{"id":352569,"date":"2024-10-20T00:53:13","date_gmt":"2024-10-20T00:53:13","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-9594-22014\/"},"modified":"2024-10-26T00:54:27","modified_gmt":"2024-10-26T00:54:27","slug":"bs-iso-iec-9594-22014","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-9594-22014\/","title":{"rendered":"BS ISO\/IEC 9594-2:2014"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
3<\/td>\nITU-T Rec. X.501 (10\/2012) \u2013
\nInformation technology – Open Systems Interconnection – The Directory: Models <\/td>\n<\/tr>\n
5<\/td>\nSummary
History <\/td>\n<\/tr>\n
6<\/td>\nBlank Page <\/td>\n<\/tr>\n
7<\/td>\nCONTENTS <\/td>\n<\/tr>\n
12<\/td>\nIntroduction <\/td>\n<\/tr>\n
15<\/td>\n1 Scope <\/td>\n<\/tr>\n
16<\/td>\n2 Normative references
2.1 Identical Recommendations | International Standards
2.2 Paired Recommendations | International Standards equivalent in technical content <\/td>\n<\/tr>\n
17<\/td>\n2.3 Other references
3 Definitions
3.1 Communication definitions
3.2 Basic Directory definitions
3.3 Distributed operation definitions
3.4 Replication definitions <\/td>\n<\/tr>\n
18<\/td>\n4 Abbreviations <\/td>\n<\/tr>\n
19<\/td>\n5 Conventions <\/td>\n<\/tr>\n
20<\/td>\n6 Directory Models
6.1 Definitions
6.2 The Directory and its users <\/td>\n<\/tr>\n
21<\/td>\n6.3 Directory and DSA Information Models
6.4 Directory Administrative Authority Model <\/td>\n<\/tr>\n
23<\/td>\n7 Directory Information Base
7.1 Definitions <\/td>\n<\/tr>\n
24<\/td>\n7.2 Objects
7.3 Directory entries
7.4 Directory Information Tree (DIT) <\/td>\n<\/tr>\n
25<\/td>\n8 Directory entries
8.1 Definitions <\/td>\n<\/tr>\n
27<\/td>\n8.2 Overall structure <\/td>\n<\/tr>\n
28<\/td>\n8.3 Object classes <\/td>\n<\/tr>\n
30<\/td>\n8.4 Attribute types
8.5 Attribute values
8.6 Attribute type hierarchies <\/td>\n<\/tr>\n
31<\/td>\n8.7 Friend attributes
8.8 Contexts <\/td>\n<\/tr>\n
32<\/td>\n8.9 Matching rules <\/td>\n<\/tr>\n
35<\/td>\n8.10 Entry collections <\/td>\n<\/tr>\n
36<\/td>\n8.11 Compound entries and families of entries <\/td>\n<\/tr>\n
37<\/td>\n9 Names
9.1 Definitions
9.2 Names in general
9.3 Relative distinguished name <\/td>\n<\/tr>\n
38<\/td>\n9.4 Name matching
9.5 Distinguished names <\/td>\n<\/tr>\n
39<\/td>\n9.6 Alias names
10 Hierarchical groups
10.1 Definitions <\/td>\n<\/tr>\n
40<\/td>\n10.2 Hierarchical relationship <\/td>\n<\/tr>\n
41<\/td>\n10.3 Sequential ordering of a hierarchical group <\/td>\n<\/tr>\n
42<\/td>\n11 Directory Administrative Authority model
11.1 Definitions
11.2 Overview <\/td>\n<\/tr>\n
43<\/td>\n11.3 Policy
11.4 Specific administrative authorities <\/td>\n<\/tr>\n
44<\/td>\n11.5 Administrative areas and administrative points <\/td>\n<\/tr>\n
46<\/td>\n11.7 DMD policies <\/td>\n<\/tr>\n
48<\/td>\n12 Model of Directory Administrative and Operational Information
12.1 Definitions
12.2 Overview <\/td>\n<\/tr>\n
49<\/td>\n12.3 Subtrees <\/td>\n<\/tr>\n
51<\/td>\n12.4 Operational attributes <\/td>\n<\/tr>\n
52<\/td>\n12.5 Entries
12.6 Subentries <\/td>\n<\/tr>\n
53<\/td>\n12.7 Information model for collective attributes <\/td>\n<\/tr>\n
54<\/td>\n12.8 Information model for context defaults <\/td>\n<\/tr>\n
55<\/td>\n13 Directory Schema
13.1 Definitions
13.2 Overview <\/td>\n<\/tr>\n
57<\/td>\n13.3 Object class definition <\/td>\n<\/tr>\n
59<\/td>\n13.4 Attribute type definition <\/td>\n<\/tr>\n
62<\/td>\n13.5 Matching rule definition <\/td>\n<\/tr>\n
64<\/td>\n13.6 Relaxation and tightening <\/td>\n<\/tr>\n
70<\/td>\n13.7 DIT structure definition <\/td>\n<\/tr>\n
73<\/td>\n13.8 DIT content rule definition <\/td>\n<\/tr>\n
74<\/td>\n13.9 Context type definition <\/td>\n<\/tr>\n
76<\/td>\n13.10 DIT Context Use definition
13.11 Friends definition <\/td>\n<\/tr>\n
77<\/td>\n13.12 Syntax definitions
14 Directory System Schema
14.1 Overview <\/td>\n<\/tr>\n
78<\/td>\n14.2 System schema supporting the administrative and operational information model
14.3 System schema supporting the administrative model <\/td>\n<\/tr>\n
79<\/td>\n14.4 System schema supporting general administrative and operational requirements <\/td>\n<\/tr>\n
81<\/td>\n14.5 System schema supporting access control
14.6 System schema supporting the collective attribute model <\/td>\n<\/tr>\n
82<\/td>\n14.7 System schema supporting context assertion defaults
14.8 System schema supporting the service administration model <\/td>\n<\/tr>\n
83<\/td>\n14.9 System schema supporting password administration <\/td>\n<\/tr>\n
84<\/td>\n14.10 System schema supporting hierarchical groups
14.11 Maintenance of system schema <\/td>\n<\/tr>\n
85<\/td>\n14.12 System schema for first-level subordinates
15 Directory schema administration
15.1 Overview
15.2 Policy objects <\/td>\n<\/tr>\n
86<\/td>\n15.3 Policy parameters
15.4 Policy procedures
15.5 Subschema modification procedures <\/td>\n<\/tr>\n
87<\/td>\n15.6 Entry addition and modification procedures
15.7 Subschema policy attributes <\/td>\n<\/tr>\n
94<\/td>\n16 Service Administration Model
16.1 Definitions
16.2 Service-type\/user-class model <\/td>\n<\/tr>\n
95<\/td>\n16.3 Service-specific administrative areas <\/td>\n<\/tr>\n
96<\/td>\n16.4 Introduction to search-rules
16.5 Subfilters <\/td>\n<\/tr>\n
97<\/td>\n16.6 Filter requirements
16.7 Attribute information selection based on search-rules <\/td>\n<\/tr>\n
98<\/td>\n16.8 Access control aspects of search-rules
16.9 Contexts aspects of search-rules
16.10 Search-rule specification <\/td>\n<\/tr>\n
106<\/td>\n16.11 Matching restriction definition
16.12 Search-validation function <\/td>\n<\/tr>\n
108<\/td>\n17 Security model
17.1 Definitions
17.2 Security policies <\/td>\n<\/tr>\n
109<\/td>\n17.3 Protection of Directory operations <\/td>\n<\/tr>\n
110<\/td>\n18 Basic Access Control
18.1 Scope and application
18.2 Basic Access Control model <\/td>\n<\/tr>\n
112<\/td>\n18.3 Access control administrative areas <\/td>\n<\/tr>\n
115<\/td>\n18.4 Representation of Access Control Information <\/td>\n<\/tr>\n
120<\/td>\n18.5 ACI operational attributes <\/td>\n<\/tr>\n
121<\/td>\n18.6 Protecting the ACI
18.7 Access control and Directory operations
18.8 Access Control Decision Function <\/td>\n<\/tr>\n
123<\/td>\n18.9 Simplified Access Control
19 Rule-based Access Control
19.1 Scope and application <\/td>\n<\/tr>\n
124<\/td>\n19.2 Rule-based Access Control model
19.3 Access control administrative areas
19.4 Security Label <\/td>\n<\/tr>\n
126<\/td>\n19.5 Clearance
19.6 Access Control and Directory operations <\/td>\n<\/tr>\n
127<\/td>\n19.7 Access Control Decision Function
19.8 Use of Rule-based and Basic Access Control
20 Data Integrity in Storage
20.1 Introduction
20.2 Protection of an Entry or Selected Attribute Types <\/td>\n<\/tr>\n
129<\/td>\n20.3 Context for Protection of a Single Attribute Value <\/td>\n<\/tr>\n
130<\/td>\n21 DSA Models
21.1 Definitions
21.2 Directory Functional Model <\/td>\n<\/tr>\n
131<\/td>\n21.3 Directory Distribution Model <\/td>\n<\/tr>\n
133<\/td>\n22 Knowledge
22.1 Definitions
22.2 Introduction <\/td>\n<\/tr>\n
134<\/td>\n22.3 Knowledge References <\/td>\n<\/tr>\n
136<\/td>\n22.4 Minimum Knowledge
22.5 First Level DSAs <\/td>\n<\/tr>\n
137<\/td>\n22.6 Knowledge references to LDAP servers
23 Basic Elements of the DSA Information Model
23.1 Definitions
23.2 Introduction <\/td>\n<\/tr>\n
138<\/td>\n23.3 DSA Specific Entries and their Names <\/td>\n<\/tr>\n
139<\/td>\n23.4 Basic Elements <\/td>\n<\/tr>\n
141<\/td>\n24 Representation of DSA Information
24.1 Representation of Directory User and Operational Information
24.2 Representation of Knowledge References <\/td>\n<\/tr>\n
148<\/td>\n24.3 Representation of Names and Naming Contexts <\/td>\n<\/tr>\n
150<\/td>\n25 Overview
25.1 Definitions
25.2 Introduction
26 Operational bindings
26.1 General <\/td>\n<\/tr>\n
151<\/td>\n26.2 Application of the operational framework <\/td>\n<\/tr>\n
152<\/td>\n26.3 States of cooperation <\/td>\n<\/tr>\n
153<\/td>\n27 Operational binding specification and management
27.1 Operational binding type specification <\/td>\n<\/tr>\n
154<\/td>\n27.2 Operational binding management
27.3 Operational binding specification templates <\/td>\n<\/tr>\n
156<\/td>\n28 Operations for operational binding management
28.1 Application-context definition <\/td>\n<\/tr>\n
157<\/td>\n28.2 Establish Operational Binding operation <\/td>\n<\/tr>\n
160<\/td>\n28.3 Modify Operational Binding operation <\/td>\n<\/tr>\n
162<\/td>\n28.4 Terminate Operational Binding operation <\/td>\n<\/tr>\n
163<\/td>\n28.5 Operational Binding Error <\/td>\n<\/tr>\n
165<\/td>\n28.6 Operational Binding Management Bind and Unbind <\/td>\n<\/tr>\n
166<\/td>\n29 Overview
29.1 Definitions
29.2 Introduction <\/td>\n<\/tr>\n
167<\/td>\n30 LDAP interworking model
30.1 LDAP interworking scenarios
30.2 Overview of bound DSA handling LDAP operations <\/td>\n<\/tr>\n
168<\/td>\n30.3 General LDAP requestor characteristics
30.4 LDAP extension mechanisms
31 LDAP specific system schema
31.1 Operational Attribute types from IETF RFC 4512 <\/td>\n<\/tr>\n
171<\/td>\nAnnex
\n A \u2013 Object identifier usage <\/td>\n<\/tr>\n
175<\/td>\nAnnex B \u2013
\nInformation framework in ASN.1 <\/td>\n<\/tr>\n
186<\/td>\nAnnex C \u2013
\nSubschema administration in ASN.1 <\/td>\n<\/tr>\n
191<\/td>\nAnnex D \u2013
\nService administration in ASN.1 <\/td>\n<\/tr>\n
195<\/td>\nAnnex E \u2013
\nBasic Access Control in ASN.1 <\/td>\n<\/tr>\n
198<\/td>\nAnnex F \u2013
\nDSA operational attribute types in ASN.1 <\/td>\n<\/tr>\n
201<\/td>\nAnnex G \u2013
\nOperational binding management in ASN.1 <\/td>\n<\/tr>\n
206<\/td>\nAnnex H \u2013
\n Enhanced security in ASN.1 <\/td>\n<\/tr>\n
209<\/td>\nAnnex I \u2013
\nLDAP system schema <\/td>\n<\/tr>\n
211<\/td>\nAnnex J \u2013
\nThe mathematics of trees <\/td>\n<\/tr>\n
212<\/td>\nAnnex K \u2013
\nName design criteria <\/td>\n<\/tr>\n
214<\/td>\nAnnex L \u2013
\nExamples of various aspects of schema
L.1 Example of an attribute hierarchy
L.2 Example of a subtree specification <\/td>\n<\/tr>\n
215<\/td>\nL.3 Schema specification <\/td>\n<\/tr>\n
216<\/td>\nL.4 DIT content rules <\/td>\n<\/tr>\n
217<\/td>\nL.5 DIT context use <\/td>\n<\/tr>\n
218<\/td>\nAnnex M \u2013
\nOverview of basic access control permissions
M.1 Introduction
M.2 Permissions required for operations <\/td>\n<\/tr>\n
219<\/td>\nM.3 Permissions affecting error
M.4 Entry level permissions <\/td>\n<\/tr>\n
220<\/td>\nM.5 Entry level permissions <\/td>\n<\/tr>\n
221<\/td>\nAnnex N \u2013
\nExamples of access control
N.1 Introduction
N.2 Design principles for Basic Access Control <\/td>\n<\/tr>\n
222<\/td>\nN.3 Introduction to example
N.4 Policy affecting the definition of specific and inner areas <\/td>\n<\/tr>\n
224<\/td>\nN.5 Policy affecting the definition of Directory Access Control Domains (DACDs) <\/td>\n<\/tr>\n
227<\/td>\nN.6 Policy expressed in prescriptiveACI attributes <\/td>\n<\/tr>\n
231<\/td>\nN.7 Policy expressed in subentryACI attributes <\/td>\n<\/tr>\n
232<\/td>\nN.8 Policy expressed in entryACI attributes <\/td>\n<\/tr>\n
233<\/td>\nN.9 ACDF examples <\/td>\n<\/tr>\n
235<\/td>\nN.10 Rule-based access control <\/td>\n<\/tr>\n
236<\/td>\nAnnex O \u2013
\nDSE type combinations <\/td>\n<\/tr>\n
238<\/td>\nAnnex P \u2013
\nModelling of knowledge <\/td>\n<\/tr>\n
242<\/td>\nAnnex Q \u2013
\nSubfilters <\/td>\n<\/tr>\n
243<\/td>\nAnnex R \u2013
\n Compound entry name patterns and their use <\/td>\n<\/tr>\n
245<\/td>\nAnnex S \u2013
\nNaming concepts and considerations
S.1 History tells us \u2013
S.2 A new look at name resolution <\/td>\n<\/tr>\n
251<\/td>\nAnnex T \u2013
\nAlphabetical index of definitions <\/td>\n<\/tr>\n
254<\/td>\nAnnex U \u2013
\nAmendments and corrigenda <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Information technology. Open Systems Interconnection. The Directory – Models<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2014<\/td>\n258<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":352577,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[675,2641],"product_tag":[],"class_list":{"0":"post-352569","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-35-100-70","7":"product_cat-bsi","9":"first","10":"instock","11":"sold-individually","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/352569","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/352577"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=352569"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=352569"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=352569"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}