BS ISO/IEC 9594-3:2017
$215.11
Information technology. Open Systems Interconnection. The Directory – Abstract service definition
Published By | Publication Date | Number of Pages |
BSI | 2017 | 134 |
PDF Catalog
PDF Pages | PDF Title |
---|---|
2 | National foreword |
11 | 1 Scope 2 Normative references 2.1 Identical Recommendations | International Standards 2.2 Paired Recommendations | International Standards equivalent in technical content |
12 | 2.3 Additional references 3 Definitions 3.1 OSI Reference Model security architecture definitions 3.2 Basic Directory definitions 3.3 Directory model definitions 3.4 Directory information base definitions 3.5 Directory entry definitions |
13 | 3.6 Name definitions 3.7 Distributed operations definitions 3.8 Abstract service definitions |
14 | 4 Abbreviations 5 Conventions |
15 | 6 Overview of the Directory service 7 Information types and common procedures 7.1 Introduction 7.2 Information types defined elsewhere |
16 | 7.3 Common arguments |
17 | 7.3.1 Critical extensions |
19 | 7.3.2 Family grouping 7.4 Common results |
20 | 7.5 Service controls |
22 | 7.6 Entry information selection |
24 | 7.6.1 Use of contextSelection or context selection defaults 7.6.2 Evaluation of contextSelection 7.6.3 Evaluation of a TypeAndContextAssertion |
25 | 7.6.4 Family Return 7.7 Entry information 7.7.1 Entry information data type |
26 | 7.7.2 Family information in entry information |
27 | 7.8 Filter 7.8.1 Filter parameter |
28 | 7.8.2 Filter item |
29 | 7.8.3 Evaluating filters with family information |
30 | 7.9 Paged results |
32 | 7.10 Security parameters |
33 | 7.11 Common elements of procedure for access control 7.11.1 Common elements of procedure for basic access control 7.11.1.1 Alias dereferencing 7.11.1.2 Return of Name Error |
34 | 7.11.1.3 Non-disclosure of the existence of an entry 7.11.1.4 Return of Distinguished Name 7.11.2 Common elements of procedure for rule-based-access-control 7.11.2.1 Accessing an entry (entry level permission) 7.11.2.2 Returning the name of an entry 7.11.2.3 Alias dereferencing 7.11.2.4 Return of Name Error (noSuchObject) 7.11.2.5 Accessing an attribute |
35 | 7.11.2.6 Deleting information 7.11.2.7 Invoking search-rules 7.11.3 Family information 7.12 Managing the DSA Information Tree 7.13 Procedures for families of entries |
36 | 8 Directory authentication 8.1 Simple authentication procedure |
37 | 8.1.1 Generation of protected identifying information |
38 | 8.1.2 Procedure for protected simple authentication 8.2 Password policy 8.2.1 Introduction |
39 | 8.2.2 Operational attributes and procedures |
40 | 8.2.3 Password history |
41 | 9 Bind, Unbind operations, Change Password and Administer Password operations 9.1 Directory Bind 9.1.1 Directory Bind syntax |
42 | 9.1.2 Directory Bind arguments |
43 | 9.1.3 Directory Bind results |
44 | 9.1.4 Directory Bind errors 9.2 Directory Unbind 10 Directory Read operations 10.1 Read 10.1.1 Read syntax |
45 | 10.1.2 Read arguments 10.1.3 Read results |
46 | 10.1.4 Read errors 10.1.5 Read operation decision points for basic access control 10.1.5.1 Error returns 10.1.5.2 Non-disclosure of incomplete results 10.1.6 Read operation decision points for rule-based access control |
47 | 10.2 Compare 10.2.1 Compare syntax |
48 | 10.2.2 Compare arguments 10.2.3 Compare results 10.2.4 Compare errors 10.2.5 Compare operation decision points for basic access control |
49 | 10.2.5.1 Error returns 10.2.6 Compare operation decision points for rule-based access control 10.2.7 Remote checking of password |
50 | 10.3 Abandon 11 Directory Search operations 11.1 List 11.1.1 List syntax |
51 | 11.1.2 List arguments |
52 | 11.1.3 List results |
53 | 11.1.4 List errors 11.1.5 List operation decision points for basic access control |
54 | 11.1.6 List operation decision points for rule-based access control 11.2 Search 11.2.1 Search syntax |
55 | 11.2.2 Search arguments |
61 | 11.2.3 Search results 11.2.4 Service administration 11.2.5 Search errors |
62 | 11.2.6 Search operation decision points for basic access control |
63 | 11.2.6.1 Search operation decision points for basic-access-control in the presence of additional searches |
64 | 11.2.6.2 Alias dereferencing during Search 11.2.6.3 Non-disclosure of incomplete results 11.2.7 Search operation decision points for rule-based access control 12 Directory Modify operations |
65 | 12.1 Add Entry 12.1.1 Add Entry syntax 12.1.2 Add Entry arguments |
66 | 12.1.3 Add Entry results 12.1.4 Add Entry errors 12.1.5 Add operation decision points for basic access control 12.1.5.1 Error returns 12.1.6 Add Entry operation decision points for rule-based-access-control |
67 | 12.2 Remove Entry 12.2.1 Remove Entry syntax 12.2.2 Remove Entry arguments 12.2.3 Remove Entry results |
68 | 12.2.4 Remove Entry errors 12.2.5 Remove Entry operation decision points for basic access control 12.2.6 Remove Entry operation decision points for rule-based access control 12.3 Modify Entry 12.3.1 Modify Entry syntax |
69 | 12.3.2 Modify Entry arguments |
70 | 12.3.3 Modify Entry results |
71 | 12.3.4 Modify Entry errors 12.3.5 Modify Entry operation decision points for basic access control 12.3.5.1 Error returns |
72 | 12.3.6 Modify Entry operation decision points for rule-based access control 12.4 Modify DN 12.4.1 Modify DN syntax |
73 | 12.4.2 Modify DN arguments |
74 | 12.4.3 Modify DN results 12.4.4 Modify DN errors 12.4.5 ModifyDN decision points for basic access control 12.4.5.1 Error returns 12.4.6 Modify DN operation decision points for rule-based access control 12.5 Change Password 12.5.1 Change Password syntax |
75 | 12.5.2 Change Password arguments 12.5.3 Change Password results 12.5.4 Change Password errors 12.6 Administer Password 12.6.1 Administer Password syntax |
76 | 12.6.2 Administer Password arguments 12.6.3 Administer Password results 12.6.4 Administer Password errors 13 Operations for LDAP messages 13.1 LDAP Transport operation 13.1.1 LDAP Transport syntax |
77 | 13.1.2 LDAP Transport arguments |
78 | 13.1.3 LDAP Transport results |
79 | 13.2 Linked LDAP operation 13.2.1 Linked LDAP syntax 13.2.2 Linked LDAP arguments 13.2.3 Linked LDAP results 14 Errors 14.1 Error precedence |
80 | 14.2 Abandoned 14.3 Abandon Failed |
81 | 14.4 Attribute Error |
82 | 14.5 Name Error 14.6 Referral |
83 | 14.7 Security Error |
84 | 14.8 Service Error |
85 | 14.9 Update Error |
87 | 15 Analysis of search arguments 15.1 General check of search filter |
89 | 15.2 Check of request-attribute-profiles |
90 | 15.3 Check of controls and hierarchy selections |
91 | 15.4 Check of matching use |
121 | C.1 Single family example |
122 | C.2 Multiple families example C.2.1 Filter example 1 |
123 | C.2.2 Filter example 2 C.2.3 Filter example 3 |
124 | C.2.4 Filter example 4 |