Internet DRAFT - draft-hodson-hob-ady72
draft-hodson-hob-ady72
INTERNET-DRAFT ISSS EGDIR
draft-hodson-hob-ady72-00.txt A Hodson (Editor)
Expires in six months E Andersen (Chairman)
L Visser
P Fantou
K Richardson
J Pasquerau
June 1997
Hierarchical Operational Bindings - a profile
Filename: draft-hodson-hob-ady72-00.txt
Status of this Memo
This document is an Internet-Draft. Internet-Drafts are working
documents of the Internet Engineering Task Force (IETF), its
areas, and its working groups. Note that other groups may also
distribute working documents as Internet-Drafts.
Internet-Drafts are draft documents valid for a maximum of six
months and may be updated, replaced, or obsoleted by other
documents at any time. It is inappropriate to use
Internet-Drafts as reference material or to cite them other than
as "work in progress."
To view the entire list of current Internet-Drafts, please check
the "1id-abstracts.txt" listing contained in the Internet-Drafts
Shadow Directories on ftp.is.co.za (Africa), nic.nordu.net
(Europe), munnari.oz.au (Pacific Rim), ds.internic.net (US East
Coast), or ftp.isi.edu (US West Coast).
Abstract
The '93 X.500 Directory standards define HOB (Hierarchical
Operational Binding) procedures for the creation of a new naming
context in another DSA, and also for the maintenance of the
relationship between two DSAs where one holds a superior naming
context and the other holds a subordinate naming context. The
standards also define the use of the Directory Operational
Binding Management Protocol (DOP) to mediate these procedures.
The use of HOBs provides a major simplification for managers of
X.500 systems, since it provides a way to update policies
automatically from one DSA to another. But practical design for
HOBs requires decisions in a number of respects not fully treated
by the standards. This document simplifies the implementor's
task by defining viable and practical subsets of the standards
and by clarifying some of the issues left undefined by the
standards. It was originated by EGDIR, the expert group within
ISSS EGDIR [Page 1]
INTERNET-DRAFT Hierarchical Operational Bindings - a profile June 1997
EWOS, the European Workshop for Open Systems, which is supported
by some major players in X.500 design.
This document was derived from a draft profile taken from the
range of profiles intended as ISPs (Internationally Standardised
profiles), developed jointly by the European, North American and
Asiatic/Oceanic/Pacific workshops (EWOS, OIW and AOW). More
information on '93 X.500 standard profiles is available from
http://www.ewos.be and other sites.
Contents
1. Introduction
2. Scenario
3. Definitions and abbreviations
3.1 Definitions
3.2 Abbreviations
4. Conformance - Hierarchical Operational Bindings
4.1 Static Conformance Requirements
4.2 Dynamic Conformance Requirements
5. Security considerations
6. Summary of support
7. References
8. Authors' Addresses
1. Introduction
This document provides guidelines for the implementation of
Hierarchical Bindings (HOBs) by profiling the behaviour of a DSA
in the context of HOBs. It may also provides a basis for
procurement of implementations that purport to offer HOB
functionality.
The HOB represents the relationship between two DSAs when one
holds a superior naming context and the other contains (or is to
contain) a subordinate naming context.
A HOB can only come into existence when the administrative
authorities of each DSA permit it (e.g. by configuration of the
DSA). It can be initiated in one of two ways:
1. By direct management action on the part of the administrative
authority of one of the two DSAs
2. By the DSA that completes name resolution acting on an
add-entry operation which specifies that an entry is to be placed
in a DSA other than that holding its superior entry.
ISSS EGDIR [Page 2]
INTERNET-DRAFT Hierarchical Operational Bindings - a profile June 1997
In both cases, the HOB is initiated by an exchange of Directory
Operational Management Binding Protocol (DOP) which establishes
the Operational Binding.
In the former case, the superior naming context and the
subordinate reference to it from the superior DSA are presumed to
pre-exist. In the latter case, the exchange passes information
about the contents of the new entry to the subordinate DSA, and
form a part of a standardised procedure whereby (among other
features):
* The subordinate DSA creates a new naming context by adding a
context prefix entry with the required name and attribute
information
* The superior DSA provides the DSA holding the subordinate
naming context with all of the policy information (access
control, subschema and collective attributes) required to
administer the naming context
* The superior DSA creates a subordinate reference to the
subordinate DSA with the required name
Once the HOB is established, it provides a means of automatically
maintaining access point and policy information relevant to the
naming context in the subordinate DSA and to the corresponding
subordinate reference held in the superior DSA.
A related process is described in the Standards whereby the
reference from the superior to the subordinate DSA is a Non
Specific Subordinate Reference. This process is not within the
scope of the present document.
The objective of this document is to define capabilities and
constraints on support for DSP by DSAs so that DSAs will be able
to interwork using HOBs within the Directory.
It therefore profiles the following:
* The configuration of DSAs in preparation for establishment
of HOBs
* A superior DSA using a DOP establish-operational-binding
operation to create a subordinate naming context in order to
implement an add-entry operation in which the targetSystem
element is present
* A subordinate DSA responding to a DOP
establish-operational-binding operation
ISSS EGDIR [Page 3]
INTERNET-DRAFT Hierarchical Operational Bindings - a profile June 1997
* Superior and subordinate DSAs as invokers and responders of
DOP modify-operational-binding operations
* Superior and subordinate DSAs as invokers and responders of
DOP terminate-operational-binding operations
DSAs supporting HOBs are required by the base standards to
support DSP.
HOB operations normally require the establishment of a DOP
association within which each DSA will have authenticated itself
to the other using simple authentication or better. The means of
doing this is not within the scope of this document. However,
the requirement to do so is profiled here.
2. Scenario
DSAs may be configured by their administrative authorities (by
means outside the scope of the Directory standards) to allow them
to create or accept Hierarchical Operational Bindings.
Administrative Administrative
authority authority
\ /
+--------+ +-----------+
|superior| |subordinate|
administr- | DSA | DSA | DSA |
ative user | * | | ^ |
creating DAP| /*\ | DOP | / \ |
new naming ====>| /***\ |<=======>| / \ |
context or DSP| ---^- | | ---*- |
or maintain- | sub | | /*\ |
ing existing | ref | | /***\ |
one +--------+ +-----------+
Figure 1-DSA support of Hierarchical Operational Bindings
A DSA configured in this way may then (after suitable stimulus)
interact with another DSA using DOP operations. This stimulus
may be direct management action, or it may be DAP or DSP protocol
action. A particular stimulus is a request by an administrative
user to establish a new naming context (triangle of asterisks at
bottom of box for subordinate DSA). Another may be an
administrative authority action to coordinate two DSAs which
already contain a superior and a subordinate naming context.
ISSS EGDIR [Page 4]
INTERNET-DRAFT Hierarchical Operational Bindings - a profile June 1997
3. Definitions and abbreviations
3.1 Definitions
Many of the definitions used may be found in the Directory
Standards. Since not all of the definitions are to be found in
the Definitions clauses within the standards documents,
references are listed in Table 1 below. The "Part" reference
refers to the part number within ISO/IEC 9594 or its ITU-T
equivalent.
+-----------------------------------+----+-----------+
| Term |Part| Reference |
| administrative role | 2 | 13.3 |
| cooperative state | 2 | 22.1 |
| Directory Operational Binding | | |
| Management Protocol (DOP) | 2 | 11 |
| directory operational framework | 2 | 22.1 |
| Hierarchical Operational Binding | | |
| (HOB) | 4 | 3 |
| immediate superior reference | 2 | 18.1 |
| knowledge (information) | 2 | 18.1 |
| knowledge reference | 2 | 18.1 |
| master knowledge | 2 | 18.1 |
| name resolution | 4 | 3 |
| naming context | 4 | 17.1 |
| non-cooperative state | 2 | 22.1 |
| Non-specific Hierarchical | | |
| Operational Binding (NHOB) | 4 | 3 |
| Non-specific Subordinate | | |
| Reference (NSSR) | 2 | 18.1 |
| operational binding | 2 | 22.1 |
| operational binding establishment | 2 | 22.1 |
| operational binding instance | 2 | 22.1 |
+-----------------------------------+----+-----------+
| operational binding management | 2 | 22.1 |
| operational binding modification | 2 | 22.1 |
| operational binding termination | 2 | 22.1 |
| operational binding type | 2 | 22.1 |
| relevant hierarchical operation | | |
| binding (RHOB) | 4 | 3 |
| Simplified Access Control | 2 | 16 |
| subentry | 2 | 11.1 |
| subordinate DSA | 4 | 3 |
| subordinate reference | 2 | 18.1 |
| subrequest | 4 | 3 |
+-----------------------------------+----+-----------+
ISSS EGDIR [Page 5]
INTERNET-DRAFT Hierarchical Operational Bindings - a profile June 1997
+-----------------------------------+----+-----------+
| superior DSA | 4 | 3 |
| target object name | 4 | 3 |
+-----------------------------------+----+-----------+
Table 1: Definitions and references
3.2 Abbreviations
The following abbreviations are used as defined in the Directory Standards
or elsewhere:
ACSE Association Control Service Element
APDU Application Protocol Data Unit
ASN.1 Abstract Syntax Notation One
DAP Directory Access Protocol
DIB Directory Information Base
DIT Directory Information Tree
DMD Directory Management Domain
DSA Directory System Agent
DSE DSA specific entry
DSP Directory System Protocol
DUA Directory User Agent
EGDIR Expert Group on the Directory
EWOS European Workshop for Open Systems
HOB Hierarchical operation binding
IUT Implementation under test
NHOB Non-specific hierarchical operation binding
NSSR Non-Specific Subordinate Reference
PDU Protocol Data Unit
POQ Partial outcome qualifier
RDN Relative Distinguished Name
RHOB Relevant hierarchical operation binding
ROSE Remote Operations Service Element
SPDU Session Protocol Data Unit
SSDU Session Service Data Unit
4. Conformance - Hierarchical Operational Bindings
This document specifies requirements upon DSA implementations to
achieve interworking when using HOBs. A claim of conformance to
this document is a claim that all requirements in the relevant
base standards are satisfied, and that all requirements in the
following clauses are satisfied.
ISSS EGDIR [Page 6]
INTERNET-DRAFT Hierarchical Operational Bindings - a profile June 1997
4.1 Static Conformance Requirements
To conform to this document, DSA implementations MUST conform to
all mandatory requirements of clause 9.2 in ISO/IEC 9594-5:1993
(X.519), of Section 10 of ISO/IEC 9594-2:1993 (X.501), extended
by mandatory requirements of Clause 24 of ISO/IEC 9594-4:1993
(X.518), as applicable to a DSA implementing the
directoryOperationalBindingManagementAC application context,
including the requirements directly and indirectly referenced by
that clause.
NOTE. A DSA claiming conformance to the
directoryOperationalBindingManagementAC MUST also claim
conformance to the directorySystemAC (see X.518 clause 9.2.1 a)).
4.1.1 General capability
DSAs conformant with this document MUST be capable of:
1. Acting in both ROLE-A (superior DSA) and ROLE B (subordinate
DSA), in accordance with X.518 clause 24.2, in order to
implement the procedures associated with the targetSystem
element of the DAP add-entry operation
2. When in ROLE-A (superior DSA), accepting an add-entry
operation specifying targetSystem, and carrying out the
procedures defined in X.518 clause 24.3 for the establishment
of a HOB.
DSAs should be capable of acting in ROLE-A (superior DSA), or
ROLE B (subordinate DSA), or both, in accordance with X.518
clause 24.2, in order to implement a Hierarchical Operational
Binding in respect of a pre-existing subordinate naming context
which was established by local means.
DSAs conformant with this document MUST be able to tolerate the
case where they contain a superior or subordinate DSA, but no HOB
exists.
4.1.2 HOB acceptability
DSAs conformant with this document MUST be configurable to reject
HOBS under the following circumstances, in order to permit
administrative authorities sufficient control over hierarchical
bindings:
ISSS EGDIR [Page 7]
INTERNET-DRAFT Hierarchical Operational Bindings - a profile June 1997
1. A ROLE-A DSA conformant with this document MUST be
configurable to reject an add-entry operation specifying
targetSystem in respect of any specific DSA. In this case,
it may either ignore the targetSystem element or respond to
the invoker of the operation with a suitable error. The
latter capability is mandatory if target-system is specified
as a critical extension.
2. A ROLE-A DSA conformant with this document MUST be
configurable to reject an attempt to create a HOB when the
proposed new naming context for the DSA has a name which is
unacceptable when this is proposed by a ROLE-B DSA. It MUST
be possible for any specific name for an entry immediately
subordinate to entries already held by the DSA to be
configured as unacceptable in this sense, for the purposes of
conformance testing.
3. A ROLE-B DSA conformant with this document MUST be
configurable to reject a HOB when the naming context for the
DSA has a name which is unacceptable when this is proposed by
a ROLE-A DSA. It MUST be possible for any entry name that is
not superior or subordinate to entries already held by the
DSA to be configured as unacceptable in this sense, for the
purposes of conformance testing, possibly by implementing a
list of names which are acceptable.
4. A ROLE-B DSA conformant with this document MUST be
configurable to reject a HOB when this is proposed by any
specific DSA attempting to act as a ROLE-A DSA.
4.1.3 HOB operations
DSAs MUST support establishment, modification and termination
operations in both ROLE-A and ROLE-B, within limitations defined
in clause 4.2.
4.1.4 Information supported by HOBs
ROLE A DSAs conformant with this document MUST support the supply
and maintenance of all relevant administrative point and subentry
information for each vertex between the root and the subordinate
naming context (except when specified below as optional). This
includes:
* Access control information (both BAC and SAC)
* Subschema information (optionally)
* Collective attribute information (optionally)
ISSS EGDIR [Page 8]
INTERNET-DRAFT Hierarchical Operational Bindings - a profile June 1997
ROLE-A and Role-B DSAs MUST support the supply and maintenance of
their own access points.
ROLE-A DSAs are not required to support the modification of a HOB
which would change the DN of the context prefix for the
subordinate naming context except that ROLE-A DSAs are required
to support a change in RDN of the subordinate context prefix
(while retaining the DN of the superior entry).
ROLE-A DSAs are not required to support the modification of a HOB
which would change the DN of the context prefix for the superior
naming context without changing the DN of the context prefix for
the subordinate naming context (i.e. moving the context prefix
for the subordinate naming context up or down the DIT).
ROLE-B DSAs are not required to supply and maintain entry
information for the context prefix in the superior DSA (i.e. as
entryInfo in the SubordinateToSuperior establishment parameter -
see X.518 clause 24.4.1.2). If not supplied, the superior DSA
cannot make access control decisions that take into account
policies within the subordinate DSA; it may be able to implement
locally defined policies instead. However, they are recommended
to do so.
NOTE. If however they do so supply it, they MUST be capable of
maintaining it (see 4.1.5).
4.1.5 Established Hierarchical Bindings
After a hierarchical operational binding has been successfully
established, the following requirements are placed on ROLE-A and
ROLE-B DSAs:
1. ROLE-A DSAs MUST be capable of establishing a DOP
association, and using it to invoke a
modify-operational-binding operation consequent upon the
following stimuli:
* Any change in contextPrefixInfo as it would be
transmitted in modify-operational-binding argument
* Any change in the access point of the DSA
2. ROLE-B DSAs MUST similarly be capable of establishing a DOP
association, and using it to invoke a
modify-operational-binding operation consequent upon the
following stimuli:
ISSS EGDIR [Page 9]
INTERNET-DRAFT Hierarchical Operational Bindings - a profile June 1997
* Any change in entryInfo within the scope of interest to
the ROLE-A DSA, to include object class and entryACI
(when present)
* Any change in the access point of the DSA
Either role is permitted to invoke a modify-operational-binding
operation under other circumstances, even when no change has
taken place, for example following a crash.
4.1.6 Security Level
Implementations MUST be able to carry out the peer entity
authentication of DSAs by the following ways:
* Simple authentication with unprotected password
The following methods of peer entity authentication are optional
(see Note 2 below):
* Simple protected authentication
* Strong authentication
DSAs conformant with this document MUST be capable of rejecting
DOP binds that use no authentication, or that use simple
unprotected authentication without password.
Notes
1. Since HOBS establish trusted relationships between DSAs,
authentication must be adequately secure. Credentials should
normally be used.
2. The use of external authentication using the
externalProcedure element in accordance with ISO/IEC
9594-4:1993 (X.518) clause 11.1 and ISO/IEC 9594-3:1993
(X.511) clause 8.1.2 is outside the scope of this document.
4.1.7 Disclosure of HOB information
DSAs acting in ROLE-A or ROLE-B MUST be configurable to refuse
direct DAP or DSP access to any information received as a result
of the HOB, other than entryInfo by a ROLE B DSA.
NOTE. This requirement states that the following information is
regarded as internal, although access to it may be required for
system management or diagnostic purposes, even when it can in
principle be formulated to provide attribute information:
ISSS EGDIR [Page 10]
INTERNET-DRAFT Hierarchical Operational Bindings - a profile June 1997
* SuperiorToSubordinate.contextPrefixInfo
* SuperiorToSubordinate.immediateSuperiorInfo
* SubordinateToSuperior
4.1.8 Initiation by administrative intervention
DSAs may optionally support the initiation of a HOB in respect of
a pre-existing naming context. If supported, initiation MUST be
possible by either the ROLE-A or the ROLE-B DSA creating a DOP
association and invoking an establish-operational-binding
operation conformant with HOB requirements.
Following successful establishment, each DSA conformant to this
document MUST support modify-operational-binding operations as in
clause 4.1.4.
4.1.9 Validity
Since a HOB represents the existence of bothe a superior and a
subordinate naming context, DSAs in ROLE-A and ROLE-B are not
required to support validity other than the default validity for
the operational binding:
* Valid from now ...
* Until explicitly terminated
ROLE-A and ROLE-B DSAs are permitted to act always as if this
were the validity used (see 4.2.2).
4.1.10 Termination
A ROLE-A DSA may optionally be capable of invoking a termination
operation for an active HOB. This can only occur as a
consequence of Administrative Authority action.
A ROLE-B DSA MUST be capable of invoking a termination operation
for an active HOB when the naming context is removed (e.g. by a
remove-entry operation for the context prefix).
A ROLE-B DSA may optionally be capable of invoking a termination
operation for an active HOB when the naming context still exists.
ISSS EGDIR [Page 11]
INTERNET-DRAFT Hierarchical Operational Bindings - a profile June 1997
4.2 Dynamic Conformance Requirements
To conform to document, implementations MUST conform to all
mandatory requirements of 9.2.3 and 7.5 in ISO/IEC 9594-5:1993
(X.519) for a DSA supporting s the
directoryOperationalBindingManagementAC application context.
Implementations MUST conform to all procedures specified in the
directory base standards relating to Hierarchical Operational
Bindings, as amended by the corrigenda listed in clause 7 of this
document, as they relate to operations and protocol elements for
which support is claimed in the PICS. Attention is drawn to the
following clauses of ISO/IEC 9594-4:1993 (X.518):
* Add-entry operations affecting HOBs (clause 19.1.1) ,
including those that add relevant subentries
* Remove-entry operations affecting HOBs (clause 19.1.2),
including those that remove relevant subentries
* Modify-entry operations affecting HOBs (clause 19.1.3),
including those that remove relevant subentries
* Modify-DN operations affecting HOBs (clause 19.1.4),
including those that change the names of relevant subentries
There are limitations on the support for modify-DN operations
(see 4.1.4).
4.2.1 ROLE-A Support - Establishment Parameters
4.2.1.1 Vertex
In the case of administrative points, the following information
MUST be supplied in contextPrefixInfo for each vertex:
* In admPointInfo, the administrative role attribute if
relevant (i.e. there is no ppp-specific point interposed
between the vertex and the new entry where ppp is any of the
three administrative purposes: access-control, subschema
administration, collective attributes)
* In admPointInfo, the access-control-scheme attribute if
relevant (i.e. there is no access control specific point
interposed between the vertex and the new entry)
* In subentryInfo, the complete information in all relevant
subentries (i.e. subentries for each administrative purpose
ppp where there is no ppp-specific point interposed between
the vertex and the new entry)
ISSS EGDIR [Page 12]
INTERNET-DRAFT Hierarchical Operational Bindings - a profile June 1997
The accessPoints element MUST be present when the vertex
corresponds to the context prefix of the superior naming context
which is the subject of the HOB. However a ROLE-A DSA is
permitted to pass either an empty SET OF as
MasterAndShadowAccessPoints or a SET OF that contains only the
master access-point (i.e. a reference to itself).
If shadow access points are present in
MasterAndShadowAccessPoints, the master access-point MUST also be
present.
4.2.1.2 Entry information
When the HOB is initiated as a result of an add-entry operation,
the DSA MUST supply in SET OF Attribute the exact information
supplied by SET OF Attribute within the add-entry operation.
4.2.1.3 Immediate superior info
The ImmediateSuperiorInfo element MUST be supported, and MUST
contain the objectClass and entryACI attributes.
NOTES
1. The DSA is permitted to be configurable to not transmit this
element
2. The DSA is permitted to supply other attributes
4.2.2 Validity
Since a HOB of this kind represents a de-facto situation (i.e.
the presence or otherwise of a subordinate naming context), the
components of Validity are not relevant to practical operations.
Initiating DSAs are recommended to use the default (element is
absent), meaning valid from now until explicitly terminated.
Responding DSAs are permitted to ignore the element (i.e. treat
it as if the default had been received).
4.2.3 ROLE-B Support - Establishment Parameters
DSAs acting in ROLE-B MUST be capable of supporting:
1. Administrative information supplied in contextPrefixInfo, in
respect of some or all of the administrative purposes:
ISSS EGDIR [Page 13]
INTERNET-DRAFT Hierarchical Operational Bindings - a profile June 1997
* Access control (mandatory)
* Subschema administration (optional but should be
supported)
* Collective attributes (optional but should be supported)
within the requirements of:
* DSA Simple Access Control or DSA Basic Access Control
* Administrative Areas
* Schema Administration
2. Knowledge information for an immediate-superior reference
supplied in accessPoints within contextPrefixInfo.
A DSA is not required to implement the optimisation of the list
operation supported by ImmediateSuperiorInfo (X.518 clause
19.3.1.2.1 3 a), 24.1.4.2 Note).
A DSA MUST support the subordinateToSuperior value as follows:
* accessPoints MUST be supported, except that only support for
a master reference is required (Shadow references wouldn't be
available at this stage, but they could be present for the
use in MODIFICATION-PARAMETERS).
* alias may optionally be supported
* entryInfo may optionally be supported
When entryInfo is supported, it MUST comprise at least:
* The objectClass attribute
* An entryACI attribute, synthesised as necessary to contain
all the ACI that is relevant to the access of the context
prefix.
The last of these is used to indicate all of the ACI relevant to
the entry which is derived from the context prefix's entry ACI
(if any) together with any precriptive ACI derived from the
context prefix's subentries (if any) and relevant to the context
prefix. The ACI values are simply gathered together to form a
synthesised attribute. This information can be supplied to
optimise the handling of access control for lists, and also to
ISSS EGDIR [Page 14]
INTERNET-DRAFT Hierarchical Operational Bindings - a profile June 1997
regulate access to subordinate reference information. Disclosing
the latter could give rise to a breach of security, and the entry
ACI helps xontrol this.
This entryACI may be passed back even if if SAC is to be used.
4.2.4 Modification Parameters
4.2.4.1 ROLE-A Parameters
Support MUST be as for establishment parameters, except that
entryInfo is absent in SuperiorToSubordinateModification (it is
otherwise identical to SuperiorToSubordinate).
4.2.4.2 ROLE-B Parameters
Support MUST be as for establishment parameters.
4.2.5 Termination
A ROLE-B DSA in receipt of a termination invoke from a ROLE-A DSA
MUST be capable of accepting the termination. However, there is
no requirement to remove the subordinate naming context, or to
change any of the administrative policies that pre-existed before
the termination.
A ROLE-B DSA MUST be capable of invoking a termination operation
for an active HOB when the naming context is removed (e.g. by a
remove-entry operation for the context prefix).
A ROLE-A DSA from a ROLE-A DSA in receipt of a termination invoke
MUST be capable of accepting the termination.
4.2.6 Rules of Extensibility for Result and Error Handling
Implementations MUST satisfy the rule of extensibility for result
and error handling specified in clause 7.5 of ISO/IEC 9594-5:1993
(X.519).
4.2.7 Digital Signatures
Digital signatures are not supported by 1993 DOP operations
(although this anomaly is rectified by the 1997 Directory
standards).
ISSS EGDIR [Page 15]
INTERNET-DRAFT Hierarchical Operational Bindings - a profile June 1997
4.2.8 Errors
Operational binding errors MUST be supported by ROLE-A and ROLE-B
DSAs in conformance with X.501 clause 24.5.
5. Security considerations
HOBs permit an intimate relationship to exist between two DSAs;
the feature needs to be carefully protected. For this reason,
adequate authentication is required, and DSAs need to be designed
to accept HOBs only from suitably qualified sites. In addition,
the initiation of a HOB is only tolerable when done by a
qualified administrative user.
The scenario for HOB creation and management is likely to be
constrained mostly to a single organisation; this means that
simpler forms of authentication may be adequate in the short
term.
6. Summary of support
The following clause summarises the functional and protocol
support defined by this document.
+----------------------------------------------------------+---+
| Support of both ROLE-A and ROLE B in implementing | |
| the targetSystem element and procedure of add-entry | |
| to create a HOB | m |
+----------------------------------------------------------+---+
| Support of ROLE-A or ROLE-B in implement a HOB in respect| |
| of a pre-existing subordinate naming context which was | |
| established by local means. | m |
+----------------------------------------------------------+---+
| For a ROLE-A DSA, support of configuration to reject an | |
| add-entry operation specifying targetSystem in respect of| |
| any specific DSA. | m |
+----------------------------------------------------------+---+
| DSAs conformant with this document MUST be able to | |
| tolerate the case where they contain a superior or | |
| subordinate DSA, but no HOB exists. | m |
+----------------------------------------------------------+---+
| For a ROLE-A DSA, support of configuration to reject an | |
| attempt to create a HOB when the ROLE-B DSA proposes a | |
| new naming context ith an unacceptable name | m |
+----------------------------------------------------------+---+
| For a ROLE-B DSA, support of configuration to reject an | |
| attempt to create a HOB proposed by a ROLE-A DSA for a | |
| new naming context with a name unacceptable to it | m |
+----------------------------------------------------------+---+
ISSS EGDIR [Page 16]
INTERNET-DRAFT Hierarchical Operational Bindings - a profile June 1997
+----------------------------------------------------------+---+
| For a ROLE-B DSA, support of configuration to reject a | |
| HOB proposed by any specific ROLE-A DSA | m |
+----------------------------------------------------------+---+
| Support of establishment, modification, and termination | |
| operations in ROLE-A and ROLE-B, subject to clause 4.2 | m |
+----------------------------------------------------------+---+
| Support of transfer of administrative point and subentry | |
| information by ROLE A DSAs: Access control information | m |
+----------------------------------------------------------+---+
| Ditto - Subschema information | o |
+----------------------------------------------------------+---+
| Ditto - Collective attribute information | o |
+----------------------------------------------------------+---+
| Support, by both ROLE-A and Role-B DSAs of the supply and| |
| maintenance of their own access points. | m |
+----------------------------------------------------------+---+
| Support by ROLE-A of a change in RDN of the subordinate | |
| context prefix (retaining the DN of the superior entry) | m |
+----------------------------------------------------------+---+
| Support by ROLE-A DSAs of establishing a DOP association,| |
| to invoke a modify-operational-binding operation after | |
| Any change in contextPrefixInfo | |
| Any change in the access point of the DSA | m |
+----------------------------------------------------------+---+
| Support by ROLE-B DSAs of establishing a DOP association | |
| to invoke a modify-operational-binding operation after | |
| Any change in entryInfo as previously supplied | |
| Any change in the access point of the DSA | m |
+----------------------------------------------------------+---+
| Support of DOP binds using simple authentication with | |
| unprotected password | m |
+----------------------------------------------------------+---+
| Ditto using simple protected authentication | o |
+----------------------------------------------------------+---+
| Ditto using strong authentication | o |
+----------------------------------------------------------+---+
| Capable of rejecting DOP binds that use no | |
| authentication, or that use simple unprotected | |
| authentication without password. | m |
+----------------------------------------------------------+---+
| Support of configuration as ROLE-A or ROLE-B to refuse | |
| direct DAP or DSP access to information received using | |
| other than entryInfo supplied by a ROLE B DSA. | m |
+----------------------------------------------------------+---+
| Support by a ROLE-A or ROLE-B DSA of creation of a HOB | |
| in respect of a pre-existing naming context, and | |
| subsequent support of modify-operational-binding | |
| operations | m |
+----------------------------------------------------------+---+
ISSS EGDIR [Page 17]
INTERNET-DRAFT Hierarchical Operational Bindings - a profile June 1997
+----------------------------------------------------------+---+
| Support by a ROLE-B DSA of a termination operation for | |
| an active HOB when the naming context is removed | m |
+----------------------------------------------------------+---+
| Ditto when the naming context still exists. | o |
+----------------------------------------------------------+---+
| Support of simple-protected authentication with password | |
| is mandatory ("none" authentication is considered | |
| inappropriate for a management protocol) | m |
+----------------------------------------------------------+---+
| For Supported Operational Binding types support of | |
| specificHierarchicalBindingID is mandatory | m |
+----------------------------------------------------------+---+
| The following DOP operations are mandatory | |
| EstablishOperationalBinding | |
| ModifyOperationalBinding | |
| TerminateOperationalBinding, | m |
| as used for hierarchical operational bindings | |
+----------------------------------------------------------+---+
| In DirectoryBindArgument and DirectoryBindResult, as | |
| used within DOP, the following must be supported | |
| credentials | |
| simple | |
| name | |
| password | |
| as used for hierarchical operational bindings | m |
+----------------------------------------------------------+---+
| In Establish Operational Binding Argument, the following | |
| must be supported: | |
| bindingID - the initiator must be able to place an Id | |
| here | |
| roleA-initiates (with SuperiorToSubordinate) | |
| If roleB-initiates is supported, SubordinateToSuperior | |
| must be supported. | m |
+----------------------------------------------------------+---+
| In Establish Operational Binding Argument Result, the | |
| following must be supported: | |
| bindingID | |
| initiator | m |
+----------------------------------------------------------+---+
7. References
The following Directory standards are particularly relevant:
[1] ISO/IEC 9594-2:1993 (X.501): Information Technology -- Open
Systems Interconnection -- The Directory: Models.
ISSS EGDIR [Page 18]
INTERNET-DRAFT Hierarchical Operational Bindings - a profile June 1997
[2] ISO/IEC 9594-3:1993 (X.511): Information Technology -- Open
Systems Interconnection -- The Directory: Abstract Service
Definition.
[3] ISO/IEC 9594-4:1993 (X.518): Information Technology -- Open
Systems Interconnection -- The Directory: Procedures for
Distributed Operations.
[4] ISO/IEC 9594-5:1993 (X.519): Information Technology -- Open
Systems Interconnection -- The Directory: Protocol
Specifications.
The amendments and corrigenda as listed below are considered as
normative references by this document.
+----+-----------------------------+----------------------------+
| 1 | ISO/IEC 9594-2:1993 (X.501) | Cor.1: 1995 |
| 2 | ISO/IEC 9594-2:1993 (X.501) | Draft Cor.2: 1995 |
| 3 | ISO/IEC 9594-8:1993 (X.509) | Cor.1: 1995 |
| 4 | ISO/IEC 9594-8:1993 (X.509) | Cor.2: 1995 |
| 5 | ISO/IEC 9594-8:1993 (X.509) | Draft Cor.3: 1995 |
| 6 | ISO/IEC 9594-3:1993 (X.511) | Cor.1: 1995 |
| 7 | ISO/IEC 9594-3:1993 (X.511) | Draft Cor.2: 1995 |
| 8 | ISO/IEC 9594-4:1993 (X.518) | Cor.1: 1995 |
| 9 | ISO/IEC 9594-4:1993 (X.518) | Draft Cor.2: 1995 |
| 10 | ISO/IEC 9594-5:1993 (X.519) | Cor.1: 1995 |
| 11 | ISO/IEC 9594-6:1993 (X.520) | Cor.1: 1995 |
| 12 | ISO/IEC 9594-9:1993 (X.525) | Cor.1: 1995 |
| 13 | ISO/IEC 9594-9:1993 (X.525) | Draft Cor.2: 1995 |
+----+-----------------------------+----------------------------+
8. Authors' Addresses
Anthony Hodson (Editor for EGDIR)
XdotD Associates
Spring Lanes House
Holly Spring Lane
Bracknell, Berkshire, ENGLAND
Email: aeh@xdotd.demon.co.uk
Erik Andersen (EGDIR Chairman)
Fischer & Lorenz
Tuborg Parkvej 10
DK2000 Hellerup, DENMARK
Email: era@fl.dk
ISSS EGDIR [Page 19]
INTERNET-DRAFT Hierarchical Operational Bindings - a profile June 1997
Keith Richardson
ICL
High Performance Systems
Wenlock Way, West Gorton
Manchester M12 5DR ENGLAND
Email: k.richardson@man0523.wins.icl.co.uk
Louis Visser
Netherlands Normalisatie-instituut
Kalfjeslaan 2
Delft, NETHERLANDS,
Email: l.visser@nni.nl
Patrick Fantou
Siemens Nixdorf Informationssysteme AG
ASW BA COM2
Otto-Hahn-Ring 6
D-81739 MUNICH GERMANY
Email: Patrick.Fantou@mch.sni.de
Jacqueline Pasquerau
EDFGDS
STI
21 Rue Joseph Bara
92132 Issy les Moulineaux CEDEX
FRANCE
Email: jacqueline.pasquereau@edfgds.fr
ISSS EGDIR [Page 20]