributes
12.6 Subentries
12.6.1 Overview <\/td>\n<\/tr>\n
54<\/td>\n12.6.2 Subentry RDN attribute
12.6.3 Subtree Specification attribute
12.6.4 Use of Object Class attribute
12.6.5 Other subentry attributes
12.7 Information model for collective attributes <\/td>\n<\/tr>\n
55<\/td>\n12.8 Information model for context defaults <\/td>\n<\/tr>\n
56<\/td>\n13 Directory Schema
13.1 Definitions
13.2 Overview <\/td>\n<\/tr>\n
58<\/td>\n13.3 Object class definition
13.3.1 Subclassing
13.3.2 Object class attribute <\/td>\n<\/tr>\n
59<\/td>\n13.3.3 Object class specification <\/td>\n<\/tr>\n
60<\/td>\n13.4 Attribute type definition
13.4.1 Operational attributes
13.4.2 Attribute hierarchies <\/td>\n<\/tr>\n
61<\/td>\n13.4.3 Friend attributes
13.4.4 Collective attributes
13.4.5 Derived attributes
13.4.6 Attribute syntax
13.4.7 Matching rules <\/td>\n<\/tr>\n
62<\/td>\n13.4.8 Attribute definition <\/td>\n<\/tr>\n
64<\/td>\n13.5 Matching rule definition
13.5.1 Overview
13.5.2 Matching rule definition <\/td>\n<\/tr>\n
66<\/td>\n13.6 Relaxation and tightening
13.6.1 Matching rule substitution <\/td>\n<\/tr>\n
67<\/td>\n13.6.2 Mapping-based matching <\/td>\n<\/tr>\n
72<\/td>\n13.7 DIT structure definition
13.7.1 Overview
13.7.2 Name form definition <\/td>\n<\/tr>\n
73<\/td>\n13.7.3 Name form specification
13.7.4 Structural object class of an entry
13.7.5 DIT structure rule definition <\/td>\n<\/tr>\n
74<\/td>\n13.7.6 DIT structure rule specification <\/td>\n<\/tr>\n
75<\/td>\n13.8 DIT content rule definition
13.8.1 Overview
13.8.2 DIT content rule specification <\/td>\n<\/tr>\n
76<\/td>\n13.9 Context type definition
13.9.1 Context value matching
13.9.2 Context definition <\/td>\n<\/tr>\n
77<\/td>\n13.10 DIT Context Use definition
13.10.1 Overview <\/td>\n<\/tr>\n
78<\/td>\n13.10.2 DIT Context Use specification
13.11 Friends definition <\/td>\n<\/tr>\n
79<\/td>\n13.12 Syntax definitions
14 Directory System Schema
14.1 Overview <\/td>\n<\/tr>\n
80<\/td>\n14.2 System schema supporting the administrative and operational information model
14.2.1 Subentry object class
14.2.2 Subentry name form
14.2.3 Subtree Specification operational attribute
14.3 System schema supporting the administrative model <\/td>\n<\/tr>\n
81<\/td>\n14.4 System schema supporting general administrative and operational requirements
14.4.1 Timestamps <\/td>\n<\/tr>\n
82<\/td>\n14.4.2 Entry Modifier operational attributes
14.4.3 Subentry identification operational attributes <\/td>\n<\/tr>\n
83<\/td>\n14.4.4 Has Subordinates operational attribute
14.5 System schema supporting access control <\/td>\n<\/tr>\n
84<\/td>\n14.6 System schema supporting the collective attribute model
14.7 System schema supporting context assertion defaults
14.8 System schema supporting the service administration model <\/td>\n<\/tr>\n
85<\/td>\n14.9 System schema supporting password administration
14.9.1 Definition of an history attribute from the password attribute, the history matching rule and an object identifier <\/td>\n<\/tr>\n
86<\/td>\n14.9.2 Definition of a recently expired password attribute from the password attribute and an object identifier
14.9.3 Definition of a password history matching rule from the password attribute and an object identifier
14.10 System schema supporting hierarchical groups <\/td>\n<\/tr>\n
87<\/td>\n14.11 Maintenance of system schema
14.12 System schema for first-level subordinates
15 Directory schema administration
15.1 Overview <\/td>\n<\/tr>\n
88<\/td>\n15.2 Policy objects
15.3 Policy parameters <\/td>\n<\/tr>\n
89<\/td>\n15.4 Policy procedures
15.5 Subschema modification procedures
15.6 Entry addition and modification procedures <\/td>\n<\/tr>\n
90<\/td>\n15.7 Subschema policy attributes
15.7.1 DIT Structure Rules operational attribute
15.7.2 DIT Content Rules operational attribute <\/td>\n<\/tr>\n
91<\/td>\n15.7.3 Matching Rules operational attribute
15.7.4 Attribute Types operational attribute <\/td>\n<\/tr>\n
92<\/td>\n15.7.5 Object Classes operational attribute
15.7.6 Name Forms operational attribute <\/td>\n<\/tr>\n
93<\/td>\n15.7.7 Matching Rule Use operational attribute
15.7.8 Structural Object Class operational attribute type <\/td>\n<\/tr>\n
94<\/td>\n15.7.9 Governing Structure Rule operational attribute
15.7.10 ContextTypes operational attribute
15.7.11 DIT Context Use operational attribute <\/td>\n<\/tr>\n
95<\/td>\n15.7.12 Friends operational attribute <\/td>\n<\/tr>\n
96<\/td>\n16 Service Administration Model
16.1 Definitions
16.2 Service-type\/user-class model <\/td>\n<\/tr>\n
97<\/td>\n16.3 Service-specific administrative areas <\/td>\n<\/tr>\n
98<\/td>\n16.4 Introduction to search-rules
16.5 Subfilters <\/td>\n<\/tr>\n
99<\/td>\n16.6 Filter requirements
16.7 Attribute information selection based on search-rules <\/td>\n<\/tr>\n
100<\/td>\n16.8 Access control aspects of search-rules
16.9 Contexts aspects of search-rules
16.10 Search-rule specification <\/td>\n<\/tr>\n
102<\/td>\n16.10.1 Search-rule identification components
16.10.2 Request-attribute-profiles <\/td>\n<\/tr>\n
104<\/td>\n16.10.3 Attribute combinations
16.10.4 Attributes in the result <\/td>\n<\/tr>\n
105<\/td>\n16.10.5 Service and search controls
16.10.6 Family specifications
16.10.7 Control of relaxation <\/td>\n<\/tr>\n
106<\/td>\n16.10.8 Additional control component <\/td>\n<\/tr>\n
107<\/td>\n16.10.9 Miscellaneous components
16.10.10 ASN.1 information object classes <\/td>\n<\/tr>\n
108<\/td>\n16.11 Matching restriction definition <\/td>\n<\/tr>\n
109<\/td>\n16.12 Search-validation function <\/td>\n<\/tr>\n
110<\/td>\n17 Security model
17.1 Definitions
17.2 Security policies
17.2.1 Authentication procedures and mechanisms
17.2.2 Access control scheme <\/td>\n<\/tr>\n
111<\/td>\n17.3 Protection of Directory operations <\/td>\n<\/tr>\n
112<\/td>\n18 Basic Access Control
18.1 Scope and application
18.2 Basic Access Control model
18.2.1 Protected items
18.2.2 Access control permissions and their scope <\/td>\n<\/tr>\n
113<\/td>\n18.2.3 Permission categories for entry access <\/td>\n<\/tr>\n
114<\/td>\n18.2.4 Permission categories for attribute and attribute value access <\/td>\n<\/tr>\n
115<\/td>\n18.3 Access control administrative areas
18.3.1 Access control areas and Directory Access Control Domains
18.3.2 Associating controls with administrative areas <\/td>\n<\/tr>\n
117<\/td>\n18.4 Representation of Access Control Information
18.4.1 ASN.1 for Access Control Information <\/td>\n<\/tr>\n
119<\/td>\n18.4.2 Description of ACIItem Parameters
18.4.2.1 Identification Tag
18.4.2.2 Precedence
18.4.2.3 Authentication Level <\/td>\n<\/tr>\n
120<\/td>\n18.4.2.4 itemFirst and userFirst Parameters <\/td>\n<\/tr>\n
122<\/td>\n18.4.2.5 Determining group membership
18.5 ACI operational attributes
18.5.1 Prescriptive access control information
18.5.2 Entry access control information <\/td>\n<\/tr>\n
123<\/td>\n18.5.3 Subentry ACI
18.6 Protecting the ACI
18.7 Access control and Directory operations <\/td>\n<\/tr>\n
124<\/td>\n18.8 Access Control Decision Function
18.8.1 Inputs and outputs
18.8.2 Tuples
18.8.3 Discarding non-relevant tuples <\/td>\n<\/tr>\n
125<\/td>\n18.8.4 Selecting highest precedence, most specific tuples
18.9 Simplified Access Control
18.9.1 Introduction
18.9.2 Definition of Simplified Access Control functionality
19 Rule-based Access Control
19.1 Scope and application <\/td>\n<\/tr>\n
126<\/td>\n19.2 Rule-based Access Control model <\/td>\n<\/tr>\n
127<\/td>\n19.3 Access control administrative areas
19.4 Security Label
19.4.1 Introduction
19.4.2 Administration of Security Labels
19.4.3 Labelled Attribute Values <\/td>\n<\/tr>\n
128<\/td>\n19.5 Clearance <\/td>\n<\/tr>\n
129<\/td>\n19.6 Access Control and Directory operations
19.7 Access Control Decision Function
19.8 Use of Rule-based and Basic Access Control <\/td>\n<\/tr>\n
130<\/td>\n20 Data Integrity in Storage
20.1 Introduction
20.2 Protection of an Entry or Selected Attribute Types <\/td>\n<\/tr>\n
131<\/td>\n20.3 Context for Protection of a Single Attribute Value <\/td>\n<\/tr>\n
133<\/td>\n21 DSA Models
21.1 Definitions
21.2 Directory Functional Model <\/td>\n<\/tr>\n
134<\/td>\n21.3 Directory Distribution Model <\/td>\n<\/tr>\n
136<\/td>\n22 Knowledge
22.1 Definitions
22.2 Introduction <\/td>\n<\/tr>\n
137<\/td>\n22.3 Knowledge References
22.3.1 Knowledge Categories
22.3.2 Knowledge Reference Types <\/td>\n<\/tr>\n
138<\/td>\n22.3.2.1 Superior References
22.3.2.2 Immediate Superior References
22.3.2.3 Subordinate References
22.3.2.4 Non-Specific Subordinate References <\/td>\n<\/tr>\n
139<\/td>\n22.3.2.5 Cross References
22.3.2.6 Supplier References
22.3.2.7 Consumer References
22.4 Minimum Knowledge
22.4.1 Superior Knowledge
22.4.2 Subordinate Knowledge <\/td>\n<\/tr>\n
140<\/td>\n22.4.3 Supplier Knowledge
22.4.4 Consumer Knowledge
22.5 First Level DSAs
22.6 Knowledge references to LDAP servers
23 Basic Elements of the DSA Information Model
23.1 Definitions <\/td>\n<\/tr>\n
141<\/td>\n23.2 Introduction
23.3 DSA Specific Entries and their Names <\/td>\n<\/tr>\n
143<\/td>\n23.4 Basic Elements
23.4.1 DSA Operational Attributes
23.4.2 DSE Types <\/td>\n<\/tr>\n
144<\/td>\n24 Representation of DSA Information
24.1 Representation of Directory User and Operational Information <\/td>\n<\/tr>\n
145<\/td>\n24.1.1 Object Entry
24.1.2 Alias Entry
24.1.3 Administrative Point
24.1.4 Subentry
24.1.5 Family member
24.2 Representation of Knowledge References
24.2.1 Knowledge Attribute Types <\/td>\n<\/tr>\n
146<\/td>\n24.2.1.1 My Access Point
24.2.1.2 Superior Knowledge
24.2.1.3 Specific Knowledge <\/td>\n<\/tr>\n
147<\/td>\n24.2.1.4 Non-Specific Knowledge
24.2.1.5 Supplier Knowledge <\/td>\n<\/tr>\n
148<\/td>\n24.2.1.6 Consumer Knowledge <\/td>\n<\/tr>\n
149<\/td>\n24.2.1.7 Secondary Shadow Knowledge
24.2.1.8 DIT Bridge Knowledge
24.2.1.9 Matching Rules <\/td>\n<\/tr>\n
150<\/td>\n24.2.1.9.1 Access Point Match
24.2.1.9.2 Master And Shadow Access Points Match
24.2.1.9.3 Supplier or Consumer Information Match
24.2.1.9.4 Suppliers and Consumers Match
24.2.2 Knowledge Reference Types <\/td>\n<\/tr>\n
151<\/td>\n24.2.2.1 Self Reference
24.2.2.2 Superior Reference
24.2.2.3 Immediate Superior Reference
24.2.2.4 Subordinate Reference
24.2.2.5 Non-Specific Subordinate Reference <\/td>\n<\/tr>\n
152<\/td>\n24.2.2.6 Cross Reference
24.2.2.7 Supplier Reference
24.2.2.8 Consumer Reference
24.3 Representation of Names and Naming Contexts
24.3.1 Names and Glue DSEs
24.3.2 Naming Contexts <\/td>\n<\/tr>\n
153<\/td>\n24.3.3 Example <\/td>\n<\/tr>\n
154<\/td>\n25 Overview
25.1 Definitions
25.2 Introduction
26 Operational bindings
26.1 General <\/td>\n<\/tr>\n
155<\/td>\n26.2 Application of the operational framework <\/td>\n<\/tr>\n
156<\/td>\n26.2.1 Two DSAs
26.2.2 The agreement
26.2.3 Operations
26.2.4 Management of the agreement
26.3 States of cooperation <\/td>\n<\/tr>\n
157<\/td>\n27 Operational binding specification and management
27.1 Operational binding type specification <\/td>\n<\/tr>\n
158<\/td>\n27.2 Operational binding management <\/td>\n<\/tr>\n
159<\/td>\n27.3 Operational binding specification templates
27.3.1 Operational binding information object class <\/td>\n<\/tr>\n
160<\/td>\n27.3.2 Operational binding cooperation information object class
27.3.3 Operational binding role information object class <\/td>\n<\/tr>\n
161<\/td>\n28 Operations for operational binding management
28.1 Application-context definition
28.2 Establish Operational Binding operation
28.2.1 Establish Operational Binding syntax <\/td>\n<\/tr>\n
162<\/td>\n28.2.2 Establish Operational Binding arguments <\/td>\n<\/tr>\n
164<\/td>\n28.2.3 Establish Operational Binding results
28.3 Modify Operational Binding operation
28.3.1 Modify Operational Binding syntax <\/td>\n<\/tr>\n
165<\/td>\n28.3.2 Modify Operational Binding argument <\/td>\n<\/tr>\n
166<\/td>\n28.3.3 Modify Operational Binding results
28.4 Terminate Operational Binding operation
28.4.1 Terminate Operational Binding syntax <\/td>\n<\/tr>\n
167<\/td>\n28.4.2 Terminate Operational Binding argument
28.4.3 Terminate Operational Binding result
28.5 Operational Binding Error <\/td>\n<\/tr>\n
169<\/td>\n28.6 Operational Binding Management Bind and Unbind
28.6.1 DSA Operational Binding Management Bind
28.6.2 DSA Operational Binding Management Unbind <\/td>\n<\/tr>\n
170<\/td>\n29 Overview
29.1 Definitions
29.2 Introduction
30 LDAP interworking model
30.1 LDAP interworking scenarios <\/td>\n<\/tr>\n
171<\/td>\n30.2 Overview of bound DSA handling LDAP operations
30.3 General LDAP requestor characteristics <\/td>\n<\/tr>\n
172<\/td>\n30.4 LDAP extension mechanisms
30.4.1 General
30.4.2 LDAP controls
30.4.3 LDAP extended operations
30.4.4 LDAP extended features
31 LDAP specific system schema
31.1 Operational Attribute types from IETF RFC 4512
31.1.1 Introduction <\/td>\n<\/tr>\n
173<\/td>\n31.1.2 Naming contexts
31.1.3 Alternative server
31.1.4 Supported extension
31.1.5 Supported control
31.1.6 Supported SASL Mechanisms
31.1.7 Supported LDAP version <\/td>\n<\/tr>\n
174<\/td>\n31.1.8 Supported features
31.1.9 LDAP Syntaxes <\/td>\n<\/tr>\n
220<\/td>\nL.1 Example of an attribute hierarchy
L.2 Example of a subtree specification <\/td>\n<\/tr>\n
221<\/td>\nL.3 Schema specification
L.3.1 Object classes and name forms
L.3.2 DIT structure rules <\/td>\n<\/tr>\n
222<\/td>\nL.4 DIT content rules <\/td>\n<\/tr>\n
223<\/td>\nL.5 DIT context use <\/td>\n<\/tr>\n
224<\/td>\nM.1 Introduction
M.2 Permissions required for operations <\/td>\n<\/tr>\n
225<\/td>\nM.3 Permissions affecting error
M.4 Entry level permissions <\/td>\n<\/tr>\n
226<\/td>\nM.5 Entry level permissions <\/td>\n<\/tr>\n
227<\/td>\nN.1 Introduction
N.2 Design principles for Basic Access Control <\/td>\n<\/tr>\n
228<\/td>\nN.3 Introduction to example <\/td>\n<\/tr>\n
229<\/td>\nN.4 Policy affecting the definition of specific and inner areas <\/td>\n<\/tr>\n
230<\/td>\nN.5 Policy affecting the definition of Directory Access Control Domains (DACDs) <\/td>\n<\/tr>\n
232<\/td>\nN.5.1 Administrative area associated with each DACD <\/td>\n<\/tr>\n
233<\/td>\nN.6 Policy expressed in prescriptiveACI attributes
N.6.1 prescriptiveACI for DACD-1 <\/td>\n<\/tr>\n
236<\/td>\nN.6.2 prescriptiveACI for DACD-2
N.6.3 prescriptiveACI for DACD-3 <\/td>\n<\/tr>\n
237<\/td>\nN.6.4 prescriptiveACI for DACD-4
N.6.5 prescriptiveACI for DACD-5 <\/td>\n<\/tr>\n
238<\/td>\nN.7 Policy expressed in subentryACI attributes
N.7.1 subentryACI in the administrative entry for ACSA-1
N.7.2 subentryACI in the administrative entry for ACIA-1 <\/td>\n<\/tr>\n
239<\/td>\nN.8 Policy expressed in entryACI attributes
N.9 ACDF examples
N.9.1 Public access read <\/td>\n<\/tr>\n
240<\/td>\nN.9.2 Public access search
N.9.2.1 Check each entry in the search scope for proper entry permission <\/td>\n<\/tr>\n
241<\/td>\nN.9.2.2 Check for satisfaction of Filter
N.10 Rule-based access control <\/td>\n<\/tr>\n
252<\/td>\nS.1 History tells us \u2026
S.1.1 Original concepts that are still valid
S.1.2 Original concepts that are no longer valid
S.2 A new look at name resolution <\/td>\n<\/tr>\n
253<\/td>\nS.2.1 The explicit knowledge model <\/td>\n<\/tr>\n
256<\/td>\nS.2.2 Name resolution with implicit knowledge <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Information technology. Open Systems Interconnection. The Directory – Models<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2017<\/td>\n264<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":353219,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[675,2641],"product_tag":[],"class_list":{"0":"post-353212","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-35-100-70","7":"product_cat-bsi","9":"first","10":"instock","11":"sold-individually","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/353212","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/353219"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=353212"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=353212"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=353212"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}