{"id":353228,"date":"2024-10-20T00:56:51","date_gmt":"2024-10-20T00:56:51","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-9594-92017\/"},"modified":"2024-10-26T01:02:37","modified_gmt":"2024-10-26T01:02:37","slug":"bs-iso-iec-9594-92017","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-9594-92017\/","title":{"rendered":"BS ISO\/IEC 9594-9:2017"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Normative references 2.1 Identical Recommendations | International Standards 3 Definitions 3.1 Basic Directory definitions <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | 3.2 Directory model definitions 3.3 Abstract service definitions 3.4 Distributed operation definitions 3.5 Protocol definitions 3.6 Replication definitions <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 4 Abbreviations 5 Conventions <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 6 Replication in the Directory 6.1 Caching 6.2 Shadowing <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 6.3 Shadowing functional model 6.3.1 Primary shadowing <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 6.3.2 Secondary shadowing 7 Shadowing in the Directory 7.1 Shadowing agreement <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 7.2 Shadowed information <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 7.2.1 Shadowed DSA-Specific Entries (SDSEs) 7.2.1.1 SDSE type 7.2.1.2 Subordinate-completeness flag <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 7.2.1.3 Attribute-completeness flag 7.2.1.4 Attribute-values-incomplete flag 7.2.2 Establishment of shadowed information 7.2.2.1 Prefix information 7.2.2.2 Area information <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 7.2.2.3 Subordinate information 7.3 Shadow operations <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 7.4 DSA Shadow Bind and DSA Shadow Unbind operation 7.4.1 DSA Shadow Bind 7.4.2 DSA Shadow Unbind 8 Shadow operational binding 8.1 Shadow operational binding type characteristics 8.1.1 Symmetry and roles <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 8.1.2 Agreement 8.1.3 Initiator 8.1.4 Establishment parameters 8.1.5 Type identification 8.2 DSA procedures for operational binding management 8.2.1 Establishment procedure 8.2.2 Modification procedure 8.2.2.1 Modification of the agreement <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 8.2.2.2 Update of secondary shadow information 8.2.3 Termination procedure 8.2.4 Operations and procedures 8.3 Operational binding <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 9 Shadowing agreement 9.1 Shadowing agreement specification <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 9.2 Unit of replication <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 9.2.1 Area specification 9.2.1.1 Subtree boundary specification 9.2.1.2 Subtree refinement 9.2.2 Attribute selection <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 9.2.3 Subordinate knowledge 9.2.4 Subentries 9.2.4.1 Access control information <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 9.2.4.2 Schema information 9.2.4.3 Entry collection information 9.2.4.4 Search-rule information 9.2.4.5 Password policy information 9.2.5 Principles for the use of SDSE information 9.2.6 Overlapping replicated areas <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 9.2.6.2 Procedures for DSAs supporting overlapping replicated areas 9.3 Update mode 9.3.1 Supplier update mode 9.3.2 Consumer update mode 9.3.3 Scheduling parameters <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 10 Directory information shadow service 10.1 Shadow supplier initiated service <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 10.2 Shadow consumer initiated service 11 Shadow operations 11.1 Coordinate Shadow Update operation <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 11.1.1 Coordinate Shadow Update parameters 11.1.2 Coordinate Shadow Update success 11.1.3 Coordinate Shadow Update failure <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 11.2 Request Shadow Update operation <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 11.2.1 Request Shadow Update parameters 11.2.2 Request Shadow Update success 11.2.3 Request Shadow Update failure <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | 11.3 Update Shadow operation 11.3.1 Update Shadow parameters <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | 11.3.1.1 Total refresh <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 11.3.1.2 Incremental refresh <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | 11.3.2 Update Shadow success 11.3.3 Update Shadow failure 12 Shadow error <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | 12.1 Shadow error problems 12.2 Last update 12.3 Update window 12.4 Common results <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Information technology. Open Systems Interconnection. The Directory – Replication<\/b><\/p>\n |