: Appearance of Interconnected local and wide area network. : need to provide basic service ( Distributed Directory information). : E-mail and electronic File Transfer (FTP). : fostered the growth of group interaction and cooperative research. - has changed how research interact with across the world. - single address schema ( require the individual exact E-mail address). : need applications which will provide assistance.
: white page support for E-mail. : is distributed over physically separated entities (DSA). : define transfer protocol and distributed operation procedure and other objects. : provide an information repository and service agent (handle information tree and retrieval request for application user). : The Distribution is transparent to user (through the use of DSP operation). : Each user is represented by a DUA which is responsible for interacting with the Directory. : Easily and efficiently access the Directory information through local or nearby DSAs. : define abstract port and operations (Simple Interface Protocol (DAP)). - Interrogation function: READ, COMPARE, LIST, SEARCH. - Entry manipulation function: ADD, REMOVE, MODIFY.
o attribute: - consist of type and one or more values. - attributes type indicates the class of information. - attribute value is a particular instance of the class of information indicated by an attribute type. o entry: : arranged in the strictly hierarchical and logically form of a tree, Directory Information Tree (DIT). - higher in the tree: countries, organizations. - lower in the tree: people, application processes. : has a distinguished name (DN) which identifies the entry uniquely in the totality of the DIB. : Each level has a naming authority which is responsible for the assignment of names from the point of the authority down.
The Directory is a repository of information object, and the Directory service it provides to its its user are concerned with various kind of access to this information. The Directory is manifested as a set of one or more application process known as DSAs. Directory is a collection of open systems which cooperate to hold a logical database of information about a set of objects in the real world. The users of the Directory, including people and computer programs, can read or modify the information, on part of it, subject to having permission to do so. Each user is represented in accessing the Directory by a DUA, which is considered to be an application-process. The information held in the Directory is collectively known as the DIB. The Directory provides a well-defined set of access capabilities, known as the abstract service of the Directory, to its users. This service provides a simple modification and retrieval capabilities. The Directory will be distributed, perhaps widely distributed, both along functional and organizational lines. When the Directory is distributed, it may be desirable to replicate information to improve performance and availability. The provision and consumption of the directory services requires that the users (DUA) and the various functional components of the Directory should cooperate with one another.
All services are provided by the Directory in response to requests from DUA. There are requests which allow interrogation of the Directory, and those for modification In addition, requests for service can be qualified. The Directory always reports the outcome of each request that is made of it. The form of the normal outcome is specific to the request, and is evident from the description of the request. The Directory ensure that changes to the DIB, whether the result of a directory service request, or by some other (local) means, results in a DIB which continues to obey the rules of the Directory schema. o service controls: A number of controls can be applied to the various services requests, primarily to allow the user to impose limits on the use of resources which the Directory shall not surpass. Controls are the amount of time, the size of results, the scope of search, the interaction modes, and priority of the request. - Directory Interrogation: Read, Compare, Search, List, Abandon - Directory Modification: Add Entry, Remove Entry, Modify Entry, Modify Distinguished Name - Other outcomes: Error, Referrals
o Functional model: DSA role is to provide access to the DIB to DUAs and/or other DSAs. A DSA may use information stored in its local database or interact with other DSAs to carry out requests. Alternatively, the DSA may direct a requester to another DSA which can help carry out the request.
: ITU-T REC. x.501 | ISO/IEC 9594-2
: Access to Directory information is determined by some administratively controlled security policy. o authentication procedure and mechanisms include methods: - to verify and propagate, where necessary, the identity of DSAs, directory users, and the origin of information received at an access point. - General authentication procedure are defined in ITU-T Rec.509 | ISO/IEC 9594-8. o Access control schema include methods: - to specify access control information, enforce access rights defined by that access control information. - to maintain access control information. o Control of access to information enables the prevention of unauthorized detection, disclosure, or modification of that information. The basis access control model for the directory defines, for every operation, one or more points at which access control decisions may take place. Each access control decision involves: - that component within the Directory being accessed; - the user requesting the operation; - a specific right necessary to complete a portion of the operation; - the security policy governing access to that item.
: ITU-T Rec.X.525 | ISO/IEC 9594-9 Replication in the Directory refers to the existence of directory entry and operational information held by DSAs other than the DSA responsible for the creation and update of the information. This DSA, containing the information, is the master DSA. The deployment of additional copies of directory entry information may be of use in the improvement of the service provided by the Directory by: - improving the performance of directory systems by moving directory information "closer" to particular Directory users; - improving the availability of the directory service by introducing redundant directory information and Directory components so that an individual component failure does not prevent all access to the information in some portion of the DIT. o Forms of Directory Replication 1) Cache copies are copies of entry information 2) Shadowed copies are copies of directory information - DSA may retain information obtained from another DSA. - A DSA retaining such information may only supply it to DUAs in accordance with the access control policy. If it is known that there are no read access controls on the information. - The information to be replicated will typically comprise three elements: (1) Replicated entry information from within a subtree of the DIT (2) Relevant operational information, including access control information, required to give full read access to the replication information. (3) Optionally, subordinate knowledge information. - The replicated information may form a subset of the complete information within the subtree, in that: (1) A selection of the entries may be made by specifying only those that meet certain criteria on their object classes. (2) Within each entry, a selection of the attributes may be made in accordance with a specification of attributes. o Replication and consistency of directory information Consistency in the Directory is achieved when all copies of a specific attribute are the same. At times consistency may be subject to comprise because transient inconsistencies can exit within the Directory for shadowed information and permanent inconsistencies can exist for cached information. - Cached entry information may become and indefinitely remain inconsistency with entry information. - Shadowed information held by a shadow consumer is brought into agreement with the corresponding information held by shadow supplier according to a schedule contracted to as part of the shadowing agreement. - In an environment where directory information is replicated, the Directory has no specific time constraints to achieve consistency. A user of shadowed information will have a high level of confidence in it because: (1) the shadowed information is internally consistent; (2) the knowledge relating it to the DIT is accurate; and (3) the shadowed entry will ultimately become consistent with the entry in the master DSA. o DSA View of replication Although a DSA can detect the difference between replicated information and information which is held by a master, it generally uses both in the same way. i.e., it satisfies user interrogation requests with either, depending on which is most conveniently available to it. Since the information held locally may be known to be partial, a DSA may pass an inquiry to another DSA better able to provide the information required. o Replication and Access Control The Access Control Model allows access control information to be specified for an area of the DIT. Any time entries are replicated to another DSA, the access control information shall also be replicated.
: ITU-T Rec. X.519 | ISO / IEC 9594-5 1. Directory Access Protocol (DAP): defines the exchange of requests and outcomes between a DUA and a DSA. 2. Directory System Protocol (DSP): defines the exchange of requests and outcomes between two DSAs. 3. Directory Information Shadowing Protocol (DISP): defines the exchange of replication information between two DSAs that have established shadowing agreements. 4. Directory Operational Binding Management Protocol (DOP): defines the exchange of administrative information between two DSAs to administer operational bindings between them. Each protocol is defined by one or more application contexts, each containing a set of protocol elements. These application service elements are defined to use the Remote Operations Service Element (ROSE) of ITU-T Rec. X.880 | ISO / IEC 9072-1 to structure and support their interactions. Thus the DAP, DSP, DISP, and DOP are defined as sets of remote operations and errors using the ROS notation.
: QUIPU (Univ. College London) : EAN X500 (Univ. of British Columbia) - maintain their subschema which must be update manually and off-line to executing DSAs and DUAs. - The Directory Schema is held within a master DSA. When other DSA within the domain startup they load the schema from the master DSA into usable data store. There is currently no implementation which dynamically propagate schema change between its functional components (either DSAs or DUA).