{"id":352570,"date":"2024-10-20T00:53:14","date_gmt":"2024-10-20T00:53:14","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-9594-42014\/"},"modified":"2024-10-26T00:54:27","modified_gmt":"2024-10-26T00:54:27","slug":"bs-iso-iec-9594-42014","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-9594-42014\/","title":{"rendered":"BS ISO\/IEC 9594-4:2014"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
3<\/td>\n | ITU-T Rec. X.518 (10\/2012) \u2013 \nInformation technology – Open Systems Interconnection – The Directory: Procedures for distributed operation <\/td>\n<\/tr>\n | ||||||
5<\/td>\n | Summary History <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | Blank Page <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | CONTENTS <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 1 Scope 2 Normative references 2.1 Identical Recommendations | International Standards <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 2.2 Other references 3 Definitions 3.1 Basic Directory definitions 3.2 Directory model definitions 3.3 DSA information model definitions <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 3.4 Abstract service definitions 3.5 Protocol definitions 3.6 Directory replication definitions 3.7 Distributed operation definitions <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 4 Abbreviations 5 Conventions <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 6 Overview <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 7 Distributed Directory system model <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 8 DSA interactions model 8.1 Decomposition of a request 8.2 Uni-chaining <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 8.3 Multi-chaining <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 8.4 Referral <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 8.5 Mode determination <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 9 Overview of DSA abstract service 10 Information types 10.1 Introduction 10.2 Information types defined elsewhere <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 10.3 Chaining arguments <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 10.4 Chaining results 10.5 Operation progress <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 10.6 Trace information 10.7 Reference type <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 10.8 Access point information <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 10.9 DIT bridge knowledge 10.10 Exclusions <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 10.11 Continuation reference <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 11 Bind and Unbind 11.1 DSA Bind <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 11.2 DSA Unbind 12 Chained operations 12.1 Chained operations <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | 12.2 Chained Abandon operation 12.3 Chained operations and protocol version 13 Chained errors 13.1 Introduction 13.2 DSA referral <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 14 Introduction 14.1 Scope and limits 14.2 Conformance 14.3 Conceptual model 14.4 Individual and cooperative operation of DSAs <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | 14.5 Cooperative agreements between DSAs 15 Distributed Directory behaviour 15.1 Cooperative fulfilment of operations 15.2 Phases of operation processing <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | 15.3 Managing Distributed Operations <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | 15.4 Loop handling <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | 15.5 Other considerations for distributed operation <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | 15.6 Authentication of Distributed operations <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | 16 The Operation Dispatcher 16.1 General concepts <\/td>\n<\/tr>\n | ||||||
47<\/td>\n | 16.2 Procedures of the Operation Dispatcher <\/td>\n<\/tr>\n | ||||||
48<\/td>\n | 16.3 Overview of procedures <\/td>\n<\/tr>\n | ||||||
49<\/td>\n | 17 Request Validation procedure 17.1 Introduction <\/td>\n<\/tr>\n | ||||||
50<\/td>\n | 17.2 Procedure parameters <\/td>\n<\/tr>\n | ||||||
51<\/td>\n | 17.3 Procedure definition <\/td>\n<\/tr>\n | ||||||
54<\/td>\n | 18 Name Resolution procedure 18.1 Introduction 18.2 Find DSE procedure parameters <\/td>\n<\/tr>\n | ||||||
55<\/td>\n | 18.3 Procedures <\/td>\n<\/tr>\n | ||||||
64<\/td>\n | 19 Operation evaluation <\/td>\n<\/tr>\n | ||||||
65<\/td>\n | 19.1 Modification procedures <\/td>\n<\/tr>\n | ||||||
72<\/td>\n | 19.2 Single entry interrogation procedure 19.3 Multiple entry interrogation procedure <\/td>\n<\/tr>\n | ||||||
87<\/td>\n | 20 Continuation Reference procedures 20.1 Chaining strategy in the presence of shadowing <\/td>\n<\/tr>\n | ||||||
89<\/td>\n | 20.2 Issuing chained subrequests to a remote DSA or LDAP server <\/td>\n<\/tr>\n | ||||||
90<\/td>\n | 20.3 Procedures’ parameters 20.4 Definition of the procedures <\/td>\n<\/tr>\n | ||||||
99<\/td>\n | 20.5 Abandon procedures <\/td>\n<\/tr>\n | ||||||
101<\/td>\n | 20.6 DAP request to LDAP request procedure <\/td>\n<\/tr>\n | ||||||
105<\/td>\n | 20.7 LDAP result to DAP reply procedure <\/td>\n<\/tr>\n | ||||||
107<\/td>\n | 21 Results Merging procedure <\/td>\n<\/tr>\n | ||||||
109<\/td>\n | 22 Procedures for distributed authentication <\/td>\n<\/tr>\n | ||||||
110<\/td>\n | 22.1 Requester authentication 22.2 Results authentication <\/td>\n<\/tr>\n | ||||||
111<\/td>\n | 23 Knowledge administration overview 23.1 Maintenance of knowledge references <\/td>\n<\/tr>\n | ||||||
112<\/td>\n | 23.2 Requesting cross reference <\/td>\n<\/tr>\n | ||||||
113<\/td>\n | 23.3 Knowledge inconsistencies <\/td>\n<\/tr>\n | ||||||
114<\/td>\n | 24 Hierarchical operational bindings 24.1 Operational binding type characteristics <\/td>\n<\/tr>\n | ||||||
117<\/td>\n | 24.2 Operational binding information object Class definition 24.3 DSA procedures for hierarchical operational binding management <\/td>\n<\/tr>\n | ||||||
121<\/td>\n | 24.4 Procedures for operations 24.5 Use of application contexts 25 Non-specific hierarchical operational binding 25.1 Operational binding type characteristics <\/td>\n<\/tr>\n | ||||||
122<\/td>\n | 25.2 Operational binding information object class definition <\/td>\n<\/tr>\n | ||||||
123<\/td>\n | 25.3 DSA procedures for non-specific hierarchical operational binding management <\/td>\n<\/tr>\n | ||||||
124<\/td>\n | 25.4 Procedures for operations 25.5 Use of application contexts <\/td>\n<\/tr>\n | ||||||
125<\/td>\n | Annex A \u2013 \nASN.1 for Distributed Operations <\/td>\n<\/tr>\n | ||||||
129<\/td>\n | Annex B \u2013 \nSpecification of hierarchical and non-specific hierarchical operational binding types <\/td>\n<\/tr>\n | ||||||
131<\/td>\n | Annex C \u2013 \nExample of distributed name resolution <\/td>\n<\/tr>\n | ||||||
133<\/td>\n | Annex D \u2013 \nDistributed use of authentication D.1 Summary D.2 Distributed protection model D.3 Signed chained operations <\/td>\n<\/tr>\n | ||||||
135<\/td>\n | Annex E \u2013 \n Knowledge maintenance example <\/td>\n<\/tr>\n | ||||||
138<\/td>\n | Annex F \u2013 \nAmendments and corrigenda <\/td>\n<\/tr>\n | ||||||
139<\/td>\n | Blank Page <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Information technology. Open Systems Interconnection. The Directory – Procedures for distributed operation<\/b><\/p>\n |