{"id":352569,"date":"2024-10-20T00:53:13","date_gmt":"2024-10-20T00:53:13","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-9594-22014\/"},"modified":"2024-10-26T00:54:27","modified_gmt":"2024-10-26T00:54:27","slug":"bs-iso-iec-9594-22014","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-9594-22014\/","title":{"rendered":"BS ISO\/IEC 9594-2:2014"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
3<\/td>\n | ITU-T Rec. X.501 (10\/2012) \u2013 \nInformation technology – Open Systems Interconnection – The Directory: Models <\/td>\n<\/tr>\n | ||||||
5<\/td>\n | Summary History <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | Blank Page <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | CONTENTS <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 1 Scope <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 2 Normative references 2.1 Identical Recommendations | International Standards 2.2 Paired Recommendations | International Standards equivalent in technical content <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 2.3 Other references 3 Definitions 3.1 Communication definitions 3.2 Basic Directory definitions 3.3 Distributed operation definitions 3.4 Replication definitions <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 4 Abbreviations <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 5 Conventions <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 6 Directory Models 6.1 Definitions 6.2 The Directory and its users <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 6.3 Directory and DSA Information Models 6.4 Directory Administrative Authority Model <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 7 Directory Information Base 7.1 Definitions <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 7.2 Objects 7.3 Directory entries 7.4 Directory Information Tree (DIT) <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 8 Directory entries 8.1 Definitions <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 8.2 Overall structure <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 8.3 Object classes <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 8.4 Attribute types 8.5 Attribute values 8.6 Attribute type hierarchies <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 8.7 Friend attributes 8.8 Contexts <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 8.9 Matching rules <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | 8.10 Entry collections <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 8.11 Compound entries and families of entries <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | 9 Names 9.1 Definitions 9.2 Names in general 9.3 Relative distinguished name <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | 9.4 Name matching 9.5 Distinguished names <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | 9.6 Alias names 10 Hierarchical groups 10.1 Definitions <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | 10.2 Hierarchical relationship <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | 10.3 Sequential ordering of a hierarchical group <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | 11 Directory Administrative Authority model 11.1 Definitions 11.2 Overview <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | 11.3 Policy 11.4 Specific administrative authorities <\/td>\n<\/tr>\n | ||||||
44<\/td>\n | 11.5 Administrative areas and administrative points <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | 11.7 DMD policies <\/td>\n<\/tr>\n | ||||||
48<\/td>\n | 12 Model of Directory Administrative and Operational Information 12.1 Definitions 12.2 Overview <\/td>\n<\/tr>\n | ||||||
49<\/td>\n | 12.3 Subtrees <\/td>\n<\/tr>\n | ||||||
51<\/td>\n | 12.4 Operational attributes <\/td>\n<\/tr>\n | ||||||
52<\/td>\n | 12.5 Entries 12.6 Subentries <\/td>\n<\/tr>\n | ||||||
53<\/td>\n | 12.7 Information model for collective attributes <\/td>\n<\/tr>\n | ||||||
54<\/td>\n | 12.8 Information model for context defaults <\/td>\n<\/tr>\n | ||||||
55<\/td>\n | 13 Directory Schema 13.1 Definitions 13.2 Overview <\/td>\n<\/tr>\n | ||||||
57<\/td>\n | 13.3 Object class definition <\/td>\n<\/tr>\n | ||||||
59<\/td>\n | 13.4 Attribute type definition <\/td>\n<\/tr>\n | ||||||
62<\/td>\n | 13.5 Matching rule definition <\/td>\n<\/tr>\n | ||||||
64<\/td>\n | 13.6 Relaxation and tightening <\/td>\n<\/tr>\n | ||||||
70<\/td>\n | 13.7 DIT structure definition <\/td>\n<\/tr>\n | ||||||
73<\/td>\n | 13.8 DIT content rule definition <\/td>\n<\/tr>\n | ||||||
74<\/td>\n | 13.9 Context type definition <\/td>\n<\/tr>\n | ||||||
76<\/td>\n | 13.10 DIT Context Use definition 13.11 Friends definition <\/td>\n<\/tr>\n | ||||||
77<\/td>\n | 13.12 Syntax definitions 14 Directory System Schema 14.1 Overview <\/td>\n<\/tr>\n | ||||||
78<\/td>\n | 14.2 System schema supporting the administrative and operational information model 14.3 System schema supporting the administrative model <\/td>\n<\/tr>\n | ||||||
79<\/td>\n | 14.4 System schema supporting general administrative and operational requirements <\/td>\n<\/tr>\n | ||||||
81<\/td>\n | 14.5 System schema supporting access control 14.6 System schema supporting the collective attribute model <\/td>\n<\/tr>\n | ||||||
82<\/td>\n | 14.7 System schema supporting context assertion defaults 14.8 System schema supporting the service administration model <\/td>\n<\/tr>\n | ||||||
83<\/td>\n | 14.9 System schema supporting password administration <\/td>\n<\/tr>\n | ||||||
84<\/td>\n | 14.10 System schema supporting hierarchical groups 14.11 Maintenance of system schema <\/td>\n<\/tr>\n | ||||||
85<\/td>\n | 14.12 System schema for first-level subordinates 15 Directory schema administration 15.1 Overview 15.2 Policy objects <\/td>\n<\/tr>\n | ||||||
86<\/td>\n | 15.3 Policy parameters 15.4 Policy procedures 15.5 Subschema modification procedures <\/td>\n<\/tr>\n | ||||||
87<\/td>\n | 15.6 Entry addition and modification procedures 15.7 Subschema policy attributes <\/td>\n<\/tr>\n | ||||||
94<\/td>\n | 16 Service Administration Model 16.1 Definitions 16.2 Service-type\/user-class model <\/td>\n<\/tr>\n | ||||||
95<\/td>\n | 16.3 Service-specific administrative areas <\/td>\n<\/tr>\n | ||||||
96<\/td>\n | 16.4 Introduction to search-rules 16.5 Subfilters <\/td>\n<\/tr>\n | ||||||
97<\/td>\n | 16.6 Filter requirements 16.7 Attribute information selection based on search-rules <\/td>\n<\/tr>\n | ||||||
98<\/td>\n | 16.8 Access control aspects of search-rules 16.9 Contexts aspects of search-rules 16.10 Search-rule specification <\/td>\n<\/tr>\n | ||||||
106<\/td>\n | 16.11 Matching restriction definition 16.12 Search-validation function <\/td>\n<\/tr>\n | ||||||
108<\/td>\n | 17 Security model 17.1 Definitions 17.2 Security policies <\/td>\n<\/tr>\n | ||||||
109<\/td>\n | 17.3 Protection of Directory operations <\/td>\n<\/tr>\n | ||||||
110<\/td>\n | 18 Basic Access Control 18.1 Scope and application 18.2 Basic Access Control model <\/td>\n<\/tr>\n | ||||||
112<\/td>\n | 18.3 Access control administrative areas <\/td>\n<\/tr>\n | ||||||
115<\/td>\n | 18.4 Representation of Access Control Information <\/td>\n<\/tr>\n | ||||||
120<\/td>\n | 18.5 ACI operational attributes <\/td>\n<\/tr>\n | ||||||
121<\/td>\n | 18.6 Protecting the ACI 18.7 Access control and Directory operations 18.8 Access Control Decision Function <\/td>\n<\/tr>\n | ||||||
123<\/td>\n | 18.9 Simplified Access Control 19 Rule-based Access Control 19.1 Scope and application <\/td>\n<\/tr>\n | ||||||
124<\/td>\n | 19.2 Rule-based Access Control model 19.3 Access control administrative areas 19.4 Security Label <\/td>\n<\/tr>\n | ||||||
126<\/td>\n | 19.5 Clearance 19.6 Access Control and Directory operations <\/td>\n<\/tr>\n | ||||||
127<\/td>\n | 19.7 Access Control Decision Function 19.8 Use of Rule-based and Basic Access Control 20 Data Integrity in Storage 20.1 Introduction 20.2 Protection of an Entry or Selected Attribute Types <\/td>\n<\/tr>\n | ||||||
129<\/td>\n | 20.3 Context for Protection of a Single Attribute Value <\/td>\n<\/tr>\n | ||||||
130<\/td>\n | 21 DSA Models 21.1 Definitions 21.2 Directory Functional Model <\/td>\n<\/tr>\n | ||||||
131<\/td>\n | 21.3 Directory Distribution Model <\/td>\n<\/tr>\n | ||||||
133<\/td>\n | 22 Knowledge 22.1 Definitions 22.2 Introduction <\/td>\n<\/tr>\n | ||||||
134<\/td>\n | 22.3 Knowledge References <\/td>\n<\/tr>\n | ||||||
136<\/td>\n | 22.4 Minimum Knowledge 22.5 First Level DSAs <\/td>\n<\/tr>\n | ||||||
137<\/td>\n | 22.6 Knowledge references to LDAP servers 23 Basic Elements of the DSA Information Model 23.1 Definitions 23.2 Introduction <\/td>\n<\/tr>\n | ||||||
138<\/td>\n | 23.3 DSA Specific Entries and their Names <\/td>\n<\/tr>\n | ||||||
139<\/td>\n | 23.4 Basic Elements <\/td>\n<\/tr>\n | ||||||
141<\/td>\n | 24 Representation of DSA Information 24.1 Representation of Directory User and Operational Information 24.2 Representation of Knowledge References <\/td>\n<\/tr>\n | ||||||
148<\/td>\n | 24.3 Representation of Names and Naming Contexts <\/td>\n<\/tr>\n | ||||||
150<\/td>\n | 25 Overview 25.1 Definitions 25.2 Introduction 26 Operational bindings 26.1 General <\/td>\n<\/tr>\n | ||||||
151<\/td>\n | 26.2 Application of the operational framework <\/td>\n<\/tr>\n | ||||||
152<\/td>\n | 26.3 States of cooperation <\/td>\n<\/tr>\n | ||||||
153<\/td>\n | 27 Operational binding specification and management 27.1 Operational binding type specification <\/td>\n<\/tr>\n | ||||||
154<\/td>\n | 27.2 Operational binding management 27.3 Operational binding specification templates <\/td>\n<\/tr>\n | ||||||
156<\/td>\n | 28 Operations for operational binding management 28.1 Application-context definition <\/td>\n<\/tr>\n | ||||||
157<\/td>\n | 28.2 Establish Operational Binding operation <\/td>\n<\/tr>\n | ||||||
160<\/td>\n | 28.3 Modify Operational Binding operation <\/td>\n<\/tr>\n | ||||||
162<\/td>\n | 28.4 Terminate Operational Binding operation <\/td>\n<\/tr>\n | ||||||
163<\/td>\n | 28.5 Operational Binding Error <\/td>\n<\/tr>\n | ||||||
165<\/td>\n | 28.6 Operational Binding Management Bind and Unbind <\/td>\n<\/tr>\n | ||||||
166<\/td>\n | 29 Overview 29.1 Definitions 29.2 Introduction <\/td>\n<\/tr>\n | ||||||
167<\/td>\n | 30 LDAP interworking model 30.1 LDAP interworking scenarios 30.2 Overview of bound DSA handling LDAP operations <\/td>\n<\/tr>\n | ||||||
168<\/td>\n | 30.3 General LDAP requestor characteristics 30.4 LDAP extension mechanisms 31 LDAP specific system schema 31.1 Operational Attribute types from IETF RFC 4512 <\/td>\n<\/tr>\n | ||||||
171<\/td>\n | Annex \n A \u2013 Object identifier usage <\/td>\n<\/tr>\n | ||||||
175<\/td>\n | Annex B \u2013 \nInformation framework in ASN.1 <\/td>\n<\/tr>\n | ||||||
186<\/td>\n | Annex C \u2013 \nSubschema administration in ASN.1 <\/td>\n<\/tr>\n | ||||||
191<\/td>\n | Annex D \u2013 \nService administration in ASN.1 <\/td>\n<\/tr>\n | ||||||
195<\/td>\n | Annex E \u2013 \nBasic Access Control in ASN.1 <\/td>\n<\/tr>\n | ||||||
198<\/td>\n | Annex F \u2013 \nDSA operational attribute types in ASN.1 <\/td>\n<\/tr>\n | ||||||
201<\/td>\n | Annex G \u2013 \nOperational binding management in ASN.1 <\/td>\n<\/tr>\n | ||||||
206<\/td>\n | Annex H \u2013 \n Enhanced security in ASN.1 <\/td>\n<\/tr>\n | ||||||
209<\/td>\n | Annex I \u2013 \nLDAP system schema <\/td>\n<\/tr>\n | ||||||
211<\/td>\n | Annex J \u2013 \nThe mathematics of trees <\/td>\n<\/tr>\n | ||||||
212<\/td>\n | Annex K \u2013 \nName design criteria <\/td>\n<\/tr>\n | ||||||
214<\/td>\n | Annex L \u2013 \nExamples of various aspects of schema L.1 Example of an attribute hierarchy L.2 Example of a subtree specification <\/td>\n<\/tr>\n | ||||||
215<\/td>\n | L.3 Schema specification <\/td>\n<\/tr>\n | ||||||
216<\/td>\n | L.4 DIT content rules <\/td>\n<\/tr>\n | ||||||
217<\/td>\n | L.5 DIT context use <\/td>\n<\/tr>\n | ||||||
218<\/td>\n | Annex M \u2013 \nOverview of basic access control permissions M.1 Introduction M.2 Permissions required for operations <\/td>\n<\/tr>\n | ||||||
219<\/td>\n | M.3 Permissions affecting error M.4 Entry level permissions <\/td>\n<\/tr>\n | ||||||
220<\/td>\n | M.5 Entry level permissions <\/td>\n<\/tr>\n | ||||||
221<\/td>\n | Annex N \u2013 \nExamples of access control N.1 Introduction N.2 Design principles for Basic Access Control <\/td>\n<\/tr>\n | ||||||
222<\/td>\n | N.3 Introduction to example N.4 Policy affecting the definition of specific and inner areas <\/td>\n<\/tr>\n | ||||||
224<\/td>\n | N.5 Policy affecting the definition of Directory Access Control Domains (DACDs) <\/td>\n<\/tr>\n | ||||||
227<\/td>\n | N.6 Policy expressed in prescriptiveACI attributes <\/td>\n<\/tr>\n | ||||||
231<\/td>\n | N.7 Policy expressed in subentryACI attributes <\/td>\n<\/tr>\n | ||||||
232<\/td>\n | N.8 Policy expressed in entryACI attributes <\/td>\n<\/tr>\n | ||||||
233<\/td>\n | N.9 ACDF examples <\/td>\n<\/tr>\n | ||||||
235<\/td>\n | N.10 Rule-based access control <\/td>\n<\/tr>\n | ||||||
236<\/td>\n | Annex O \u2013 \nDSE type combinations <\/td>\n<\/tr>\n | ||||||
238<\/td>\n | Annex P \u2013 \nModelling of knowledge <\/td>\n<\/tr>\n | ||||||
242<\/td>\n | Annex Q \u2013 \nSubfilters <\/td>\n<\/tr>\n | ||||||
243<\/td>\n | Annex R \u2013 \n Compound entry name patterns and their use <\/td>\n<\/tr>\n | ||||||
245<\/td>\n | Annex S \u2013 \nNaming concepts and considerations S.1 History tells us \u2013 S.2 A new look at name resolution <\/td>\n<\/tr>\n | ||||||
251<\/td>\n | Annex T \u2013 \nAlphabetical index of definitions <\/td>\n<\/tr>\n | ||||||
254<\/td>\n | Annex U \u2013 \nAmendments and corrigenda <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Information technology. Open Systems Interconnection. The Directory – Models<\/b><\/p>\n |