ISO/IEC 9594-1:2008
(Main)Information technology - Open Systems Interconnection - The Directory: Overview of concepts, models and services - Part 1:
Information technology - Open Systems Interconnection - The Directory: Overview of concepts, models and services - Part 1:
ISO/IEC 9594-1:2008 gives an overview of the concepts, models and services related to “The Directory”. The Directory provides the directory capabilities required by OSI applications, OSI management processes, other OSI layer entities, and telecommunications services. Among the capabilities which it provides are those of "user-friendly naming", whereby objects can be referred to by names which are suitable for citing by human users (though not all objects need have user-friendly names), and "name-to-address mapping", which allows the binding between objects and their locations to be dynamic. The latter capability allows OSI networks, for example, to be "self-configuring" in the sense that addition, removal and changes of object location do not affect OSI network operation. The Directory is not intended to be a general-purpose database system, although it may be built on such systems. It is assumed, for instance, that, as is typical with communications directories, there is a considerably higher frequency of "queries" than of updates. The rate of updates is expected to be governed by the dynamics of people and organizations, rather than, for example, the dynamics of networks. There is also no need for instantaneous global commitment of updates; transient conditions, where both old and new versions of the same information are available, are quite acceptable. It is a characteristic of the Directory that, except as a consequence of differing access rights or unpropagated updates, the results of directory queries will not be dependent on the identity or location of the enquirer. This characteristic renders the Directory unsuitable for some telecommunications applications, for example some types of routing. For cases where the results are dependent on the identity of the enquirer, access to directory information and updates of the Directory may be denied.
Technologies de l'information — Interconnexion de systèmes ouverts (OSI) — L'annuaire: Aperçu général des concepts, modèles et services — Partie 1:
General Information
Relations
Frequently Asked Questions
ISO/IEC 9594-1:2008 is a standard published by the International Organization for Standardization (ISO). Its full title is "Information technology - Open Systems Interconnection - The Directory: Overview of concepts, models and services - Part 1:". This standard covers: ISO/IEC 9594-1:2008 gives an overview of the concepts, models and services related to “The Directory”. The Directory provides the directory capabilities required by OSI applications, OSI management processes, other OSI layer entities, and telecommunications services. Among the capabilities which it provides are those of "user-friendly naming", whereby objects can be referred to by names which are suitable for citing by human users (though not all objects need have user-friendly names), and "name-to-address mapping", which allows the binding between objects and their locations to be dynamic. The latter capability allows OSI networks, for example, to be "self-configuring" in the sense that addition, removal and changes of object location do not affect OSI network operation. The Directory is not intended to be a general-purpose database system, although it may be built on such systems. It is assumed, for instance, that, as is typical with communications directories, there is a considerably higher frequency of "queries" than of updates. The rate of updates is expected to be governed by the dynamics of people and organizations, rather than, for example, the dynamics of networks. There is also no need for instantaneous global commitment of updates; transient conditions, where both old and new versions of the same information are available, are quite acceptable. It is a characteristic of the Directory that, except as a consequence of differing access rights or unpropagated updates, the results of directory queries will not be dependent on the identity or location of the enquirer. This characteristic renders the Directory unsuitable for some telecommunications applications, for example some types of routing. For cases where the results are dependent on the identity of the enquirer, access to directory information and updates of the Directory may be denied.
ISO/IEC 9594-1:2008 gives an overview of the concepts, models and services related to “The Directory”. The Directory provides the directory capabilities required by OSI applications, OSI management processes, other OSI layer entities, and telecommunications services. Among the capabilities which it provides are those of "user-friendly naming", whereby objects can be referred to by names which are suitable for citing by human users (though not all objects need have user-friendly names), and "name-to-address mapping", which allows the binding between objects and their locations to be dynamic. The latter capability allows OSI networks, for example, to be "self-configuring" in the sense that addition, removal and changes of object location do not affect OSI network operation. The Directory is not intended to be a general-purpose database system, although it may be built on such systems. It is assumed, for instance, that, as is typical with communications directories, there is a considerably higher frequency of "queries" than of updates. The rate of updates is expected to be governed by the dynamics of people and organizations, rather than, for example, the dynamics of networks. There is also no need for instantaneous global commitment of updates; transient conditions, where both old and new versions of the same information are available, are quite acceptable. It is a characteristic of the Directory that, except as a consequence of differing access rights or unpropagated updates, the results of directory queries will not be dependent on the identity or location of the enquirer. This characteristic renders the Directory unsuitable for some telecommunications applications, for example some types of routing. For cases where the results are dependent on the identity of the enquirer, access to directory information and updates of the Directory may be denied.
ISO/IEC 9594-1:2008 is classified under the following ICS (International Classification for Standards) categories: 35.100.70 - Application layer. The ICS classification helps identify the subject area and facilitates finding related standards.
ISO/IEC 9594-1:2008 has the following relationships with other standards: It is inter standard links to ISO/IEC 9594-1:2014, ISO/IEC 9594-1:2005. Understanding these relationships helps ensure you are using the most current and applicable version of the standard.
You can purchase ISO/IEC 9594-1:2008 directly from iTeh Standards. The document is available in PDF format and is delivered instantly after payment. Add the standard to your cart and complete the secure checkout process. iTeh Standards is an authorized distributor of ISO standards.
Standards Content (Sample)
INTERNATIONAL ISO/IEC
STANDARD 9594-1
Sixth edition
2008-12-15
Information technology — Open Systems
Interconnection — The Directory:
Overview of concepts, models and
services
Technologies de l'information — Interconnexion de systèmes ouverts
(OSI) — L'annuaire: Aperçu général des concepts, modèles et services
Reference number
©
ISO/IEC 2008
PDF disclaimer
This PDF file may contain embedded typefaces. In accordance with Adobe's licensing policy, this file may be printed or viewed but
shall not be edited unless the typefaces which are embedded are licensed to and installed on the computer performing the editing. In
downloading this file, parties accept therein the responsibility of not infringing Adobe's licensing policy. The ISO Central Secretariat
accepts no liability in this area.
Adobe is a trademark of Adobe Systems Incorporated.
Details of the software products used to create this PDF file can be found in the General Info relative to the file; the PDF-creation
parameters were optimized for printing. Every care has been taken to ensure that the file is suitable for use by ISO member bodies. In
the unlikely event that a problem relating to it is found, please inform the Central Secretariat at the address given below.
© ISO/IEC 2008
All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or by any means,
electronic or mechanical, including photocopying and microfilm, without permission in writing from either ISO at the address below or
ISO's member body in the country of the requester.
ISO copyright office
Case postale 56 • CH-1211 Geneva 20
Tel. + 41 22 749 01 11
Fax + 41 22 749 09 47
E-mail copyright@iso.org
Web www.iso.org
Published by ISO in 2009
Published in Switzerland
ii © ISO/IEC 2008 – All rights reserved
CONTENTS
Page
Foreword . iv
Introduction . v
1 Scope. 1
2 Normative references . 1
2.1 Identical Recommendations | International Standards. 1
3 Definitions . 2
3.1 Communication model definitions. 2
3.2 Directory model definitions. 2
3.3 Distributed Operation definitions . 3
3.4 Replication definitions . 3
3.5 Basic directory definitions . 3
4 Abbreviations . 3
5 Conventions . 4
6 Overview of the Directory. 4
7 The Directory Information Base (DIB) . 5
8 The Directory service . 7
8.1 Introduction . 7
8.2 Service qualification . 7
8.3 Directory interrogation. 8
8.4 Directory modification . 8
8.5 Other outcomes. 9
9 The distributed Directory . 9
9.1 Functional model . 9
9.2 Organizational model. 10
9.3 Operation of the model. 10
10 Access control in the Directory. 13
11 Service administration . 14
12 Replication in the Directory. 15
12.1 Introduction . 15
12.2 Forms of Directory replication. 15
12.3 Replication and consistency of Directory information. 16
12.4 Views of replication. 16
12.5 Replication and Access Control . 17
13 Directory protocols . 17
14 Systems management of the Directory . 17
14.1 Introduction . 18
14.2 Management of the DIT domain. 18
14.3 Management of Directory components . 18
Annex A – Applying the Directory . 19
A.1 The Directory environment . 19
A.2 Directory service characteristics. 19
A.3 Patterns of use of the Directory. 19
A.4 Generic applications . 21
Annex B – Amendments and corrigenda. 23
Foreword
© ISO/IEC 2008 – All rights reserved iii
Foreword
ISO (the International Organization for Standardization) and IEC (the International Electrotechnical
Commission) form the specialized system for worldwide standardization. National bodies that are members of
ISO or IEC participate in the development of International Standards through technical committees
established by the respective organization to deal with particular fields of technical activity. ISO and IEC
technical committees collaborate in fields of mutual interest. Other international organizations, governmental
and non-governmental, in liaison with ISO and IEC, also take part in the work. In the field of information
technology, ISO and IEC have established a joint technical committee, ISO/IEC JTC 1.
International Standards are drafted in accordance with the rules given in the ISO/IEC Directives, Part 2.
The main task of the joint technical committee is to prepare International Standards. Draft International
Standards adopted by the joint technical committee are circulated to national bodies for voting. Publication as
an International Standard requires approval by at least 75 % of the national bodies casting a vote.
Attention is drawn to the possibility that some of the elements of this document may be the subject of patent
rights. ISO and IEC shall not be held responsible for identifying any or all such patent rights.
Subcommittee SC 6, Telecommunications and information exchange between systems, in collaboration with
ITU-T. The identical text is published as ITU-T Rec. X.500 (11/2008).
This sixth edition cancels and replaces the fifth edition (ISO/IEC 9594-1:2005), which has been technically
revised.
ISO/IEC 9594 consists of the following parts, under the general title Information technology — Open Systems
Interconnection — The Directory:
⎯ Part 1: Overview of concepts, models and services
⎯ Part 2: Models
⎯ Part 3: Abstract service definition
⎯ Part 4: Procedures for distributed operation
⎯ Part 5: Protocol specifications
⎯ Part 6: Selected attribute types
⎯ Part 7: Selected object classes
⎯ Part 8: Public-key and attribute certificate frameworks
⎯ Part 9: Replication
⎯ Part 10: Use of systems management for administration of the Directory
iv © ISO/IEC 2008 – All rights reserved
Introduction
This Recommendation | International Standard together with other Recommendations | International Standards, has
been produced to facilitate the interconnection of information processing systems to provide directory services. A set of
such systems, together with the directory information that they hold, can be viewed as an integrated whole, called the
Directory. The information held by the Directory, collectively known as the Directory Information Base (DIB), is
typically used to facilitate communication between, with or about objects such as application entities, people, terminals
and distribution lists.
The Directory plays a significant role in Open Systems Interconnection, whose aim is to allow, with a minimum of
technical agreement outside of the interconnection standards themselves, the interconnection of information processing
systems:
– from different manufacturers;
– under different managements;
– of different levels of complexity; and
– of different ages.
This Recommendation | International Standard introduces and models the concepts of the Directory and of the DIB and
overviews the services and capabilities which they provide. Other Recommendations | International Standards make use
of these models in defining the abstract service provided by the Directory, and in specifying the protocols through
which this service can be obtained or propagated.
This Recommendation | International Standard provides the foundation frameworks upon which industry profiles can be
defined by other standards groups and industry forums. Many of the features defined as optional in these frameworks,
may be mandated for use in certain environments through profiles. This sixth edition technically revises and enhances,
but does not replace, the fifth edition of this Recommendation | International Standard. Implementations may still claim
conformance to the fifth edition. However, at some point, the fifth edition will not be supported (i.e., reported defects
will no longer be resolved). It is recommended that implementations conform to this sixth edition as soon as possible.
This sixth edition specifies versions 1 and 2 of the Directory protocols.
The first and second editions specified only version 1. Most of the services and protocols specified in this edition are
designed to function under version 1. However some enhanced services and protocols, e.g., signed errors, will not
function unless all Directory entities involved in the operation have negotiated version 2. Whichever version has been
negotiated, differences between the services and between the protocols defined in the six editions, except for those
specifically assigned to version 2, are accommodated using the rules of extensibility defined in ITU-T Rec. X.519 |
ISO/IEC 9594-5.
Annex A, which is an integral part of this Recommendation | International Standard, describes the types of use to which
the Directory can be applied.
Annex B, which is not an integral part of this Recommendation | International Standard, lists the amendments and
defect reports that have been incorporated to form this edition of this Recommendation | International Standard.
© ISO/IEC 2008 – All rights reserved v
INTERNATIONAL STANDARD
ITU-T RECOMMENDATION
Information technology – Open Systems Interconnection – The Directory:
Overview of concepts, models and services
1 Scope
The Directory provides the directory capabilities required by OSI applications, OSI management processes, other OSI
layer entities, and telecommunications services. Among the capabilities which it provides are those of "user-friendly
naming", whereby objects can be referred to by names which are suitable for citing by human users (though not all
objects need have user-friendly names); and "name-to-address mapping" which allows the binding between objects and
their locations to be dynamic. The latter capability allows OSI networks, for example, to be "self-configuring" in the
sense that addition, removal and the changes of object location do not affect OSI network operation.
The Directory is not intended to be a general-purpose database system, although it may be built on such systems. It is
assumed, for instance, that, as is typical with communications directories, there is a considerably higher frequency of
"queries" than of updates. The rate of updates is expected to be governed by the dynamics of people and organizations,
rather than, for example, the dynamics of networks. There is also no need for instantaneous global commitment of
updates; transient conditions, where both old and new versions of the same information are available, are quite
acceptable.
It is a characteristic of the Directory that, except as a consequence of differing access rights or unpropagated updates,
the results of directory queries will not be dependent on the identity or location of the inquirer. This characteristic
renders the Directory unsuitable for some telecommunications applications, for example some types of routing. For
cases where the results are dependent on the identity of the inquirer, access to directory information and updates of the
Directory may be denied.
2 Normative references
The following Recommendations and International Standards contain provisions which, through reference in this text,
constitute provisions of this Recommendation | International Standard. At the time of publication, the editions indicated
were valid. All Recommendations and Standards are subject to revision, and parties to agreements based on this
Recommendation | International Standard are encouraged to investigate the possibility of applying the most recent
edition of the Recommendations and Standards listed below. Members of IEC and ISO maintain registers of currently
valid International Standards. The Telecommunication Standardization Bureau of the ITU maintains a list of currently
valid ITU-T Recommendations.
2.1 Identical Recommendations | International Standards
– ITU-T Recommendation X.200 (1994) | ISO/IEC 7498-1:1994, Information technology – Open Systems
Interconnection – Basic Reference Model: The Basic Model.
– ITU-T Recommendation X.501 (2008) | ISO/IEC 9594-2:2008, Information technology – Open Systems
Interconnection – The Directory: Models.
– ITU-T Recommendation X.509 (2008) | ISO/IEC 9594-8:2008, Information technology – Open Systems
Interconnection – The Directory: Public-key and attribute certificate frameworks.
– ITU-T Recommendation X.511 (2008) | ISO/IEC 9594-3:2008, Information technology – Open Systems
Interconnection – The Directory: Abstract service definition.
– ITU-T Recommendation X.518 (2008) | ISO/IEC 9594-4:2008, Information technology – Open Systems
Interconnection – The Directory: Procedures for distributed operation.
– ITU-T Recommendation X.519 (2008) | ISO/IEC 9594-5:2008, Information technology – Open Systems
Interconnection – The Directory: Protocol specifications.
– ITU-T Recommendation X.520 (2008) | ISO/IEC 9594-6:2008, Information technology – Open Systems
Interconnection – The Directory: Selected attribute types.
ITU-T Rec. X.500 (11/2008) 1
– ITU-T Recommendation X.521 (2008) | ISO/IEC 9594-7:2008, Information technology – Open Systems
Interconnection – The Directory: Selected object classes.
– ITU-T Recommendation X.525 (2008) | ISO/IEC 9594-9:2008, Information technology – Open Systems
Interconnection – The Directory: Replication.
– ITU-T Recommendation X.530 (2008) | ISO/IEC 9594-10:2008, Information technology – Open Systems
Interconnection – The Directory: Use of systems management for administration of the Directory.
3 Definitions
For the purposes of this Recommendation | International Standard, the following definitions apply.
3.1 Communication model definitions
The following terms are defined in ITU-T Rec. X.519 | ISO/IEC 9594-5:
a) application-entity;
b) application layer;
c) application process.
3.2 Directory model definitions
The following terms are defined in ITU-T Rec. X.501 | ISO/IEC 9594-2:
a) access control;
b) Administration Directory Management Domain;
c) alias;
d) ancestor;
e) attribute;
f) attribute type;
g) attribute value;
h) authentication;
i) compound entry;
j) context;
k) Directory Information Tree (DIT);
l) Directory Management Domain (DMD);
m) Directory System Agent (DSA);
n) Directory User Agent (DUA);
o) distinguished name;
p) entry;
q) family (of entries);
r) hierarchical group;
s) LDAP client;
t) LDAP requester;
u) LDAP responder;
v) LDAP server;
w) name;
x) object (of interest);
y) Private Directory Management Domain;
z) related entries;
aa) relative distinguished name;
bb) root;
2 ITU-T Rec. X.500 (11/2008)
cc) schema;
dd) security policy;
ee) subordinate object;
ff) superior entry;
gg) superior object;
hh) tree.
3.3 Distributed Operation definitions
The following terms are defined in ITU-T Rec. X.518 | ISO/IEC 9594-4:
a) uni-chaining;
b) multi-chaining;
c) referral.
3.4 Replication definitions
The following terms are defined in ITU-T Rec. X.525 | ISO/IEC 9594-9:
a) caching;
b) cache-copy;
c) entry-copy;
d) master DSA;
e) replication;
f) shadow consumer;
g) shadow supplier;
h) shadowed information;
i) shadowing agreement.
3.5 Basic directory definitions
The following terms are defined in this Recommendation | International Standard:
3.5.1 the Directory: A collection of open systems cooperating to provide directory services.
3.5.2 directory information base (DIB): The set of information managed by the Directory.
3.5.3 (directory) user: The end user of the Directory, i.e., the entity or person which accesses the Directory.
4 Abbreviations
For the purposes of this Recommendation | International Standard, the following abbreviations apply:
ACI Access Control Information
ADDMD Administration Directory Management Domain
DAP Directory Access Protocol
DIB Directory Information Base
DISP Directory Information Shadowing Protocol
DIT Directory Information Tree
DMD Directory Management Domain
DOP Directory Operational Binding Management Protocol
DSA Directory System Agent
DSP Directory System Protocol
DUA Directory User Agent
LDAP Lightweight Directory Access Protocol
ITU-T Rec. X.500 (11/2008) 3
OSI Open Systems Interconnection
PRDMD Private Directory Management Domain
RDN Relative Distinguished Name
5 Conventions
The term "Directory Specification" (as in "this Directory Specification") shall be taken to mean ITU-T Rec. X.500 |
ISO/IEC 9594-1. The term "Directory Specifications" shall be taken to mean the X.500-series Recommendations and all
parts of ISO/IEC 9594.
This Directory Specification uses the term first edition systems to refer to systems conforming to the first edition of the
Directory Specifications, i.e., the 1988 edition of the series of CCITT X.500 Recommendations and the
ISO/IEC 9594:1990 edition.
This Directory Specification uses the term second edition systems to refer to systems conforming to the second edition
of the Directory Specifications, i.e., the 1993 edition of the series of ITU-T X.500 Recommendations and the
ISO/IEC 9594:1995 edition.
This Directory Specification uses the term third edition systems to refer to systems conforming to the third edition of the
Directory Specifications, i.e., the 1997 edition of the series of ITU-T X.500 Recommendations and the ISO/IEC
9594:1998 edition.
This Directory Specification uses the term fourth edition systems to refer to systems conforming to the fourth edition of
the Directory Specifications, i.e., the 2001 editions of ITU-T Recs X.500, X.501, X.511, X.518, X.519, X.520, X.521,
X.525, and X.530, the 2000 edition of ITU-T Rec. X.509, and parts 1-10 of the ISO/IEC 9594:2001 edition.
This Directory Specification uses the term fifth edition systems to refer to systems conforming to the fifth edition of the
Directory Specifications, i.e., the 2005 editions of the series of ITU-T X.500 Recommendations and the ISO/IEC
9594:2005 edition.
This Directory Specification uses the term sixth edition systems to refer to systems conforming to the sixth edition of the
Directory Specifications, i.e., the 2008 editions of the series of ITU-T X.500 Recommendations and the ISO/IEC
9594:2008 edition.
6 Overview of the Directory
The Directory is a collection of open systems which cooperate to hold a logical database of information about a set of
objects in the real world. The users of the Directory, including people and computer programs, can read or modify the
information, or parts of it, subject to having permission to do so. Each user is represented in accessing the Directory by
a Directory User Agent (DUA) or an LDAP client, each of which is considered to be an application-process. These
concepts are illustrated in Figure 1.
NOTE – The Directory Specifications refer to the Directory in the singular, and reflects the intention to create, through a single,
unified, name space, one logical directory composed of many systems and serving many applications. Whether or not these
systems choose to interwork will depend on the needs of the applications they support. Applications dealing with non-
intersecting worlds of objects may have no such need. The single name space facilitates later interworking should the needs
change. For a variety of reasons, such as security, connectivity, or business decisions, it is likely that some portions of the
Directory may be unreachable from other portions of the Directory using third edition operations. This results in differing views
of the Directory. Such differing views may contain related entries about a given real world object. Such related entries may or
may not have the same distinguished name. Using fourth or subsequent edition systems, it is possible to perform operations
across multiple, differing views to provide an integrated response to the user. Specifically:
– DMD administrators (see 9.2) may have a need to publish their own view (or views) of some specific real-world object; a
real-world object may thus be modelled by multiple independent entries in the directory. This may happen whether or not
they need to interwork. Interworking using DSP may also be unsupported.
– Notwithstanding the last sentence of the Note, it is also possible that particular DMDs may choose to publish information
about real-world objects within their own distinct directory name-spaces (i.e., in one of multiple DITs); in this case, it
would be possible to have a specific real-world object modelled by entries in the same or different DIT namespaces, with
the same or different distinguished names in each. Note that certain Directory facilities (e.g., the acquisition of certificates,
and related functions based on digital signatures) cannot be implemented when distinct objects are permitted to share
distinguished names.
– The objective of related entries is to provide a means whereby users can access such entries, bringing the resulting
information together, if possible. This would apply to the situation described by both of the preceding bullet points.
4 ITU-T Rec. X.500 (11/2008)
Figure 1 – Access to the Directory
The information held in the Directory is collectively known as the Directory Information Base (DIB). Clause 7 gives an
overview of its structure.
The Directory provides a well-defined set of access capabilities, known as the abstract service of the Directory, to its
users. This service, which is briefly described in clause 8, provides a simple modification and retrieval capability. This
can be built on with local DUA functions to provide the capabilities required by the end-users.
The Directory is distributed, both along functional and organizational lines. Clause 9 gives an overview of the
corresponding models of the Directory. These have been developed in order to provide a framework for the cooperation
of the various components to provide an integrated whole.
The Directory exists in an environment where various administrative authorities control access to their portion of the
information. Clause 10 gives an overview of access control.
When the Directory is distributed, it may be desirable to replicate information to improve performance and availability.
Clause 11 gives an overview of the Directory replication mechanism.
The provision and consumption of the Directory services requires that the users (actually the DUAs and/or LDAP
clients) and the various functional components of the Directory should cooperate with one another. In many cases, this
will require cooperation between application processes in different open systems, which in turn requires standardized
application protocols, briefly described in clause 11, to govern this cooperation.
The Directory has been designed so as to support multiple applications, drawn from a wide range of possibilities. The
nature of the applications supported governs which objects are listed in the Directory, which users access the
information, and which kinds of access they carry out. Applications may be very specific, such as the provision of
distribution lists for electronic mail, or generic, such as the 'inter-personal communications directory' application. The
Directory provides the opportunity to exploit commonness among the applications:
– A single object may be relevant to more than one application: Perhaps even the same piece of
information about the same object may be so relevant.
– To support this, a number of object classes and attribute types are defined, which are useful across a
range of applications. These definitions are contained in ITU-T Rec. X.520 | ISO/IEC 9594-6 and
ITU-T Rec. X.521 | ISO/IEC 9594-7.
– Certain patterns of use of the Directory are common across a range of applications: Annex A gives an
overview of this area.
7 The Directory Information Base (DIB)
NOTE 1 – The DIB, and its structure, are defined in ITU-T Rec. X.501 | ISO/IEC 9594-2.
The DIB is made up of information about objects. It is composed of (Directory) entries, each of which consists of a
collection of information on one object. An entry may be an aggregate of member entries each holding information
about a particular aspect of an object. Such an aggregate entry is called a compound entry. Each entry is made up of
attributes, each with a type and one or more values. The types of attribute which are present in a particular entry are
dependent on the class of object which the entry describes. Each value of an attribute may be tagged with one or more
contexts that specify information about a value that can be used to determine the applicability of the value.
The entries of the DIB are arranged in the form of a tree, the Directory Information Tree (DIT) where the vertices
represent the entries. Entries higher in the tree (nearer the root) will often represent objects such as countries or
organizations, while entries lower in the tree will represent people or application processes.
ITU-T Rec. X.500 (11/2008) 5
NOTE 2 – The services defined in the Directory Specifications operate only on a tree-structured DIT. The Directory
Specifications do not preclude the existence in the future of other structures (as the need arises).
Every entry has a distinguished name, which uniquely and unambiguously identifies the entry. These properties of the
distinguished name are derived from the tree structure of the information. The distinguished name of an entry is made
up of the distinguished name of its superior entry, together with specially nominated attribute values (the distinguished
values) from the entry.
Some of the entries at the leaves of the tree are alias entries, while other entries are object entries and compound entries.
Alias entries point to object entries, and provide the basis for alternative names for the corresponding objects.
A compound entry is an entry representing a single object and it is an aggregate of member entries each representing a
part of the information about the object.
The Directory enforces a set of rules to ensure that the DIB remains well-formed in the face of modifications over time.
These rules, known as the Directory schema, prevent entries having the wrong types of attributes for its object class,
attribute values being of the wrong form for the attribute type, and even entries having subordinate entries of the wrong
class.
Figure 2 illustrates the above concepts of the DIT and its components.
Figure 2 – Structure of the DIT and of entries
Figure 3 gives a hypothetical example of a DIT. The tree provides examples of some of the types of attributes used to
identify different objects. For example the name:
{C=GB, L=Winslow, O=Graphic Services, CN=Laser Printer}
identifies the application entity, "Laser Printer", which has in its distinguished name the geographical attribute of
Locality.
The residential person, John Jones, whose name is {C=GB, L=Winslow, CN=John Jones}, has the same geographical
attribute in his distinguished name.
The growth and form of the DIT, the definition of the Directory schema, and the selection of distinguished names for
entries as they are added, is the responsibility of various authorities, whose hierarchical relationship is reflected in the
shape of the tree. The authorities shall ensure, for example, that all of the entries in their jurisdiction have unambiguous
distinguished names, by carefully managing the attribute types and values which appear in those names. Responsibility
is passed down the tree from superior to subordinate authorities, with control being exercised by means of the schema.
6 ITU-T Rec. X.500 (11/2008)
Figure 3 – A hypothetical Directory Information Tree
The hierarchical group function allows an alternative hierarchical relationship to be established among entries
independent of the hierarchical relationship reflected by the DIT structure. The Directory Search operation (see 8.3.4)
can return not only information from matched entries, but also other members of the hierarchical group to which the
matched entry might belong. The hierarchical group function also has the advantage that it allows hierarchical
relationships to be changed without changing the DIT structure and thereby the distinguished names of the entries.
8 The Directory service
NOTE – The definition of the abstract service of the Directory can be found in ITU-T Rec. X.511 | ISO/IEC 9594-3.
8.1 Introduction
This clause provides an overview of the service provided to users, as represented by their DUAs and/or LDAP clients,
by the Directory. All services are provided by the Directory in response to requests from DUAs and/or LDAP clients.
There are requests which allow interrogation of the Directory, as described in 8.3, and those for modification, as
described in 8.4. In addition, requests for service can be qualified, as described in 8.2. The Directory always reports the
outcome of each request that is made of it. The form of the normal outcome is specific to the request, and is evident
from the description of the request. Most abnormal outcomes are common to several requests. The possibilities are
described in 8.5.
The Directory ensures that changes to the DIB, whether the result of a Directory service request, or by some other
(local) means, result in a DIB which continues to obey the rules of the Directory schema.
A user and the Directory are bound together for a period of time at an access point to the Directory. At the time of
binding, the user and the Directory optionally verify each other's identity.
8.2 Service qualification
8.2.1 Service controls
A number of controls can be applied to the various service requests, primarily to allow the user to impose limits on the
use of resources that the Directory shall not surpass, but also to control the progress of the Directory operation. Controls
are provided on, among other things: the amount of time, the size of results, the scope of search, the interaction modes,
and the priority of the request.
8.2.2 Security parameters
Each request may be accompanied by information in support of security mechanisms for protecting the Directory
information. Such information may include the user's request for various kinds of protection; a digital signature of the
request, together with information to assist the correct party to verify the signature.
8.2.3 Filters
A number of requests, whose outcome involves information from or concerning a number of entries, may carry with
them one or more filters. A filter expresses one or more conditions that an entry or a compound entry shall satisfy in
order to be returned as part of the outcome. This allows the set of entries returned to be reduced to only those relevant.
ITU-T Rec. X.500 (11/2008) 7
8.3 Directory interrogation
8.3.1 Read
A read request is aimed at a particular entry, or a compound entry and causes the values of some or all of the attributes
of that entry to be returned. In the case of compound entries, family member information is contained in a package (of
syntax similar to that of an attribute) comprising the selected family information. Where only some attributes are to be
returned, the DUA supplies the list of attribute types of interest as part of the request. A DUA may also supply one or
more contexts for one or more attribute types of interest, in order to select only those values that apply in the specified
contexts.
NOTE – LDAP clients do not support the Read operation.
8.3.2 Compare
A compare request is aimed at a particular attribute of a particular entry or a compound entry, and causes the Directory
to check whether a supplied value matches a value of that attribute. A DUA may also supply one or more contexts for
the attribute value of interest to constrain the comparison operation.
NOTE – For example, this can be used to carry out password checking, where the password, held in the Directory, might be
inaccessible for read, but accessible for compare.
8.3.3 List
A list request causes the Directory to return the list of immediate subordinates of a particular named entry in the DIT. A
DUA may also supply one or more contexts to select which contexts are used in the returned RDNs.
NOTE – LDAP clients do not support the List operation.
8.3.4 Search
A search request causes the Directory to return information from all of the entries or compound entries within one or
more portions of the DIT that satisfy some filters. The information returned from each entry consists of some or all of
the attributes of that entry as with read. Information returned from related entries may be combined according to some
join criteria.
It is possible to put restrictions on the types of searches that can be performed by use of search-rules. It is also possible,
as a facility of search-rules, to progressively relax or tighten up searches within a single Directory operation, if too few
or too many items of entry information would otherwise be returned.
8.3.5 Abandon
An abandon request, as applied to an outstanding interrogation request, informs the Directory that the originator of the
request is no longer interested in the request being carried out. The Directory may, for example, cease processing the
request, and may discard any results so far achieved.
8.4 Directory modification
8.4.1 Add entry
An add entry request causes a new leaf entry to be added to the DIT. Contexts may be included with the attribute values
for the new entry.
8.4.2 Remove entry
A remove entry request causes a leaf entry or, if required, the entries comprising a compound entry to be removed from
the DIT.
8.4.3 Modify entry
A modify entry request causes the Directory to execute a sequence of changes to a particular entry or family member.
Either all of the changes are made, or none of them, and the DIB is always left in a state consistent with the schema.
The changes allowed include the addition, removal, or replacement of attributes or attribute values. Contexts may be
included with attribute values that are added to the entry. This operation can only be used on a single family member,
but cannot manipulate a compound entry as a whole.
A Modify Entry operation can, if required, supply the information contained in the entry or compound entry after a
successful modification has taken place.
8 ITU-T Rec. X.500 (11/2008)
8.4.4 Modify distinguished name
A modify distinguished name (DN) request is used to change the relative distinguished name of an entry (either an
object entry, an alias, or a family member) or to move an entry, if not a family member, to a new superior in the DIT. If
an entry has subordinates, then all subordinates are renamed or moved accordingly. Contexts may be included in the
new RDN of the entry. In the case of family members, these can be moved to have new superiors, provided that they
remain within the same compound entry.
8.5 Other outcomes
8.5.1 Errors
Any service may fail, for example because of problems with the user supplied parameters, in which case an error is
reported. Information is returned with the error, where possible, to assist in correcting the problem. However, in
general, only the first error encountered by the Directory is reported. Besides the above-mentioned example of problems
with the parameters supplied by the user (particularly invalid names for entries or invalid attribute types), errors may
arise from violations of security policy, schema rules, and service controls.
8.5.2 Referrals
A service may fail because the particular access point to which the DUA or LDAP client is bound is not the most
suitable for carrying out the request, e.g., because the information affected by the request is (logically) far away from
the access point. In this case, the Directory may return a referral, which suggests an alternative access point at which the
DUA or LDAP client can make its request.
NOTE – The Directory and the DUA may each have a preference as to whether referrals are used, or whether the requests are
chained (see 9.3). The DUA can express its preference by means of service controls. The Directory makes the final decision as to
which approach is used.
9 The distributed Directory
NOTE – The models of the Directory are defined in ITU-T Rec. X.501 | ISO/IEC 9594-2, while the procedures for the operation
of the distributed Directory are specified in ITU-T Rec. X.518 | ISO/IEC 9594-4.
9.1 Functional model
The functional model of the Directory is shown in Figure 4.
A Directory System Agent (DSA) is an application process which is part of the Directory and whose role is to provide
access to the DIB to DUAs, LDAP clients and/or other DSAs. A DSA may use information stored in its local database
or interact with other DSAs or LDAP servers to carry out requests. Alternatively, the DSA may direct a requester to
another DSA which can help carry out the request. A DSA that is capable of issuing an LDAP request and
understanding the associated LDAP response is said to be an LDAP requester. A DSA that is capable of understanding
an LDAP request and responding to that LDAP request is said to be an LDAP responder. Local databases are entirely
implementation dependent.
An LDAP server is an application process which is part of the Directory, that responds to requests via the LDAP
protocol, and whose role is to provide access to the DIB to LDAP clients and/or LDAP requesters. An LDAP server
may use information stored in its local database or may direct a requester to another LDAP responder or LDAP server
which can help carry out the request. As with DSAs, local databases are entirely implementation dependent.
Figure 4 – Functional model of the Directory
ITU-T Rec. X.500 (11/2008) 9
9.2 Organizational model
A set of one or more DSAs and/or LDAP servers and zero or more DUAs and/or LDAP clients managed by a single
organization may form a Directory Management Domain (DMD). The organization concerned may or may not elect to
make use of the Directory Specifications to govern the communications among the functional components within
the DMD.
The other Directory Specifications specify certain aspects of the behaviour of DSAs. For this purpose, a group of DSAs
within one DMD may, at the option of the organization which manages the DMD, behave as a single DSA.
A DMD may be an Administration DMD (ADDMD), or a Private DMD (PRDMD), depending on whether or not it is
being operated by a public telecommunication organization.
9.3 Operation of the model
The DUA or LDAP client interacts with the Directory by communicating with one or more DSAs and/or LDAP servers.
A DUA or LDAP client need not be bound to any particular DSA or LDAP server. It may interact directly with various
DSAs and/or LDAP servers to make requests. For some administrative reasons, it may not always be possible to interact
directly with the DSA or LDAP server which needs to carry out the request, e.g., to return some directory information.
It is also possible that the DUA or LDAP client can access the Directory through a single DSA. For this purpose, DSAs
will need to interact with each other.
The DSA is concerned with carrying out the requests of DUAs and LDAP clients, and with obtaining the information
where it does not have the necessary information. It may take the responsibility to obtain the informati
...








Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.
Loading comments...