{"id":352570,"date":"2024-10-20T00:53:14","date_gmt":"2024-10-20T00:53:14","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-9594-42014\/"},"modified":"2024-10-26T00:54:27","modified_gmt":"2024-10-26T00:54:27","slug":"bs-iso-iec-9594-42014","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-9594-42014\/","title":{"rendered":"BS ISO\/IEC 9594-4:2014"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
3<\/td>\nITU-T Rec. X.518 (10\/2012) \u2013
\nInformation technology – Open Systems Interconnection – The Directory: Procedures for distributed operation <\/td>\n<\/tr>\n
5<\/td>\nSummary
History <\/td>\n<\/tr>\n
6<\/td>\nBlank Page <\/td>\n<\/tr>\n
7<\/td>\nCONTENTS <\/td>\n<\/tr>\n
10<\/td>\nIntroduction <\/td>\n<\/tr>\n
11<\/td>\n1 Scope
2 Normative references
2.1 Identical Recommendations | International Standards <\/td>\n<\/tr>\n
12<\/td>\n2.2 Other references
3 Definitions
3.1 Basic Directory definitions
3.2 Directory model definitions
3.3 DSA information model definitions <\/td>\n<\/tr>\n
13<\/td>\n3.4 Abstract service definitions
3.5 Protocol definitions
3.6 Directory replication definitions
3.7 Distributed operation definitions <\/td>\n<\/tr>\n
15<\/td>\n4 Abbreviations
5 Conventions <\/td>\n<\/tr>\n
17<\/td>\n6 Overview <\/td>\n<\/tr>\n
18<\/td>\n7 Distributed Directory system model <\/td>\n<\/tr>\n
19<\/td>\n8 DSA interactions model
8.1 Decomposition of a request
8.2 Uni-chaining <\/td>\n<\/tr>\n
20<\/td>\n8.3 Multi-chaining <\/td>\n<\/tr>\n
21<\/td>\n8.4 Referral <\/td>\n<\/tr>\n
22<\/td>\n8.5 Mode determination <\/td>\n<\/tr>\n
23<\/td>\n9 Overview of DSA abstract service
10 Information types
10.1 Introduction
10.2 Information types defined elsewhere <\/td>\n<\/tr>\n
24<\/td>\n10.3 Chaining arguments <\/td>\n<\/tr>\n
27<\/td>\n10.4 Chaining results
10.5 Operation progress <\/td>\n<\/tr>\n
28<\/td>\n10.6 Trace information
10.7 Reference type <\/td>\n<\/tr>\n
29<\/td>\n10.8 Access point information <\/td>\n<\/tr>\n
30<\/td>\n10.9 DIT bridge knowledge
10.10 Exclusions <\/td>\n<\/tr>\n
31<\/td>\n10.11 Continuation reference <\/td>\n<\/tr>\n
32<\/td>\n11 Bind and Unbind
11.1 DSA Bind <\/td>\n<\/tr>\n
33<\/td>\n11.2 DSA Unbind
12 Chained operations
12.1 Chained operations <\/td>\n<\/tr>\n
34<\/td>\n12.2 Chained Abandon operation
12.3 Chained operations and protocol version
13 Chained errors
13.1 Introduction
13.2 DSA referral <\/td>\n<\/tr>\n
36<\/td>\n14 Introduction
14.1 Scope and limits
14.2 Conformance
14.3 Conceptual model
14.4 Individual and cooperative operation of DSAs <\/td>\n<\/tr>\n
37<\/td>\n14.5 Cooperative agreements between DSAs
15 Distributed Directory behaviour
15.1 Cooperative fulfilment of operations
15.2 Phases of operation processing <\/td>\n<\/tr>\n
38<\/td>\n15.3 Managing Distributed Operations <\/td>\n<\/tr>\n
39<\/td>\n15.4 Loop handling <\/td>\n<\/tr>\n
40<\/td>\n15.5 Other considerations for distributed operation <\/td>\n<\/tr>\n
41<\/td>\n15.6 Authentication of Distributed operations <\/td>\n<\/tr>\n
42<\/td>\n16 The Operation Dispatcher
16.1 General concepts <\/td>\n<\/tr>\n
47<\/td>\n16.2 Procedures of the Operation Dispatcher <\/td>\n<\/tr>\n
48<\/td>\n16.3 Overview of procedures <\/td>\n<\/tr>\n
49<\/td>\n17 Request Validation procedure
17.1 Introduction <\/td>\n<\/tr>\n
50<\/td>\n17.2 Procedure parameters <\/td>\n<\/tr>\n
51<\/td>\n17.3 Procedure definition <\/td>\n<\/tr>\n
54<\/td>\n18 Name Resolution procedure
18.1 Introduction
18.2 Find DSE procedure parameters <\/td>\n<\/tr>\n
55<\/td>\n18.3 Procedures <\/td>\n<\/tr>\n
64<\/td>\n19 Operation evaluation <\/td>\n<\/tr>\n
65<\/td>\n19.1 Modification procedures <\/td>\n<\/tr>\n
72<\/td>\n19.2 Single entry interrogation procedure
19.3 Multiple entry interrogation procedure <\/td>\n<\/tr>\n
87<\/td>\n20 Continuation Reference procedures
20.1 Chaining strategy in the presence of shadowing <\/td>\n<\/tr>\n
89<\/td>\n20.2 Issuing chained subrequests to a remote DSA or LDAP server <\/td>\n<\/tr>\n
90<\/td>\n20.3 Procedures’ parameters
20.4 Definition of the procedures <\/td>\n<\/tr>\n
99<\/td>\n20.5 Abandon procedures <\/td>\n<\/tr>\n
101<\/td>\n20.6 DAP request to LDAP request procedure <\/td>\n<\/tr>\n
105<\/td>\n20.7 LDAP result to DAP reply procedure <\/td>\n<\/tr>\n
107<\/td>\n21 Results Merging procedure <\/td>\n<\/tr>\n
109<\/td>\n22 Procedures for distributed authentication <\/td>\n<\/tr>\n
110<\/td>\n22.1 Requester authentication
22.2 Results authentication <\/td>\n<\/tr>\n
111<\/td>\n23 Knowledge administration overview
23.1 Maintenance of knowledge references <\/td>\n<\/tr>\n
112<\/td>\n23.2 Requesting cross reference <\/td>\n<\/tr>\n
113<\/td>\n23.3 Knowledge inconsistencies <\/td>\n<\/tr>\n
114<\/td>\n24 Hierarchical operational bindings
24.1 Operational binding type characteristics <\/td>\n<\/tr>\n
117<\/td>\n24.2 Operational binding information object Class definition
24.3 DSA procedures for hierarchical operational binding management <\/td>\n<\/tr>\n
121<\/td>\n24.4 Procedures for operations
24.5 Use of application contexts
25 Non-specific hierarchical operational binding
25.1 Operational binding type characteristics <\/td>\n<\/tr>\n
122<\/td>\n25.2 Operational binding information object class definition <\/td>\n<\/tr>\n
123<\/td>\n25.3 DSA procedures for non-specific hierarchical operational binding management <\/td>\n<\/tr>\n
124<\/td>\n25.4 Procedures for operations
25.5 Use of application contexts <\/td>\n<\/tr>\n
125<\/td>\nAnnex A \u2013
\nASN.1 for Distributed Operations <\/td>\n<\/tr>\n
129<\/td>\nAnnex B \u2013
\nSpecification of hierarchical and non-specific hierarchical operational binding types <\/td>\n<\/tr>\n
131<\/td>\nAnnex C \u2013
\nExample of distributed name resolution <\/td>\n<\/tr>\n
133<\/td>\nAnnex D \u2013
\nDistributed use of authentication
D.1 Summary
D.2 Distributed protection model
D.3 Signed chained operations <\/td>\n<\/tr>\n
135<\/td>\nAnnex E \u2013
\n Knowledge maintenance example <\/td>\n<\/tr>\n
138<\/td>\nAnnex F \u2013
\nAmendments and corrigenda <\/td>\n<\/tr>\n
139<\/td>\nBlank Page <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Information technology. Open Systems Interconnection. The Directory – Procedures for distributed operation<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2014<\/td>\n142<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":352578,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[675,2641],"product_tag":[],"class_list":{"0":"post-352570","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-35-100-70","7":"product_cat-bsi","9":"first","10":"instock","11":"sold-individually","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/352570","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/352578"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=352570"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=352570"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=352570"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}