mirror of
https://git.openldap.org/openldap/openldap.git
synced 2026-02-02 11:59:45 -05:00
Latest revisions
This commit is contained in:
parent
44a1f10d97
commit
186b8700ae
20 changed files with 10708 additions and 8404 deletions
File diff suppressed because it is too large
Load diff
File diff suppressed because it is too large
Load diff
|
|
@ -3,14 +3,15 @@
|
|||
|
||||
|
||||
|
||||
|
||||
Internet-Draft Kurt D. Zeilenga
|
||||
Intended Category: Standard Track OpenLDAP Foundation
|
||||
Expires in six months 9 February 2005
|
||||
Expires in six months 30 September 2005
|
||||
|
||||
|
||||
|
||||
LDAP: Internationalized String Preparation
|
||||
<draft-ietf-ldapbis-strprep-05.txt>
|
||||
<draft-ietf-ldapbis-strprep-06.txt>
|
||||
|
||||
|
||||
|
||||
|
|
@ -22,11 +23,10 @@ Status of this Memo
|
|||
mailing list <ietf-ldapbis@openldap.org>. Please send editorial
|
||||
comments directly to the editor <Kurt@OpenLDAP.org>.
|
||||
|
||||
By submitting this Internet-Draft, I accept the provisions of Section
|
||||
4 of RFC 3667. By submitting this Internet-Draft, I certify that any
|
||||
applicable patent or other IPR claims of which I am aware have been
|
||||
disclosed, or will be disclosed, and any of which I become aware will
|
||||
be disclosed, in accordance with RFC 3668.
|
||||
By submitting this Internet-Draft, each author represents that any
|
||||
applicable patent or other IPR claims of which he or she is aware have
|
||||
been or will be disclosed, and any of which he or she becomes aware
|
||||
will be disclosed, in accordance with Section 6 of BCP 79.
|
||||
|
||||
Internet-Drafts are working documents of the Internet Engineering Task
|
||||
Force (IETF), its areas, and its working groups. Note that other
|
||||
|
|
@ -54,9 +54,10 @@ Status of this Memo
|
|||
|
||||
|
||||
|
||||
|
||||
Zeilenga LDAPprep [Page 1]
|
||||
|
||||
Internet-Draft draft-ietf-ldapbis-strprep-05 9 February 2005
|
||||
Internet-Draft draft-ietf-ldapbis-strprep-06 30 September 2005
|
||||
|
||||
|
||||
Abstract
|
||||
|
|
@ -112,7 +113,7 @@ Conventions and Terms
|
|||
|
||||
Zeilenga LDAPprep [Page 2]
|
||||
|
||||
Internet-Draft draft-ietf-ldapbis-strprep-05 9 February 2005
|
||||
Internet-Draft draft-ietf-ldapbis-strprep-06 30 September 2005
|
||||
|
||||
|
||||
For instance, the caseIgnoreMatch matching rule may be used to compare
|
||||
|
|
@ -168,7 +169,7 @@ Internet-Draft draft-ietf-ldapbis-strprep-05 9 February 2005
|
|||
|
||||
Zeilenga LDAPprep [Page 3]
|
||||
|
||||
Internet-Draft draft-ietf-ldapbis-strprep-05 9 February 2005
|
||||
Internet-Draft draft-ietf-ldapbis-strprep-06 30 September 2005
|
||||
|
||||
|
||||
b) after applying the Unicode string preparation steps outlined in
|
||||
|
|
@ -224,7 +225,7 @@ Internet-Draft draft-ietf-ldapbis-strprep-05 9 February 2005
|
|||
|
||||
Zeilenga LDAPprep [Page 4]
|
||||
|
||||
Internet-Draft draft-ietf-ldapbis-strprep-05 9 February 2005
|
||||
Internet-Draft draft-ietf-ldapbis-strprep-06 30 September 2005
|
||||
|
||||
|
||||
5) Check bidi
|
||||
|
|
@ -280,7 +281,7 @@ Internet-Draft draft-ietf-ldapbis-strprep-05 9 February 2005
|
|||
|
||||
Zeilenga LDAPprep [Page 5]
|
||||
|
||||
Internet-Draft draft-ietf-ldapbis-strprep-05 9 February 2005
|
||||
Internet-Draft draft-ietf-ldapbis-strprep-06 30 September 2005
|
||||
|
||||
|
||||
these code points: U+0020, 00A0, 1680, 2000-200A, 2028-2029, 202F,
|
||||
|
|
@ -336,7 +337,7 @@ Internet-Draft draft-ietf-ldapbis-strprep-05 9 February 2005
|
|||
|
||||
Zeilenga LDAPprep [Page 6]
|
||||
|
||||
Internet-Draft draft-ietf-ldapbis-strprep-05 9 February 2005
|
||||
Internet-Draft draft-ietf-ldapbis-strprep-06 30 September 2005
|
||||
|
||||
|
||||
characters insignificant to the matching rule. This modification
|
||||
|
|
@ -392,7 +393,7 @@ Internet-Draft draft-ietf-ldapbis-strprep-05 9 February 2005
|
|||
|
||||
Zeilenga LDAPprep [Page 7]
|
||||
|
||||
Internet-Draft draft-ietf-ldapbis-strprep-05 9 February 2005
|
||||
Internet-Draft draft-ietf-ldapbis-strprep-06 30 September 2005
|
||||
|
||||
|
||||
2.6.3. telephoneNumber Insignificant Character Handling
|
||||
|
|
@ -448,7 +449,7 @@ Internet-Draft draft-ietf-ldapbis-strprep-05 9 February 2005
|
|||
|
||||
Zeilenga LDAPprep [Page 8]
|
||||
|
||||
Internet-Draft draft-ietf-ldapbis-strprep-05 9 February 2005
|
||||
Internet-Draft draft-ietf-ldapbis-strprep-06 30 September 2005
|
||||
|
||||
|
||||
6. References
|
||||
|
|
@ -490,7 +491,7 @@ Internet-Draft draft-ietf-ldapbis-strprep-05 9 February 2005
|
|||
[X.680] International Telecommunication Union -
|
||||
Telecommunication Standardization Sector, "Abstract
|
||||
Syntax Notation One (ASN.1) - Specification of Basic
|
||||
Notation", X.680(1997) (also ISO/IEC 8824-1:1998).
|
||||
Notation", X.680(2002) (also ISO/IEC 8824-1:2002).
|
||||
|
||||
|
||||
6.2. Informative References
|
||||
|
|
@ -504,7 +505,7 @@ Internet-Draft draft-ietf-ldapbis-strprep-05 9 February 2005
|
|||
|
||||
Zeilenga LDAPprep [Page 9]
|
||||
|
||||
Internet-Draft draft-ietf-ldapbis-strprep-05 9 February 2005
|
||||
Internet-Draft draft-ietf-ldapbis-strprep-06 30 September 2005
|
||||
|
||||
|
||||
[X.501] International Telecommunication Union -
|
||||
|
|
@ -560,7 +561,7 @@ Appendix B. Substrings Matching
|
|||
|
||||
Zeilenga LDAPprep [Page 10]
|
||||
|
||||
Internet-Draft draft-ietf-ldapbis-strprep-05 9 February 2005
|
||||
Internet-Draft draft-ietf-ldapbis-strprep-06 30 September 2005
|
||||
|
||||
|
||||
In absence of substrings matching, the insignificant space handling
|
||||
|
|
@ -616,7 +617,7 @@ Internet-Draft draft-ietf-ldapbis-strprep-05 9 February 2005
|
|||
|
||||
Zeilenga LDAPprep [Page 11]
|
||||
|
||||
Internet-Draft draft-ietf-ldapbis-strprep-05 9 February 2005
|
||||
Internet-Draft draft-ietf-ldapbis-strprep-06 30 September 2005
|
||||
|
||||
|
||||
requirements.
|
||||
|
|
@ -672,7 +673,7 @@ Intellectual Property Rights
|
|||
|
||||
Zeilenga LDAPprep [Page 12]
|
||||
|
||||
Internet-Draft draft-ietf-ldapbis-strprep-05 9 February 2005
|
||||
Internet-Draft draft-ietf-ldapbis-strprep-06 30 September 2005
|
||||
|
||||
|
||||
Copies of IPR disclosures made to the IETF Secretariat and any
|
||||
|
|
@ -692,9 +693,11 @@ Internet-Draft draft-ietf-ldapbis-strprep-05 9 February 2005
|
|||
|
||||
Full Copyright
|
||||
|
||||
Copyright (C) The Internet Society (2005). This document is subject
|
||||
to the rights, licenses and restrictions contained in BCP 78, and
|
||||
except as set forth therein, the authors retain all their rights.
|
||||
Copyright (C) The Internet Society (2005).
|
||||
|
||||
This document is subject to the rights, licenses and restrictions
|
||||
contained in BCP 78, and except as set forth therein, the authors
|
||||
retain all their rights.
|
||||
|
||||
This document and the information contained herein are provided on an
|
||||
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE
|
||||
|
|
@ -721,11 +724,8 @@ Full Copyright
|
|||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Zeilenga LDAPprep [Page 13]
|
||||
|
||||
|
||||
|
|
|
|||
|
|
@ -1,28 +1,29 @@
|
|||
|
||||
|
||||
INTERNET-DRAFT Editor: A. Sciberras
|
||||
Intended Category: Standard Track eB2Bcom
|
||||
Updates: RFC 2247, RFC 2798, RFC 2377 April 4, 2005
|
||||
Updates: RFC 2247, RFC 2798, RFC 2377 July 11, 2005
|
||||
Obsoletes: RFC 2256
|
||||
|
||||
|
||||
LDAP: Schema for User Applications
|
||||
draft-ietf-ldapbis-user-schema-09.txt
|
||||
draft-ietf-ldapbis-user-schema-10.txt
|
||||
|
||||
Copyright (C) The Internet Society (2005). All Rights Reserved.
|
||||
Copyright (C) The Internet Society (2005). All Rights Reserved.
|
||||
|
||||
Status of this Memo
|
||||
|
||||
This document is an Internet-Draft and is subject to all provisions
|
||||
of Section 3 of RFC 3978. By submitting this Internet-Draft, each
|
||||
author represents that any applicable patent or other IPR claims of
|
||||
which he or she is aware have been or will be disclosed, and any of
|
||||
which he or she become aware will be disclosed, in accordance with
|
||||
RFC 3979.
|
||||
By submitting this Internet-Draft, each author represents that any
|
||||
applicable patent or other IPR claims of which he or she is aware
|
||||
have been or will be disclosed, and any of which he or she becomes
|
||||
aware will be disclosed, in accordance with Section 6 of BCP 79.
|
||||
|
||||
By submitting this Internet-Draft, I accept the provisions of Section
|
||||
3 of BCP 78.
|
||||
|
||||
Internet-Drafts are working documents of the Internet Engineering
|
||||
Task Force (IETF), its areas, and its working groups. Note that
|
||||
other groups may also distribute working documents as Internet-
|
||||
Drafts.
|
||||
other groups may also distribute working documents as
|
||||
Internet-Drafts.
|
||||
|
||||
Internet-Drafts are draft documents valid for a maximum of six months
|
||||
and may be updated, replaced, or obsoleted by other documents at any
|
||||
|
|
@ -37,23 +38,22 @@ Obsoletes: RFC 2256
|
|||
|
||||
This document is intended to be, after appropriate review and
|
||||
revision, submitted to the RFC Editor as a Standard Track document.
|
||||
Distribution of this memo is unlimited. Technical discussion of this
|
||||
document will take place on the IETF LDAP Revision Working Group
|
||||
(LDAPbis) mailing list <ietf-ldapbis@openldap.org>. Please send
|
||||
editorial comments directly to the editor
|
||||
Distribution of this document is unlimited. Technical discussion of
|
||||
this document should take place on the IETF LDAP Revision Working
|
||||
Group (LDAPbis) mailing list <ietf-ldapbis@openldap.org>. Please
|
||||
send editorial comments directly to the editor
|
||||
<andrew.sciberras@eb2bcom.com>.
|
||||
|
||||
This Internet-Draft expires on 4 October 2005.
|
||||
|
||||
Copyright Notice
|
||||
|
||||
Copyright (C) The Internet Society 2005. All Rights Reserved.
|
||||
This Internet-Draft expires on 11 January 2006.
|
||||
|
||||
|
||||
|
||||
Sciberras Expires 4 October 2005 [Page 1]
|
||||
|
||||
|
||||
|
||||
Sciberras Expires 11 January 2006 [Page 1]
|
||||
|
||||
INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
||||
INTERNET-DRAFT LDAP: Schema for User Applications July 11, 2005
|
||||
|
||||
|
||||
Abstract
|
||||
|
|
@ -107,9 +107,9 @@ Abstract
|
|||
|
||||
|
||||
|
||||
Sciberras Expires 4 October 2005 [Page 2]
|
||||
Sciberras Expires 11 January 2006 [Page 2]
|
||||
|
||||
INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
||||
INTERNET-DRAFT LDAP: Schema for User Applications July 11, 2005
|
||||
|
||||
|
||||
Table of Contents
|
||||
|
|
@ -163,9 +163,9 @@ Table of Contents
|
|||
|
||||
|
||||
|
||||
Sciberras Expires 4 October 2005 [Page 3]
|
||||
Sciberras Expires 11 January 2006 [Page 3]
|
||||
|
||||
INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
||||
INTERNET-DRAFT LDAP: Schema for User Applications July 11, 2005
|
||||
|
||||
|
||||
2.37 'telexNumber'. . . . . . . . . . . . . . . . . . . . . . 19
|
||||
|
|
@ -206,7 +206,7 @@ INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
|||
|
||||
9. Intellectual Property Statement . . . . . . . . . . . . . . . 32
|
||||
|
||||
10. Disclaimer of Validity. . . . . . . . . . . . . . . . . . . . 32
|
||||
10. Full Copyright Statement. . . . . . . . . . . . . . . . . . . 32
|
||||
|
||||
|
||||
|
||||
|
|
@ -219,9 +219,9 @@ INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
|||
|
||||
|
||||
|
||||
Sciberras Expires 4 October 2005 [Page 4]
|
||||
Sciberras Expires 11 January 2006 [Page 4]
|
||||
|
||||
INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
||||
INTERNET-DRAFT LDAP: Schema for User Applications July 11, 2005
|
||||
|
||||
|
||||
1. Introduction
|
||||
|
|
@ -235,7 +235,7 @@ INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
|||
administration of directory servers, nor does it include directory
|
||||
objects defined for specific uses in other documents.
|
||||
|
||||
1.1 Relationship with other specifications
|
||||
1.1 Relationship with other specifications
|
||||
|
||||
This document is an integral part of the LDAP technical specification
|
||||
[Roadmap] which obsoletes the previously defined LDAP technical
|
||||
|
|
@ -263,7 +263,7 @@ INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
|||
1.2 Conventions
|
||||
|
||||
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
|
||||
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
|
||||
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
|
||||
document are to be interpreted as described in RFC 2119 [RFC2119].
|
||||
|
||||
1.3 General Issues
|
||||
|
|
@ -275,9 +275,9 @@ INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
|||
|
||||
|
||||
|
||||
Sciberras Expires 4 October 2005 [Page 5]
|
||||
Sciberras Expires 11 January 2006 [Page 5]
|
||||
|
||||
INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
||||
INTERNET-DRAFT LDAP: Schema for User Applications July 11, 2005
|
||||
|
||||
|
||||
using the Augmented Backus-Naur Form (ABNF) [RFC2234] of
|
||||
|
|
@ -331,9 +331,9 @@ INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
|||
|
||||
|
||||
|
||||
Sciberras Expires 4 October 2005 [Page 6]
|
||||
Sciberras Expires 11 January 2006 [Page 6]
|
||||
|
||||
INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
||||
INTERNET-DRAFT LDAP: Schema for User Applications July 11, 2005
|
||||
|
||||
|
||||
Examples: "DE", "AU" and "FR".
|
||||
|
|
@ -387,9 +387,9 @@ INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
|||
|
||||
|
||||
|
||||
Sciberras Expires 4 October 2005 [Page 7]
|
||||
Sciberras Expires 11 January 2006 [Page 7]
|
||||
|
||||
INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
||||
INTERNET-DRAFT LDAP: Schema for User Applications July 11, 2005
|
||||
|
||||
|
||||
2.5 'description'
|
||||
|
|
@ -443,9 +443,9 @@ INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
|||
|
||||
|
||||
|
||||
Sciberras Expires 4 October 2005 [Page 8]
|
||||
Sciberras Expires 11 January 2006 [Page 8]
|
||||
|
||||
INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
||||
INTERNET-DRAFT LDAP: Schema for User Applications July 11, 2005
|
||||
|
||||
|
||||
attribute types with a DN syntax can inherit.
|
||||
|
|
@ -499,9 +499,9 @@ INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
|||
|
||||
|
||||
|
||||
Sciberras Expires 4 October 2005 [Page 9]
|
||||
Sciberras Expires 11 January 2006 [Page 9]
|
||||
|
||||
INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
||||
INTERNET-DRAFT LDAP: Schema for User Applications July 11, 2005
|
||||
|
||||
|
||||
( 2.5.4.47 NAME 'enhancedSearchGuide'
|
||||
|
|
@ -510,8 +510,8 @@ INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
|||
1.3.6.1.4.1.1466.115.121.1.21 refers to the Enhanced Guide syntax
|
||||
[Syntaxes].
|
||||
|
||||
Examples: "person#(sn$APPROX)#wholeSubtree"
|
||||
"organizationalUnit#(ou$SUBSTR)#oneLevel"
|
||||
Examples: "person#(sn$APPROX)#wholeSubtree" and
|
||||
"organizationalUnit#(ou$SUBSTR)#oneLevel".
|
||||
|
||||
2.10 'facsimileTelephoneNumber'
|
||||
|
||||
|
|
@ -526,7 +526,7 @@ INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
|||
1.3.6.1.4.1.1466.115.121.1.22 refers to the Facsimile Telephone
|
||||
Number syntax [Syntaxes].
|
||||
|
||||
Examples: "+61 3 9896 7801" and "+81 3 347 7418$fineResolution"
|
||||
Examples: "+61 3 9896 7801" and "+81 3 347 7418$fineResolution".
|
||||
|
||||
2.11 'generationQualifier'
|
||||
|
||||
|
|
@ -550,14 +550,14 @@ INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
|||
( 2.5.4.42 NAME 'givenName'
|
||||
SUP name )
|
||||
|
||||
Examples: "Andrew", "Charles" and "Joanne"
|
||||
Examples: "Andrew", "Charles" and "Joanne".
|
||||
|
||||
|
||||
|
||||
|
||||
Sciberras Expires 4 October 2005 [Page 10]
|
||||
Sciberras Expires 11 January 2006 [Page 10]
|
||||
|
||||
INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
||||
INTERNET-DRAFT LDAP: Schema for User Applications July 11, 2005
|
||||
|
||||
|
||||
2.13 'houseIdentifier'
|
||||
|
|
@ -575,7 +575,7 @@ INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
|||
1.3.6.1.4.1.1466.115.121.1.15 refers to the Directory String syntax
|
||||
[Syntaxes].
|
||||
|
||||
Examples: "20" to represent a the house number 20.
|
||||
Examples: "20" to represent the house number 20.
|
||||
|
||||
2.14 'initials'
|
||||
|
||||
|
|
@ -605,15 +605,15 @@ INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
|||
1.3.6.1.4.1.1466.115.121.1.36 refers to the Numeric String syntax
|
||||
[Syntaxes].
|
||||
|
||||
Example: "0198 333 333"
|
||||
Example: "0198 333 333".
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Sciberras Expires 4 October 2005 [Page 11]
|
||||
Sciberras Expires 11 January 2006 [Page 11]
|
||||
|
||||
INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
||||
INTERNET-DRAFT LDAP: Schema for User Applications July 11, 2005
|
||||
|
||||
|
||||
2.16 'l'
|
||||
|
|
@ -639,7 +639,7 @@ INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
|||
SUP distinguishedName )
|
||||
|
||||
Examples: "cn=James Clarke,ou=Finance,o=Widget\, Inc." and
|
||||
"cn=John Xerri,ou=Finance,o=Widget\, Inc" may
|
||||
"cn=John Xerri,ou=Finance,o=Widget\, Inc." may
|
||||
be two members of the financial team (group) at Widget,
|
||||
Inc. In which case, both of these distinguished names would
|
||||
be present as individual values of the member attribute.
|
||||
|
|
@ -667,9 +667,9 @@ INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
|||
|
||||
|
||||
|
||||
Sciberras Expires 4 October 2005 [Page 12]
|
||||
Sciberras Expires 11 January 2006 [Page 12]
|
||||
|
||||
INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
||||
INTERNET-DRAFT LDAP: Schema for User Applications July 11, 2005
|
||||
|
||||
|
||||
2.19 'o'
|
||||
|
|
@ -711,7 +711,7 @@ INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
|||
Example: The mailing list object, whose DN is "cn=All Employees,
|
||||
ou=Mailing List,o=Widget\, Inc.", is owned by the Human
|
||||
Resources Director.
|
||||
Therefore, the value of the owner attribute within the
|
||||
Therefore, the value of the 'owner' attribute within the
|
||||
mailing list object, would be the DN of the director (role):
|
||||
"cn=Human Resources Director,ou=employee,o=Widget\, Inc.".
|
||||
|
||||
|
|
@ -723,9 +723,9 @@ INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
|||
|
||||
|
||||
|
||||
Sciberras Expires 4 October 2005 [Page 13]
|
||||
Sciberras Expires 11 January 2006 [Page 13]
|
||||
|
||||
INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
||||
INTERNET-DRAFT LDAP: Schema for User Applications July 11, 2005
|
||||
|
||||
|
||||
( 2.5.4.19 NAME 'physicalDeliveryOfficeName'
|
||||
|
|
@ -779,9 +779,9 @@ INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
|||
|
||||
|
||||
|
||||
Sciberras Expires 4 October 2005 [Page 14]
|
||||
Sciberras Expires 11 January 2006 [Page 14]
|
||||
|
||||
INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
||||
INTERNET-DRAFT LDAP: Schema for User Applications July 11, 2005
|
||||
|
||||
|
||||
at a box on premises of the Postal Service. Each postal box
|
||||
|
|
@ -813,7 +813,7 @@ INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
|||
|
||||
Example: If the mhs-delivery Delivery Method is preferred over
|
||||
telephone-delivery, which is preferred over all other
|
||||
methods, the value would be: "mhs $ telephone"
|
||||
methods, the value would be: "mhs $ telephone".
|
||||
|
||||
2.27 'registeredAddress'
|
||||
|
||||
|
|
@ -835,9 +835,9 @@ INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
|||
|
||||
|
||||
|
||||
Sciberras Expires 4 October 2005 [Page 15]
|
||||
Sciberras Expires 11 January 2006 [Page 15]
|
||||
|
||||
INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
||||
INTERNET-DRAFT LDAP: Schema for User Applications July 11, 2005
|
||||
|
||||
|
||||
2.28 'roleOccupant'
|
||||
|
|
@ -872,14 +872,13 @@ INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
|||
|
||||
1.3.6.1.4.1.1466.115.121.1.25 refers to the Guide syntax [Syntaxes].
|
||||
|
||||
Example: "person#sn$EQ"
|
||||
Example: "person#sn$EQ".
|
||||
|
||||
2.30 'seeAlso'
|
||||
|
||||
The 'seeAlso' attribute type contains Distinguished Names of objects
|
||||
that are related to the subject object. Each related object name is
|
||||
one value of this multi-valued attribute.
|
||||
|
||||
(Source: X.520 [X.520])
|
||||
|
||||
( 2.5.4.34 NAME 'seeAlso'
|
||||
|
|
@ -888,15 +887,15 @@ INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
|||
Example: The person object, "cn=James Brown,ou=employee,o=Widget\,
|
||||
Inc." is related to the role objects, "cn=Football Team
|
||||
Captain,ou=sponsored activities,o=Widget\, Inc." and
|
||||
|
||||
|
||||
|
||||
Sciberras Expires 4 October 2005 [Page 16]
|
||||
|
||||
INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
||||
|
||||
|
||||
"cn=Chess Team,ou=sponsored activities,o=Widget\, Inc.".
|
||||
|
||||
|
||||
|
||||
Sciberras Expires 11 January 2006 [Page 16]
|
||||
|
||||
INTERNET-DRAFT LDAP: Schema for User Applications July 11, 2005
|
||||
|
||||
|
||||
Since the role objects are related to the person object, the
|
||||
'seeAlso' attribute will contain the distinguished name of
|
||||
each role object as separate values.
|
||||
|
|
@ -928,7 +927,7 @@ INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
|||
( 2.5.4.4 NAME 'sn'
|
||||
SUP name )
|
||||
|
||||
Example: "Smith"
|
||||
Example: "Smith".
|
||||
|
||||
2.33 'st'
|
||||
|
||||
|
|
@ -947,9 +946,10 @@ INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
|||
|
||||
|
||||
|
||||
Sciberras Expires 4 October 2005 [Page 17]
|
||||
|
||||
Sciberras Expires 11 January 2006 [Page 17]
|
||||
|
||||
INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
||||
INTERNET-DRAFT LDAP: Schema for User Applications July 11, 2005
|
||||
|
||||
|
||||
2.34 'street'
|
||||
|
|
@ -968,7 +968,7 @@ INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
|||
1.3.6.1.4.1.1466.115.121.1.15 refers to the Directory String syntax
|
||||
[Syntaxes].
|
||||
|
||||
Example: "15 Main St."
|
||||
Example: "15 Main St.".
|
||||
|
||||
2.35 'telephoneNumber'
|
||||
|
||||
|
|
@ -1003,9 +1003,9 @@ INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
|||
|
||||
|
||||
|
||||
Sciberras Expires 4 October 2005 [Page 18]
|
||||
Sciberras Expires 11 January 2006 [Page 18]
|
||||
|
||||
INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
||||
INTERNET-DRAFT LDAP: Schema for User Applications July 11, 2005
|
||||
|
||||
|
||||
2.37 'telexNumber'
|
||||
|
|
@ -1021,7 +1021,7 @@ INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
|||
1.3.6.1.4.1.1466.115.121.1.52 refers to the Telex Number syntax
|
||||
[Syntaxes].
|
||||
|
||||
Example: "12345$023$ABCDE"
|
||||
Example: "12345$023$ABCDE".
|
||||
|
||||
2.38 'title'
|
||||
|
||||
|
|
@ -1032,8 +1032,6 @@ INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
|||
|
||||
( 2.5.4.12 NAME 'title'
|
||||
SUP name )
|
||||
|
||||
|
||||
Examples: "Vice President", "Software Engineer" and "CEO".
|
||||
|
||||
2.39 'uid'
|
||||
|
|
@ -1056,16 +1054,16 @@ INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
|||
2.40 'uniqueMember'
|
||||
|
||||
The 'uniqueMember' attribute type contains the Distinguished Names of
|
||||
|
||||
|
||||
|
||||
Sciberras Expires 4 October 2005 [Page 19]
|
||||
|
||||
INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
||||
|
||||
|
||||
an object that is on a list or in a group, where the Relative
|
||||
Distinguished Names of the object include a value that distinguishes
|
||||
|
||||
|
||||
|
||||
Sciberras Expires 11 January 2006 [Page 19]
|
||||
|
||||
INTERNET-DRAFT LDAP: Schema for User Applications July 11, 2005
|
||||
|
||||
|
||||
between objects when a distinguished name has been reused. Each
|
||||
distinguished name is one value of this multi-valued attribute.
|
||||
(Source: X.520 [X.520])
|
||||
|
|
@ -1089,7 +1087,7 @@ INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
|||
string is one value of this multi-valued attribute.
|
||||
|
||||
The application SHOULD prepare textual strings used as passwords by
|
||||
transcoding them to Unicode, applying SASLprep [SASLprep], and
|
||||
transcoding them to Unicode, applying SASLprep [RFC4013], and
|
||||
encoding as UTF-8. The determination of whether a password is
|
||||
textual is a local client matter.
|
||||
(Source: X.509 [X.509])
|
||||
|
|
@ -1112,16 +1110,16 @@ INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
|||
to use a different password generated by some automated system.
|
||||
During transitional periods, like the last and first day of the
|
||||
periods, it may be necessary to allow two passwords for the two
|
||||
|
||||
|
||||
|
||||
Sciberras Expires 4 October 2005 [Page 20]
|
||||
|
||||
INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
||||
|
||||
|
||||
consecutive periods to be valid in the system.
|
||||
|
||||
|
||||
|
||||
|
||||
Sciberras Expires 11 January 2006 [Page 20]
|
||||
|
||||
INTERNET-DRAFT LDAP: Schema for User Applications July 11, 2005
|
||||
|
||||
|
||||
2.42 'x121Address'
|
||||
|
||||
The 'x121Address' attribute type contains data network addresses as
|
||||
|
|
@ -1171,9 +1169,11 @@ INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
|||
|
||||
|
||||
|
||||
Sciberras Expires 4 October 2005 [Page 21]
|
||||
|
||||
|
||||
Sciberras Expires 11 January 2006 [Page 21]
|
||||
|
||||
INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
||||
INTERNET-DRAFT LDAP: Schema for User Applications July 11, 2005
|
||||
|
||||
|
||||
3. Object Classes
|
||||
|
|
@ -1209,7 +1209,7 @@ INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
|||
MAY ( searchGuide $
|
||||
description ) )
|
||||
|
||||
3.3 'dcObject'
|
||||
3.3 'dcObject'
|
||||
|
||||
The 'dcObject' object class permits an entry to contains domain
|
||||
component information. This object class is defined as auxiliary,
|
||||
|
|
@ -1227,9 +1227,9 @@ INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
|||
|
||||
|
||||
|
||||
Sciberras Expires 4 October 2005 [Page 22]
|
||||
Sciberras Expires 11 January 2006 [Page 22]
|
||||
|
||||
INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
||||
INTERNET-DRAFT LDAP: Schema for User Applications July 11, 2005
|
||||
|
||||
|
||||
3.4 'device'
|
||||
|
|
@ -1283,9 +1283,9 @@ INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
|||
|
||||
|
||||
|
||||
Sciberras Expires 4 October 2005 [Page 23]
|
||||
Sciberras Expires 11 January 2006 [Page 23]
|
||||
|
||||
INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
||||
INTERNET-DRAFT LDAP: Schema for User Applications July 11, 2005
|
||||
|
||||
|
||||
cn )
|
||||
|
|
@ -1339,9 +1339,9 @@ INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
|||
|
||||
|
||||
|
||||
Sciberras Expires 4 October 2005 [Page 24]
|
||||
Sciberras Expires 11 January 2006 [Page 24]
|
||||
|
||||
INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
||||
INTERNET-DRAFT LDAP: Schema for User Applications July 11, 2005
|
||||
|
||||
|
||||
( 2.5.6.7 NAME 'organizationalPerson'
|
||||
|
|
@ -1395,9 +1395,9 @@ INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
|||
|
||||
|
||||
|
||||
Sciberras Expires 4 October 2005 [Page 25]
|
||||
Sciberras Expires 11 January 2006 [Page 25]
|
||||
|
||||
INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
||||
INTERNET-DRAFT LDAP: Schema for User Applications July 11, 2005
|
||||
|
||||
|
||||
3.12 'person'
|
||||
|
|
@ -1433,7 +1433,7 @@ INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
|||
street $ postOfficeBox $ postalCode $ postalAddress $
|
||||
physicalDeliveryOfficeName $ st $ l ) )
|
||||
|
||||
3.14 'uidObject'
|
||||
3.14 'uidObject'
|
||||
|
||||
The 'uidObject' object class permits an entry to contains user
|
||||
identification information. This object class is defined as
|
||||
|
|
@ -1451,9 +1451,9 @@ INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
|||
|
||||
|
||||
|
||||
Sciberras Expires 4 October 2005 [Page 26]
|
||||
Sciberras Expires 11 January 2006 [Page 26]
|
||||
|
||||
INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
||||
INTERNET-DRAFT LDAP: Schema for User Applications July 11, 2005
|
||||
|
||||
|
||||
4. IANA Considerations
|
||||
|
|
@ -1471,8 +1471,6 @@ INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
|||
Specification: RFC XXXX [editor's note: The RFC number will be
|
||||
the one assigned to this document.]
|
||||
Author/Change Controller: IESG
|
||||
|
||||
|
||||
Comments
|
||||
In the LDAP descriptors registry, the following descriptors (short
|
||||
names) should be updated to refer to RFC XXXX [editor's note: This
|
||||
|
|
@ -1504,16 +1502,16 @@ INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
|||
GN A RESERVED
|
||||
groupOfNames O 2.5.6.9
|
||||
groupOfUniqueNames O 2.5.6.17
|
||||
|
||||
|
||||
|
||||
Sciberras Expires 4 October 2005 [Page 27]
|
||||
|
||||
INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
||||
|
||||
|
||||
houseIdentifier A 2.5.4.51
|
||||
initials A 2.5.4.43
|
||||
|
||||
|
||||
|
||||
Sciberras Expires 11 January 2006 [Page 27]
|
||||
|
||||
INTERNET-DRAFT LDAP: Schema for User Applications July 11, 2005
|
||||
|
||||
|
||||
internationalISDNNumber A 2.5.4.25
|
||||
L A 2.5.4.7
|
||||
locality O 2.5.6.3
|
||||
|
|
@ -1560,24 +1558,24 @@ INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
|||
5. Security Considerations
|
||||
|
||||
Attributes of directory entries are used to provide descriptive
|
||||
|
||||
|
||||
|
||||
Sciberras Expires 4 October 2005 [Page 28]
|
||||
|
||||
INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
||||
|
||||
|
||||
information about the real-world objects they represent, which can be
|
||||
people, organizations or devices. Most countries have privacy laws
|
||||
|
||||
|
||||
|
||||
Sciberras Expires 11 January 2006 [Page 28]
|
||||
|
||||
INTERNET-DRAFT LDAP: Schema for User Applications July 11, 2005
|
||||
|
||||
|
||||
regarding the publication of information about people.
|
||||
|
||||
Transfer of cleartext passwords is strongly discouraged where the
|
||||
underlying transport service cannot guarantee confidentiality and may
|
||||
result in disclosure of the password to unauthorized parties.
|
||||
|
||||
Multiple attribute values for the 'userPassword' needs to be used
|
||||
with care. Especially reset/deletion of a password by an admin
|
||||
Multiple attribute values for the 'userPassword' attribute need to be
|
||||
used with care. Especially reset/deletion of a password by an admin
|
||||
without knowing the old user password gets tricky or impossible if
|
||||
multiple values for different applications are present.
|
||||
|
||||
|
|
@ -1585,13 +1583,14 @@ INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
|||
value(s) with new value(s) should use modify/replaceValues (or
|
||||
modify/deleteAttribute+addAttribute). Additionally, server
|
||||
implementations are encouraged to provide administrative controls
|
||||
which, if enabled, restrict the 'userPassword' attributer to one
|
||||
which, if enabled, restrict the 'userPassword' attribute to one
|
||||
value.
|
||||
|
||||
Note that when used for authentication purposes [AuthMeth], the user
|
||||
need only prove knowledge of one of the values, not all of the
|
||||
values.
|
||||
|
||||
|
||||
6. Acknowledgements
|
||||
|
||||
The definitions, on which this document is based, have been developed
|
||||
|
|
@ -1610,7 +1609,7 @@ INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
|||
|
||||
The 'uidObject' object class definition in this document supersedes
|
||||
the specification of the 'uidObject' in RFC 2377 by A. Grimstad, R.
|
||||
Huber, S, Sataluri and M. Smith.
|
||||
Huber, S. Sataluri and M. Smith.
|
||||
|
||||
This document is based upon input of the IETF LDAPBIS working group.
|
||||
The author wishes to thank S. Legg and K. Zeilenga for their
|
||||
|
|
@ -1619,9 +1618,10 @@ INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
|||
|
||||
|
||||
|
||||
Sciberras Expires 4 October 2005 [Page 29]
|
||||
|
||||
Sciberras Expires 11 January 2006 [Page 29]
|
||||
|
||||
INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
||||
INTERNET-DRAFT LDAP: Schema for User Applications July 11, 2005
|
||||
|
||||
|
||||
7. References
|
||||
|
|
@ -1660,28 +1660,26 @@ INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
|||
"Internationalizing Domain Names in Applications
|
||||
(IDNA)", RFC 3490, March 2003
|
||||
|
||||
[RFC4013] Zeilenga K., "SASLprep: Stringprep profile for User
|
||||
Names and Passwords", RFC 4013, February 2005.
|
||||
|
||||
[Roadmap] Zeilenga, K., "LDAP: Technical Specification Road
|
||||
Map", draft-ietf-ldapbis-roadmap-xx (a work in
|
||||
progress)
|
||||
|
||||
[SASLprep] Zeilenga K., "SASLprep: Stringprep profile for user
|
||||
names and passwords", draft-ietf-sasl-saslprep-xx (a
|
||||
work in progress)
|
||||
|
||||
[Syntaxes] S. Legg (editor), "LDAP: Syntaxes", draft-ietf-ldapbis-
|
||||
syntaxes-xx (a work in progress)
|
||||
|
||||
[X.121] International numbering plan for public data networks,
|
||||
|
||||
|
||||
|
||||
Sciberras Expires 4 October 2005 [Page 30]
|
||||
|
||||
INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
||||
|
||||
|
||||
ITU-T Recommendation X.121, 1996
|
||||
|
||||
|
||||
|
||||
Sciberras Expires 11 January 2006 [Page 30]
|
||||
|
||||
INTERNET-DRAFT LDAP: Schema for User Applications July 11, 2005
|
||||
|
||||
|
||||
[X.509] The Directory: Authentication Framework, ITU-T
|
||||
Recommendation X.509, 1993
|
||||
|
||||
|
|
@ -1715,7 +1713,10 @@ INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
|||
[RFC2798] Smith, M., "Definition of the inetOrgPerson LDAP Object
|
||||
Class", RFC 2798, April 2000
|
||||
|
||||
[X.500] The Directory, ITU-T Recommendations X.501-X.525, 1993
|
||||
[X.500] ITU-T Recommendations X.5000 (1993) | ISO/IEC
|
||||
9594-1:1994, Information Technology - Open Systems
|
||||
Interconnection - The Directory: Overview of concepts,
|
||||
models and services.
|
||||
|
||||
8. Author's Address
|
||||
|
||||
|
|
@ -1727,15 +1728,16 @@ INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
|||
AUSTRALIA
|
||||
|
||||
Phone: +61 3 9896 7833
|
||||
Email: andrew.sciberras@eb2bcom.com
|
||||
|
||||
|
||||
|
||||
Sciberras Expires 4 October 2005 [Page 31]
|
||||
Sciberras Expires 11 January 2006 [Page 31]
|
||||
|
||||
INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
||||
INTERNET-DRAFT LDAP: Schema for User Applications July 11, 2005
|
||||
|
||||
|
||||
Email: andrew.sciberras@eb2bcom.com
|
||||
|
||||
9. Intellectual Property Statement
|
||||
|
||||
The IETF takes no position regarding the validity or scope of any
|
||||
|
|
@ -1760,7 +1762,13 @@ INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
|||
this standard. Please address the information to the IETF at
|
||||
ietf-ipr@ietf.org.
|
||||
|
||||
10. Disclaimer of Validity
|
||||
10. Full Copyright Statement
|
||||
|
||||
Copyright (C) The Internet Society (2005).
|
||||
|
||||
This document is subject to the rights, licenses and restrictions
|
||||
contained in BCP 78, and except as set forth therein, the authors
|
||||
retain all their rights.
|
||||
|
||||
This document and the information contained herein are provided on an
|
||||
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
|
||||
|
|
@ -1770,10 +1778,6 @@ INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
|||
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
|
||||
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
|
||||
|
||||
Copyright Statement Copyright (C) The Internet Society (2005). This
|
||||
document is subject to the rights, licenses and restrictions
|
||||
contained in BCP 78, and except as set forth therein, the authors
|
||||
retain all their rights.
|
||||
|
||||
|
||||
|
||||
|
|
@ -1783,13 +1787,9 @@ Copyright Statement Copyright (C) The Internet Society (2005). This
|
|||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Sciberras Expires 4 October 2005 [Page 32]
|
||||
Sciberras Expires 11 January 2006 [Page 32]
|
||||
|
||||
INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
||||
INTERNET-DRAFT LDAP: Schema for User Applications July 11, 2005
|
||||
|
||||
|
||||
Appendix A Changes Made Since RFC 2256
|
||||
|
|
@ -1843,9 +1843,9 @@ INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
|||
|
||||
|
||||
|
||||
Sciberras Expires 4 October 2005 [Page 33]
|
||||
Sciberras Expires 11 January 2006 [Page 33]
|
||||
|
||||
INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
||||
INTERNET-DRAFT LDAP: Schema for User Applications July 11, 2005
|
||||
|
||||
|
||||
12. Numerous edititorial changes.
|
||||
|
|
@ -1899,9 +1899,9 @@ INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
|||
|
||||
|
||||
|
||||
Sciberras Expires 4 October 2005 [Page 34]
|
||||
Sciberras Expires 11 January 2006 [Page 34]
|
||||
|
||||
INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
||||
INTERNET-DRAFT LDAP: Schema for User Applications July 11, 2005
|
||||
|
||||
|
||||
30. Spelt out and referenced ABNF on first usage.
|
||||
|
|
@ -1955,6 +1955,5 @@ INTERNET-DRAFT LDAP: Schema for User Applications April 4, 2005
|
|||
|
||||
|
||||
|
||||
Sciberras Expires 4 October 2005 [Page 35]
|
||||
Sciberras Expires 11 January 2006 [Page 35]
|
||||
|
||||
|
||||
|
|
|
|||
|
|
@ -1,21 +1,29 @@
|
|||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
INTERNET-DRAFT S. Legg
|
||||
draft-legg-ldap-binary-01.txt Adacel Technologies
|
||||
Intended Category: Standards Track 16 June 2004
|
||||
Updates: RFC 2251bis
|
||||
draft-legg-ldap-binary-03.txt eB2Bcom
|
||||
Intended Category: Standards Track 7 June 2005
|
||||
Updates: [SYNTAX]
|
||||
|
||||
|
||||
Lightweight Directory Access Protocol (LDAP):
|
||||
The Binary Encoding Option
|
||||
|
||||
Copyright (C) The Internet Society (2004). All Rights Reserved.
|
||||
Copyright (C) The Internet Society (2005). All Rights Reserved.
|
||||
|
||||
Status of this Memo
|
||||
|
||||
By submitting this Internet-draft, each author represents that any
|
||||
applicable patent or other IPR claims of which he or she is aware
|
||||
have been or will be disclosed, and any of which he or she becomes
|
||||
aware will be disclosed, in accordance with Section 6 of BCP 79.
|
||||
|
||||
This document is an Internet-Draft and is in full conformance with
|
||||
all provisions of Section 10 of RFC2026.
|
||||
By submitting this Internet-draft, I accept the provisions of Section
|
||||
3 of BCP 78.
|
||||
|
||||
Internet-Drafts are working documents of the Internet Engineering
|
||||
Task Force (IETF), its areas, and its working groups. Note that
|
||||
|
|
@ -28,21 +36,17 @@ Updates: RFC 2251bis
|
|||
material or to cite them other than as "work in progress".
|
||||
|
||||
The list of current Internet-Drafts can be accessed at
|
||||
http://www.ietf.org/ietf/1id-abstracts.txt
|
||||
http://www.ietf.org/1id-abstracts.html
|
||||
|
||||
The list of Internet-Draft Shadow Directories can be accessed at
|
||||
http://www.ietf.org/shadow.html.
|
||||
http://www.ietf.org/shadow.html
|
||||
|
||||
This document is intended to be, after appropriate review and
|
||||
revision, submitted to the RFC Editor as a Standard Track document.
|
||||
Distribution of this document is unlimited. Technical discussion of
|
||||
this document should take place on the IETF LDAP Revision Working
|
||||
Group (LDAPbis) mailing list <ietf-ldapbis@openldap.org>. Please
|
||||
send editorial comments directly to the editor
|
||||
<steven.legg@adacel.com.au>.
|
||||
|
||||
This Internet-Draft expires on 16 December 2004.
|
||||
Technical discussion of this document should take place on the IETF
|
||||
LDAP Revision Working Group (LDAPbis) mailing list
|
||||
<ietf-ldapbis@openldap.org>. Please send editorial comments directly
|
||||
to the editor <steven.legg@eb2bcom.com>.
|
||||
|
||||
This Internet-Draft expires on 7 December 2005.
|
||||
|
||||
Abstract
|
||||
|
||||
|
|
@ -51,9 +55,9 @@ Abstract
|
|||
|
||||
|
||||
|
||||
Legg Expires 16 December 2004 [Page 1]
|
||||
Legg Expires 7 December 2005 [Page 1]
|
||||
|
||||
INTERNET-DRAFT LDAP: The Binary Encoding Option June 16, 2004
|
||||
INTERNET-DRAFT LDAP: The Binary Encoding Option June 7, 2005
|
||||
|
||||
|
||||
definition specifies how attribute values conforming to the syntax
|
||||
|
|
@ -107,9 +111,9 @@ INTERNET-DRAFT LDAP: The Binary Encoding Option June 16, 2004
|
|||
|
||||
|
||||
|
||||
Legg Expires 16 December 2004 [Page 2]
|
||||
Legg Expires 7 December 2005 [Page 2]
|
||||
|
||||
INTERNET-DRAFT LDAP: The Binary Encoding Option June 16, 2004
|
||||
INTERNET-DRAFT LDAP: The Binary Encoding Option June 7, 2005
|
||||
|
||||
|
||||
Table of Contents
|
||||
|
|
@ -124,9 +128,9 @@ Table of Contents
|
|||
8. Security Considerations. . . . . . . . . . . . . . . . . . . . 6
|
||||
9. IANA Considerations. . . . . . . . . . . . . . . . . . . . . . 6
|
||||
10. References . . . . . . . . . . . . . . . . . . . . . . . . . . 6
|
||||
10.1. Normative References. . . . . . . . . . . . . . . . . . 6
|
||||
10.1. Normative References. . . . . . . . . . . . . . . . . . 7
|
||||
10.2. Informative References. . . . . . . . . . . . . . . . . 7
|
||||
Author's Address . . . . . . . . . . . . . . . . . . . . . . . . . 7
|
||||
Author's Address . . . . . . . . . . . . . . . . . . . . . . . . . 8
|
||||
Full Copyright Statement . . . . . . . . . . . . . . . . . . . . . 8
|
||||
|
||||
1. Introduction
|
||||
|
|
@ -143,10 +147,10 @@ Table of Contents
|
|||
|
||||
This document defines an attribute option, the binary option, which
|
||||
can be used in an attribute description [MODELS] in an LDAP operation
|
||||
to specify that the associated attribute values or assertion value
|
||||
to specify that the associated attribute values or assertion values
|
||||
are, or are requested to be, encoded according to the Basic Encoding
|
||||
Rules (BER) [BER] as used by X.500 [X500] directories, instead of the
|
||||
usual LDAP-specific encoding.
|
||||
Rules (BER) [BER] as used by X.500 [X.500] directories, instead of
|
||||
the usual LDAP-specific encoding.
|
||||
|
||||
The binary option was originally defined in RFC 2251 [RFC2251]. The
|
||||
LDAP technical specification [ROADMAP] has obsoleted the previously
|
||||
|
|
@ -163,9 +167,9 @@ Table of Contents
|
|||
|
||||
|
||||
|
||||
Legg Expires 16 December 2004 [Page 3]
|
||||
Legg Expires 7 December 2005 [Page 3]
|
||||
|
||||
INTERNET-DRAFT LDAP: The Binary Encoding Option June 16, 2004
|
||||
INTERNET-DRAFT LDAP: The Binary Encoding Option June 7, 2005
|
||||
|
||||
|
||||
2. Conventions
|
||||
|
|
@ -182,48 +186,52 @@ INTERNET-DRAFT LDAP: The Binary Encoding Option June 16, 2004
|
|||
options, the string representing the binary option is case
|
||||
insensitive.
|
||||
|
||||
Where the binary option is present in an attribute description the
|
||||
associated attribute values or assertion values MUST be BER encoded
|
||||
(otherwise the values are encoded according to the LDAP-specific
|
||||
encoding [SYNTAX] for the attribute's syntax). Note that it is
|
||||
possible for a syntax to be defined such that its LDAP-specific
|
||||
encoding is exactly the same as its BER encoding.
|
||||
|
||||
In terms of the protocol [PROT], the binary option specifies that the
|
||||
contents octets of the associated AttributeValue or AssertionValue
|
||||
OCTET STRING are a complete BER encoding of the relevant value.
|
||||
|
||||
Where the binary option is present in an attribute description the
|
||||
associated attribute values or assertion value MUST be BER encoded.
|
||||
Note that it is possible for a syntax to be defined such that its
|
||||
LDAP-specific encoding is exactly the same as its BER encoding.
|
||||
|
||||
The binary option is not a tagging option [MODELS] so the presence of
|
||||
the binary option does not specify an attribute subtype. An
|
||||
attribute description containing the binary option references exactly
|
||||
the same attribute as the same attribute description without the
|
||||
binary option. The supertype/subtype relationships of attributes
|
||||
with tagging options are not altered in any way by the presence or
|
||||
absence of the binary option.
|
||||
the same attribute as the attribute description without the binary
|
||||
option. The supertype/subtype relationships of attributes with
|
||||
tagging options are not altered in any way by the presence or absence
|
||||
of the binary option.
|
||||
|
||||
An attribute description SHALL be treated as unrecognized if it
|
||||
contains the binary option and the syntax of the attribute does not
|
||||
have an associated ASN.1 type [SYNTAX], or the BER encoding of that
|
||||
type is not supported.
|
||||
have an associated ASN.1 type [SYNTAX], or the BER encoding of values
|
||||
of that type is not supported.
|
||||
|
||||
The presence or absence of the binary option only affects the
|
||||
transfer of attribute and assertion values in protocol; servers store
|
||||
any particular attribute value in a single format of their choosing.
|
||||
any particular attribute value in a format of their choosing.
|
||||
|
||||
4. Syntaxes Requiring Binary Transfer
|
||||
|
||||
Certain syntaxes are required to be transferred in the BER encoded
|
||||
form. These syntaxes are said to have a binary transfer requirement.
|
||||
The Certificate, Certificate List, Certificate Pair and Supported
|
||||
The attribute values of certain attribute syntaxes are defined
|
||||
without an LDAP-specific encoding and are required to be transferred
|
||||
in the BER encoded form. For the purposes of this document, these
|
||||
syntaxes are said to have a binary transfer requirement. The
|
||||
|
||||
|
||||
|
||||
Legg Expires 7 December 2005 [Page 4]
|
||||
|
||||
INTERNET-DRAFT LDAP: The Binary Encoding Option June 7, 2005
|
||||
|
||||
|
||||
Certificate, Certificate List, Certificate Pair and Supported
|
||||
Algorithm syntaxes [PKI] are examples of syntaxes with a binary
|
||||
transfer requirement. These syntaxes also have an additional
|
||||
requirement that the exact BER encoding must be preserved. Note that
|
||||
|
||||
|
||||
|
||||
Legg Expires 16 December 2004 [Page 4]
|
||||
|
||||
INTERNET-DRAFT LDAP: The Binary Encoding Option June 16, 2004
|
||||
|
||||
|
||||
this is a property of the syntaxes themselves, and not a property of
|
||||
the binary option.
|
||||
|
||||
|
|
@ -244,21 +252,22 @@ INTERNET-DRAFT LDAP: The Binary Encoding Option June 16, 2004
|
|||
applies to all the subtypes of the attribute type in the attribute
|
||||
description (however, see Section 7).
|
||||
|
||||
Attributes of a syntax with the binary transfer requirement SHALL be
|
||||
returned in the binary form, i.e., with the binary option in the
|
||||
attribute description and the associated attribute values BER
|
||||
encoded, regardless of whether the binary option was present in the
|
||||
request (for the attribute or for one of its supertypes).
|
||||
Attributes of a syntax with the binary transfer requirement, if
|
||||
returned, SHALL be returned in the binary form, i.e., with the binary
|
||||
option in the attribute description and the associated attribute
|
||||
values BER encoded, regardless of whether the binary option was
|
||||
present in the request (for the attribute or for one of its
|
||||
supertypes).
|
||||
|
||||
Attributes of a syntax without the binary transfer requirement SHOULD
|
||||
be returned in the form explicitly requested. That is, if the
|
||||
attribute description in the requested attributes list contains the
|
||||
binary option then the corresponding attribute in the result SHOULD
|
||||
be in the binary form. If the attribute description in the request
|
||||
does not contain the binary option then the corresponding attribute
|
||||
in the result SHOULD NOT be in the binary form. A server MAY omit an
|
||||
attribute from the result if it does not support the requested
|
||||
encoding.
|
||||
Attributes of a syntax without the binary transfer requirement, if
|
||||
returned, SHOULD be returned in the form explicitly requested. That
|
||||
is, if the attribute description in the requested attributes list
|
||||
contains the binary option then the corresponding attribute in the
|
||||
result SHOULD be in the binary form. If the attribute description in
|
||||
the request does not contain the binary option then the corresponding
|
||||
attribute in the result SHOULD NOT be in the binary form. A server
|
||||
MAY omit an attribute from the result if it does not support the
|
||||
requested encoding.
|
||||
|
||||
Regardless of the encoding chosen, a particular attribute value is
|
||||
returned at most once.
|
||||
|
|
@ -267,18 +276,18 @@ INTERNET-DRAFT LDAP: The Binary Encoding Option June 16, 2004
|
|||
|
||||
If the list of attributes in a search request is empty, or contains
|
||||
the special attribute description string "*", then all user
|
||||
|
||||
|
||||
|
||||
Legg Expires 7 December 2005 [Page 5]
|
||||
|
||||
INTERNET-DRAFT LDAP: The Binary Encoding Option June 7, 2005
|
||||
|
||||
|
||||
attributes are requested to be returned.
|
||||
|
||||
Attributes of a syntax with the binary transfer requirement SHALL be
|
||||
returned in the binary form.
|
||||
|
||||
|
||||
|
||||
|
||||
Legg Expires 16 December 2004 [Page 5]
|
||||
|
||||
INTERNET-DRAFT LDAP: The Binary Encoding Option June 16, 2004
|
||||
|
||||
Attributes of a syntax with the binary transfer requirement, if
|
||||
returned, SHALL be returned in the binary form.
|
||||
|
||||
Attributes of a syntax without the binary transfer requirement and
|
||||
having a defined LDAP-specific encoding SHOULD NOT be returned in the
|
||||
|
|
@ -295,8 +304,8 @@ INTERNET-DRAFT LDAP: The Binary Encoding Option June 16, 2004
|
|||
of one or more of its supertypes, or by the special attribute
|
||||
description string "*". If the binary option is not present in all
|
||||
these attribute descriptions, nor absent in all these attribute
|
||||
descriptions, then the server is free to choose whether to return the
|
||||
attribute in the binary form.
|
||||
descriptions, then the effect of the request with respect to binary
|
||||
transfer is implementation defined.
|
||||
|
||||
8. Security Considerations
|
||||
|
||||
|
|
@ -311,12 +320,12 @@ INTERNET-DRAFT LDAP: The Binary Encoding Option June 16, 2004
|
|||
the LDAP attribute description option registry [BCP64] as indicated
|
||||
by the following template:
|
||||
|
||||
Subject: Request for
|
||||
LDAP Attribute Description Option Registration
|
||||
Subject:
|
||||
Request for LDAP Attribute Description Option Registration
|
||||
Option Name: binary
|
||||
Family of Options: NO
|
||||
Person & email address to contact for further information:
|
||||
Steven Legg <steven.legg@adacel.com.au>
|
||||
Steven Legg <steven.legg@eb2bcom.com>
|
||||
Specification: RFC XXXX
|
||||
Author/Change Controller: IESG
|
||||
Comments: The existing registration for "binary"
|
||||
|
|
@ -324,18 +333,18 @@ INTERNET-DRAFT LDAP: The Binary Encoding Option June 16, 2004
|
|||
|
||||
10. References
|
||||
|
||||
|
||||
|
||||
Legg Expires 7 December 2005 [Page 6]
|
||||
|
||||
INTERNET-DRAFT LDAP: The Binary Encoding Option June 7, 2005
|
||||
|
||||
|
||||
10.1. Normative References
|
||||
|
||||
[KEYWORD] Bradner, S., "Key words for use in RFCs to Indicate
|
||||
Requirement Levels", BCP 14, RFC 2119, March 1997.
|
||||
|
||||
|
||||
|
||||
Legg Expires 16 December 2004 [Page 6]
|
||||
|
||||
INTERNET-DRAFT LDAP: The Binary Encoding Option June 16, 2004
|
||||
|
||||
|
||||
[BCP64] Zeilenga, K., "Internet Assigned Numbers Authority (IANA)
|
||||
Considerations for the Lightweight Directory Access
|
||||
Protcol (LDAP)", BCP 64, RFC 3383, September 2002.
|
||||
|
|
@ -343,25 +352,25 @@ INTERNET-DRAFT LDAP: The Binary Encoding Option June 16, 2004
|
|||
[ROADMAP] Zeilenga, K., "Lightweight Directory Access Protocol
|
||||
(LDAP): Technical Specification Road Map",
|
||||
draft-ietf-ldapbis-roadmap-xx.txt, a work in progress,
|
||||
June 2004.
|
||||
February 2005.
|
||||
|
||||
[MODELS] Zeilenga, K., "LDAP: Directory Information Models",
|
||||
draft-ietf-ldapbis-models-xx.txt, a work in progress, June
|
||||
2004.
|
||||
draft-ietf-ldapbis-models-xx.txt, a work in progress,
|
||||
February 2005.
|
||||
|
||||
[PROT] Sermersheim, J., "LDAP: The Protocol",
|
||||
draft-ietf-ldapbis-protocol-xx.txt, a work in progress,
|
||||
May 2004.
|
||||
February 2005.
|
||||
|
||||
[SYNTAX] Legg, S. and K. Dally, "Lightweight Directory Access
|
||||
Protocol (LDAP): Syntaxes and Matching Rules",
|
||||
draft-ietf-ldapbis-syntaxes-xx.txt, a work in progress,
|
||||
May 2004.
|
||||
February 2005.
|
||||
|
||||
[PKI] Chadwick, D. and S. Legg, "Internet X.509 Public Key
|
||||
Infrastructure Additional LDAP Schema for PKIs and PMIs",
|
||||
draft-pkix-ldap-schema-xx.txt, a work in progress, April
|
||||
2002.
|
||||
[PKI] Zeilenga, Kurt D., "Lightweight Directory Access Protocol
|
||||
(LDAP) schema definitions for X.509 Certificates",
|
||||
draft-zeilenga-ldap-x509-xx.txt, a work in progress,
|
||||
February 2005.
|
||||
|
||||
[BER] ITU-T Recommendation X.690 (07/02) | ISO/IEC 8825-1,
|
||||
Information Technology - ASN.1 encoding rules:
|
||||
|
|
@ -378,35 +387,38 @@ INTERNET-DRAFT LDAP: The Binary Encoding Option June 16, 2004
|
|||
Protocol (v3): Technical Specification", RFC 3377,
|
||||
September 2002.
|
||||
|
||||
[X500] ITU-T Recommendation X.500 (1993) | ISO/IEC 9594-1:1994,
|
||||
[X.500] ITU-T Recommendation X.500 (1993) | ISO/IEC 9594-1:1994,
|
||||
|
||||
|
||||
|
||||
Legg Expires 7 December 2005 [Page 7]
|
||||
|
||||
INTERNET-DRAFT LDAP: The Binary Encoding Option June 7, 2005
|
||||
|
||||
|
||||
"Information Technology - Open Systems Interconnection -
|
||||
The Directory: Overview of concepts, models and services".
|
||||
|
||||
Author's Address
|
||||
|
||||
|
||||
|
||||
|
||||
Legg Expires 16 December 2004 [Page 7]
|
||||
|
||||
INTERNET-DRAFT LDAP: The Binary Encoding Option June 16, 2004
|
||||
|
||||
|
||||
Steven Legg
|
||||
Adacel Technologies Ltd.
|
||||
250 Bay Street
|
||||
Brighton, Victoria 3186
|
||||
eB2Bcom
|
||||
Suite 3, Woodhouse Corporate Centre
|
||||
935 Station Street
|
||||
Box Hill North, Victoria 3129
|
||||
AUSTRALIA
|
||||
|
||||
Phone: +61 3 8530 7710
|
||||
Fax: +61 3 8530 7888
|
||||
Email: steven.legg@adacel.com.au
|
||||
Phone: +61 3 9896 7830
|
||||
Fax: +61 3 9896 7801
|
||||
EMail: steven.legg@eb2bcom.com
|
||||
|
||||
Full Copyright Statement
|
||||
|
||||
Copyright (C) The Internet Society (2004). This document is subject
|
||||
to the rights, licenses and restrictions contained in BCP 78, and
|
||||
except as set forth therein, the authors retain all their rights.
|
||||
Copyright (C) The Internet Society (2005).
|
||||
|
||||
This document is subject to the rights, licenses and restrictions
|
||||
contained in BCP 78, and except as set forth therein, the authors
|
||||
retain all their rights.
|
||||
|
||||
This document and the information contained herein are provided on an
|
||||
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
|
||||
|
|
@ -432,6 +444,14 @@ Intellectual Property
|
|||
attempt made to obtain a general license or permission for the use of
|
||||
such proprietary rights by implementers or users of this
|
||||
specification can be obtained from the IETF on-line IPR repository at
|
||||
|
||||
|
||||
|
||||
Legg Expires 7 December 2005 [Page 8]
|
||||
|
||||
INTERNET-DRAFT LDAP: The Binary Encoding Option June 7, 2005
|
||||
|
||||
|
||||
http://www.ietf.org/ipr.
|
||||
|
||||
The IETF invites any interested party to bring to its attention any
|
||||
|
|
@ -443,6 +463,45 @@ Intellectual Property
|
|||
|
||||
|
||||
|
||||
Legg Expires 16 December 2004 [Page 8]
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Legg Expires 7 December 2005 [Page 9]
|
||||
|
||||
|
|
|
|||
File diff suppressed because it is too large
Load diff
|
|
@ -1,11 +1,11 @@
|
|||
|
||||
|
||||
INTERNET-DRAFT Rob Weltman
|
||||
Intended Category: Standards Track Netscape Communications Corp.
|
||||
April 2003
|
||||
Intended Category: Standards Track Yahoo!, Inc.
|
||||
June 2005
|
||||
|
||||
LDAP Proxied Authorization Control
|
||||
draft-weltman-ldapv3-proxy-12.txt
|
||||
draft-weltman-ldapv3-proxy-13.txt
|
||||
|
||||
|
||||
Status of this Memo
|
||||
|
|
@ -13,20 +13,24 @@ Status of this Memo
|
|||
This document is an Internet-Draft and is in full conformance with
|
||||
all provisions of Section 10 of RFC2026.
|
||||
|
||||
Internet-Drafts are working documents of the Internet Task Force
|
||||
(IETF), its areas, and its working groups. Note that other groups
|
||||
may also distribute working documents as Internet-Drafts.
|
||||
By submitting this Internet-Draft, each author represents that any
|
||||
applicable patent or other IPR claims of which he or she is aware
|
||||
have been or will be disclosed, and any of which he or she becomes
|
||||
aware will be disclosed, in accordance with Section 6 of BCP 79.
|
||||
|
||||
Internet-Drafts are working documents of the Internet Engineering
|
||||
Task Force (IETF), its areas, and its working groups. Note that other
|
||||
groups may also distribute working documents as Internet-Drafts.
|
||||
Internet-Drafts are draft documents valid for a maximum of six months
|
||||
and may be updated, replaced, or obsoleted by other documents at any
|
||||
time. It is inappropriate to use Internet Drafts as reference
|
||||
time. It is inappropriate to use Internet-Drafts as reference
|
||||
material or to cite them other than as "work in progress."
|
||||
|
||||
The list of current Internet-Drafts can be accessed at
|
||||
http://www.ietf.org/ietf/1id-abstracts.txt
|
||||
http://www.ietf.org/1id-abstracts.html
|
||||
|
||||
The list of Internet-Draft Shadow Directories can be accessed at
|
||||
http://www.ietf.org/shadow.html.
|
||||
http://www.ietf.org/shadow.html
|
||||
|
||||
|
||||
Abstract
|
||||
|
|
@ -50,16 +54,16 @@ Abstract
|
|||
identity distinct from the authentication identity, where the
|
||||
authorization identity applies to the whole LDAP session. The Proxy
|
||||
Authorization Control provides a mechanism for specifying an
|
||||
|
||||
Expires December 2005 [Page 1]
|
||||
|
||||
PROXIED AUTHORIZATION CONTROL June 2005
|
||||
|
||||
|
||||
authorization identity on a per operation basis, benefiting clients
|
||||
that need to efficiently perform operations on behalf of multiple
|
||||
users.
|
||||
|
||||
|
||||
Expires October 2003 [Page 1]
|
||||
|
||||
PROXIED AUTHORIZATION CONTROL April 2003
|
||||
|
||||
|
||||
The key words "MUST", "MUST NOT", "SHOULD", "SHOULD NOT", and "MAY"
|
||||
used in this document are to be interpreted as described in
|
||||
[KEYWORDS].
|
||||
|
|
@ -88,6 +92,13 @@ PROXIED AUTHORIZATION CONTROL April 2003
|
|||
protects clients from submitting a request that is executed with an
|
||||
unintended authorization identity.
|
||||
|
||||
Clients MUST include the criticality flag and MUST set it to TRUE.
|
||||
Servers MUST reject any request containing a Proxy Authorization
|
||||
Control without a criticality flag or with the flag set to FALSE with
|
||||
a protocolError error. These requirements protect clients from
|
||||
submitting a request that is executed with an unintended
|
||||
authorization identity.
|
||||
|
||||
The controlValue SHALL be present and contain either an authzId
|
||||
[AUTH] representing the authorization identity for the request or
|
||||
empty if an anonymous association is to be used.
|
||||
|
|
@ -102,6 +113,12 @@ PROXIED AUTHORIZATION CONTROL April 2003
|
|||
[Note to the IESG/IANA/RFC Editor: the value TBD is to be replaced
|
||||
with an IANA assigned LDAP Result Code (see RFC 3383 section 3.6]
|
||||
|
||||
|
||||
Expires December 2005 [Page 2]
|
||||
|
||||
PROXIED AUTHORIZATION CONTROL June 2005
|
||||
|
||||
|
||||
|
||||
4. Implementation Considerations
|
||||
|
||||
|
|
@ -113,12 +130,6 @@ PROXIED AUTHORIZATION CONTROL April 2003
|
|||
requester does not have the right to assume the requested identity
|
||||
for searching the entry, even if the entry is within the scope of a
|
||||
search request under a base DN which does imply such rights. This
|
||||
|
||||
Expires October 2003 [Page 2]
|
||||
|
||||
PROXIED AUTHORIZATION CONTROL April 2003
|
||||
|
||||
|
||||
means that fewer results, or no results, may be returned compared to
|
||||
the case where the proxy authorization identity issued the request
|
||||
directly. An example of such a case may be a system with fine-grained
|
||||
|
|
@ -155,7 +166,25 @@ PROXIED AUTHORIZATION CONTROL April 2003
|
|||
|
||||
7. Copyright
|
||||
|
||||
Copyright (C) The Internet Society (date). All Rights Reserved.
|
||||
Copyright (C) The Internet Society (2005).
|
||||
|
||||
This document is subject to the rights, licenses and restrictions
|
||||
contained in BCP 78, and except as set forth therein, the authors
|
||||
retain all their rights.
|
||||
|
||||
|
||||
Expires December 2005 [Page 3]
|
||||
|
||||
PROXIED AUTHORIZATION CONTROL June 2005
|
||||
|
||||
|
||||
This document and the information contained herein are provided on an
|
||||
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
|
||||
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
|
||||
ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
|
||||
INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
|
||||
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
|
||||
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
|
||||
|
||||
This document and translations of it may be copied and furnished to
|
||||
others, and derivative works that comment on or otherwise explain it
|
||||
|
|
@ -172,21 +201,8 @@ PROXIED AUTHORIZATION CONTROL April 2003
|
|||
English.
|
||||
|
||||
The limited permissions granted above are perpetual and will not be
|
||||
|
||||
Expires October 2003 [Page 3]
|
||||
|
||||
PROXIED AUTHORIZATION CONTROL April 2003
|
||||
|
||||
|
||||
revoked by the Internet Society or its successors or assigns.
|
||||
|
||||
This document and the information contained herein is provided on an
|
||||
"AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
|
||||
TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
|
||||
BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
|
||||
HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
|
||||
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
|
||||
|
||||
|
||||
8. Normative References
|
||||
|
||||
|
|
@ -215,6 +231,12 @@ PROXIED AUTHORIZATION CONTROL April 2003
|
|||
[RFC 2252] M. Wahl, A. Coulbeck, T. Howes, S. Kille, "Lightweight
|
||||
Directory Access Protocol (v3): Attribute Syntax Definitions",
|
||||
RFC 2252, December 1997
|
||||
|
||||
Expires December 2005 [Page 4]
|
||||
|
||||
PROXIED AUTHORIZATION CONTROL June 2005
|
||||
|
||||
|
||||
|
||||
[RFC 2829] M. Wahl, H. Alvestrand, J. Hodges, R. Morgan,
|
||||
"Authentication Methods for LDAP", RFC 2829, May 2000
|
||||
|
|
@ -226,27 +248,20 @@ PROXIED AUTHORIZATION CONTROL April 2003
|
|||
9. Author's Address
|
||||
|
||||
Rob Weltman
|
||||
Netscape Communications Corp.
|
||||
360 W. Caribbean Drive
|
||||
Yahoo!, Inc
|
||||
701 First Avenue
|
||||
Sunnyvale, CA 94089
|
||||
USA
|
||||
|
||||
|
||||
Expires October 2003 [Page 4]
|
||||
|
||||
PROXIED AUTHORIZATION CONTROL April 2003
|
||||
|
||||
|
||||
+1 650 937-3194
|
||||
rweltman@netscape.com
|
||||
+1 408 349-5504
|
||||
robw@worldspot.com
|
||||
|
||||
|
||||
10. Acknowledgements
|
||||
|
||||
Mark Smith of Netscape Communications Corp., Mark Wahl of Sun
|
||||
Microsystems, Inc, Kurt Zeilenga of OpenLDAP Foundation, Jim
|
||||
Sermersheim of Novell, and Steven Legg of Adacel have contributed
|
||||
with reviews of this document.
|
||||
Mark Smith, formerly of Netscape Communications Corp., Mark Wahl,
|
||||
formerly of Sun Microsystems, Inc, Kurt Zeilenga of OpenLDAP
|
||||
Foundation, Jim Sermersheim of Novell, and Steven Legg of Adacel have
|
||||
contributed with reviews of this document.
|
||||
|
||||
|
||||
|
||||
|
|
@ -267,21 +282,6 @@ PROXIED AUTHORIZATION CONTROL April 2003
|
|||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
|
@ -291,5 +291,5 @@ PROXIED AUTHORIZATION CONTROL April 2003
|
|||
|
||||
|
||||
|
||||
Expires October 2003 [Page 5]
|
||||
Expires December 2005 [Page 5]
|
||||
|
||||
|
|
@ -3,14 +3,16 @@
|
|||
|
||||
|
||||
|
||||
|
||||
INTERNET-DRAFT Kurt D. Zeilenga
|
||||
Intended Category: Informational OpenLDAP Foundation
|
||||
Expires in six months 18 July 2004
|
||||
Expires in six months 18 July 2005
|
||||
|
||||
|
||||
|
||||
Requesting Attributes by Object Class in the
|
||||
Lightweight Directory Access Protocol
|
||||
<draft-zeilenga-ldap-adlist-08.txt>
|
||||
<draft-zeilenga-ldap-adlist-11.txt>
|
||||
|
||||
|
||||
Status of this Memo
|
||||
|
|
@ -22,11 +24,10 @@ Status of this Memo
|
|||
<ldapext@ietf.org>. Please send editorial comments directly to the
|
||||
author <Kurt@OpenLDAP.org>.
|
||||
|
||||
By submitting this Internet-Draft, I accept the provisions of Section
|
||||
4 of RFC 3667. By submitting this Internet-Draft, I certify that any
|
||||
applicable patent or other IPR claims of which I am aware have been
|
||||
disclosed, or will be disclosed, and any of which I become aware will
|
||||
be disclosed, in accordance with RFC 3668.
|
||||
By submitting this Internet-Draft, each author represents that any
|
||||
applicable patent or other IPR claims of which he or she is aware have
|
||||
been or will be disclosed, and any of which he or she becomes aware
|
||||
will be disclosed, in accordance with Section 6 of BCP 79.
|
||||
|
||||
Internet-Drafts are working documents of the Internet Engineering Task
|
||||
Force (IETF), its areas, and its working groups. Note that other
|
||||
|
|
@ -38,43 +39,47 @@ Status of this Memo
|
|||
or to cite them other than as "work in progress."
|
||||
|
||||
The list of current Internet-Drafts can be accessed at
|
||||
<http://www.ietf.org/ietf/1id-abstracts.txt>. The list of
|
||||
Internet-Draft Shadow Directories can be accessed at
|
||||
<http://www.ietf.org/shadow.html>.
|
||||
http://www.ietf.org/1id-abstracts.html
|
||||
|
||||
Copyright (C) The Internet Society (2004). All Rights Reserved.
|
||||
The list of Internet-Draft Shadow Directories can be accessed at
|
||||
http://www.ietf.org/shadow.html
|
||||
|
||||
|
||||
Copyright (C) The Internet Society (2005). All Rights Reserved.
|
||||
|
||||
Please see the Full Copyright section near the end of this document
|
||||
for more information.
|
||||
|
||||
|
||||
Abstract
|
||||
|
||||
The Lightweight Directory Access Protocol (LDAP) search operation
|
||||
|
||||
|
||||
|
||||
Zeilenga Requesting Attributes by Object Class [Page 1]
|
||||
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-adlist-08 18 July 2004
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-adlist-11 18 July 2005
|
||||
|
||||
|
||||
Abstract
|
||||
|
||||
The Lightweight Directory Access Protocol (LDAP) search operation
|
||||
provides mechanisms for clients to request all user application
|
||||
attributes, all operational attributes, and/or attributes selected by
|
||||
their description. This document extends LDAP to support a mechanism
|
||||
that LDAP clients may use to request the return of all attributes
|
||||
belonging to an object class.
|
||||
that LDAP clients may use to request the return of all attributes of
|
||||
an object class.
|
||||
|
||||
|
||||
1. Overview
|
||||
1. Background and Intended Use
|
||||
|
||||
In the Lightweight Directory Access Protocol (LDAP) [RFC3377], the
|
||||
search operation [RFC2251] support requesting a sets of attributes.
|
||||
This set is determined by a list of attribute descriptions. Two
|
||||
special descriptors are defined to request all user attributes ("*")
|
||||
[RFC2251] and all operational attributes ("+") [RFC3673]. However,
|
||||
there is no convenient mechanism for requesting pre-defined sets of
|
||||
attributes.
|
||||
In the Lightweight Directory Access Protocol (LDAP) [Roadmap], the
|
||||
search operation [Protocol] support requesting the return of a set of
|
||||
attributes. This set is determined by a list of attribute
|
||||
descriptions. Two special descriptors are defined to request all user
|
||||
attributes ("*") [Protocol] and all operational attributes ("+")
|
||||
[RFC3673]. However, there is no convenient mechanism for requesting
|
||||
pre-defined sets of attributes such as the set of attributes used to
|
||||
represent a particular class of object.
|
||||
|
||||
This document extends LDAP to allow an object class identifier to be
|
||||
specified in attributes lists, such as in Search requests, to request
|
||||
|
|
@ -84,13 +89,12 @@ INTERNET-DRAFT draft-zeilenga-ldap-adlist-08 18 July 2004
|
|||
|
||||
For example, the attribute list of "@country" is equivalent to the
|
||||
attribute list of 'c', 'searchGuide', 'description', and
|
||||
'objectClass'. This object class and its attributes are described in
|
||||
[RFC2256].
|
||||
|
||||
This extension is intended to be used where the user is in direct
|
||||
control of the parameters of the LDAP search operation, such as when
|
||||
entering a LDAP URL [RFC2255] into a web browser.
|
||||
'objectClass'. This object class is described in [Schema].
|
||||
|
||||
This extension is intended primarily to be used where the user is in
|
||||
direct control of the parameters of the LDAP search operation, for
|
||||
instance when entering a LDAP URL [LDAPURL] into a web browser. For
|
||||
example, <ldap:///dc=example,dc=com?@organization?base>.
|
||||
|
||||
2. Terminology
|
||||
|
||||
|
|
@ -104,51 +108,50 @@ INTERNET-DRAFT draft-zeilenga-ldap-adlist-08 18 July 2004
|
|||
|
||||
3. Return of all Attributes of an Object Class
|
||||
|
||||
This extension allows object class identifiers is to be provided in
|
||||
the attributes field of the LDAP SearchRequest [RFC2251] or other
|
||||
request structures who borrow the attributes field and its semantics
|
||||
|
||||
|
||||
|
||||
Zeilenga Requesting Attributes by Object Class [Page 2]
|
||||
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-adlist-08 18 July 2004
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-adlist-11 18 July 2005
|
||||
|
||||
|
||||
(e.g., attributes field in pre/post read controls [READENTRY]). For
|
||||
each object class identified in the attributes field, the request is
|
||||
to be treated as if each attribute allowed by that class (by "MUST" or
|
||||
"MAY", directly or by "SUP"erior) was itself listed.
|
||||
This extension allows object class identifiers is to be provided in
|
||||
the attributes field of the LDAP SearchRequest [Protocol] or other
|
||||
request values of the AttributeSelection data type (e.g., attributes
|
||||
field in pre/post read controls [ReadEntry]) and/or
|
||||
<attributeSelector> production (e.g., attributes of an LDAP URL
|
||||
[LDAPURL]). For each object class identified in the attributes field,
|
||||
the request is to be treated as if each attribute allowed by that
|
||||
class (by "MUST" or "MAY", directly or by "SUP"erior) [Models] was
|
||||
itself listed.
|
||||
|
||||
If the object class identifier is unrecognized, it is be treated an an
|
||||
unrecognized attribute description.
|
||||
This extension extends attributeSelector [Protocol] production as
|
||||
indicated by the following ABNF [ABNF]:
|
||||
|
||||
This extension redefines the attributes field of the SearchRequest to
|
||||
be a DescriptionList described by the following ASN.1 [X.680] data
|
||||
type:
|
||||
attributeSelector /= objectclassdescription
|
||||
objectclassdescription = ATSIGN oid options
|
||||
ATSIGN = %x40 ; COMMERCIAL AT ("@" U+0040)
|
||||
|
||||
DescriptionList ::= SEQUENCE OF Description
|
||||
Description ::= LDAPString
|
||||
where <oid> and <options> productions are as defined in [Models].
|
||||
|
||||
The Description is string conforming to the ABNF [RFC2234]:
|
||||
The <oid> component of an <objectclassdescription> production
|
||||
identifies the object class by short name (descr) or object identifier
|
||||
(numericoid). If the value of the <oid> component is unrecognized or
|
||||
does not refer to an object class, the object class description is be
|
||||
treated an an unrecognized attribute description.
|
||||
|
||||
Description = AttributeDescription | ObjectClassDescription.
|
||||
ObjectClassDescription = AtSign ObjectClass *( ";" options )
|
||||
AtSign = "@" ; U+0040
|
||||
The <options> production is included in the grammar for extensibility
|
||||
purposes. An object class description with an unrecognized or
|
||||
inappropriate option is to be treated as an unrecognized.
|
||||
|
||||
where <AttributeDescription> and <options> productions are as defined
|
||||
in Section 4.1.5 of [RFC2251] and an <ObjectClass> is an object
|
||||
identifier, in either <numericoid> or <descr> form [RFC2252], of an
|
||||
object class.
|
||||
|
||||
<ObjectClassDescription> <options> are provided for extensibility.
|
||||
This document only defines semantics of <ObjectClassDescription>s with
|
||||
zero options in the attributes field of a SearchRequest. Other uses
|
||||
may be defined in future specifications.
|
||||
While object class description options and attribute description
|
||||
options share the same syntax, they are not semantically related.
|
||||
This document does not define any object description option.
|
||||
|
||||
Servers supporting this feature SHOULD publish the object identifier
|
||||
(OID) IANA-ASSIGNED-OID as a value of the 'supportedFeatures'
|
||||
[RFC3674] attribute in the root DSE. Clients supporting this feature
|
||||
(OID) 1.3.6.1.4.1.4203.1.5.2 as a value of the 'supportedFeatures'
|
||||
[Models] attribute in the root DSE. Clients supporting this feature
|
||||
SHOULD NOT use the feature unless they have knowledge the server
|
||||
supports it.
|
||||
|
||||
|
|
@ -157,23 +160,25 @@ INTERNET-DRAFT draft-zeilenga-ldap-adlist-08 18 July 2004
|
|||
|
||||
This extension provides a shorthand for requesting all attributes of
|
||||
an object class. As these attributes which could have been listed
|
||||
individually, this shorthand is not believed to raise additional
|
||||
security considerations.
|
||||
|
||||
Implementors of this (or any) LDAP extension should be familiar with
|
||||
general LDAP security considerations [RFC3377].
|
||||
individually, introduction of this shorthand is not believed to raise
|
||||
additional security considerations.
|
||||
|
||||
Implementors of this LDAP extension should be familiar with security
|
||||
|
||||
|
||||
|
||||
Zeilenga Requesting Attributes by Object Class [Page 3]
|
||||
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-adlist-08 18 July 2004
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-adlist-11 18 July 2005
|
||||
|
||||
|
||||
considerations applicable to the LDAP search operation [Protocol], as
|
||||
well as general LDAP security considerations [Roadmap].
|
||||
|
||||
|
||||
4. IANA Considerations
|
||||
|
||||
Registration of the LDAP Protocol Mechanism [RFC3383] defined in
|
||||
Registration of the LDAP Protocol Mechanism [BCP64bis] defined in
|
||||
document is requested.
|
||||
|
||||
Subject: Request for LDAP Protocol Mechanism Registration
|
||||
|
|
@ -199,57 +204,63 @@ INTERNET-DRAFT draft-zeilenga-ldap-adlist-08 18 July 2004
|
|||
Email: Kurt@OpenLDAP.org
|
||||
|
||||
|
||||
6. Normative References
|
||||
6. References
|
||||
|
||||
[[Note to the RFC Editor: please replace the citation tags used in
|
||||
referencing Internet-Drafts with tags of the form RFCnnnn where
|
||||
possible.]]
|
||||
|
||||
|
||||
6.1. Normative References
|
||||
|
||||
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
|
||||
Requirement Levels", BCP 14 (also RFC 2119), March 1997.
|
||||
|
||||
[RFC2234] Crocker, D. and P. Overell, "Augmented BNF for Syntax
|
||||
Specifications: ABNF", RFC 2234, November 1997.
|
||||
[ABNF] Crocker, D. and P. Overell, "Augmented BNF for Syntax
|
||||
Specifications: ABNF", draft-crocker-abnf-rfc2234bis, a
|
||||
work in progress.
|
||||
|
||||
[RFC2251] Wahl, M., T. Howes and S. Kille, "Lightweight Directory
|
||||
Access Protocol (v3)", RFC 2251, December 1997.
|
||||
|
||||
[RFC2252] Wahl, M., A. Coulbeck, T. Howes, and S. Kille,
|
||||
"Lightweight Directory Access Protocol (v3): Attribute
|
||||
Syntax Definitions", RFC 2252, December 1997.
|
||||
|
||||
[RFC3377] Hodges, J. and R. Morgan, "Lightweight Directory Access
|
||||
Protocol (v3): Technical Specification", RFC 3377,
|
||||
September 2002.
|
||||
|
||||
[Features] Zeilenga, K., "Feature Discovery in LDAP", RFC 3674,
|
||||
|
||||
|
||||
|
||||
Zeilenga Requesting Attributes by Object Class [Page 4]
|
||||
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-adlist-08 18 July 2004
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-adlist-11 18 July 2005
|
||||
|
||||
|
||||
December 2003.
|
||||
[Roadmap] Zeilenga, K. (editor), "LDAP: Technical Specification
|
||||
Road Map", draft-ietf-ldapbis-roadmap-xx.txt, a work in
|
||||
progress.
|
||||
|
||||
[Protocol] Sermersheim, J. (editor), "LDAP: The Protocol",
|
||||
draft-ietf-ldapbis-protocol-xx.txt, a work in progress.
|
||||
|
||||
[Models] Zeilenga, K. (editor), "LDAP: Directory Information
|
||||
Models", draft-ietf-ldapbis-models-xx.txt, a work in
|
||||
progress.
|
||||
|
||||
[LDAPURL] Smith, M. (editor), "LDAP: Uniform Resource Locator",
|
||||
draft-ietf-ldapbis-url-xx.txt, a work in progress.
|
||||
|
||||
[X.680] International Telecommunication Union -
|
||||
Telecommunication Standardization Sector, "Abstract
|
||||
Syntax Notation One (ASN.1) - Specification of Basic
|
||||
Notation", X.680(1997) (also ISO/IEC 8824-1:1998).
|
||||
Notation", X.680(2002) (also ISO/IEC 8824-1:2002).
|
||||
|
||||
|
||||
7. Informative References
|
||||
|
||||
[RFC2255] Howes, T. and M. Smith, "The LDAP URL Format", RFC 2255,
|
||||
December, 1997.
|
||||
|
||||
[RFC2256] Wahl, M., "A Summary of the X.500(96) User Schema for
|
||||
use with LDAPv3", RFC 2256, December 1997.
|
||||
|
||||
[RFC3383] Zeilenga, K., "IANA Considerations for LDAP", BCP 64
|
||||
(also RFC 3383), September 2002.
|
||||
6.2. Informative References
|
||||
|
||||
[RFC3673] Zeilenga, K., "LDAPv3: All Operational Attributes", RFC
|
||||
3673, December 2003.
|
||||
|
||||
[READENTRY] Zeilenga, K., "LDAP Read Entry Controls",
|
||||
[Schema] Dally, K. (editor), "LDAP: User Schema",
|
||||
draft-ietf-ldapbis-user-schema-xx.txt, a work in
|
||||
progress.
|
||||
|
||||
[BCP64bis] Zeilenga, K., "IANA Considerations for LDAP",
|
||||
draft-ietf-ldapbis-bcp64-xx.txt, a work in progress.
|
||||
|
||||
[ReadEntry] Zeilenga, K., "LDAP Read Entry Controls",
|
||||
draft-zeilenga-ldap-readentry-xx.txt, a work in
|
||||
progress.
|
||||
|
||||
|
|
@ -263,9 +274,19 @@ INTERNET-DRAFT draft-zeilenga-ldap-adlist-08 18 July 2004
|
|||
|
||||
Full Copyright
|
||||
|
||||
Copyright (C) The Internet Society (2004). This document is subject
|
||||
to the rights, licenses and restrictions contained in BCP 78, and
|
||||
except as set forth therein, the authors retain all their rights.
|
||||
Copyright (C) The Internet Society (2005).
|
||||
|
||||
|
||||
|
||||
|
||||
Zeilenga Requesting Attributes by Object Class [Page 5]
|
||||
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-adlist-11 18 July 2005
|
||||
|
||||
|
||||
This document is subject to the rights, licenses and restrictions
|
||||
contained in BCP 78, and except as set forth therein, the authors
|
||||
retain all their rights.
|
||||
|
||||
This document and the information contained herein are provided on an
|
||||
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
|
||||
|
|
@ -277,12 +298,6 @@ Full Copyright
|
|||
|
||||
|
||||
|
||||
|
||||
Zeilenga Requesting Attributes by Object Class [Page 5]
|
||||
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-adlist-08 18 July 2004
|
||||
|
||||
|
||||
Intellectual Property Rights
|
||||
|
||||
The IETF takes no position regarding the validity or scope of any
|
||||
|
|
@ -313,20 +328,6 @@ Intellectual Property Rights
|
|||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
|
@ -336,5 +337,3 @@ Intellectual Property Rights
|
|||
|
||||
Zeilenga Requesting Attributes by Object Class [Page 6]
|
||||
|
||||
|
||||
|
||||
|
|
|
|||
|
|
@ -5,11 +5,12 @@
|
|||
|
||||
INTERNET-DRAFT Kurt D. Zeilenga
|
||||
Intended Category: Standard Track OpenLDAP Foundation
|
||||
Expires in six months 18 July 2004
|
||||
Expires in six months 10 February 2005
|
||||
|
||||
|
||||
|
||||
The LDAP Assertion Control
|
||||
<draft-zeilenga-ldap-assert-03.txt>
|
||||
<draft-zeilenga-ldap-assert-05.txt>
|
||||
|
||||
|
||||
Status of this Memo
|
||||
|
|
@ -37,28 +38,31 @@ Status of this Memo
|
|||
or to cite them other than as "work in progress."
|
||||
|
||||
The list of current Internet-Drafts can be accessed at
|
||||
<http://www.ietf.org/ietf/1id-abstracts.txt>. The list of
|
||||
Internet-Draft Shadow Directories can be accessed at
|
||||
<http://www.ietf.org/shadow.html>.
|
||||
http://www.ietf.org/1id-abstracts.html
|
||||
|
||||
Copyright (C) The Internet Society (2004). All Rights Reserved.
|
||||
The list of Internet-Draft Shadow Directories can be accessed at
|
||||
http://www.ietf.org/shadow.html
|
||||
|
||||
|
||||
Copyright (C) The Internet Society (2005). All Rights Reserved.
|
||||
|
||||
Please see the Full Copyright section near the end of this document
|
||||
for more information.
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Zeilenga LDAP Assertion Control [Page 1]
|
||||
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-assert-05 10 February 2005
|
||||
|
||||
|
||||
Abstract
|
||||
|
||||
This document defines the Lightweight Directory Access Protocol (LDAP)
|
||||
Assertion Control which allows a client to specify that a directory
|
||||
|
||||
|
||||
|
||||
Zeilenga LDAP Assertion Control [Page 1]
|
||||
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-assert-03 18 July 2004
|
||||
|
||||
|
||||
operation should only be processed if an assertion applied to the
|
||||
target entry of the operation is true. It can be used to construct
|
||||
"test and set" and "test and clear" and other conditional operations.
|
||||
|
|
@ -67,15 +71,16 @@ INTERNET-DRAFT draft-zeilenga-ldap-assert-03 18 July 2004
|
|||
1. Overview
|
||||
|
||||
This document defines the Lightweight Directory Access Protocol (LDAP)
|
||||
[RFC3377] assertion control. The assertion control allows the client
|
||||
[Roadmap] assertion control. The assertion control allows the client
|
||||
to specify a condition which must be true for the operation to be
|
||||
processed normally. Otherwise the operation fails.
|
||||
processed normally. Otherwise the operation fails. For instance, the
|
||||
control can be used with the Modify operation [Protocol] to perform
|
||||
atomic "test and set" and "test and clear" operations.
|
||||
|
||||
The control can be used with the Modify operation [RFC2251] to perform
|
||||
atomic "test and set" and "test and clear" operations as the asserted
|
||||
condition is evaluated as an integral part the operation. The control
|
||||
may be attached to other update operations to support conditional
|
||||
addition, deletion, and renaming of objects.
|
||||
The control may be attached to any update operation to support
|
||||
conditional addition, deletion, modification, and renaming of the
|
||||
target object. The asserted condition is evaluated as an integral
|
||||
part the operation.
|
||||
|
||||
The control may also be used with the search operation. Here the
|
||||
assertion is applied to the base object of the search before searching
|
||||
|
|
@ -90,7 +95,7 @@ INTERNET-DRAFT draft-zeilenga-ldap-assert-03 18 July 2004
|
|||
Protocol elements are described using ASN.1 [X.680] with implicit
|
||||
tags. The term "BER-encoded" means the element is to be encoded using
|
||||
the Basic Encoding Rules [X.690] under the restrictions detailed in
|
||||
Section 5.1 of [RFC2251].
|
||||
Section 5.2 of [Protocol].
|
||||
|
||||
DSA stands for Directory System Agent (or server).
|
||||
DSE stands for DSA-specific Entry.
|
||||
|
|
@ -102,24 +107,23 @@ INTERNET-DRAFT draft-zeilenga-ldap-assert-03 18 July 2004
|
|||
|
||||
3. The Assertion Control
|
||||
|
||||
The assertion control is an LDAP Control [RFC2251] whose controlType
|
||||
is IANA-ASSIGNED-OID and controlValue is a BER-encoded Filter
|
||||
[RFC2251, Section 4.5.1]. The criticality may be TRUE or FALSE.
|
||||
There is no corresponding response control.
|
||||
|
||||
|
||||
|
||||
|
||||
Zeilenga LDAP Assertion Control [Page 2]
|
||||
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-assert-03 18 July 2004
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-assert-05 10 February 2005
|
||||
|
||||
|
||||
The assertion control is an LDAP Control [Protocol] whose controlType
|
||||
is IANA-ASSIGNED-OID and controlValue is a BER-encoded Filter
|
||||
[Protocol, Section 4.5.1]. The criticality may be TRUE or FALSE.
|
||||
There is no corresponding response control.
|
||||
|
||||
The control is appropriate for both LDAP interrogation and update
|
||||
operations [RFC2251] including Add, Compare, Delete, Modify, ModifyDN
|
||||
operations [Protocol] including Add, Compare, Delete, Modify, ModifyDN
|
||||
(rename), and Search. It is inappropriate for Abandon, Bind nor
|
||||
Unbind operations. It is also inappropriate for the Start TLS
|
||||
[RFC2830] operation.
|
||||
Unbind, and Start TLS operations.
|
||||
|
||||
When the control is attached to an LDAP request, the processing of the
|
||||
request is conditional on the evaluation of the Filter as applied
|
||||
|
|
@ -138,14 +142,14 @@ INTERNET-DRAFT draft-zeilenga-ldap-assert-03 18 July 2004
|
|||
|
||||
For search operation, the target is indicated by the baseObject field
|
||||
and the evaluation is done after "finding" but before "searching"
|
||||
[RFC2251]. Hence, no entries or continuations references are returned
|
||||
if the assertion fails.
|
||||
[Protocol]. Hence, no entries or continuations references are
|
||||
returned if the assertion fails.
|
||||
|
||||
Servers implementing this technical specification SHOULD publish the
|
||||
object identifier IANA-ASSIGNED-OID as a value of the
|
||||
'supportedControl' attribute [RFC2252] in their root DSE. A server
|
||||
MAY choose to advertise this extension only when the client is
|
||||
authorized to use it.
|
||||
'supportedControl' attribute [Models] in their root DSE. A server MAY
|
||||
choose to advertise this extension only when the client is authorized
|
||||
to use it.
|
||||
|
||||
Other documents may specify how this control applies to other LDAP
|
||||
operations. In doing so, they must state how the target entry is
|
||||
|
|
@ -159,24 +163,25 @@ INTERNET-DRAFT draft-zeilenga-ldap-assert-03 18 July 2004
|
|||
appropriately protected.
|
||||
|
||||
As with any general assertion mechanism, the mechanism can be used to
|
||||
determine directory content. Hence, this mechanism SHOULD be subject
|
||||
to appropriate access controls.
|
||||
|
||||
Some assertions may be very complex, requiring significant time and
|
||||
|
||||
|
||||
|
||||
Zeilenga LDAP Assertion Control [Page 3]
|
||||
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-assert-03 18 July 2004
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-assert-05 10 February 2005
|
||||
|
||||
|
||||
determine directory content. Hence, this mechanism SHOULD be subject
|
||||
to appropriate access controls.
|
||||
|
||||
Some assertions may be very complex, requiring significant time and
|
||||
resources to evaluate. Hence, this mechanism SHOULD be subject to
|
||||
appropriate administrative controls.
|
||||
|
||||
All security considerations for the base operations [RFC2251] to which
|
||||
this control is attached to apply, as do general LDAP security
|
||||
considerations [RFC3377].
|
||||
Security considerations for the base operations [Protocol] extended by
|
||||
this control, as well as general LDAP security considerations
|
||||
[Roadmap], generally apply to implementation and use of this
|
||||
extension.
|
||||
|
||||
|
||||
5. IANA Considerations
|
||||
|
|
@ -184,8 +189,8 @@ INTERNET-DRAFT draft-zeilenga-ldap-assert-03 18 July 2004
|
|||
5.1. Object Identifier
|
||||
|
||||
It is requested that IANA assign upon Standards Action an LDAP Object
|
||||
Identifier [RFC3383] to identify the LDAP Assertion Control defined in
|
||||
this document.
|
||||
Identifier [BCP64bis] to identify the LDAP Assertion Control defined
|
||||
in this document.
|
||||
|
||||
Subject: Request for LDAP Object Identifier Registration
|
||||
Person & email address to contact for further information:
|
||||
|
|
@ -197,7 +202,7 @@ INTERNET-DRAFT draft-zeilenga-ldap-assert-03 18 July 2004
|
|||
|
||||
5.2 LDAP Protocol Mechanism
|
||||
|
||||
Registration of this protocol mechanism [RFC3383] is requested.
|
||||
Registration of this protocol mechanism [BCP64bis] is requested.
|
||||
|
||||
Subject: Request for LDAP Protocol Mechanism Registration
|
||||
Object Identifier: IANA-ASSIGNED-OID
|
||||
|
|
@ -212,21 +217,20 @@ INTERNET-DRAFT draft-zeilenga-ldap-assert-03 18 July 2004
|
|||
|
||||
5.3 LDAP Result Code
|
||||
|
||||
Assignment of an LDAP Result Code [RFC3383] called 'assertionFailed'
|
||||
Assignment of an LDAP Result Code [BCP64bis] called 'assertionFailed'
|
||||
is requested.
|
||||
|
||||
Subject: LDAP Result Code Registration
|
||||
Person & email address to contact for further information:
|
||||
Kurt Zeilenga <kurt@OpenLDAP.org>
|
||||
Result Code Name: assertionFailed
|
||||
|
||||
|
||||
|
||||
Zeilenga LDAP Assertion Control [Page 4]
|
||||
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-assert-03 18 July 2004
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-assert-05 10 February 2005
|
||||
|
||||
|
||||
Subject: LDAP Result Code Registration
|
||||
Person & email address to contact for further information:
|
||||
Kurt Zeilenga <kurt@OpenLDAP.org>
|
||||
Result Code Name: assertionFailed
|
||||
Specification: RFC XXXX
|
||||
Author/Change Controller: IESG
|
||||
Comments: none
|
||||
|
|
@ -245,27 +249,42 @@ INTERNET-DRAFT draft-zeilenga-ldap-assert-03 18 July 2004
|
|||
Email: Kurt@OpenLDAP.org
|
||||
|
||||
|
||||
8. Normative References
|
||||
8. References
|
||||
|
||||
[[Note to the RFC Editor: please replace the citation tags used in
|
||||
referencing Internet-Drafts with tags of the form RFCnnnn where
|
||||
possible.]]
|
||||
|
||||
|
||||
8.1. Normative References
|
||||
|
||||
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
|
||||
Requirement Levels", BCP 14 (also RFC 2119), March 1997.
|
||||
|
||||
[RFC2251] Wahl, M., T. Howes and S. Kille, "Lightweight Directory
|
||||
Access Protocol (v3)", RFC 2251, December 1997.
|
||||
[Roadmap] Zeilenga, K. (editor), "LDAP: Technical Specification
|
||||
Road Map", draft-ietf-ldapbis-roadmap-xx.txt, a work in
|
||||
progress.
|
||||
|
||||
[RFC2252] Wahl, M., A. Coulbeck, T. Howes, and S. Kille,
|
||||
"Lightweight Directory Access Protocol (v3): Attribute
|
||||
Syntax Definitions", RFC 2252, December 1997.
|
||||
[Protocol] Sermersheim, J. (editor), "LDAP: The Protocol",
|
||||
draft-ietf-ldapbis-protocol-xx.txt, a work in progress.
|
||||
|
||||
[RFC3377] Hodges, J. and R. Morgan, "Lightweight Directory Access
|
||||
Protocol (v3): Technical Specification", RFC 3377,
|
||||
September 2002.
|
||||
[Models] Zeilenga, K. (editor), "LDAP: Directory Information
|
||||
Models", draft-ietf-ldapbis-models-xx.txt, a work in
|
||||
progress.
|
||||
|
||||
|
||||
9. Informative References
|
||||
8.2. Informative References
|
||||
|
||||
[RFC3383] Zeilenga, K., "IANA Considerations for LDAP", BCP 64
|
||||
(also RFC 3383), September 2002.
|
||||
|
||||
|
||||
|
||||
Zeilenga LDAP Assertion Control [Page 5]
|
||||
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-assert-05 10 February 2005
|
||||
|
||||
|
||||
[BCP64bis] Zeilenga, K., "IANA Considerations for LDAP",
|
||||
draft-ietf-ldapbis-bcp64-xx.txt, a work in progress.
|
||||
|
||||
|
||||
|
||||
|
|
@ -275,14 +294,6 @@ Intellectual Property Rights
|
|||
Intellectual Property Rights or other rights that might be claimed to
|
||||
pertain to the implementation or use of the technology described in
|
||||
this document or the extent to which any license under such rights
|
||||
|
||||
|
||||
|
||||
Zeilenga LDAP Assertion Control [Page 5]
|
||||
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-assert-03 18 July 2004
|
||||
|
||||
|
||||
might or might not be available; nor does it represent that it has
|
||||
made any independent effort to identify any such rights. Information
|
||||
on the procedures with respect to rights in RFC documents can be found
|
||||
|
|
@ -305,7 +316,7 @@ INTERNET-DRAFT draft-zeilenga-ldap-assert-03 18 July 2004
|
|||
|
||||
Full Copyright
|
||||
|
||||
Copyright (C) The Internet Society (2004). This document is subject
|
||||
Copyright (C) The Internet Society (2005). This document is subject
|
||||
to the rights, licenses and restrictions contained in BCP 78, and
|
||||
except as set forth therein, the authors retain all their rights.
|
||||
|
||||
|
|
@ -323,17 +334,6 @@ Full Copyright
|
|||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Zeilenga LDAP Assertion Control [Page 6]
|
||||
|
||||
|
||||
|
|
|
|||
|
|
@ -1,63 +1,63 @@
|
|||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
INTERNET-DRAFT Kurt D. Zeilenga
|
||||
Intended Category: Standard Track OpenLDAP Foundation
|
||||
Expires in six months 1 November 2002
|
||||
Expires in six months 19 November 2004
|
||||
|
||||
|
||||
|
||||
LDAP "Who am I?" Operation
|
||||
<draft-zeilenga-ldap-authzid-08.txt>
|
||||
<draft-zeilenga-ldap-authzid-10.txt>
|
||||
|
||||
|
||||
Status of this Memo
|
||||
|
||||
This document is an Internet-Draft and is in full conformance with all
|
||||
provisions of Section 10 of RFC2026.
|
||||
|
||||
This document is intended to be, after appropriate review and
|
||||
revision, submitted to the RFC Editor as a Standard Track document.
|
||||
Distribution of this memo is unlimited. Technical discussion of this
|
||||
document will take place on the IETF LDAP Extension Working Group
|
||||
mailing list <ldapext@ietf.org>. Please send editorial comments
|
||||
directly to the author <Kurt@OpenLDAP.org>.
|
||||
document will take place on the IETF LDAP Extensions mailing list
|
||||
<ldapext@ietf.org>. Please send editorial comments directly to the
|
||||
author <Kurt@OpenLDAP.org>.
|
||||
|
||||
By submitting this Internet-Draft, I accept the provisions of Section
|
||||
4 of RFC 3667. By submitting this Internet-Draft, I certify that any
|
||||
applicable patent or other IPR claims of which I am aware have been
|
||||
disclosed, or will be disclosed, and any of which I become aware will
|
||||
be disclosed, in accordance with RFC 3668.
|
||||
|
||||
Internet-Drafts are working documents of the Internet Engineering Task
|
||||
Force (IETF), its areas, and its working groups. Note that other
|
||||
Force (IETF), its areas, and its working groups. Note that other
|
||||
groups may also distribute working documents as Internet-Drafts.
|
||||
|
||||
Internet-Drafts are draft documents valid for a maximum of six months
|
||||
and may be updated, replaced, or obsoleted by other documents at any
|
||||
time. It is inappropriate to use Internet-Drafts as reference
|
||||
material or to cite them other than as ``work in progress.''
|
||||
time. It is inappropriate to use Internet-Drafts as reference material
|
||||
or to cite them other than as "work in progress."
|
||||
|
||||
The list of current Internet-Drafts can be accessed at
|
||||
<http://www.ietf.org/ietf/1id-abstracts.txt>. The list of
|
||||
<http://www.ietf.org/ietf/1id-abstracts.txt>. The list of
|
||||
Internet-Draft Shadow Directories can be accessed at
|
||||
<http://www.ietf.org/shadow.html>.
|
||||
|
||||
Copyright 2002, The Internet Society. All Rights Reserved.
|
||||
Copyright (C) The Internet Society (2004). All Rights Reserved.
|
||||
|
||||
Please see the Copyright section near the end of this document for
|
||||
more information.
|
||||
Please see the Full Copyright section near the end of this document
|
||||
for more information.
|
||||
|
||||
|
||||
Abstract
|
||||
|
||||
This specification provides a mechanism for Lightweight Directory
|
||||
Access Protocol (LDAP) clients to obtain the authorization identity
|
||||
which the server has associated with the user or application entity.
|
||||
This mechanism is specified as an LDAP extended operation called the
|
||||
LDAP "Who am I?" operation.
|
||||
|
||||
|
||||
|
||||
Zeilenga LDAP "Who am I?" [Page 1]
|
||||
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-authzid-08 1 November 2002
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-authzid-10 19 November 2004
|
||||
|
||||
|
||||
Access Protocol (LDAP) clients to obtain the authorization identity
|
||||
which the server has associated with the user or application entity.
|
||||
This mechanism is specified as an LDAP extended operation called the
|
||||
LDAP "Who am I?" operation.
|
||||
|
||||
|
||||
Conventions
|
||||
|
|
@ -75,21 +75,21 @@ Conventions
|
|||
associated with the user or application entity. The operation is
|
||||
called the "Who am I?" operation.
|
||||
|
||||
This specification is intended to replace the existing [AUTHCTL]
|
||||
This specification is intended to replace the existing [AUTHRESP]
|
||||
mechanism which uses Bind request and response controls to request and
|
||||
return the authorization identity. Bind controls are not protected by
|
||||
the security layers established by the Bind operation which they are
|
||||
transferred as part of. While it is possible to establish security
|
||||
layers using Start TLS [RFC2830] prior to the Bind operation, it is
|
||||
often desirable to use security layers established by the Bind
|
||||
operation. An extended operation sent after a Bind operation is
|
||||
protected by the security layers established by the Bind operation.
|
||||
the security layers established by the Bind operation which includes
|
||||
them. While it is possible to establish security layers using Start
|
||||
TLS [RFC2830] prior to the Bind operation, it is often desirable to
|
||||
use security layers established by the Bind operation. An extended
|
||||
operation sent after a Bind operation is protected by the security
|
||||
layers established by the Bind operation.
|
||||
|
||||
There are other cases where it is desirable to request the
|
||||
authorization identity which the server associated with the client
|
||||
separately from the Bind operation. For example, the "Who am I?"
|
||||
operation can be augmented with a Proxied Authorization Control
|
||||
[PROXYCTL] to determine the authorization identity which the server
|
||||
[PROXYAUTH] to determine the authorization identity which the server
|
||||
associates with the identity asserted in the Proxied Authorization
|
||||
Control. The "Who am I?" operation can also be used prior to the Bind
|
||||
operation.
|
||||
|
|
@ -103,19 +103,18 @@ Conventions
|
|||
authzId", respectively.
|
||||
|
||||
|
||||
|
||||
|
||||
Zeilenga LDAP "Who am I?" [Page 2]
|
||||
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-authzid-10 19 November 2004
|
||||
|
||||
|
||||
2. The "Who am I?" Operation
|
||||
|
||||
The "Who am I?" operation is defined as an LDAP Extended Operation
|
||||
[RFC2251, Section 4.12] identified by the whoamiOID Object Identifier
|
||||
(OID). This section details the syntax of the operation's whoami
|
||||
|
||||
|
||||
|
||||
Zeilenga LDAP "Who am I?" [Page 2]
|
||||
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-authzid-08 1 November 2002
|
||||
|
||||
|
||||
request and response messages.
|
||||
|
||||
whoamiOID ::= "1.3.6.1.4.1.4203.1.11.3"
|
||||
|
|
@ -137,12 +136,12 @@ INTERNET-DRAFT draft-zeilenga-ldap-authzid-08 1 November 2002
|
|||
The whoami response is an ExtendedResponse where the responseName
|
||||
field is absent and the response field, if present, is empty or an
|
||||
authzId [RFC2829]. For example, a whoami response returning the
|
||||
authzId "u:kurt@OPENLDAP.ORG" (in response to the example request)
|
||||
authzId "u:xxyyz@EXAMPLE.NET" (in response to the example request)
|
||||
would be encoded as the sequence of octets (in hex):
|
||||
|
||||
30 21 02 01 02 78 1c 0a 01 00 04 00 04 00 8b 13
|
||||
75 3a 6b 75 72 74 40 4f 50 45 4e 4c 44 41 50 2e
|
||||
4f 52 47
|
||||
75 3a 78 78 79 79 7a 40 45 58 41 4d 50 4c 45 2e
|
||||
4e 45 54
|
||||
|
||||
|
||||
3. Operational Semantics
|
||||
|
|
@ -153,6 +152,20 @@ INTERNET-DRAFT draft-zeilenga-ldap-authzid-08 1 November 2002
|
|||
mechanism, a whoami Response, for the server to respond to that
|
||||
request.
|
||||
|
||||
Servers indicate their support for this extended operation by
|
||||
providing whoamiOID object identifier as a value of the
|
||||
'supportedExtension' attribute type in their root DSE. Server SHOULD
|
||||
advertise this extension only when the client is willing and able to
|
||||
perform this operation.
|
||||
|
||||
|
||||
|
||||
|
||||
Zeilenga LDAP "Who am I?" [Page 3]
|
||||
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-authzid-10 19 November 2004
|
||||
|
||||
|
||||
If the server is willing and able to provide the authorization
|
||||
identity it associates with the client, the server SHALL return a
|
||||
whoami Response with a success resultCode. If the server is treating
|
||||
|
|
@ -164,14 +177,6 @@ INTERNET-DRAFT draft-zeilenga-ldap-authzid-08 1 November 2002
|
|||
If the server is unwilling or unable to provide the authorization
|
||||
identity it associates with the client, the server SHALL return a
|
||||
whoami Response with an appropriate non-success resultCode (such as
|
||||
|
||||
|
||||
|
||||
Zeilenga LDAP "Who am I?" [Page 3]
|
||||
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-authzid-08 1 November 2002
|
||||
|
||||
|
||||
operationsError, protocolError, confidentialityRequired,
|
||||
insufficientAccessRights, busy, unavailable, unwillingToPerform, or
|
||||
other) and an absent response field.
|
||||
|
|
@ -181,7 +186,9 @@ INTERNET-DRAFT draft-zeilenga-ldap-authzid-08 1 November 2002
|
|||
authenticated using the Bind operation. Clients MUST NOT invoke the
|
||||
"Who Am I?" operation while any Bind operation is in progress,
|
||||
including between two Bind requests made as part of a multi-stage Bind
|
||||
operation.
|
||||
operation. Where a whoami Request is received in violation of this
|
||||
absolute prohibition, the server should return a whoami Response with
|
||||
an operationsError resultCode.
|
||||
|
||||
|
||||
4. Extending the "Who am I?" operation with controls
|
||||
|
|
@ -195,7 +202,7 @@ INTERNET-DRAFT draft-zeilenga-ldap-authzid-08 1 November 2002
|
|||
|
||||
4.1. Proxied Authorization Control
|
||||
|
||||
The Proxied Authorization Control [PROXYCTL] is used by clients to
|
||||
The Proxied Authorization Control [PROXYAUTH] is used by clients to
|
||||
request that the operation it is attached to operates under the
|
||||
authorization of an assumed identity. The client provides the
|
||||
identity to assume in the Proxied Authorization request control. If
|
||||
|
|
@ -207,33 +214,34 @@ INTERNET-DRAFT draft-zeilenga-ldap-authzid-08 1 November 2002
|
|||
[RFC2829], it is desirable to request the server provide the authzId
|
||||
it associates with the assumed identity.
|
||||
|
||||
|
||||
|
||||
|
||||
Zeilenga LDAP "Who am I?" [Page 4]
|
||||
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-authzid-10 19 November 2004
|
||||
|
||||
|
||||
When a Proxied Authorization Control is be attached to the "Who Am I?"
|
||||
operation, the operation requests the return of the authzId the server
|
||||
associates with the identity asserted in the Proxied Authorization
|
||||
Control. The TBD result code is used to indicate that the server does
|
||||
not allow the client to assume the asserted identity. [[Note to RFC
|
||||
Editor: TBD is to be replaced with the name/code assigned by IANA for
|
||||
[PROXYCTL] use.]]
|
||||
[PROXYAUTH] use.]]
|
||||
|
||||
|
||||
5. Security Considerations
|
||||
|
||||
Identities associated with users may be sensitive information. When
|
||||
so, security layers [RFC2829][RFC2830] should be established to
|
||||
|
||||
|
||||
|
||||
Zeilenga LDAP "Who am I?" [Page 4]
|
||||
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-authzid-08 1 November 2002
|
||||
|
||||
|
||||
protect this information. This mechanism is specifically designed to
|
||||
allow security layers established by a Bind operation to protect the
|
||||
integrity and/or confidentiality of the authorization identity.
|
||||
|
||||
Servers may place access control or other restrictions upon the use of
|
||||
this operation.
|
||||
this operation. As stated in Section 3, the server SHOULD advertise
|
||||
this extension when it is willing and able to perform the operation.
|
||||
|
||||
As with any other extended operations, general LDAP security
|
||||
considerations [RFC3377] apply.
|
||||
|
|
@ -241,124 +249,150 @@ INTERNET-DRAFT draft-zeilenga-ldap-authzid-08 1 November 2002
|
|||
|
||||
6. IANA Considerations
|
||||
|
||||
This OID 1.3.6.1.4.1.4203.1.11.3 to identify the LDAP "Who Am I?
|
||||
extended operation. This OID was assigned [ASSIGN] by OpenLDAP
|
||||
The OID 1.3.6.1.4.1.4203.1.11.3 is used to identify the LDAP "Who Am
|
||||
I?" extended operation. This OID was assigned [ASSIGN] by OpenLDAP
|
||||
Foundation, under its IANA-assigned private enterprise allocation
|
||||
[PRIVATE], for use in this specification.
|
||||
|
||||
Registration of this protocol mechansism is requested [RFC3383].
|
||||
|
||||
Subject: Request for LDAP Protocol Mechansism Registration
|
||||
Registration of this protocol mechanism [RFC3383] is requested.
|
||||
|
||||
Subject: Request for LDAP Protocol Mechanism Registration
|
||||
Object Identifier: 1.3.6.1.4.1.4203.1.11.3
|
||||
|
||||
Description: Who am I?
|
||||
|
||||
Person & email address to contact for further information:
|
||||
Kurt Zeilenga <kurt@openldap.org>
|
||||
|
||||
Usage: Extended Operation
|
||||
|
||||
Specification: RFCxxxx
|
||||
|
||||
Specification: RFC XXXX
|
||||
Author/Change Controller: IESG
|
||||
|
||||
Comments: none
|
||||
|
||||
|
||||
7. Acknowledgment
|
||||
|
||||
This document borrows from prior work in this area including
|
||||
"Authentication Response Control" [AUTHCTL] by Rob Weltman, Mark Smith
|
||||
and Mark Wahl.
|
||||
|
||||
The LDAP "Who am I?" operation takes it name from the UNIX whoami(1)
|
||||
command. The whoami(1) command displays the effective user id.
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Zeilenga LDAP "Who am I?" [Page 5]
|
||||
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-authzid-08 1 November 2002
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-authzid-10 19 November 2004
|
||||
|
||||
|
||||
"Authentication Response Control" [AUTHRESP] by Rob Weltman, Mark
|
||||
Smith and Mark Wahl.
|
||||
|
||||
The LDAP "Who am I?" operation takes it name from the UNIX whoami(1)
|
||||
command. The whoami(1) command displays the effective user id.
|
||||
|
||||
|
||||
8. Author's Address
|
||||
|
||||
Kurt D. Zeilenga
|
||||
OpenLDAP Foundation
|
||||
<Kurt@OpenLDAP.org>
|
||||
|
||||
Email: Kurt@OpenLDAP.org
|
||||
|
||||
|
||||
9. Normative References
|
||||
9. References
|
||||
|
||||
[RFC2119] S. Bradner, "Key words for use in RFCs to Indicate
|
||||
Requirement Levels", BCP 14 (also RFC 2119), March 1997.
|
||||
|
||||
[RFC2251] M. Wahl, T. Howes, S. Kille, "Lightweight Directory Access
|
||||
Protocol (v3)", RFC 2251, December 1997.
|
||||
|
||||
[RFC2829] M. Wahl, H. Alvestrand, J. Hodges, RL "Bob" Morgan,
|
||||
"Authentication Methods for LDAP", RFC 2829, June 2000.
|
||||
|
||||
[RFC2830] J. Hodges, R. Morgan, and M. Wahl, "Lightweight Directory
|
||||
Access Protocol (v3): Extension for Transport Layer
|
||||
Security", RFC 2830, May 2000.
|
||||
|
||||
[RFC3377] J. Hodges, R. Morgan, "Lightweight Directory Access
|
||||
Protocol (v3): Technical Specification", RFC 3377,
|
||||
September 2002.
|
||||
|
||||
[PROXYCTL] R. Weltman, "LDAP Proxied Authentication Control", draft-
|
||||
weltman-ldapv3-proxy-xx.txt (a work in progress).
|
||||
[[Note to the RFC Editor: please replace the citation tags used in
|
||||
referencing Internet-Drafts with tags of the form RFCnnnn where
|
||||
possible.]]
|
||||
|
||||
|
||||
10. Informative References
|
||||
9.1. Normative References
|
||||
|
||||
[RFC3383] K. Zeilenga, "IANA Considerations for LDAP", BCP 64 (also
|
||||
RFC 3383), September 2002.
|
||||
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
|
||||
Requirement Levels", BCP 14 (also RFC 2119), March 1997.
|
||||
|
||||
[ASSIGN] OpenLDAP Foundation, "OpenLDAP OID Delegations",
|
||||
http://www.openldap.org/foundation/oid-delegate.txt.
|
||||
[RFC2251] Wahl, M., T. Howes and S. Kille, "Lightweight Directory
|
||||
Access Protocol (v3)", RFC 2251, December 1997.
|
||||
|
||||
[AUTHCTL] R. Weltman, M. Smith, M. Wahl, "LDAP Authentication
|
||||
Response Control", draft-weltman-ldapv3-auth-response-
|
||||
xx.txt (a work in progress).
|
||||
[RFC2829] Wahl, M., H. Alvestrand, and J. Hodges, RL "Bob" Morgan,
|
||||
"Authentication Methods for LDAP", RFC 2829, June 2000.
|
||||
|
||||
[PRIVATE] IANA, "Private Enterprise Numbers",
|
||||
http://www.iana.org/assignments/enterprise-numbers.
|
||||
[RFC2830] Hodges, J., R. Morgan, and M. Wahl, "Lightweight
|
||||
Directory Access Protocol (v3): Extension for Transport
|
||||
Layer Security", RFC 2830, May 2000.
|
||||
|
||||
[RFC3377] Hodges, J. and R. Morgan, "Lightweight Directory Access
|
||||
Protocol (v3): Technical Specification", RFC 3377,
|
||||
September 2002.
|
||||
|
||||
[PROXYAUTH] Weltman, R., "LDAP Proxy Authentication Control",
|
||||
draft-weltman-ldapv3-proxy-xx.txt, a work in progress.
|
||||
|
||||
|
||||
Copyright 2002, The Internet Society. All Rights Reserved.
|
||||
9.2. Informative References
|
||||
|
||||
[RFC3383] Zeilenga, K., "IANA Considerations for LDAP", BCP 64
|
||||
|
||||
|
||||
|
||||
Zeilenga LDAP "Who am I?" [Page 6]
|
||||
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-authzid-08 1 November 2002
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-authzid-10 19 November 2004
|
||||
|
||||
|
||||
This document and translations of it may be copied and furnished to
|
||||
others, and derivative works that comment on or otherwise explain it
|
||||
or assist in its implementation may be prepared, copied, published and
|
||||
distributed, in whole or in part, without restriction of any kind,
|
||||
provided that the above copyright notice and this paragraph are
|
||||
included on all such copies and derivative works. However, this
|
||||
document itself may not be modified in any way, such as by removing
|
||||
the copyright notice or references to the Internet Society or other
|
||||
Internet organizations, except as needed for the purpose of
|
||||
developing Internet standards in which case the procedures for
|
||||
copyrights defined in the Internet Standards process must be followed,
|
||||
or as required to translate it into languages other than English.
|
||||
(also RFC 3383), September 2002.
|
||||
|
||||
The limited permissions granted above are perpetual and will not be
|
||||
revoked by the Internet Society or its successors or assigns.
|
||||
[AUTHRESP] Weltman, R., M. Smith and M. Wahl, "LDAP Authorization
|
||||
Identity Response and Request Controls",
|
||||
draft-weltman-ldapv3-auth-response-xx.txt, a work in
|
||||
progress.
|
||||
|
||||
This document and the information contained herein is provided on an
|
||||
"AS IS" basis and THE AUTHORS, THE INTERNET SOCIETY, AND THE INTERNET
|
||||
ENGINEERING TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED,
|
||||
[ASSIGN] OpenLDAP Foundation, "OpenLDAP OID Delegations",
|
||||
http://www.openldap.org/foundation/oid-delegate.txt.
|
||||
|
||||
[PRIVATE] IANA, "Private Enterprise Numbers",
|
||||
http://www.iana.org/assignments/enterprise-numbers.
|
||||
|
||||
|
||||
|
||||
Intellectual Property Rights
|
||||
|
||||
The IETF takes no position regarding the validity or scope of any
|
||||
Intellectual Property Rights or other rights that might be claimed to
|
||||
pertain to the implementation or use of the technology described in
|
||||
this document or the extent to which any license under such rights
|
||||
might or might not be available; nor does it represent that it has
|
||||
made any independent effort to identify any such rights. Information
|
||||
on the procedures with respect to rights in RFC documents can be found
|
||||
in BCP 78 and BCP 79.
|
||||
|
||||
Copies of IPR disclosures made to the IETF Secretariat and any
|
||||
assurances of licenses to be made available, or the result of an
|
||||
attempt made to obtain a general license or permission for the use of
|
||||
such proprietary rights by implementers or users of this specification
|
||||
can be obtained from the IETF on-line IPR repository at
|
||||
http://www.ietf.org/ipr.
|
||||
|
||||
The IETF invites any interested party to bring to its attention any
|
||||
copyrights, patents or patent applications, or other proprietary
|
||||
rights that may cover technology that may be required to implement
|
||||
this standard. Please address the information to the IETF at
|
||||
ietf-ipr@ietf.org.
|
||||
|
||||
|
||||
|
||||
Full Copyright
|
||||
|
||||
Copyright (C) The Internet Society (2004). This document is subject
|
||||
to the rights, licenses and restrictions contained in BCP 78, and
|
||||
except as set forth therein, the authors retain all their rights.
|
||||
|
||||
This document and the information contained herein are provided on an
|
||||
|
||||
|
||||
|
||||
Zeilenga LDAP "Who am I?" [Page 7]
|
||||
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-authzid-10 19 November 2004
|
||||
|
||||
|
||||
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
|
||||
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
|
||||
ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
|
||||
INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
|
||||
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
|
||||
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
|
||||
|
|
@ -391,5 +425,21 @@ INTERNET-DRAFT draft-zeilenga-ldap-authzid-08 1 November 2002
|
|||
|
||||
|
||||
|
||||
Zeilenga LDAP "Who am I?" [Page 7]
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Zeilenga LDAP "Who am I?" [Page 8]
|
||||
|
||||
|
|
|
|||
1403
doc/drafts/draft-zeilenga-ldap-cosine-xx.txt
Normal file
1403
doc/drafts/draft-zeilenga-ldap-cosine-xx.txt
Normal file
File diff suppressed because it is too large
Load diff
283
doc/drafts/draft-zeilenga-ldap-dontusecopy-xx.txt
Normal file
283
doc/drafts/draft-zeilenga-ldap-dontusecopy-xx.txt
Normal file
|
|
@ -0,0 +1,283 @@
|
|||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
INTERNET-DRAFT Kurt D. Zeilenga
|
||||
Intended Category: Standard Track OpenLDAP Foundation
|
||||
Expires in six months 17 July 2005
|
||||
|
||||
|
||||
|
||||
The LDAP Don't Use Copy Control
|
||||
<draft-zeilenga-ldap-dontusecopy-01.txt>
|
||||
|
||||
|
||||
Status of this Memo
|
||||
|
||||
This document is intended to be, after appropriate review and
|
||||
revision, submitted to the IESG for consideration as a Standard Track
|
||||
document. Distribution of this memo is unlimited. Technical
|
||||
discussion of this document will take place on the IETF LDAP
|
||||
Extensions mailing list <ldapext@ietf.org>. Please send editorial
|
||||
comments directly to the author <Kurt@OpenLDAP.org>.
|
||||
|
||||
By submitting this Internet-Draft, each author represents that any
|
||||
applicable patent or other IPR claims of which he or she is aware have
|
||||
been or will be disclosed, and any of which he or she becomes aware
|
||||
will be disclosed, in accordance with Section 6 of BCP 79.
|
||||
|
||||
Internet-Drafts are working documents of the Internet Engineering Task
|
||||
Force (IETF), its areas, and its working groups. Note that other
|
||||
groups may also distribute working documents as Internet-Drafts.
|
||||
|
||||
Internet-Drafts are draft documents valid for a maximum of six months
|
||||
and may be updated, replaced, or obsoleted by other documents at any
|
||||
time. It is inappropriate to use Internet-Drafts as reference material
|
||||
or to cite them other than as "work in progress."
|
||||
|
||||
The list of current Internet-Drafts can be accessed at
|
||||
http://www.ietf.org/1id-abstracts.html
|
||||
|
||||
The list of Internet-Draft Shadow Directories can be accessed at
|
||||
http://www.ietf.org/shadow.html
|
||||
|
||||
|
||||
Copyright (C) The Internet Society (2005). All Rights Reserved.
|
||||
|
||||
Please see the Full Copyright section near the end of this document
|
||||
for more information.
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Zeilenga LDAP Don't Use Copy Control [Page 1]
|
||||
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-dontusecopy-01 17 July 2005
|
||||
|
||||
|
||||
Abstract
|
||||
|
||||
This document defines the Lightweight Directory Access Protocol (LDAP)
|
||||
Don't Use Copy control extension which allows a client to specify that
|
||||
copied information should not be used in providing service. This
|
||||
control is based upon the X.511 dontUseCopy service control option.
|
||||
|
||||
|
||||
1. Background and Intended Usage
|
||||
|
||||
This document defines the Lightweight Directory Access Protocol (LDAP)
|
||||
[Roadmap] Don't Use Copy control extension. The control may be
|
||||
attached to request messages to indicate that copied (replicated or
|
||||
cached) information [X.500] should not be used in providing service.
|
||||
This control is based upon the X.511 [X.511] dontUseCopy service
|
||||
control option.
|
||||
|
||||
The Don't Use Copy control is intended to be used where the client
|
||||
requires the service be provided using original (master) information
|
||||
[X.500].
|
||||
|
||||
|
||||
2. Terminology
|
||||
|
||||
DSA stands for Directory System Agent (or server).
|
||||
DSE stands for DSA-specific Entry.
|
||||
|
||||
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
|
||||
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
|
||||
document are to be interpreted as described in BCP 14 [RFC2119].
|
||||
|
||||
|
||||
3. The Don't Use Copy Control
|
||||
|
||||
The Don't Use Copy control is an LDAP Control [Protocol] whose
|
||||
controlType is IANA-ASSIGNED-OID and controlValue is absent. The
|
||||
criticality may be TRUE or FALSE. There is no corresponding response
|
||||
control.
|
||||
|
||||
The control is appropriate for both LDAP interrogation operations,
|
||||
including Compare and Search operations [Protocol]. It is
|
||||
inappropriate for all other operations, including Abandon, Bind,
|
||||
Delete, Modify, ModifyDN, StartTLS, and Unbind operations [Protocol].
|
||||
|
||||
When the control is attached to an LDAP request, the requested
|
||||
operation MUST NOT be performed on copied information. That is, the
|
||||
requested operation MUST be performed on original information.
|
||||
|
||||
|
||||
|
||||
|
||||
Zeilenga LDAP Don't Use Copy Control [Page 2]
|
||||
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-dontusecopy-01 17 July 2005
|
||||
|
||||
|
||||
If original information for the target or base object of the operation
|
||||
is not available (either locally or through chaining), the server MUST
|
||||
either return a referral directing the client to a server believed to
|
||||
be better able to service the request or return an appropriate result
|
||||
code (e.g., unwillingToPerform).
|
||||
|
||||
|
||||
4. Security Considerations
|
||||
|
||||
This control is intended to be provided where providing service using
|
||||
copied information might lead to unexpected application behavior.
|
||||
Designers of directory applications should consider where it is
|
||||
appropriate for clients to provide this control. Designers should
|
||||
consider whether use of copied information, in particular security and
|
||||
policy information, may result insecure behavior.
|
||||
|
||||
Security considerations for the base operations [Protocol] extended by
|
||||
this control, as well as general LDAP security considerations
|
||||
[Roadmap], generally apply to implementation and use of this
|
||||
extension.
|
||||
|
||||
|
||||
5. IANA Considerations
|
||||
|
||||
5.1. Object Identifier
|
||||
|
||||
It is requested that IANA assign upon Standards Action an LDAP Object
|
||||
Identifier [BCP64bis] to identify the LDAP Don't Use Copy Control
|
||||
defined in this document.
|
||||
|
||||
Subject: Request for LDAP Object Identifier Registration
|
||||
Person & email address to contact for further information:
|
||||
Kurt Zeilenga <kurt@OpenLDAP.org>
|
||||
Specification: RFC XXXX
|
||||
Author/Change Controller: IESG
|
||||
Comments:
|
||||
Identifies the LDAP Don't Use Copy Control
|
||||
|
||||
5.2 LDAP Protocol Mechanism
|
||||
|
||||
Registration of this protocol mechanism [BCP64bis] is requested.
|
||||
|
||||
Subject: Request for LDAP Protocol Mechanism Registration
|
||||
Object Identifier: IANA-ASSIGNED-OID
|
||||
Description: Don't Use Copy Control
|
||||
Person & email address to contact for further information:
|
||||
Kurt Zeilenga <kurt@openldap.org>
|
||||
Usage: Control
|
||||
|
||||
|
||||
|
||||
Zeilenga LDAP Don't Use Copy Control [Page 3]
|
||||
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-dontusecopy-01 17 July 2005
|
||||
|
||||
|
||||
Specification: RFC XXXX
|
||||
Author/Change Controller: IESG
|
||||
Comments: none
|
||||
|
||||
|
||||
|
||||
6. Author's Address
|
||||
|
||||
Kurt D. Zeilenga
|
||||
OpenLDAP Foundation
|
||||
|
||||
Email: Kurt@OpenLDAP.org
|
||||
|
||||
|
||||
7. References
|
||||
|
||||
[[Note to the RFC Editor: please replace the citation tags used in
|
||||
referencing Internet-Drafts with tags of the form RFCnnnn where
|
||||
possible.]]
|
||||
|
||||
|
||||
7.1. Normative References
|
||||
|
||||
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
|
||||
Requirement Levels", BCP 14 (also RFC 2119), March 1997.
|
||||
|
||||
[Roadmap] Zeilenga, K. (editor), "LDAP: Technical Specification
|
||||
Road Map", draft-ietf-ldapbis-roadmap-xx.txt, a work in
|
||||
progress.
|
||||
|
||||
[Protocol] Sermersheim, J. (editor), "LDAP: The Protocol",
|
||||
draft-ietf-ldapbis-protocol-xx.txt, a work in progress.
|
||||
|
||||
|
||||
7.2. Informative References
|
||||
|
||||
[X.500] International Telecommunication Union -
|
||||
Telecommunication Standardization Sector, "The Directory
|
||||
-- Overview of concepts, models and services,"
|
||||
X.500(1993) (also ISO/IEC 9594-1:1994).
|
||||
|
||||
[X.511] International Telecommunication Union -
|
||||
Telecommunication Standardization Sector, "The
|
||||
Directory: Abstract Service Definition", X.511(1993)
|
||||
(also ISO/IEC 9594-3:1993).
|
||||
|
||||
[BCP64bis] Zeilenga, K., "IANA Considerations for LDAP",
|
||||
draft-ietf-ldapbis-bcp64-xx.txt, a work in progress.
|
||||
|
||||
|
||||
|
||||
Zeilenga LDAP Don't Use Copy Control [Page 4]
|
||||
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-dontusecopy-01 17 July 2005
|
||||
|
||||
|
||||
Intellectual Property Rights
|
||||
|
||||
The IETF takes no position regarding the validity or scope of any
|
||||
Intellectual Property Rights or other rights that might be claimed to
|
||||
pertain to the implementation or use of the technology described in
|
||||
this document or the extent to which any license under such rights
|
||||
might or might not be available; nor does it represent that it has
|
||||
made any independent effort to identify any such rights. Information
|
||||
on the procedures with respect to rights in RFC documents can be found
|
||||
in BCP 78 and BCP 79.
|
||||
|
||||
Copies of IPR disclosures made to the IETF Secretariat and any
|
||||
assurances of licenses to be made available, or the result of an
|
||||
attempt made to obtain a general license or permission for the use of
|
||||
such proprietary rights by implementers or users of this specification
|
||||
can be obtained from the IETF on-line IPR repository at
|
||||
http://www.ietf.org/ipr.
|
||||
|
||||
The IETF invites any interested party to bring to its attention any
|
||||
copyrights, patents or patent applications, or other proprietary
|
||||
rights that may cover technology that may be required to implement
|
||||
this standard. Please address the information to the IETF at
|
||||
ietf-ipr@ietf.org.
|
||||
|
||||
|
||||
|
||||
Full Copyright
|
||||
|
||||
Copyright (C) The Internet Society (2005).
|
||||
|
||||
This document is subject to the rights, licenses and restrictions
|
||||
contained in BCP 78, and except as set forth therein, the authors
|
||||
retain all their rights.
|
||||
|
||||
This document and the information contained herein are provided on an
|
||||
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
|
||||
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
|
||||
ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
|
||||
INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
|
||||
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
|
||||
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Zeilenga LDAP Don't Use Copy Control [Page 5]
|
||||
|
||||
|
|
@ -1,10 +1,16 @@
|
|||
|
||||
|
||||
|
||||
|
||||
|
||||
INTERNET-DRAFT Kurt D. Zeilenga
|
||||
Intended Category: Experimental OpenLDAP Foundation
|
||||
Expires in six months 17 October 2004
|
||||
Expires in six months 10 February 2005
|
||||
|
||||
|
||||
|
||||
LDAP Modify-Increment Extension
|
||||
<draft-zeilenga-ldap-incr-00.txt>
|
||||
<draft-zeilenga-ldap-incr-01.txt>
|
||||
|
||||
|
||||
Status of this Memo
|
||||
|
|
@ -32,28 +38,31 @@ Status of this Memo
|
|||
or to cite them other than as "work in progress."
|
||||
|
||||
The list of current Internet-Drafts can be accessed at
|
||||
<http://www.ietf.org/ietf/1id-abstracts.txt>. The list of
|
||||
Internet-Draft Shadow Directories can be accessed at
|
||||
<http://www.ietf.org/shadow.html>.
|
||||
http://www.ietf.org/1id-abstracts.html
|
||||
|
||||
Copyright (C) The Internet Society (2004). All Rights Reserved.
|
||||
The list of Internet-Draft Shadow Directories can be accessed at
|
||||
http://www.ietf.org/shadow.html
|
||||
|
||||
|
||||
Copyright (C) The Internet Society (2005). All Rights Reserved.
|
||||
|
||||
Please see the Full Copyright section near the end of this document
|
||||
for more information.
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Zeilenga LDAP Modify-Increment Extension [Page 1]
|
||||
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-incr-01.txt 10 February 2005
|
||||
|
||||
|
||||
Abstract
|
||||
|
||||
This document describes an extension to the Lightweight Directory
|
||||
Access Protocol (LDAP) Modify operation to support an increment
|
||||
|
||||
|
||||
|
||||
Zeilenga LDAP Modify-Increment Extension [Page 1]
|
||||
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-incr-00.txt 17 October 2004
|
||||
|
||||
|
||||
capability. This extension is useful in provisioning applications,
|
||||
especially when combined with the assertion control and/or the
|
||||
pre-read or post-read control extension.
|
||||
|
|
@ -61,7 +70,7 @@ INTERNET-DRAFT draft-zeilenga-ldap-incr-00.txt 17 October 2004
|
|||
|
||||
1. Background and Intended Use
|
||||
|
||||
The Lightwieght Directory Access Protocol [Roadmap] does not currently
|
||||
The Lightweight Directory Access Protocol [Roadmap] does not currently
|
||||
provide an operation to increment values of an attribute. A client
|
||||
must read the values of the attribute, then modify those values to
|
||||
increment them by the desired amount. As the values may be updated by
|
||||
|
|
@ -72,8 +81,8 @@ INTERNET-DRAFT draft-zeilenga-ldap-incr-00.txt 17 October 2004
|
|||
This document extends the LDAP Modify Operation [Protocol] to support
|
||||
an increment values capability. This feature is intended to be used
|
||||
with either the LDAP pre-read or post-read control extension
|
||||
[READENTRY]. This feature may be used with the LDAP assertion control
|
||||
[ASSERT] to provide test-and-increment functionality.
|
||||
[ReadEntry]. This feature may also be used with the LDAP assertion
|
||||
control [Assertion] to provide test-and-increment functionality.
|
||||
|
||||
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
|
||||
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
|
||||
|
|
@ -84,30 +93,33 @@ INTERNET-DRAFT draft-zeilenga-ldap-incr-00.txt 17 October 2004
|
|||
|
||||
This document extends the LDAP Modify request to support a increment
|
||||
values capability. Implementations of this extension SHALL support an
|
||||
additional ModifyRequest operation enumeration value increment (3) as
|
||||
described herein. Implementations not supporting this extension will
|
||||
treat this value as they would an unlisted value, e.g., as a protocol
|
||||
error.
|
||||
|
||||
The increment (3) operation value specifies that an increment values
|
||||
modification is requested. All existing values of the modification
|
||||
attribute are to be incremented by the listed value. The modification
|
||||
attribute must be appropriate for request, e.g., must have INTEGER or
|
||||
other incrementable values, and the modification must provide one and
|
||||
only value.
|
||||
|
||||
Servers supporting this feature SHOULD publish the object identifier
|
||||
(OID) OID-TBD as a value of the 'supportedFeatures' [RFC3674]
|
||||
attribute in the root DSE. Clients supporting this feature SHOULD NOT
|
||||
use the feature unless they have knowledge the server supports it.
|
||||
|
||||
additional ModifyRequest operation enumeration value increment (IANA-
|
||||
ASSIGNED-TYPE) as described herein. Implementations not supporting
|
||||
this extension will treat this value as they would an unlisted value,
|
||||
e.g., as a protocol error.
|
||||
|
||||
The increment (IANA-ASSIGNED-TYPE) operation value specifies that an
|
||||
increment values modification is requested. All existing values of
|
||||
the modification attribute are to be incremented by the listed value.
|
||||
The modification attribute must be appropriate for request, e.g., must
|
||||
have INTEGER or other increment-able values, and the modification must
|
||||
provide one and only value. If the attribute is not appropriate for
|
||||
the request, a constraintViolation or other appropriate error is to be
|
||||
returned. If multiple values are provided, a protocolError is to be
|
||||
returned.
|
||||
|
||||
|
||||
|
||||
Zeilenga LDAP Modify-Increment Extension [Page 2]
|
||||
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-incr-00.txt 17 October 2004
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-incr-01.txt 10 February 2005
|
||||
|
||||
|
||||
Servers supporting this feature SHOULD publish the object identifier
|
||||
(OID) IANA-ASSIGNED-OID as a value of the 'supportedFeatures'
|
||||
[RFC3674] attribute in the root DSE. Clients supporting this feature
|
||||
SHOULD NOT use the feature unless they have knowledge the server
|
||||
supports it.
|
||||
|
||||
|
||||
3. LDIF Support
|
||||
|
|
@ -144,11 +156,38 @@ INTERNET-DRAFT draft-zeilenga-ldap-incr-00.txt 17 October 2004
|
|||
|
||||
5. IANA Considerations
|
||||
|
||||
Registration of the LDAP Protocol Mechanism [BCP64bis] defined in
|
||||
document is requested.
|
||||
Registration of the following values [BCP64bis] is requested.
|
||||
|
||||
|
||||
5.1. Object Identifier
|
||||
|
||||
It is requested that IANA assign an LDAP Object Identifier to identify
|
||||
the LDAP Modify-Increment feature as defined in this document.
|
||||
|
||||
|
||||
|
||||
Zeilenga LDAP Modify-Increment Extension [Page 3]
|
||||
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-incr-01.txt 10 February 2005
|
||||
|
||||
|
||||
Subject: Request for LDAP Object Identifier Registration
|
||||
Person & email address to contact for further information:
|
||||
Kurt Zeilenga <kurt@OpenLDAP.org>
|
||||
Specification: RFC XXXX
|
||||
Author/Change Controller: Author
|
||||
Comments:
|
||||
Identifies the LDAP Modify-Increment feature
|
||||
|
||||
|
||||
|
||||
5.2. LDAP Protocol Mechanism
|
||||
|
||||
It is requested that the following LDAP Protocol Mechanism be
|
||||
registered.
|
||||
|
||||
Subject: Request for LDAP Protocol Mechanism Registration
|
||||
Object Identifier: OID-TBD
|
||||
Object Identifier: IANA-ASSIGNED-OID
|
||||
Description: Modify-Increment
|
||||
Person & email address to contact for further information:
|
||||
Kurt Zeilenga <kurt@openldap.org>
|
||||
|
|
@ -158,12 +197,20 @@ INTERNET-DRAFT draft-zeilenga-ldap-incr-00.txt 17 October 2004
|
|||
Comments: none
|
||||
|
||||
|
||||
5.3. LDAP Protocol Mechanism
|
||||
|
||||
It is requested that IANA assign an LDAP ModifyRequest Operation Type
|
||||
[BCP64bis] for use in this document.
|
||||
|
||||
|
||||
Zeilenga LDAP Modify-Increment Extension [Page 3]
|
||||
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-incr-00.txt 17 October 2004
|
||||
Subject: Request for LDAP Protocol Mechanism Registration
|
||||
ModifyRequest Operation Name: increment
|
||||
Description: Modify-Increment
|
||||
Person & email address to contact for further information:
|
||||
Kurt Zeilenga <kurt@openldap.org>
|
||||
Usage: Feature
|
||||
Specification: RFC XXXX
|
||||
Author/Change Controller: Kurt Zeilenga <kurt@openldap.org>
|
||||
Comments: none
|
||||
|
||||
|
||||
6. Author's Address
|
||||
|
|
@ -173,7 +220,21 @@ INTERNET-DRAFT draft-zeilenga-ldap-incr-00.txt 17 October 2004
|
|||
<Kurt@OpenLDAP.org>
|
||||
|
||||
|
||||
7. Normative References
|
||||
|
||||
|
||||
Zeilenga LDAP Modify-Increment Extension [Page 4]
|
||||
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-incr-01.txt 10 February 2005
|
||||
|
||||
|
||||
7. References
|
||||
|
||||
[[Note to the RFC Editor: please replace the citation tags used in
|
||||
referencing Internet-Drafts with tags of the form RFCnnnn where
|
||||
possible.]]
|
||||
|
||||
|
||||
7.1. Normative References
|
||||
|
||||
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
|
||||
Requirement Levels", BCP 14 (also RFC 2119), March 1997.
|
||||
|
|
@ -195,16 +256,16 @@ INTERNET-DRAFT draft-zeilenga-ldap-incr-00.txt 17 October 2004
|
|||
draft-ietf-ldapbis-protocol-xx.txt, a work in progress.
|
||||
|
||||
|
||||
8. Informative References
|
||||
7.2. Informative References
|
||||
|
||||
[BCP64bis] Zeilenga, K., "IANA Considerations for LDAP",
|
||||
draft-ietf-ldapbis-bcp64-xx.txt, a work in progress.
|
||||
|
||||
[READENTRY] Zeilenga, K., "LDAP Read Entry Controls",
|
||||
[ReadEntry] Zeilenga, K., "LDAP Read Entry Controls",
|
||||
draft-zeilenga-ldap-readentry-xx.txt, a work in
|
||||
progress.
|
||||
|
||||
[ASSERT] Zeilenga, K., "LDAP Assertion Control",
|
||||
[Assertion] Zeilenga, K., "LDAP Assertion Control",
|
||||
draft-zeilenga-ldap-assert-xx.txt, a work in progress.
|
||||
|
||||
[ASSIGN] OpenLDAP Foundation, "OpenLDAP OID Delegations",
|
||||
|
|
@ -217,9 +278,9 @@ INTERNET-DRAFT draft-zeilenga-ldap-incr-00.txt 17 October 2004
|
|||
|
||||
|
||||
|
||||
Zeilenga LDAP Modify-Increment Extension [Page 4]
|
||||
Zeilenga LDAP Modify-Increment Extension [Page 5]
|
||||
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-incr-00.txt 17 October 2004
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-incr-01.txt 10 February 2005
|
||||
|
||||
|
||||
Intellectual Property Rights
|
||||
|
|
@ -250,7 +311,7 @@ Intellectual Property Rights
|
|||
|
||||
Full Copyright
|
||||
|
||||
Copyright (C) The Internet Society (2004). This document is subject
|
||||
Copyright (C) The Internet Society (2005). This document is subject
|
||||
to the rights, licenses and restrictions contained in BCP 78, and
|
||||
except as set forth therein, the authors retain all their rights.
|
||||
|
||||
|
|
@ -273,6 +334,7 @@ Full Copyright
|
|||
|
||||
|
||||
|
||||
Zeilenga LDAP Modify-Increment Extension [Page 5]
|
||||
Zeilenga LDAP Modify-Increment Extension [Page 6]
|
||||
|
||||
|
||||
|
||||
|
|
|
|||
|
|
@ -3,14 +3,15 @@
|
|||
|
||||
|
||||
|
||||
|
||||
INTERNET-DRAFT Kurt D. Zeilenga
|
||||
Intended Category: Standard Track OpenLDAP Foundation
|
||||
Expires in six months 10 February 2005
|
||||
Expires in six months 28 October 2005
|
||||
|
||||
|
||||
|
||||
The LDAP No-Op Control
|
||||
<draft-zeilenga-ldap-noop-06.txt>
|
||||
<draft-zeilenga-ldap-noop-07.txt>
|
||||
|
||||
|
||||
Status of this Memo
|
||||
|
|
@ -22,11 +23,10 @@ Status of this Memo
|
|||
Extensions mailing list <ldapext@ietf.org>. Please send editorial
|
||||
comments directly to the author <Kurt@OpenLDAP.org>.
|
||||
|
||||
By submitting this Internet-Draft, I accept the provisions of Section
|
||||
4 of RFC 3667. By submitting this Internet-Draft, I certify that any
|
||||
applicable patent or other IPR claims of which I am aware have been
|
||||
disclosed, or will be disclosed, and any of which I become aware will
|
||||
be disclosed, in accordance with RFC 3668.
|
||||
By submitting this Internet-Draft, each author represents that any
|
||||
applicable patent or other IPR claims of which he or she is aware have
|
||||
been or will be disclosed, and any of which he or she becomes aware
|
||||
will be disclosed, in accordance with Section 6 of BCP 79.
|
||||
|
||||
Internet-Drafts are working documents of the Internet Engineering Task
|
||||
Force (IETF), its areas, and its working groups. Note that other
|
||||
|
|
@ -54,9 +54,10 @@ Status of this Memo
|
|||
|
||||
|
||||
|
||||
|
||||
Zeilenga LDAP No-Op Control [Page 1]
|
||||
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-noop-06 10 February 2005
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-noop-07 28 October 2005
|
||||
|
||||
|
||||
Abstract
|
||||
|
|
@ -81,8 +82,8 @@ Abstract
|
|||
[Roadmap] No-Op control extension. The presence of the No-Op control
|
||||
in an operation request message disables its normal effect upon the
|
||||
directory which operation would otherwise have. Instead of updating
|
||||
the directory and return the normal indication of success, the server
|
||||
does not update the directory and indicates so by returning the
|
||||
the directory and returning the normal indication of success, the
|
||||
server does not update the directory and indicates so by returning the
|
||||
noOperation resultCode (introduced below).
|
||||
|
||||
For example, when the No-Op control is present in a LDAP modify
|
||||
|
|
@ -112,7 +113,7 @@ Abstract
|
|||
|
||||
Zeilenga LDAP No-Op Control [Page 2]
|
||||
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-noop-06 10 February 2005
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-noop-07 28 October 2005
|
||||
|
||||
|
||||
2. No-Op Control
|
||||
|
|
@ -139,6 +140,8 @@ INTERNET-DRAFT draft-zeilenga-ldap-noop-06 10 February 2005
|
|||
reason indicated by the result code. A result code of noOperation
|
||||
(IANA-ASSIGNED-CODE) indicates that the server discovered no reason
|
||||
why the operation would fail if submitted without the No-Op control.
|
||||
It is noted that there may be reasons why the operation may fail which
|
||||
are only discoverable when submitting without the No-Op control.
|
||||
|
||||
Servers SHOULD indicate their support for this control by providing
|
||||
IANA-ASSIGNED-OID as a value of the 'supportedControl' attribute type
|
||||
|
|
@ -161,16 +164,16 @@ INTERNET-DRAFT draft-zeilenga-ldap-noop-06 10 February 2005
|
|||
[Roadmap].
|
||||
|
||||
|
||||
4. IANA Considerations
|
||||
|
||||
|
||||
|
||||
|
||||
Zeilenga LDAP No-Op Control [Page 3]
|
||||
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-noop-06 10 February 2005
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-noop-07 28 October 2005
|
||||
|
||||
|
||||
4. IANA Considerations
|
||||
|
||||
4.1. Object Identifier
|
||||
|
||||
It is requested that IANA assign an LDAP Object Identifier [BCP64bis]
|
||||
|
|
@ -218,13 +221,14 @@ INTERNET-DRAFT draft-zeilenga-ldap-noop-06 10 February 2005
|
|||
Kurt D. Zeilenga
|
||||
OpenLDAP Foundation
|
||||
|
||||
Email: Kurt@OpenLDAP.org
|
||||
|
||||
|
||||
|
||||
Zeilenga LDAP No-Op Control [Page 4]
|
||||
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-noop-06 10 February 2005
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-noop-07 28 October 2005
|
||||
|
||||
|
||||
Email: Kurt@OpenLDAP.org
|
||||
|
||||
|
||||
6. References
|
||||
|
|
@ -272,17 +276,17 @@ INTERNET-DRAFT draft-zeilenga-ldap-noop-06 10 February 2005
|
|||
Intellectual Property Rights
|
||||
|
||||
The IETF takes no position regarding the validity or scope of any
|
||||
Intellectual Property Rights or other rights that might be claimed to
|
||||
pertain to the implementation or use of the technology described in
|
||||
this document or the extent to which any license under such rights
|
||||
|
||||
|
||||
|
||||
Zeilenga LDAP No-Op Control [Page 5]
|
||||
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-noop-06 10 February 2005
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-noop-07 28 October 2005
|
||||
|
||||
|
||||
Intellectual Property Rights or other rights that might be claimed to
|
||||
pertain to the implementation or use of the technology described in
|
||||
this document or the extent to which any license under such rights
|
||||
might or might not be available; nor does it represent that it has
|
||||
made any independent effort to identify any such rights. Information
|
||||
on the procedures with respect to rights in RFC documents can be found
|
||||
|
|
@ -305,9 +309,11 @@ INTERNET-DRAFT draft-zeilenga-ldap-noop-06 10 February 2005
|
|||
|
||||
Full Copyright
|
||||
|
||||
Copyright (C) The Internet Society (2005). This document is subject
|
||||
to the rights, licenses and restrictions contained in BCP 78, and
|
||||
except as set forth therein, the authors retain all their rights.
|
||||
Copyright (C) The Internet Society (2005).
|
||||
|
||||
This document is subject to the rights, licenses and restrictions
|
||||
contained in BCP 78, and except as set forth therein, the authors
|
||||
retain all their rights.
|
||||
|
||||
This document and the information contained herein are provided on an
|
||||
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
|
||||
|
|
@ -329,12 +335,5 @@ Full Copyright
|
|||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Zeilenga LDAP No-Op Control [Page 6]
|
||||
|
||||
|
||||
|
||||
|
|
|
|||
|
|
@ -3,21 +3,18 @@
|
|||
|
||||
|
||||
|
||||
|
||||
INTERNET-DRAFT Kurt D. Zeilenga
|
||||
Intended Category: Standard Track OpenLDAP Foundation
|
||||
Expires in six months 26 October 2003
|
||||
Expires in six months 10 February 2005
|
||||
|
||||
|
||||
|
||||
LDAP Read Entry Controls
|
||||
<draft-zeilenga-ldap-readentry-01.txt>
|
||||
<draft-zeilenga-ldap-readentry-04.txt>
|
||||
|
||||
|
||||
1. Status of this Memo
|
||||
|
||||
This document is an Internet-Draft and is in full conformance with all
|
||||
provisions of Section 10 of RFC2026.
|
||||
|
||||
This document is intended to be, after appropriate review and
|
||||
revision, submitted to the RFC Editor as a Standard Track document.
|
||||
Distribution of this memo is unlimited. Technical discussion of this
|
||||
|
|
@ -25,46 +22,59 @@ Expires in six months 26 October 2003
|
|||
<ldapext@ietf.org>. Please send editorial comments directly to the
|
||||
author <Kurt@OpenLDAP.org>.
|
||||
|
||||
By submitting this Internet-Draft, I accept the provisions of Section
|
||||
4 of RFC 3667. By submitting this Internet-Draft, I certify that any
|
||||
applicable patent or other IPR claims of which I am aware have been
|
||||
disclosed, or will be disclosed, and any of which I become aware will
|
||||
be disclosed, in accordance with RFC 3668.
|
||||
|
||||
Internet-Drafts are working documents of the Internet Engineering Task
|
||||
Force (IETF), its areas, and its working groups. Note that other
|
||||
Force (IETF), its areas, and its working groups. Note that other
|
||||
groups may also distribute working documents as Internet-Drafts.
|
||||
|
||||
Internet-Drafts are draft documents valid for a maximum of six months
|
||||
and may be updated, replaced, or obsoleted by other documents at any
|
||||
time. It is inappropriate to use Internet-Drafts as reference
|
||||
material or to cite them other than as ``work in progress.''
|
||||
time. It is inappropriate to use Internet-Drafts as reference material
|
||||
or to cite them other than as "work in progress."
|
||||
|
||||
The list of current Internet-Drafts can be accessed at
|
||||
<http://www.ietf.org/ietf/1id-abstracts.txt>. The list of
|
||||
Internet-Draft Shadow Directories can be accessed at
|
||||
<http://www.ietf.org/shadow.html>.
|
||||
http://www.ietf.org/1id-abstracts.html
|
||||
|
||||
Copyright (C) The Internet Society (2003). All Rights Reserved.
|
||||
The list of Internet-Draft Shadow Directories can be accessed at
|
||||
http://www.ietf.org/shadow.html
|
||||
|
||||
|
||||
Copyright (C) The Internet Society (2005). All Rights Reserved.
|
||||
|
||||
Please see the Full Copyright section near the end of this document
|
||||
for more information.
|
||||
|
||||
|
||||
Abstract
|
||||
|
||||
This specification describes controls which can be attached to a
|
||||
Lightweight Directory Access Protocol (LDAP) update request to obtain
|
||||
copies of the target entry before and/or after the requested update is
|
||||
applied.
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Zeilenga LDAP Read Entry Controls [Page 1]
|
||||
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-readentry-01 26 October 2003
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-readentry-04 10 February 2005
|
||||
|
||||
|
||||
Abstract
|
||||
|
||||
This document specifies an extension to the Lightweight Directory
|
||||
Access Protocol (LDAP) to allow the client to read the target entry of
|
||||
an update operation. The client may request to read the entry before
|
||||
and/or after the modifications are applied. These reads are done as
|
||||
an atomic part of the update operation.
|
||||
|
||||
|
||||
1. Background and Intent of Use
|
||||
|
||||
This specification describes controls [RFC2251] which can be attached
|
||||
to Lightweight Directory Access Protocol (LDAP) [RFC3377] update
|
||||
requests to request and return copies of the target entry. One
|
||||
This document specifies an extension to the Lightweight Directory
|
||||
Access Protocol (LDAP) [Roadmap] to allow the client to read the
|
||||
target entry of an update operation (e.g., Add, Delete, Modify,
|
||||
ModifyDN). The extension utilizes controls [Protocol] attached to
|
||||
update requests to request and return copies of the target entry. One
|
||||
request control, called the Pre-Read request control, indicates that a
|
||||
copy of the entry before application of update is to be returned.
|
||||
Another control, called the Post-Read request control, indicates that
|
||||
|
|
@ -72,6 +82,9 @@ INTERNET-DRAFT draft-zeilenga-ldap-readentry-01 26 October 2003
|
|||
Each request control has a corresponding response control used to
|
||||
return the entry.
|
||||
|
||||
To ensure proper isolation, the controls are processed as an atomic
|
||||
part of the update operation.
|
||||
|
||||
The functionality offered by these controls is based upon similar
|
||||
functionality in the X.500 Directory Access Protocol (DAP) [X.511].
|
||||
|
||||
|
|
@ -79,8 +92,8 @@ INTERNET-DRAFT draft-zeilenga-ldap-readentry-01 26 October 2003
|
|||
of modified attributes or a copy of the entry being deleted.
|
||||
|
||||
The Post-Read controls may be used to obtain values of operational
|
||||
attributes, such as the 'entryUUID' [EntryUUID] and 'modifytimestamp'
|
||||
[RFC2252] attributes, updated by the server as part of the update
|
||||
attributes, such as the 'entryUUID' [EntryUUID] and 'modifyTimestamp'
|
||||
[Models] attributes, updated by the server as part of the update
|
||||
operation.
|
||||
|
||||
|
||||
|
|
@ -89,12 +102,19 @@ INTERNET-DRAFT draft-zeilenga-ldap-readentry-01 26 October 2003
|
|||
Protocol elements are described using ASN.1 [X.680] with implicit
|
||||
tags. The term "BER-encoded" means the element is to be encoded using
|
||||
the Basic Encoding Rules [X.690] under the restrictions detailed in
|
||||
Section 5.1 of [RFC2251].
|
||||
Section 5.2 of [Protocol].
|
||||
|
||||
DN stands for Distinguished Name.
|
||||
DSA stands for Directory System Agent (i.e., a directory server).
|
||||
DSE stands for DSA-specific Entry.
|
||||
|
||||
|
||||
|
||||
Zeilenga LDAP Read Entry Controls [Page 2]
|
||||
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-readentry-04 10 February 2005
|
||||
|
||||
|
||||
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
|
||||
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
|
||||
document are to be interpreted as described in BCP 14 [RFC2119].
|
||||
|
|
@ -107,38 +127,26 @@ INTERNET-DRAFT draft-zeilenga-ldap-readentry-01 26 October 2003
|
|||
The Pre-Read request and response controls are identified by the
|
||||
IANA-ASSIGNED-OID.1 object identifier. Servers implementing these
|
||||
controls SHOULD publish IANA-ASSIGNED-OID.1 as a value of the
|
||||
'supportedControl' [RFC2252] in their root DSE.
|
||||
'supportedControl' [Models] in their root DSE.
|
||||
|
||||
|
||||
|
||||
Zeilenga LDAP Read Entry Controls [Page 2]
|
||||
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-readentry-01 26 October 2003
|
||||
|
||||
|
||||
The Pre-Read request control is an LDAP Control [RFC2251] whose
|
||||
controlType is IANA-ASSIGNED-OID.1 and controlValue is a BER-encoded
|
||||
AttributeDescriptionList [RFC2251]. The criticality may be TRUE or
|
||||
FALSE. This control is appropriate for the modifyRequest, delRequest,
|
||||
and modDNRequest LDAP messages.
|
||||
The Pre-Read request control is an LDAP Control [Protocol] whose
|
||||
controlType is IANA-ASSIGNED-OID.1 and whose controlValue is a
|
||||
BER-encoded AttributeSelection [Protocol], as extended by [RFC3673].
|
||||
The criticality may be TRUE or FALSE. This control is appropriate for
|
||||
the modifyRequest, delRequest, and modDNRequest LDAP messages.
|
||||
|
||||
The corresponding response control is a LDAP Control whose controlType
|
||||
is IANA-ASSIGNED-OID.1 and the controlValue, an OCTET STRING, contains
|
||||
a BER-encoded SearchResultEntry. The criticality may be TRUE or
|
||||
FALSE. This control is appropriate for the modifyResponse,
|
||||
is IANA-ASSIGNED-OID.1 and whose the controlValue, an OCTET STRING,
|
||||
contains a BER-encoded SearchResultEntry. The criticality may be TRUE
|
||||
or FALSE. This control is appropriate for the modifyResponse,
|
||||
delResponse, and modDNResponse LDAP messages with a resultCode of
|
||||
success (0).
|
||||
|
||||
When the request control is attached to an appropriate update LDAP
|
||||
request, the control requests the return of a copy of target entry
|
||||
prior to the application of the update. The AttributeDescriptionList
|
||||
indicates which attributes are requested to appear in the copy. There
|
||||
are two special AttributeDescriptions which may be included in the
|
||||
list, "*" and "+". "*" requests all user attributes. "+" requests
|
||||
all operational attributes. If the list is empty, all user attributes
|
||||
are requested. If the list contains an unrecognized attribute type,
|
||||
that type is simply ignored. If all attribute types are unrecognized,
|
||||
no attributes are to be returned. The server is to return a
|
||||
prior to the application of the update. The AttributeSelection
|
||||
indicates, as discussed in [Protocol][RFC3673] which attributes are
|
||||
requested to appear in the copy. The server is to return a
|
||||
SearchResultEntry containing, subject to access controls and other
|
||||
constraints, values of the requested attributes.
|
||||
|
||||
|
|
@ -146,7 +154,8 @@ INTERNET-DRAFT draft-zeilenga-ldap-readentry-01 26 October 2003
|
|||
this control MUST be performed as one atomic action isolated from
|
||||
other update operations.
|
||||
|
||||
If the update operation fails, no response control is provided.
|
||||
If the update operation fails (in either normal or control
|
||||
processing), no response control is provided.
|
||||
|
||||
|
||||
3.2. The Post-Read Controls
|
||||
|
|
@ -154,38 +163,34 @@ INTERNET-DRAFT draft-zeilenga-ldap-readentry-01 26 October 2003
|
|||
The Post-Read request and response controls are identified by the
|
||||
IANA-ASSIGNED-OID.2 object identifier. Servers implementing these
|
||||
controls SHOULD publish IANA-ASSIGNED-OID.2 as a value of the
|
||||
'supportedControl' [RFC2252] in their root DSE.
|
||||
|
||||
The Post-Read request control is an LDAP Control [RFC2251] whose
|
||||
controlType is IANA-ASSIGNED-OID.2 and controlValue, an OCTET STRING,
|
||||
contains a BER-encoded AttributeDescriptionList [RFC2251]. The
|
||||
criticality may be TRUE or FALSE. This control is appropriate for the
|
||||
addRequest, modifyRequest, and modDNRequest LDAP messages.
|
||||
|
||||
The corresponding response control is a LDAP Control whose controlType
|
||||
is IANA-ASSIGNED-OID.2 and controlValue is a BER-encoded
|
||||
|
||||
|
||||
|
||||
Zeilenga LDAP Read Entry Controls [Page 3]
|
||||
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-readentry-01 26 October 2003
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-readentry-04 10 February 2005
|
||||
|
||||
|
||||
'supportedControl' [Models] in their root DSE.
|
||||
|
||||
The Post-Read request control is an LDAP Control [Protocol] whose
|
||||
controlType is IANA-ASSIGNED-OID.2 and whose controlValue, an OCTET
|
||||
STRING, contains a BER-encoded AttributeSelection [Protocol], as
|
||||
extended by [RFC3673]. The criticality may be TRUE or FALSE. This
|
||||
control is appropriate for the addRequest, modifyRequest, and
|
||||
modDNRequest LDAP messages.
|
||||
|
||||
The corresponding response control is a LDAP Control whose controlType
|
||||
is IANA-ASSIGNED-OID.2 and whose controlValue is a BER-encoded
|
||||
SearchResultEntry. The criticality may be TRUE or FALSE. This
|
||||
control is appropriate for the addResponse, modifyResponse, and
|
||||
modDNResponse LDAP messages with a resultCode of success (0).
|
||||
|
||||
When the request control is attached to an appropriate update LDAP
|
||||
request, the control requests the return of a copy of target entry
|
||||
after the application of the update. The AttributeDescriptionList
|
||||
indicates which attributes are requested to appear in the copy. There
|
||||
are two special AttributeDescriptions which may be included in the
|
||||
list, "*" and "+". "*" requests all user attributes. "+" requests
|
||||
all operational attributes. If the list is empty, all user attributes
|
||||
are requested. If the list contains an unrecognized attribute type,
|
||||
that type is simply ignored. If all attribute types are unrecognized,
|
||||
no attributes are to be returned. The server is to return a
|
||||
after the application of the update. The AttributeSelection
|
||||
indicates, as discussed in [Protocol][RFC3673], which attributes are
|
||||
requested to appear in the copy. The server is to return a
|
||||
SearchResultEntry containing, subject to access controls and other
|
||||
constraints, values of the requested attributes.
|
||||
|
||||
|
|
@ -193,18 +198,18 @@ INTERNET-DRAFT draft-zeilenga-ldap-readentry-01 26 October 2003
|
|||
this control MUST be performed as one atomic action isolated from
|
||||
other update operations.
|
||||
|
||||
If the update operation fails, no response control is provided.
|
||||
If the update operation fails (in either normal or control
|
||||
processing), no response control is provided.
|
||||
|
||||
|
||||
4. Interaction with other controls
|
||||
|
||||
The Pre- and Post-Read controls may be combined with each other and/or
|
||||
with a variety of other controls. When combined with the assertion
|
||||
control [ASSERT], the manageDsaIT control [RFC3296], and/or the proxy
|
||||
authorization control [PROXYAUTH], the semantics of each control
|
||||
included in the combination apply. The Pre- and Post-Read controls
|
||||
may be combined with other controls as detailed in other technical
|
||||
specifications.
|
||||
The Pre-Read and Post-Read controls may be combined with each other
|
||||
and/or with a variety of other controls. When combined with the
|
||||
assertion control [Assertion] and/or the manageDsaIT control
|
||||
[RFC3296], the semantics of each control included in the combination
|
||||
apply. The Pre-Read and Post-Read controls may be combined with other
|
||||
controls as detailed in other technical specifications.
|
||||
|
||||
|
||||
5. Security Considerations
|
||||
|
|
@ -215,20 +220,21 @@ INTERNET-DRAFT draft-zeilenga-ldap-readentry-01 26 October 2003
|
|||
control in addition to ensuring the client is authorized to perform
|
||||
the requested directory update.
|
||||
|
||||
Implementors of this (or any) LDAP extension should be familiar with
|
||||
general LDAP security considerations [RFC3377].
|
||||
|
||||
|
||||
6. IANA Considerations
|
||||
|
||||
|
||||
|
||||
Zeilenga LDAP Read Entry Controls [Page 4]
|
||||
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-readentry-01 26 October 2003
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-readentry-04 10 February 2005
|
||||
|
||||
|
||||
Registration of the following protocol values [RFC3383] is requested.
|
||||
Security considerations for the update operations [Protocol] extended
|
||||
by this control, as well as general LDAP security considerations
|
||||
[Roadmap], generally apply to implementation and use of this extension
|
||||
|
||||
|
||||
6. IANA Considerations
|
||||
|
||||
Registration of the following protocol values [BCP64bis] is requested.
|
||||
|
||||
|
||||
6.1. Object Identifier
|
||||
|
|
@ -269,47 +275,55 @@ INTERNET-DRAFT draft-zeilenga-ldap-readentry-01 26 October 2003
|
|||
Usage: Control
|
||||
Specification: RFC XXXX
|
||||
Author/Change Controller: IESG
|
||||
Comments: none
|
||||
in 2
|
||||
|
||||
|
||||
7. Acknowledgment
|
||||
|
||||
The LDAP Pre- and Post-Read controls are modeled after similar
|
||||
|
||||
|
||||
|
||||
Zeilenga LDAP Read Entry Controls [Page 5]
|
||||
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-readentry-01 26 October 2003
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-readentry-04 10 February 2005
|
||||
|
||||
|
||||
capabilities offered in the DAP [X.511].
|
||||
Comments: none
|
||||
|
||||
|
||||
8. Normative References
|
||||
7. Acknowledgment
|
||||
|
||||
The LDAP Pre-Read and Post-Read controls are modeled after similar
|
||||
capabilities offered in the DAP [X.511].
|
||||
|
||||
|
||||
8. References
|
||||
|
||||
[[Note to the RFC Editor: please replace the citation tags used in
|
||||
referencing Internet-Drafts with tags of the form RFCnnnn where
|
||||
possible.]]
|
||||
|
||||
|
||||
8.1. Normative References
|
||||
|
||||
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
|
||||
Requirement Levels", BCP 14 (also RFC 2119), March 1997.
|
||||
|
||||
[RFC2251] Wahl, M., T. Howes and S. Kille, "Lightweight Directory
|
||||
Access Protocol (v3)", RFC 2251, December 1997.
|
||||
[Roadmap] Zeilenga, K. (editor), "LDAP: Technical Specification
|
||||
Road Map", draft-ietf-ldapbis-roadmap-xx.txt, a work in
|
||||
progress.
|
||||
|
||||
[RFC2252] Wahl, M., A. Coulbeck, T. Howes, and S. Kille,
|
||||
"Lightweight Directory Access Protocol (v3): Attribute
|
||||
Syntax Definitions", RFC 2252, December 1997.
|
||||
[Protocol] Sermersheim, J. (editor), "LDAP: The Protocol",
|
||||
draft-ietf-ldapbis-protocol-xx.txt, a work in progress.
|
||||
|
||||
[RFC2830] Hodges, J., R. Morgan, and M. Wahl, "Lightweight
|
||||
Directory Access Protocol (v3): Extension for Transport
|
||||
Layer Security", RFC 2830, May 2000.
|
||||
[Models] Zeilenga, K. (editor), "LDAP: Directory Information
|
||||
Models", draft-ietf-ldapbis-models-xx.txt, a work in
|
||||
progress.
|
||||
|
||||
[RFC3296] Zeilenga, K., "Named Subordinate References in
|
||||
Lightweight Directory Access Protocol (LDAP)
|
||||
Directories", RFC 3296, July 2002.
|
||||
|
||||
[RFC3377] Hodges, J. and R. Morgan, "Lightweight Directory Access
|
||||
Protocol (v3): Technical Specification", RFC 3377,
|
||||
September 2002.
|
||||
[RFC3673] Zeilenga, K., "LDAPv3: All Operational Attributes", RFC
|
||||
3673, December 2003.
|
||||
|
||||
[Assertion] Zeilenga, K., "LDAP Assertion Control",
|
||||
draft-zeilenga-ldap-assert-xx.txt, a work in progress.
|
||||
|
||||
[X.680] International Telecommunication Union -
|
||||
Telecommunication Standardization Sector, "Abstract
|
||||
|
|
@ -317,106 +331,91 @@ INTERNET-DRAFT draft-zeilenga-ldap-readentry-01 26 October 2003
|
|||
Notation", X.680(1997) (also ISO/IEC 8824-1:1998).
|
||||
|
||||
[X.690] International Telecommunication Union -
|
||||
|
||||
|
||||
|
||||
Zeilenga LDAP Read Entry Controls [Page 6]
|
||||
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-readentry-04 10 February 2005
|
||||
|
||||
|
||||
Telecommunication Standardization Sector, "Specification
|
||||
of ASN.1 encoding rules: Basic Encoding Rules (BER),
|
||||
Canonical Encoding Rules (CER), and Distinguished
|
||||
Encoding Rules (DER)", X.690(1997) (also ISO/IEC
|
||||
8825-1:1998).
|
||||
|
||||
[PROXYAUTH] Weltman, R., "LDAP Proxy Authentication Control", draft-
|
||||
weltman-ldapv3-proxy-xx.txt, a work in progress.
|
||||
|
||||
[ASSERT] Zeilenga, K., "LDAP Assertion Control",
|
||||
draft-zeilenga-ldap-assert-xx.txt, a work in progress.
|
||||
8.2. Informative References
|
||||
|
||||
|
||||
9. Informative References
|
||||
|
||||
|
||||
|
||||
|
||||
Zeilenga LDAP Read Entry Controls [Page 6]
|
||||
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-readentry-01 26 October 2003
|
||||
|
||||
|
||||
[RFC3383] Zeilenga, K., "IANA Considerations for LDAP", BCP 64
|
||||
(also RFC 3383), September 2002.
|
||||
|
||||
[X.511] International Telecommunication Union -
|
||||
Telecommunication Standardization Sector, "The
|
||||
Directory: Abstract Service Definition", X.511(1993).
|
||||
[BCP64bis] Zeilenga, K., "IANA Considerations for LDAP",
|
||||
draft-ietf-ldapbis-bcp64-xx.txt, a work in progress.
|
||||
|
||||
[EntryUUID] Zeilenga, K., "The LDAP EntryUUID Operational
|
||||
Attribute", draft-zeilenga-ldap-uuid-xx.txt, a work in
|
||||
progress.
|
||||
|
||||
[X.511] International Telecommunication Union -
|
||||
Telecommunication Standardization Sector, "The
|
||||
Directory: Abstract Service Definition", X.511(1993)
|
||||
(also ISO/IEC 9594-3:1993).
|
||||
|
||||
|
||||
10. Author's Address
|
||||
|
||||
Kurt D. Zeilenga
|
||||
OpenLDAP Foundation
|
||||
<Kurt@OpenLDAP.org>
|
||||
|
||||
Email: Kurt@OpenLDAP.org
|
||||
|
||||
|
||||
|
||||
Intellectual Property Rights
|
||||
|
||||
The IETF takes no position regarding the validity or scope of any
|
||||
intellectual property or other rights that might be claimed to pertain
|
||||
to the implementation or use of the technology described in this
|
||||
document or the extent to which any license under such rights might or
|
||||
might not be available; neither does it represent that it has made any
|
||||
effort to identify any such rights. Information on the IETF's
|
||||
procedures with respect to rights in standards-track and
|
||||
standards-related documentation can be found in BCP-11. Copies of
|
||||
claims of rights made available for publication and any assurances of
|
||||
licenses to be made available, or the result of an attempt made to
|
||||
obtain a general license or permission for the use of such proprietary
|
||||
rights by implementors or users of this specification can be obtained
|
||||
from the IETF Secretariat.
|
||||
|
||||
The IETF invites any interested party to bring to its attention any
|
||||
copyrights, patents or patent applications, or other proprietary
|
||||
rights which may cover technology that may be required to practice
|
||||
this standard. Please address the information to the IETF Executive
|
||||
Director.
|
||||
|
||||
|
||||
|
||||
Full Copyright
|
||||
|
||||
Copyright (C) The Internet Society (2003). All Rights Reserved.
|
||||
Intellectual Property Rights or other rights that might be claimed to
|
||||
pertain to the implementation or use of the technology described in
|
||||
this document or the extent to which any license under such rights
|
||||
might or might not be available; nor does it represent that it has
|
||||
made any independent effort to identify any such rights. Information
|
||||
on the procedures with respect to rights in RFC documents can be found
|
||||
in BCP 78 and BCP 79.
|
||||
|
||||
Copies of IPR disclosures made to the IETF Secretariat and any
|
||||
assurances of licenses to be made available, or the result of an
|
||||
attempt made to obtain a general license or permission for the use of
|
||||
such proprietary rights by implementers or users of this specification
|
||||
can be obtained from the IETF on-line IPR repository at
|
||||
http://www.ietf.org/ipr.
|
||||
|
||||
|
||||
|
||||
Zeilenga LDAP Read Entry Controls [Page 7]
|
||||
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-readentry-01 26 October 2003
|
||||
|
||||
|
||||
This document and translations of it may be copied and furnished to
|
||||
others, and derivative works that comment on or otherwise explain it
|
||||
or assist in its implmentation may be prepared, copied, published and
|
||||
distributed, in whole or in part, without restriction of any kind,
|
||||
provided that the above copyright notice and this paragraph are
|
||||
included on all such copies and derivative works. However, this
|
||||
document itself may not be modified in any way, such as by removing
|
||||
the copyright notice or references to the Internet Society or other
|
||||
Internet organizations, except as needed for the purpose of
|
||||
developing Internet standards in which case the procedures for
|
||||
copyrights defined in the Internet Standards process must be followed,
|
||||
or as required to translate it into languages other than English.
|
||||
|
||||
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-readentry-04 10 February 2005
|
||||
|
||||
|
||||
The IETF invites any interested party to bring to its attention any
|
||||
copyrights, patents or patent applications, or other proprietary
|
||||
rights that may cover technology that may be required to implement
|
||||
this standard. Please address the information to the IETF at
|
||||
ietf-ipr@ietf.org.
|
||||
|
||||
|
||||
|
||||
Full Copyright
|
||||
|
||||
Copyright (C) The Internet Society (2005). This document is subject
|
||||
to the rights, licenses and restrictions contained in BCP 78, and
|
||||
except as set forth therein, the authors retain all their rights.
|
||||
|
||||
This document and the information contained herein are provided on an
|
||||
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
|
||||
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
|
||||
ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
|
||||
INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
|
||||
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
|
||||
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
|
||||
|
||||
|
||||
|
||||
|
|
@ -449,3 +448,5 @@ INTERNET-DRAFT draft-zeilenga-ldap-readentry-01 26 October 2003
|
|||
|
||||
Zeilenga LDAP Read Entry Controls [Page 8]
|
||||
|
||||
|
||||
|
||||
|
|
|
|||
|
|
@ -3,22 +3,18 @@
|
|||
|
||||
|
||||
|
||||
|
||||
INTERNET-DRAFT Kurt D. Zeilenga
|
||||
Intended Category: Standard Track OpenLDAP Foundation
|
||||
Expires in six months 25 October 2003
|
||||
Expires in six months 10 February 2005
|
||||
|
||||
|
||||
|
||||
LDAP Absolute True and False Filters
|
||||
<draft-zeilenga-ldap-t-f-07.txt>
|
||||
<draft-zeilenga-ldap-t-f-10.txt>
|
||||
|
||||
|
||||
Status of this Memo
|
||||
|
||||
This document is an Internet-Draft and is in full conformance with all
|
||||
provisions of Section 10 of RFC2026.
|
||||
|
||||
This document is intended to be, after appropriate review and
|
||||
revision, submitted to the RFC Editor as a Standard Track document.
|
||||
Distribution of this memo is unlimited. Technical discussion of this
|
||||
|
|
@ -26,25 +22,43 @@ Status of this Memo
|
|||
<ldapext@ietf.org>. Please send editorial comments directly to the
|
||||
author <Kurt@OpenLDAP.org>.
|
||||
|
||||
By submitting this Internet-Draft, I accept the provisions of Section
|
||||
4 of RFC 3667. By submitting this Internet-Draft, I certify that any
|
||||
applicable patent or other IPR claims of which I am aware have been
|
||||
disclosed, or will be disclosed, and any of which I become aware will
|
||||
be disclosed, in accordance with RFC 3668.
|
||||
|
||||
Internet-Drafts are working documents of the Internet Engineering Task
|
||||
Force (IETF), its areas, and its working groups. Note that other
|
||||
Force (IETF), its areas, and its working groups. Note that other
|
||||
groups may also distribute working documents as Internet-Drafts.
|
||||
|
||||
Internet-Drafts are draft documents valid for a maximum of six months
|
||||
and may be updated, replaced, or obsoleted by other documents at any
|
||||
time. It is inappropriate to use Internet-Drafts as reference
|
||||
material or to cite them other than as ``work in progress.''
|
||||
time. It is inappropriate to use Internet-Drafts as reference material
|
||||
or to cite them other than as "work in progress."
|
||||
|
||||
The list of current Internet-Drafts can be accessed at
|
||||
<http://www.ietf.org/ietf/1id-abstracts.txt>. The list of
|
||||
Internet-Draft Shadow Directories can be accessed at
|
||||
<http://www.ietf.org/shadow.html>.
|
||||
http://www.ietf.org/1id-abstracts.html
|
||||
|
||||
Copyright (C) The Internet Society (2003). All Rights Reserved.
|
||||
The list of Internet-Draft Shadow Directories can be accessed at
|
||||
http://www.ietf.org/shadow.html
|
||||
|
||||
|
||||
Copyright (C) The Internet Society (2005). All Rights Reserved.
|
||||
|
||||
Please see the Full Copyright section near the end of this document
|
||||
for more information.
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Zeilenga LDAP True & False Filters [Page 1]
|
||||
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-t-f-10.txt 10 February 2005
|
||||
|
||||
|
||||
Abstract
|
||||
|
||||
This document extends the Lightweight Directory Access Protocol (LDAP)
|
||||
|
|
@ -54,12 +68,6 @@ Abstract
|
|||
these filters.
|
||||
|
||||
|
||||
|
||||
Zeilenga LDAP True & False Filters [Page 1]
|
||||
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-t-f-07.txt 25 October 2003
|
||||
|
||||
|
||||
1. Background
|
||||
|
||||
The X.500 Directory Access Protocol (DAP) [X.511] supports absolute
|
||||
|
|
@ -71,19 +79,22 @@ INTERNET-DRAFT draft-zeilenga-ldap-t-f-07.txt 25 October 2003
|
|||
|
||||
While LDAPv2 [RFC1777][RFC3494] placed no restriction on the number of
|
||||
elements in 'and' and 'or' filter sets, the LDAPv2 string
|
||||
representation [RFC1960] could not represent empty 'and' and 'or'
|
||||
filter sets. Due to this, absolute True or False filters were
|
||||
(unfortunately) eliminated from LDAPv3 [RFC3377].
|
||||
representation [RFC1960][RFC3494] could not represent empty 'and' and
|
||||
'or' filter sets. Due to this, absolute True or False filters were
|
||||
(unfortunately) eliminated from LDAPv3 [Roadmap].
|
||||
|
||||
This documents extends LDAPv3 to support absolute True and False
|
||||
matches by allowing empty 'and' and 'or' in Search filters [RFC2251]
|
||||
and extends the filter string representation [RFC2254] to allow empty
|
||||
filter lists.
|
||||
assertions by allowing empty 'and' and 'or' in Search filters
|
||||
[Protocol] and extends the filter string representation [Filters] to
|
||||
allow empty filter lists.
|
||||
|
||||
It is noted that certain search operations, such as those used to
|
||||
retrieve subschema information [Models], require use of particular
|
||||
filters. This document does not change these requirements.
|
||||
|
||||
This feature is intended to allow a more direct mapping between DAP
|
||||
and LDAP (as needed to implement DAP-to-LDAP gateways).
|
||||
|
||||
|
||||
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
|
||||
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
|
||||
document are to be interpreted as described in BCP 14 [RFC2119].
|
||||
|
|
@ -97,23 +108,22 @@ INTERNET-DRAFT draft-zeilenga-ldap-t-f-07.txt 25 October 2003
|
|||
An 'and' filter consisting of an empty set of filters SHALL evaluate
|
||||
to True. This filter is represented by the string "(&)".
|
||||
|
||||
An 'or' filter consisting of an empty set of filters SHALL evaluate to
|
||||
False. This filter is represented by the string "(|)".
|
||||
|
||||
Servers supporting this feature SHOULD publish the Object Identifier
|
||||
(OID) 1.3.6.1.4.1.4203.1.5.3 as a value of the 'supportedFeatures'
|
||||
[FEATURES] attribute in the root DSE.
|
||||
|
||||
Clients supporting this feature SHOULD NOT use the feature unless they
|
||||
have knowledge the server supports it.
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Zeilenga LDAP True & False Filters [Page 2]
|
||||
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-t-f-07.txt 25 October 2003
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-t-f-10.txt 10 February 2005
|
||||
|
||||
|
||||
An 'or' filter consisting of an empty set of filters SHALL evaluate to
|
||||
False. This filter is represented by the string "(|)".
|
||||
|
||||
Servers supporting this feature SHOULD publish the Object Identifier
|
||||
1.3.6.1.4.1.4203.1.5.3 as a value of the 'supportedFeatures' [RFC3674]
|
||||
attribute in the root DSE.
|
||||
|
||||
Clients supporting this feature SHOULD NOT use the feature unless they
|
||||
have knowledge the server supports it.
|
||||
|
||||
|
||||
3. Security Considerations
|
||||
|
|
@ -122,21 +132,16 @@ INTERNET-DRAFT draft-zeilenga-ldap-t-f-07.txt 25 October 2003
|
|||
believed to raise any new security considerations.
|
||||
|
||||
Implementors of this (or any) LDAPv3 extension should be familiar with
|
||||
general LDAPv3 security considerations [RFC3377].
|
||||
general LDAPv3 security considerations [Roadmap].
|
||||
|
||||
|
||||
4. IANA Considerations
|
||||
|
||||
The OID 1.3.6.1.4.1.4203.1.5.3 identifies the feature described above.
|
||||
This OID was assigned [ASSIGN] by OpenLDAP Foundation, under its
|
||||
IANA-assigned private enterprise allocation [PRIVATE], for use in this
|
||||
specification.
|
||||
|
||||
Registration of this feature is requested [FEATURES][RFC3383].
|
||||
Registration of this feature is requested [BCP64bis].
|
||||
|
||||
Subject: Request for LDAP Protocol Mechanism Registration
|
||||
Object Identifier: 1.3.6.1.4.1.4203.1.5.3
|
||||
Description: T/F Filters
|
||||
Description: True/False filters
|
||||
Person & email address to contact for further information:
|
||||
Kurt Zeilenga <kurt@openldap.org>
|
||||
Usage: Feature
|
||||
|
|
@ -144,6 +149,10 @@ INTERNET-DRAFT draft-zeilenga-ldap-t-f-07.txt 25 October 2003
|
|||
Author/Change Controller: IESG
|
||||
Comments: none
|
||||
|
||||
This OID was assigned [ASSIGN] by OpenLDAP Foundation, under its
|
||||
IANA-assigned private enterprise allocation [PRIVATE], for use in this
|
||||
specification.
|
||||
|
||||
|
||||
5. Author's Address
|
||||
|
||||
|
|
@ -152,34 +161,46 @@ INTERNET-DRAFT draft-zeilenga-ldap-t-f-07.txt 25 October 2003
|
|||
<Kurt@OpenLDAP.org>
|
||||
|
||||
|
||||
6. Normative References
|
||||
6. References
|
||||
|
||||
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
|
||||
Requirement Levels", BCP 14 (also RFC 2119), March 1997.
|
||||
|
||||
[RFC2251] Wahl, M., T. Howes and S. Kille, "Lightweight Directory
|
||||
Access Protocol (v3)", RFC 2251, December 1997.
|
||||
|
||||
[RFC2254] Howes, T., "A String Representation of LDAP Search
|
||||
Filters", RFC 2254, December 1997.
|
||||
|
||||
[RFC3377] Hodges, J. and R. Morgan, "Lightweight Directory Access
|
||||
|
||||
|
||||
|
||||
Zeilenga LDAP True & False Filters [Page 3]
|
||||
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-t-f-07.txt 25 October 2003
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-t-f-10.txt 10 February 2005
|
||||
|
||||
|
||||
Protocol (v3): Technical Specification", RFC 3377,
|
||||
September 2002.
|
||||
|
||||
[FEATURES] Zeilenga, K., "Feature Discovery in LDAP",
|
||||
draft-zeilenga-ldap-features-xx.txt, a work in progress.
|
||||
[[Note to the RFC Editor: please replace the citation tags used in
|
||||
referencing Internet-Drafts with tags of the form RFCnnnn where
|
||||
possible.]]
|
||||
|
||||
|
||||
7. Informative References
|
||||
6.1. Normative References
|
||||
|
||||
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
|
||||
Requirement Levels", BCP 14 (also RFC 2119), March 1997.
|
||||
|
||||
[Roadmap] Zeilenga, K. (editor), "LDAP: Technical Specification
|
||||
Road Map", draft-ietf-ldapbis-roadmap-xx.txt, a work in
|
||||
progress.
|
||||
|
||||
[Protocol] Sermersheim, J. (editor), "LDAP: The Protocol",
|
||||
draft-ietf-ldapbis-protocol-xx.txt, a work in progress.
|
||||
|
||||
[Models] Zeilenga, K. (editor), "LDAP: Directory Information
|
||||
Models", draft-ietf-ldapbis-models-xx.txt, a work in
|
||||
progress.
|
||||
|
||||
[Filters] Smith, M. (editor), LDAPbis WG, "LDAP: String
|
||||
Representation of Search Filters",
|
||||
draft-ietf-ldapbis-filter-xx.txt, a work in progress.
|
||||
|
||||
[Features] Zeilenga, K., "Feature Discovery in LDAP", RFC 3674,
|
||||
December 2003.
|
||||
|
||||
|
||||
6.2. Informative References
|
||||
|
||||
[RFC1777] Yeong, W., Howes, T., and S. Kille, "Lightweight
|
||||
Directory Access Protocol", RFC 1777, March 1995.
|
||||
|
|
@ -187,8 +208,8 @@ INTERNET-DRAFT draft-zeilenga-ldap-t-f-07.txt 25 October 2003
|
|||
[RFC1960] Howes, T., "A String Representation of LDAP Search
|
||||
Filters", RFC 1960, June 1996.
|
||||
|
||||
[RFC3383] Zeilenga, K., "IANA Considerations for LDAP", BCP 64
|
||||
(also RFC 3383), September 2002.
|
||||
[BCP64bis] Zeilenga, K., "IANA Considerations for LDAP",
|
||||
draft-ietf-ldapbis-bcp64-xx.txt, a work in progress.
|
||||
|
||||
[RFC3494] Zeilenga, K., "Lightweight Directory Access Protocol
|
||||
version 2 (LDAPv2) to Historic Status", RFC 3494, March
|
||||
|
|
@ -199,10 +220,22 @@ INTERNET-DRAFT draft-zeilenga-ldap-t-f-07.txt 25 October 2003
|
|||
-- Overview of concepts, models and services,"
|
||||
X.500(1993) (also ISO/IEC 9594-1:1994).
|
||||
|
||||
|
||||
|
||||
Zeilenga LDAP True & False Filters [Page 4]
|
||||
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-t-f-10.txt 10 February 2005
|
||||
|
||||
|
||||
[X.501] International Telecommunication Union -
|
||||
Telecommunication Standardization Sector, "The Directory
|
||||
-- Models," X.501(1993) (also ISO/IEC 9594-2:1994).
|
||||
|
||||
[X.511] International Telecommunication Union -
|
||||
Telecommunication Standardization Sector, "The
|
||||
Directory: Abstract Service Definition", X.511(1993)
|
||||
(also ISO/IEC 9594-3:1993).
|
||||
|
||||
[ASSIGN] OpenLDAP Foundation, "OpenLDAP OID Delegations",
|
||||
http://www.openldap.org/foundation/oid-delegate.txt.
|
||||
|
||||
|
|
@ -214,70 +247,94 @@ INTERNET-DRAFT draft-zeilenga-ldap-t-f-07.txt 25 October 2003
|
|||
Intellectual Property Rights
|
||||
|
||||
The IETF takes no position regarding the validity or scope of any
|
||||
intellectual property or other rights that might be claimed to pertain
|
||||
to the implementation or use of the technology described in this
|
||||
document or the extent to which any license under such rights might or
|
||||
might not be available; neither does it represent that it has made any
|
||||
effort to identify any such rights. Information on the IETF's
|
||||
procedures with respect to rights in standards-track and
|
||||
Intellectual Property Rights or other rights that might be claimed to
|
||||
pertain to the implementation or use of the technology described in
|
||||
this document or the extent to which any license under such rights
|
||||
might or might not be available; nor does it represent that it has
|
||||
made any independent effort to identify any such rights. Information
|
||||
on the procedures with respect to rights in RFC documents can be found
|
||||
in BCP 78 and BCP 79.
|
||||
|
||||
|
||||
|
||||
Zeilenga LDAP True & False Filters [Page 4]
|
||||
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-t-f-07.txt 25 October 2003
|
||||
|
||||
|
||||
standards-related documentation can be found in BCP-11. Copies of
|
||||
claims of rights made available for publication and any assurances of
|
||||
licenses to be made available, or the result of an attempt made to
|
||||
obtain a general license or permission for the use of such proprietary
|
||||
rights by implementors or users of this specification can be obtained
|
||||
from the IETF Secretariat.
|
||||
Copies of IPR disclosures made to the IETF Secretariat and any
|
||||
assurances of licenses to be made available, or the result of an
|
||||
attempt made to obtain a general license or permission for the use of
|
||||
such proprietary rights by implementers or users of this specification
|
||||
can be obtained from the IETF on-line IPR repository at
|
||||
http://www.ietf.org/ipr.
|
||||
|
||||
The IETF invites any interested party to bring to its attention any
|
||||
copyrights, patents or patent applications, or other proprietary
|
||||
rights which may cover technology that may be required to practice
|
||||
this standard. Please address the information to the IETF Executive
|
||||
Director.
|
||||
rights that may cover technology that may be required to implement
|
||||
this standard. Please address the information to the IETF at
|
||||
ietf-ipr@ietf.org.
|
||||
|
||||
|
||||
|
||||
Full Copyright
|
||||
|
||||
Copyright (C) The Internet Society (2003). All Rights Reserved.
|
||||
|
||||
This document and translations of it may be copied and furnished to
|
||||
others, and derivative works that comment on or otherwise explain it
|
||||
or assist in its implmentation may be prepared, copied, published and
|
||||
distributed, in whole or in part, without restriction of any kind,
|
||||
provided that the above copyright notice and this paragraph are
|
||||
included on all such copies and derivative works. However, this
|
||||
document itself may not be modified in any way, such as by removing
|
||||
the copyright notice or references to the Internet Society or other
|
||||
Internet organizations, except as needed for the purpose of
|
||||
developing Internet standards in which case the procedures for
|
||||
copyrights defined in the Internet Standards process must be followed,
|
||||
or as required to translate it into languages other than English.
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Copyright (C) The Internet Society (2005). This document is subject
|
||||
to the rights, licenses and restrictions contained in BCP 78, and
|
||||
except as set forth therein, the authors retain all their rights.
|
||||
|
||||
|
||||
|
||||
Zeilenga LDAP True & False Filters [Page 5]
|
||||
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-t-f-10.txt 10 February 2005
|
||||
|
||||
|
||||
This document and the information contained herein are provided on an
|
||||
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
|
||||
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
|
||||
ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
|
||||
INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
|
||||
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
|
||||
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Zeilenga LDAP True & False Filters [Page 6]
|
||||
|
||||
|
||||
|
||||
|
|
|
|||
|
|
@ -3,21 +3,19 @@
|
|||
|
||||
|
||||
|
||||
INTERNET-DRAFT Kurt D. Zeilenga
|
||||
|
||||
INTERNET-DRAFT Kurt D. Zeilenga
|
||||
Intended Category: Experimental OpenLDAP Foundation
|
||||
Expires in six months 8 February 2004
|
||||
Expires in six months 28 October 2005
|
||||
|
||||
|
||||
|
||||
LDAP Turn Operation
|
||||
<draft-zeilenga-ldap-turn-00.txt>
|
||||
<draft-zeilenga-ldap-turn-03.txt>
|
||||
|
||||
|
||||
1. Status of this Memo
|
||||
|
||||
This document is an Internet-Draft and is in full conformance with all
|
||||
provisions of Section 10 of RFC2026.
|
||||
|
||||
This document is intended to be, after appropriate review and
|
||||
revision, submitted to the RFC Editor for publication as an
|
||||
Experimental document. Distribution of this memo is unlimited.
|
||||
|
|
@ -25,20 +23,28 @@ Expires in six months 8 February 2004
|
|||
Extensions mailing list <ldapext@ietf.org>. Please send editorial
|
||||
comments directly to the author <Kurt@OpenLDAP.org>.
|
||||
|
||||
By submitting this Internet-Draft, each author represents that any
|
||||
applicable patent or other IPR claims of which he or she is aware have
|
||||
been or will be disclosed, and any of which he or she becomes aware
|
||||
will be disclosed, in accordance with Section 6 of BCP 79.
|
||||
|
||||
Internet-Drafts are working documents of the Internet Engineering Task
|
||||
Force (IETF), its areas, and its working groups. Note that other
|
||||
Force (IETF), its areas, and its working groups. Note that other
|
||||
groups may also distribute working documents as Internet-Drafts.
|
||||
|
||||
Internet-Drafts are draft documents valid for a maximum of six months
|
||||
and may be updated, replaced, or obsoleted by other documents at any
|
||||
time. It is inappropriate to use Internet-Drafts as reference
|
||||
material or to cite them other than as ``work in progress.''
|
||||
time. It is inappropriate to use Internet-Drafts as reference material
|
||||
or to cite them other than as "work in progress."
|
||||
|
||||
The list of current Internet-Drafts can be accessed at
|
||||
<http://www.ietf.org/ietf/1id-abstracts.txt>. The list of
|
||||
Internet-Draft Shadow Directories can be accessed at
|
||||
<http://www.ietf.org/shadow.html>.
|
||||
http://www.ietf.org/1id-abstracts.html
|
||||
|
||||
Copyright (C) The Internet Society (2004). All Rights Reserved.
|
||||
The list of Internet-Draft Shadow Directories can be accessed at
|
||||
http://www.ietf.org/shadow.html
|
||||
|
||||
|
||||
Copyright (C) The Internet Society (2005). All Rights Reserved.
|
||||
|
||||
Please see the Full Copyright section near the end of this document
|
||||
for more information.
|
||||
|
|
@ -46,47 +52,50 @@ Expires in six months 8 February 2004
|
|||
|
||||
Abstract
|
||||
|
||||
This specification describes a Lightweight Directory Access Protocol
|
||||
(LDAP) extended operation to reverse (or "turn") the roles of client
|
||||
and server for subsequent protocol exchanges in the session.
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Zeilenga LDAP Turn Op [Page 1]
|
||||
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-turn-00 8 February 2004
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-turn-03 28 October 2005
|
||||
|
||||
|
||||
This specification describes a Lightweight Directory Access Protocol
|
||||
(LDAP) extended operation to reverse (or "turn") the roles of client
|
||||
and server for subsequent protocol exchanges in the session, or to
|
||||
enable each peer to act as both client and server with respect to the
|
||||
other.
|
||||
|
||||
|
||||
1. Background and Intent of Use
|
||||
|
||||
The Lightweight Directory Access Protocol (LDAP) [RFC3377] is a client
|
||||
/ server protocol which typically operates over reliable octet stream
|
||||
transports such as the Transport Control Protocol (TCP). Generally,
|
||||
the client initiates the stream by connecting to the server's listener
|
||||
at some well-known address.
|
||||
The Lightweight Directory Access Protocol (LDAP) [Roadmap][Protocol]
|
||||
is a client-server protocol which typically operates over reliable
|
||||
octet-stream transports such as the Transport Control Protocol (TCP).
|
||||
Generally, the client initiates the stream by connecting to the
|
||||
server's listener at some well-known address.
|
||||
|
||||
There are cases where it is desirable for the server to initiate the
|
||||
stream. While it certainly is possible to write a technical
|
||||
specification detailing how to implement server-initiated LDAP
|
||||
sessions, this would requiring designing new authentication and other
|
||||
security features to support server-initiated LDAP sessions.
|
||||
sessions, this would require the design of new authentication and
|
||||
other security mechanisms to support server-initiated LDAP sessions.
|
||||
|
||||
This document instead introduces an operation, the Turn operation,
|
||||
which may be used to reverse the client / server roles of the
|
||||
protocol peers. This allows the initiating protocol peer to be server
|
||||
(after reversal).
|
||||
Instead, this document introduces an operation, the Turn operation,
|
||||
which may be used to reverse the client-servers roles of the protocol
|
||||
peers. This allows the initiating protocol peer to become server
|
||||
(after the reversal).
|
||||
|
||||
As an additional feature, the Turn operation may be used to allow both
|
||||
peers to act in both roles. This is useful where both peers are
|
||||
directory servers which desire to issue, as LDAP clients, operations
|
||||
against the other. This may be useful in replicated environments.
|
||||
directory servers that desire to request, as LDAP clients, operations
|
||||
be performed by the other. This may be useful in replicated and/or
|
||||
distributed environments.
|
||||
|
||||
This operation is intended to used between protocol peers which have
|
||||
established a mutual agreement, by means outside of the protocol,
|
||||
which requires reversal of client / server roles or both peers to act
|
||||
both as client and server.
|
||||
This operation is intended to be used between protocol peers which
|
||||
have established a mutual agreement, by means outside of the protocol,
|
||||
which requires reversal of client-server roles, or allows both peers
|
||||
to act both as client and server.
|
||||
|
||||
|
||||
1.1 Terminology
|
||||
|
|
@ -94,28 +103,24 @@ INTERNET-DRAFT draft-zeilenga-ldap-turn-00 8 February 2004
|
|||
Protocol elements are described using ASN.1 [X.680] with implicit
|
||||
tags. The term "BER-encoded" means the element is to be encoded using
|
||||
the Basic Encoding Rules [X.690] under the restrictions detailed in
|
||||
Section 5.1 of [RFC2251].
|
||||
|
||||
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
|
||||
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
|
||||
document are to be interpreted as described in BCP 14 [RFC2119].
|
||||
Section 5.2 of [Protocol].
|
||||
|
||||
|
||||
2. Turn Operation
|
||||
|
||||
The Turn operation is defined as a LDAP Extended Operation [RFC2251,
|
||||
Section 4.12] identified by the IANA-ASSIGNED-OID. The function of
|
||||
the Turn Operation is to request that the client / server roles be
|
||||
reversed, or, optionally to request that both protocol peers to be
|
||||
|
||||
|
||||
|
||||
Zeilenga LDAP Turn Op [Page 2]
|
||||
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-turn-00 8 February 2004
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-turn-03 28 October 2005
|
||||
|
||||
|
||||
able to act both as client and server.
|
||||
The Turn operation is defined as a LDAP Extended Operation [Protocol,
|
||||
Section 4.12] identified by the IANA-ASSIGNED-OID. The function of
|
||||
the Turn Operation is to request that the client-server roles be
|
||||
reversed, or, optionally to request that both protocol peers to be
|
||||
able to act both as client and server in respect to the other.
|
||||
|
||||
|
||||
2.1. Turn Request
|
||||
|
|
@ -126,65 +131,219 @@ INTERNET-DRAFT draft-zeilenga-ldap-turn-00 8 February 2004
|
|||
|
||||
turnValue ::= SEQUENCE {
|
||||
mutual BOOLEAN DEFAULT FALSE,
|
||||
identifier LDAPString,
|
||||
identifier LDAPString
|
||||
}
|
||||
|
||||
A TRUE value of the mutual field indicates a request to allow both
|
||||
peers to act both as client and server while a FALSE value indicates a
|
||||
A TRUE mutual field value indicates a request to allow both peers to
|
||||
act both as client and server. A FALSE mutual field value indicates a
|
||||
request to reserve the client and server roles.
|
||||
|
||||
The value of the identifier field is a locally-defined policy
|
||||
identifier (typicallly associated with a mutual agreement for which
|
||||
this turn is be executed as part of). This policy identifier is
|
||||
called the turn indicator.
|
||||
identifier (typically associated with a mutual agreement for which
|
||||
this turn is be executed as part of).
|
||||
|
||||
|
||||
2.2. Turn Response
|
||||
|
||||
A Turn response is an ExtendedResponse where the responseName and
|
||||
response fields are absent. A resultCode of success is returned if
|
||||
and only if the responder is willing and able to turn the session as
|
||||
requested. Otherwise, a different resultCode is returned.
|
||||
responseValue fields are absent. A resultCode of success is returned
|
||||
if and only if the responder is willing and able to turn the session
|
||||
as requested. Otherwise, a different resultCode is returned.
|
||||
|
||||
|
||||
3. Security Considerations
|
||||
3. Authentication
|
||||
|
||||
It is generally recommended that before issuing the Turn operation the
|
||||
protocol peers:
|
||||
This extension's authentication model assumes separate authentication
|
||||
of the peers in each of their roles. A separate Bind exchange is
|
||||
expected between the peers in their new roles to establish identities
|
||||
in these roles.
|
||||
|
||||
- establish each other identities through appropriate authentication
|
||||
mechanism,
|
||||
- establish appropriate data integrity, data confidentiality, and
|
||||
other protections,
|
||||
- establish an LDAP association between the initiating peer and the
|
||||
responding peer.
|
||||
|
||||
And upon successful completion of turn:
|
||||
- establish an LDAP association in reverse.
|
||||
|
||||
That is, for peer A connecting to peer B listening and where TLS and
|
||||
Upon completion of the Turn, the responding peer in its new client
|
||||
role has an anonymous association at the initiating peer in its new
|
||||
server role. If the turn was mutual, the authentication association
|
||||
of the initiating peer in its pre-existing client role is left intact
|
||||
at the responding peer in its pre-existing server role. If the turn
|
||||
was not mutual, this association is void.
|
||||
|
||||
|
||||
|
||||
Zeilenga LDAP Turn Op [Page 3]
|
||||
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-turn-00 8 February 2004
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-turn-03 28 October 2005
|
||||
|
||||
|
||||
SASL/EXTERNAL were to be used, the sequence of operations would be:
|
||||
The responding peer may establish its identity in its client role by
|
||||
requesting and successfully completing a Bind operation.
|
||||
|
||||
A->B: StartTLS
|
||||
A->B: Bind(SASL,EXTERNAL)
|
||||
A->B: Turn
|
||||
B->A: Bind(SASL,EXTERNAL)
|
||||
The remainder of this section discuss some authentication scenarios.
|
||||
In the protocol exchange illustrations, A refers to the initiating
|
||||
peer (the original client) and B refers to the responding peer (the
|
||||
original server).
|
||||
|
||||
3.1. Use with TLS and Simple Authentication
|
||||
|
||||
A->B: StartTLS Request
|
||||
B->A: StartTLS(success) Response
|
||||
A->B: Bind(Simple(cn=B,dc=example,dc=net,B's secret)) Request
|
||||
B->A: Bind(success) Response
|
||||
A->B: Turn(TRUE,"XXYYZ") Request
|
||||
B->A: Turn(success) Response
|
||||
A->B: Bind(Simple(DN/Password)) Request
|
||||
B->A: Bind(Simple(cn=A,dc=example,dc=net,A's secret)) Request
|
||||
A->B: Bind(success) Response
|
||||
|
||||
In this scenario, TLS (Transport Layer Security) [TLS] is started and
|
||||
the initiating peer (the original client) establishes its identity
|
||||
with the responding peer prior to the Turn using the the DN/password
|
||||
mechanism of the Simple method of the Bind operation. After the turn,
|
||||
the responding peer in its new client role establishes its identity
|
||||
with the initiating peer in its new server role.
|
||||
|
||||
|
||||
4. IANA Considerations
|
||||
3.2. Use with TLS and SASL EXTERNAL
|
||||
|
||||
Registration of the following values [RFC3383] is requested.
|
||||
A->B: StartTLS Request
|
||||
B->A: StartTLS(success) Response
|
||||
A->B: Bind(SASL(EXTERNAL)) Request
|
||||
B->A: Bind(success) Response
|
||||
A->B: Turn(TRUE,"XXYYZ") Request
|
||||
B->A: Turn(success) Response
|
||||
B->A: Bind(SASL(EXTERNAL)) Request
|
||||
A->B: Bind(success) Response
|
||||
|
||||
In this scenario, TLS is started prior with each peer providing a
|
||||
valid certificate and the initiating peer (the original client)
|
||||
establishes its identity through the use of the EXTERNAL mechanism of
|
||||
the SASL (Simple Authentication and Security Layer) [SASL] method of
|
||||
the Bind operation prior to the Turn. After the turn, the responding
|
||||
peer in its new client role establishes its identity with the
|
||||
initiating peer in its new server role.
|
||||
|
||||
|
||||
4.1. Object Identifier
|
||||
|
||||
|
||||
|
||||
Zeilenga LDAP Turn Op [Page 4]
|
||||
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-turn-03 28 October 2005
|
||||
|
||||
|
||||
3.3. Use of mutual authentication and SASL EXTERNAL
|
||||
|
||||
A number of SASL mechanisms, such as GSSAPI [GSSAPI] and DIGEST-MD5
|
||||
[DIGEST-MD5], support mutual authentication. The initiating peer, it
|
||||
its new server role, may use the identity of the responding peer
|
||||
established by a prior authentication exchange, as its source for
|
||||
"external" identity in subsequent EXTERNAL exchange.
|
||||
|
||||
A->B: Bind(SASL(GSSAPI)) Request
|
||||
<intermediate messages>
|
||||
B->A: Bind(success) Response
|
||||
A->B: Turn(TRUE,"XXYYZ") Request
|
||||
B->A: Turn(success) Response
|
||||
B->A: Bind(SASL(EXTERNAL)) Request
|
||||
A->B: Bind(success) Response
|
||||
|
||||
In this scenario, a GSSAPI mutual-authentication exchange is completed
|
||||
between the initiating peer (the original client) and the the
|
||||
responding server (the original server) prior to the turn. After the
|
||||
turn, the responding peer in its new client role requests the
|
||||
initiating peer utilize an "external" identity to establish its LDAP
|
||||
authorization identity.
|
||||
|
||||
|
||||
4. TLS and SASL security layers
|
||||
|
||||
As described in [Protocol], LDAP supports both Transport Layer
|
||||
Security (TLS) [TLS] and Simple Authentication and Security Layer
|
||||
(SASL) [SASL] security frameworks. The following table illustrates
|
||||
the relationship between the LDAP message layer, SASL layer, TLS
|
||||
layer, and transport connection within an LDAP session.
|
||||
|
||||
+----------------------+
|
||||
| LDAP message layer |
|
||||
+----------------------+ > LDAP PDUs
|
||||
+----------------------+ < data
|
||||
| SASL layer |
|
||||
+----------------------+ > SASL-protected data
|
||||
+----------------------+ < data
|
||||
| TLS layer |
|
||||
Application +----------------------+ > TLS-protected data
|
||||
------------+----------------------+ < data
|
||||
Transport | transport connection |
|
||||
+----------------------+
|
||||
|
||||
This extension does not alter this relationship, nor does it remove
|
||||
the general restriction against multiple TLS layers, nor does it
|
||||
remove the general restriction against multiple SASL layers.
|
||||
|
||||
|
||||
|
||||
Zeilenga LDAP Turn Op [Page 5]
|
||||
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-turn-03 28 October 2005
|
||||
|
||||
|
||||
As specified in [Protocol], the StartTLS operation is used to initiate
|
||||
negotiation of a TLS layer. If a TLS is already installed, the
|
||||
StartTLS operation must fail. Upon establishment of the TLS layer,
|
||||
regardless of which peer issued the request to start TLS, the peer
|
||||
which initiated the LDAP session (the original client) performs the
|
||||
"server identity check" as described in Section 3.1.5 of [AuthMeth]
|
||||
treating itself as the "client" and its peer as the "server".
|
||||
|
||||
As specified in [SASL], newly negotiated SASL security layer replace
|
||||
the installed SASL security layer. Though the client/server roles in
|
||||
LDAP, and hence SASL, may be reversed in subsequent exchanges, only
|
||||
one SASL security layer may be installed at any instance.
|
||||
|
||||
|
||||
5. Security Considerations
|
||||
|
||||
Implementors should be aware that the reversing of client/server roles
|
||||
and/or allowing both peers to act as client and server likely
|
||||
introduces security considerations not foreseen by the authors of this
|
||||
document. In particular, the security implications of the design
|
||||
choices made in the authentication and data security models for this
|
||||
extension (discussed in sections 3 and 4, respectively) are not fully
|
||||
studied. It is hoped that experimentation with this extension will
|
||||
lead to better understanding of the security implications of these
|
||||
models and other aspects of this extension, and that appropriate
|
||||
considerations will be documented in a future document. The following
|
||||
security considerations are apparent at this time.
|
||||
|
||||
Implementors should take special care to process LDAP, SASL, TLS, and
|
||||
other events the appropriate roles for the peers. It is noted that
|
||||
while the Turn reverses the client/server roles with LDAP, and in SASL
|
||||
authentication exchanges, it does not reverse the roles within the TLS
|
||||
layer or the transport connection.
|
||||
|
||||
The responding server (the original server) should restrict use of
|
||||
this operation to authorized clients. Client knowledge of a valid
|
||||
identifier should not be the sole factor in determining authorization
|
||||
to turn.
|
||||
|
||||
Where the peers except to establish TLS, TLS should be started prior
|
||||
to the Turn and any request to authenticate via the Bind operation.
|
||||
|
||||
LDAP security considerations [Protocol][AuthMeth] generally apply to
|
||||
this extension.
|
||||
|
||||
|
||||
6. IANA Considerations
|
||||
|
||||
|
||||
|
||||
|
||||
Zeilenga LDAP Turn Op [Page 6]
|
||||
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-turn-03 28 October 2005
|
||||
|
||||
|
||||
Registration of the following values [BCP64bis] is requested.
|
||||
|
||||
|
||||
6.1. Object Identifier
|
||||
|
||||
It is requested that IANA assign an LDAP Object Identifier to identify
|
||||
the LDAP Turn Operation as defined in this document.
|
||||
|
|
@ -198,7 +357,7 @@ INTERNET-DRAFT draft-zeilenga-ldap-turn-00 8 February 2004
|
|||
Identifies the LDAP Turn Operation
|
||||
|
||||
|
||||
4.2. LDAP Protocol Mechanism
|
||||
6.2. LDAP Protocol Mechanism
|
||||
|
||||
It is requested that IANA register the LDAP Protocol Mechanism
|
||||
described in this document.
|
||||
|
|
@ -214,45 +373,6 @@ INTERNET-DRAFT draft-zeilenga-ldap-turn-00 8 February 2004
|
|||
Comments: none
|
||||
|
||||
|
||||
5. Normative References
|
||||
|
||||
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
|
||||
Requirement Levels", BCP 14 (also RFC 2119), March 1997.
|
||||
|
||||
|
||||
|
||||
|
||||
Zeilenga LDAP Turn Op [Page 4]
|
||||
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-turn-00 8 February 2004
|
||||
|
||||
|
||||
[RFC2251] Wahl, M., T. Howes and S. Kille, "Lightweight Directory
|
||||
Access Protocol (v3)", RFC 2251, December 1997.
|
||||
|
||||
[RFC3377] Hodges, J. and R. Morgan, "Lightweight Directory Access
|
||||
Protocol (v3): Technical Specification", RFC 3377,
|
||||
September 2002.
|
||||
|
||||
[X.680] International Telecommunication Union -
|
||||
Telecommunication Standardization Sector, "Abstract
|
||||
Syntax Notation One (ASN.1) - Specification of Basic
|
||||
Notation", X.680(1997) (also ISO/IEC 8824-1:1998).
|
||||
|
||||
[X.690] International Telecommunication Union -
|
||||
Telecommunication Standardization Sector, "Specification
|
||||
of ASN.1 encoding rules: Basic Encoding Rules (BER),
|
||||
Canonical Encoding Rules (CER), and Distinguished
|
||||
Encoding Rules (DER)", X.690(1997) (also ISO/IEC
|
||||
8825-1:1998).
|
||||
|
||||
|
||||
6. Informative References
|
||||
|
||||
[RFC3383] Zeilenga, K., "IANA Considerations for LDAP", BCP 64
|
||||
(also RFC 3383), September 2002.
|
||||
|
||||
|
||||
7. Author's Address
|
||||
|
||||
Kurt D. Zeilenga
|
||||
|
|
@ -261,55 +381,118 @@ INTERNET-DRAFT draft-zeilenga-ldap-turn-00 8 February 2004
|
|||
Email: Kurt@OpenLDAP.org
|
||||
|
||||
|
||||
8. References
|
||||
|
||||
[[Note to the RFC Editor: please replace the citation tags used in
|
||||
referencing Internet-Drafts with tags of the form RFCnnnn where
|
||||
possible.]]
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Zeilenga LDAP Turn Op [Page 7]
|
||||
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-turn-03 28 October 2005
|
||||
|
||||
|
||||
8.1. Normative References
|
||||
|
||||
[Roadmap] Zeilenga, K. (editor), "LDAP: Technical Specification
|
||||
Road Map", draft-ietf-ldapbis-roadmap-xx.txt, a work in
|
||||
progress.
|
||||
|
||||
[Protocol] Sermersheim, J. (editor), "LDAP: The Protocol",
|
||||
draft-ietf-ldapbis-protocol-xx.txt, a work in progress.
|
||||
|
||||
[AuthMeth] Harrison, R. (editor), "LDAP: Authentication Methods and
|
||||
Connection Level Security Mechanisms",
|
||||
draft-ietf-ldapbis-authmeth-xx.txt, a work in progress.
|
||||
|
||||
[SASL] Melnikov, A. (Editor), "Simple Authentication and
|
||||
Security Layer (SASL)",
|
||||
draft-ietf-sasl-rfc2222bis-xx.txt, a work in progress.
|
||||
|
||||
[TLS] Dierks, T. and, E. Rescorla, "The TLS Protocol Version
|
||||
1.1", draft-ietf-tls-rfc2246-bis-xx.txt, a work in
|
||||
progress.
|
||||
|
||||
[X.680] International Telecommunication Union -
|
||||
Telecommunication Standardization Sector, "Abstract
|
||||
Syntax Notation One (ASN.1) - Specification of Basic
|
||||
Notation", X.680(2002) (also ISO/IEC 8824-1:2002).
|
||||
|
||||
[X.690] International Telecommunication Union -
|
||||
Telecommunication Standardization Sector, "Specification
|
||||
of ASN.1 encoding rules: Basic Encoding Rules (BER),
|
||||
Canonical Encoding Rules (CER), and Distinguished
|
||||
Encoding Rules (DER)", X.690(2002) (also ISO/IEC
|
||||
8825-1:2002).
|
||||
|
||||
|
||||
8.2. Informative References
|
||||
|
||||
[BCP64bis] Zeilenga, K., "IANA Considerations for LDAP",
|
||||
draft-ietf-ldapbis-bcp64-xx.txt, a work in progress.
|
||||
|
||||
[GSSAPI] Linn, J., "Generic Security Service
|
||||
Application Program Interface, Version 2, Update 1", RFC
|
||||
2743, January 2000.
|
||||
|
||||
[DIGEST-MD5] Leach, P., C. Newman, and A. Melnikov, "Using Digest
|
||||
Authentication as a SASL Mechanism",
|
||||
draft-ietf-sasl-rfc2831bis-xx.txt, a work in progress.
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Zeilenga LDAP Turn Op [Page 8]
|
||||
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-turn-03 28 October 2005
|
||||
|
||||
|
||||
Intellectual Property Rights
|
||||
|
||||
The IETF takes no position regarding the validity or scope of any
|
||||
intellectual property or other rights that might be claimed to pertain
|
||||
to the implementation or use of the technology described in this
|
||||
document or the extent to which any license under such rights might or
|
||||
might not be available; neither does it represent that it has made any
|
||||
effort to identify any such rights. Information on the IETF's
|
||||
procedures with respect to rights in standards-track and
|
||||
standards-related documentation can be found in BCP-11. Copies of
|
||||
claims of rights made available for publication and any assurances of
|
||||
licenses to be made available, or the result of an attempt made to
|
||||
obtain a general license or permission for the use of such proprietary
|
||||
Intellectual Property Rights or other rights that might be claimed to
|
||||
pertain to the implementation or use of the technology described in
|
||||
this document or the extent to which any license under such rights
|
||||
might or might not be available; nor does it represent that it has
|
||||
made any independent effort to identify any such rights. Information
|
||||
on the procedures with respect to rights in RFC documents can be found
|
||||
in BCP 78 and BCP 79.
|
||||
|
||||
|
||||
|
||||
Zeilenga LDAP Turn Op [Page 5]
|
||||
|
||||
INTERNET-DRAFT draft-zeilenga-ldap-turn-00 8 February 2004
|
||||
|
||||
|
||||
rights by implementors or users of this specification can be obtained
|
||||
from the IETF Secretariat.
|
||||
Copies of IPR disclosures made to the IETF Secretariat and any
|
||||
assurances of licenses to be made available, or the result of an
|
||||
attempt made to obtain a general license or permission for the use of
|
||||
such proprietary rights by implementers or users of this specification
|
||||
can be obtained from the IETF on-line IPR repository at
|
||||
http://www.ietf.org/ipr.
|
||||
|
||||
The IETF invites any interested party to bring to its attention any
|
||||
copyrights, patents or patent applications, or other proprietary
|
||||
rights which may cover technology that may be required to practice
|
||||
this standard. Please address the information to the IETF Executive
|
||||
Director.
|
||||
rights that may cover technology that may be required to implement
|
||||
this standard. Please address the information to the IETF at
|
||||
ietf-ipr@ietf.org.
|
||||
|
||||
|
||||
|
||||
Full Copyright
|
||||
|
||||
Copyright (C) The Internet Society (2004). All Rights Reserved.
|
||||
Copyright (C) The Internet Society (2005).
|
||||
|
||||
This document and translations of it may be copied and furnished to
|
||||
others, and derivative works that comment on or otherwise explain it
|
||||
or assist in its implementation may be prepared, copied, published and
|
||||
distributed, in whole or in part, without restriction of any kind,
|
||||
provided that the above copyright notice and this paragraph are
|
||||
included on all such copies and derivative works. However, this
|
||||
document itself may not be modified in any way, such as by removing
|
||||
the copyright notice or references to the Internet Society or other
|
||||
Internet organizations, except as needed for the purpose of
|
||||
developing Internet standards in which case the procedures for
|
||||
copyrights defined in the Internet Standards process must be followed,
|
||||
or as required to translate it into languages other than English.
|
||||
This document is subject to the rights, licenses and restrictions
|
||||
contained in BCP 78, and except as set forth therein, the authors
|
||||
retain all their rights.
|
||||
|
||||
This document and the information contained herein are provided on an
|
||||
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
|
||||
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
|
||||
ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
|
||||
INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
|
||||
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
|
||||
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
|
||||
|
||||
|
||||
|
||||
|
|
@ -320,20 +503,5 @@ Full Copyright
|
|||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Zeilenga LDAP Turn Op [Page 6]
|
||||
Zeilenga LDAP Turn Op [Page 9]
|
||||
|
||||
|
||||
|
|
|
|||
|
|
@ -6,18 +6,17 @@
|
|||
|
||||
INTERNET-DRAFT Kurt D. Zeilenga
|
||||
Intended Category: Standard Track OpenLDAP Foundation
|
||||
Expires in six months 25 October 2003
|
||||
Expires in six months 18 July 2005
|
||||
|
||||
|
||||
|
||||
The LDAP entryUUID operational attribute
|
||||
<draft-zeilenga-ldap-uuid-02.txt>
|
||||
<draft-zeilenga-ldap-uuid-06.txt>
|
||||
|
||||
|
||||
|
||||
Status of this Memo
|
||||
|
||||
This document is an Internet-Draft and is in full conformance with all
|
||||
provisions of Section 10 of RFC2026.
|
||||
|
||||
This document is intended to be, after appropriate review and
|
||||
revision, submitted to the RFC Editor as an Standard Track document.
|
||||
Distribution of this memo is unlimited. Technical discussion of this
|
||||
|
|
@ -25,20 +24,28 @@ Status of this Memo
|
|||
<ldapext@ietf.org>. Please send editorial comments directly to the
|
||||
author <Kurt@OpenLDAP.org>.
|
||||
|
||||
By submitting this Internet-Draft, each author represents that any
|
||||
applicable patent or other IPR claims of which he or she is aware have
|
||||
been or will be disclosed, and any of which he or she becomes aware
|
||||
will be disclosed, in accordance with Section 6 of BCP 79.
|
||||
|
||||
Internet-Drafts are working documents of the Internet Engineering Task
|
||||
Force (IETF), its areas, and its working groups. Note that other
|
||||
Force (IETF), its areas, and its working groups. Note that other
|
||||
groups may also distribute working documents as Internet-Drafts.
|
||||
|
||||
Internet-Drafts are draft documents valid for a maximum of six months
|
||||
and may be updated, replaced, or obsoleted by other documents at any
|
||||
time. It is inappropriate to use Internet-Drafts as reference
|
||||
material or to cite them other than as ``work in progress.''
|
||||
time. It is inappropriate to use Internet-Drafts as reference material
|
||||
or to cite them other than as "work in progress."
|
||||
|
||||
The list of current Internet-Drafts can be accessed at
|
||||
<http://www.ietf.org/ietf/1id-abstracts.txt>. The list of
|
||||
Internet-Draft Shadow Directories can be accessed at
|
||||
<http://www.ietf.org/shadow.html>.
|
||||
http://www.ietf.org/1id-abstracts.html
|
||||
|
||||
Copyright (C) The Internet Society (2003). All Rights Reserved.
|
||||
The list of Internet-Draft Shadow Directories can be accessed at
|
||||
http://www.ietf.org/shadow.html
|
||||
|
||||
|
||||
Copyright (C) The Internet Society (2005). All Rights Reserved.
|
||||
|
||||
Please see the Full Copyright section near the end of this document
|
||||
for more information.
|
||||
|
|
@ -46,6 +53,13 @@ Status of this Memo
|
|||
|
||||
Abstract
|
||||
|
||||
|
||||
|
||||
Zeilenga draft-zeilenga-ldap-uuid-06 [Page 1]
|
||||
|
||||
INTERNET-DRAFT LDAP entryUUID 18 July 2005
|
||||
|
||||
|
||||
This document describes the LDAP/X.500 'entryUUID' operational
|
||||
attribute and associated matching rules and syntax. The attribute
|
||||
holds a server-assigned Universally Unique Identifier (UUID) for the
|
||||
|
|
@ -54,79 +68,75 @@ Abstract
|
|||
after renaming.
|
||||
|
||||
|
||||
|
||||
Zeilenga draft-zeilenga-ldap-uuid-02 [Page 1]
|
||||
|
||||
INTERNET-DRAFT LDAP entryUUID 25 October 2003
|
||||
|
||||
|
||||
1. Background and Intended Use
|
||||
|
||||
In X.500 Directory Services [X.501], such as those accessible using
|
||||
the the Lightweight Directory Access Protocol (LDAP) [RFC3377], an
|
||||
object is identified by its distinguished name (DN). However, DNs are
|
||||
not stable identifiers. That is, a new object may be identified by a
|
||||
DN which previously identified another (now renamed or deleted)
|
||||
object.
|
||||
the Lightweight Directory Access Protocol (LDAP) [Roadmap], an object
|
||||
is identified by its distinguished name (DN). However, DNs are not
|
||||
stable identifiers. That is, a new object may be identified by a DN
|
||||
which previously identified another (now renamed or deleted) object.
|
||||
|
||||
A Universally Unique Identifier (UUID) is "an identifier unique across
|
||||
both space and time, with respect to the space of all UUIDs"
|
||||
[UUIDURN]. UUIDs are used in a wide range of systems.
|
||||
|
||||
This document describes the 'entryUUID' operational attribute which
|
||||
holds the Universally Unique Identifier (UUID) [ISO11578] assigned to
|
||||
the object by the server. Clients may use this attribute to
|
||||
distinguish objects identified by a distinguished name or to locate an
|
||||
object after renaming.
|
||||
holds the UUID assigned to the object by the server. Clients may use
|
||||
this attribute to distinguish objects identified by a particular
|
||||
distinguished name or to locate a particular object after renaming.
|
||||
|
||||
This document defines the UUID syntax, the 'uuidMatch' and
|
||||
'uuidOrderingMatch' matching rules, the 'entryUUID' attribute type.
|
||||
'uuidOrderingMatch' matching rules, and the 'entryUUID' attribute
|
||||
type.
|
||||
|
||||
Schema definitions are provided using LDAP description formats
|
||||
[Models]. Definitions provided here are formatted (line wrapped) for
|
||||
readability.
|
||||
|
||||
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
|
||||
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
|
||||
document are to be interpreted as described in BCP 14 [RFC2119].
|
||||
|
||||
Schema definitions are provided using LDAP description formats
|
||||
[RFC2252]. Definitions provided here are formatted (line wrapped) for
|
||||
readability.
|
||||
|
||||
|
||||
2. UUID Schema Elements
|
||||
|
||||
2.1 UUID Syntax
|
||||
|
||||
A Universally Unique Identifier (UUID) [ISO11578] is a 16-octet
|
||||
(128-bit) value which identifies an object. The ASN.1 [X.690] type
|
||||
UUID is defined to represent UUIDs.
|
||||
A Universally Unique Identifier (UUID) [UUIDURN] is a 16-octet
|
||||
(128-bit) value which identifies an object. The ASN.1 [X.680] type
|
||||
UUID is defined to represent UUIDs as follows:
|
||||
|
||||
UUID ::= OCTET STRING (SIZE(16))
|
||||
-- constrained to an UUID [ISO 11578]
|
||||
-- constrained to an UUID [UUIDURN]
|
||||
|
||||
In LDAP, values of the UUID type are encoded using the [ASCII]
|
||||
character string representation described in [ISO11578]. For example,
|
||||
|
||||
|
||||
Zeilenga draft-zeilenga-ldap-uuid-06 [Page 2]
|
||||
|
||||
INTERNET-DRAFT LDAP entryUUID 18 July 2005
|
||||
|
||||
|
||||
In LDAP, UUID values are encoded using the [ASCII] character string
|
||||
representation described in [UUIDURN]. For example,
|
||||
"597ae2f6-16a6-1027-98f4-d28b5365dc14".
|
||||
|
||||
The following is a LDAP syntax description [RFC2252] suitable for
|
||||
publication in the subschema.
|
||||
The following is a LDAP syntax description suitable for publication in
|
||||
subschema subentries.
|
||||
|
||||
( IANA-ASSIGNED-OID.1 DESC 'UUID' )
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Zeilenga draft-zeilenga-ldap-uuid-02 [Page 2]
|
||||
|
||||
INTERNET-DRAFT LDAP entryUUID 25 October 2003
|
||||
|
||||
|
||||
2.2 'uuidMatch' Matching Rule
|
||||
|
||||
The 'uuidMatch' matching rule compares an asserted UUID with a stored
|
||||
UUID for equality. Its semantics are same as the octetStringMatch
|
||||
[X.520][RFC2252] matching rule. The rule differs from
|
||||
octetStringMatch in that the assertion value is encoded using the UUID
|
||||
string representation instead of the normal OCTET STRING string
|
||||
UUID for equality. Its semantics are same as the 'octetStringMatch'
|
||||
[X.520][Syntaxes] matching rule. The rule differs from
|
||||
'octetStringMatch' in that the assertion value is encoded using the
|
||||
UUID string representation instead of the normal OCTET STRING string
|
||||
representation.
|
||||
|
||||
The following is a LDAP matching rule description [RFC2252] suitable
|
||||
for publication in the subschema.
|
||||
The following is a LDAP matching rule description suitable for
|
||||
publication in subschema subentries.
|
||||
|
||||
( IANA-ASSIGNED-OID.2 NAME 'uuidMatch'
|
||||
SYNTAX IANA-ASSIGNED-OID.1 )
|
||||
|
|
@ -136,15 +146,15 @@ INTERNET-DRAFT LDAP entryUUID 25 October 2003
|
|||
|
||||
The 'uuidOrderingMatch' matching rule compares an asserted UUID
|
||||
with a stored UUID for ordering. Its semantics are the same as the
|
||||
octetStringOrderingMatch [X.520][RFC2252] matching rule. The rule
|
||||
differs from octetStringOrderingMatch in that the assertion value
|
||||
is encoded using the UUID string representation instead of the
|
||||
normal OCTET STRING string representation.
|
||||
'octetStringOrderingMatch' [X.520][Syntaxes] matching rule. The
|
||||
rule differs from 'octetStringOrderingMatch' in that the assertion
|
||||
value is encoded using the UUID string representation instead of
|
||||
the normal OCTET STRING string representation.
|
||||
|
||||
The following is a LDAP matching rule description [RFC2252] suitable
|
||||
for publication in the subschema.
|
||||
The following is a LDAP matching rule description suitable for
|
||||
publication in subschema subentries.
|
||||
|
||||
( IANA-ASSIGNED-OID.3 NAME 'uuidMatch'
|
||||
( IANA-ASSIGNED-OID.3 NAME 'uuidOrderingMatch'
|
||||
SYNTAX IANA-ASSIGNED-OID.1 )
|
||||
|
||||
It is noted that not all UUID variants have a defined ordering and,
|
||||
|
|
@ -154,48 +164,69 @@ INTERNET-DRAFT LDAP entryUUID 25 October 2003
|
|||
|
||||
2.4. 'entryUUID' attribute
|
||||
|
||||
The 'entryUUID' operational attribute provides the Universally Unique
|
||||
Identifier (UUID) [ISO11578] assigned to the entry.
|
||||
|
||||
The following is a LDAP attribute type description [RFC2252] suitable
|
||||
for publication in the subschema.
|
||||
|
||||
|
||||
Zeilenga draft-zeilenga-ldap-uuid-06 [Page 3]
|
||||
|
||||
INTERNET-DRAFT LDAP entryUUID 18 July 2005
|
||||
|
||||
|
||||
The 'entryUUID' operational attribute provides the Universally Unique
|
||||
Identifier (UUID) assigned to the entry.
|
||||
|
||||
The following is a LDAP attribute type description suitable for
|
||||
publication in subschema subentries.
|
||||
|
||||
( IANA-ASSIGNED-OID.4 NAME 'entryUUID'
|
||||
DESC 'UUID of the entry'
|
||||
EQUALITY uuidMatch
|
||||
ORDERING uuidOrderingMatch
|
||||
|
||||
|
||||
|
||||
Zeilenga draft-zeilenga-ldap-uuid-02 [Page 3]
|
||||
|
||||
INTERNET-DRAFT LDAP entryUUID 25 October 2003
|
||||
|
||||
|
||||
SYNTAX IANA-ASSIGNED-OID.1
|
||||
SINGLE-VALUE
|
||||
NO-USER-MODIFICATION
|
||||
USAGE directoryOperation )
|
||||
|
||||
Servers SHALL assign a UUID to each entry upon its addition to the
|
||||
directory and provide the entry's UUID as the value of the
|
||||
Servers SHALL generate and assign a new UUID to each entry upon its
|
||||
addition to the directory and provide that UUID as the value of the
|
||||
'entryUUID' operational attribute. An entry's UUID is immutable.
|
||||
|
||||
UUID are to be generated in accordance with Section 4 of [UUIDURN].
|
||||
In particular, servers MUST ensure that each generated UUID is unique
|
||||
in space and time.
|
||||
|
||||
|
||||
3. Security Considerations
|
||||
|
||||
Servers should ensure that components of UUID values are publicly
|
||||
disclosable.
|
||||
An entry's relative distinguish name (RDN) is composed from attribute
|
||||
values of the entry, values which are commonly descriptive of the
|
||||
object the entry represents. While deployers are encouraged to use
|
||||
naming attributes whose values are widely disclosable [LDAPDN],
|
||||
entries are often named using information which cannot be disclosed to
|
||||
all parties. As UUIDs do not contain any descriptive information of
|
||||
the object they identify, UUIDs may be used to identify a particular
|
||||
entry without disclosure of its contents.
|
||||
|
||||
General UUID security considerations [UUIDURN] apply.
|
||||
|
||||
General LDAP security considerations [RFC3377] apply.
|
||||
|
||||
|
||||
4. IANA Considerations
|
||||
|
||||
It is requested that IANA register upon Standards Action the LDAP
|
||||
values specified in this document.
|
||||
|
||||
|
||||
4.1. Object Identifier Registration
|
||||
|
||||
It is requested that IANA register upon Standards Action an LDAP
|
||||
Object Identifier for use in this technical specification.
|
||||
|
||||
|
||||
|
||||
Zeilenga draft-zeilenga-ldap-uuid-06 [Page 4]
|
||||
|
||||
INTERNET-DRAFT LDAP entryUUID 18 July 2005
|
||||
|
||||
|
||||
Subject: Request for LDAP OID Registration
|
||||
Person & email address to contact for further information:
|
||||
|
|
@ -206,10 +237,20 @@ INTERNET-DRAFT LDAP entryUUID 25 October 2003
|
|||
Identifies the UUID schema elements
|
||||
|
||||
|
||||
4.2. Registration of the uuidMatch descriptor
|
||||
4.2. UUID Syntax Registration
|
||||
|
||||
It is requested that IANA register upon Standards Action the LDAP
|
||||
'uuidMatch' descriptor.
|
||||
Subject: Request for LDAP Syntax Registration
|
||||
Object Identifier: IANA-ASSIGNED-OID.1
|
||||
Description: UUID
|
||||
Person & email address to contact for further information:
|
||||
Kurt Zeilenga <kurt@OpenLDAP.org>
|
||||
Specification: RFC XXXX
|
||||
Author/Change Controller: IESG
|
||||
Comments:
|
||||
Identifies the UUID syntax
|
||||
|
||||
|
||||
4.3. 'uuidMatch' Descriptor Registration
|
||||
|
||||
Subject: Request for LDAP Descriptor Registration
|
||||
Descriptor (short name): uuidMatch
|
||||
|
|
@ -221,17 +262,7 @@ INTERNET-DRAFT LDAP entryUUID 25 October 2003
|
|||
Author/Change Controller: IESG
|
||||
|
||||
|
||||
|
||||
|
||||
Zeilenga draft-zeilenga-ldap-uuid-02 [Page 4]
|
||||
|
||||
INTERNET-DRAFT LDAP entryUUID 25 October 2003
|
||||
|
||||
|
||||
4.3. Registration of the uuidOrderingMatch descriptor
|
||||
|
||||
It is requested that IANA register upon Standards Action the LDAP
|
||||
'uuidOrderingMatch' descriptor.
|
||||
4.3. 'uuidOrderingMatch' Descriptor Registration
|
||||
|
||||
Subject: Request for LDAP Descriptor Registration
|
||||
Descriptor (short name): uuidOrderingMatch
|
||||
|
|
@ -243,7 +274,15 @@ INTERNET-DRAFT LDAP entryUUID 25 October 2003
|
|||
Author/Change Controller: IESG
|
||||
|
||||
|
||||
4.4. Registration of the entryUUID descriptor
|
||||
5.4. 'entryUUID' Descriptor Registration
|
||||
|
||||
|
||||
|
||||
|
||||
Zeilenga draft-zeilenga-ldap-uuid-06 [Page 5]
|
||||
|
||||
INTERNET-DRAFT LDAP entryUUID 18 July 2005
|
||||
|
||||
|
||||
It is requested that IANA register upon Standards Action the LDAP
|
||||
'entryUUID' descriptor.
|
||||
|
|
@ -258,43 +297,54 @@ INTERNET-DRAFT LDAP entryUUID 25 October 2003
|
|||
Author/Change Controller: IESG
|
||||
|
||||
|
||||
5. Acknowledgments
|
||||
6. Acknowledgments
|
||||
|
||||
This document is based upon discussions in the LDAP Update and
|
||||
Duplication Protocols (LDUP) WG. Members of the concluded LDAP
|
||||
Extensions (LDAPEXT) Working Group provided review.
|
||||
Duplication Protocols (LDUP) WG. Members of the LDAP Directorate
|
||||
provided review.
|
||||
|
||||
|
||||
6. Author's Address
|
||||
7. Author's Address
|
||||
|
||||
Kurt D. Zeilenga
|
||||
OpenLDAP Foundation
|
||||
<Kurt@OpenLDAP.org>
|
||||
|
||||
Email: Kurt@OpenLDAP.org
|
||||
|
||||
|
||||
7. Normative References
|
||||
8. References
|
||||
|
||||
[[Note to the RFC Editor: please replace the citation tags used in
|
||||
referencing Internet-Drafts with tags of the form RFCnnnn where
|
||||
possible.]]
|
||||
|
||||
|
||||
8.1. Normative References
|
||||
|
||||
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
|
||||
Requirement Levels", BCP 14 (also RFC 2119), March 1997.
|
||||
|
||||
[Roadmap] Zeilenga, K. (editor), "LDAP: Technical Specification
|
||||
Road Map", draft-ietf-ldapbis-roadmap-xx.txt, a work in
|
||||
progress.
|
||||
|
||||
[UUIDURN] Leach, P, M. Mealling, R. Salz, "A UUID URN Namespace",
|
||||
a work in progress.
|
||||
|
||||
[Models] Zeilenga, K. (editor), "LDAP: Directory Information
|
||||
|
||||
|
||||
Zeilenga draft-zeilenga-ldap-uuid-02 [Page 5]
|
||||
|
||||
Zeilenga draft-zeilenga-ldap-uuid-06 [Page 6]
|
||||
|
||||
INTERNET-DRAFT LDAP entryUUID 25 October 2003
|
||||
INTERNET-DRAFT LDAP entryUUID 18 July 2005
|
||||
|
||||
|
||||
[RFC2252] Wahl, M., A. Coulbeck, T. Howes, and S. Kille,
|
||||
"Lightweight Directory Access Protocol (v3): Attribute
|
||||
Syntax Definitions", RFC 2252, December 1997.
|
||||
Models", draft-ietf-ldapbis-models-xx.txt, a work in
|
||||
progress.
|
||||
|
||||
[RFC3377] Hodges, J. and R. Morgan, "Lightweight Directory Access
|
||||
Protocol (v3): Technical Specification", RFC 3377,
|
||||
September 2002.
|
||||
|
||||
[ISO11578] International Organization for Standardization,
|
||||
"Information technology - Open Systems Interconnection -
|
||||
Remote Procedure Call", ISO/IEC 11578:1996.
|
||||
[Syntaxes] Legg, S. (editor), "LDAP: Syntaxes and Matching Rules",
|
||||
draft-ietf-ldapbis-syntaxes-xx.txt, a work in progress.
|
||||
|
||||
[ASCII] Coded Character Set--7-bit American Standard Code for
|
||||
Information Interchange, ANSI X3.4-1986.
|
||||
|
|
@ -311,72 +361,70 @@ INTERNET-DRAFT LDAP entryUUID 25 October 2003
|
|||
[X.680] International Telecommunication Union -
|
||||
Telecommunication Standardization Sector, "Abstract
|
||||
Syntax Notation One (ASN.1) - Specification of Basic
|
||||
Notation", X.680(1997) (also ISO/IEC 8824-1:1998).
|
||||
Notation", X.680(2002) (also ISO/IEC 8824-1:2002).
|
||||
|
||||
|
||||
8. Informative References
|
||||
|
||||
[RFC3383] Zeilenga, K., "IANA Considerations for LDAP", BCP 64
|
||||
(also RFC 3383), September 2002.
|
||||
8.2. Informative References
|
||||
|
||||
[UUIDinfo] The Open Group, "Universally Unique Identifier" appendix
|
||||
of the CAE Specification "DCE 1.1: Remote Procedure
|
||||
Calls", Document Number C706,
|
||||
<http://www.opengroup.org/products/publications/catalog/c706.htm>
|
||||
(appendix available at:
|
||||
<http://www.opengroup.org/onlinepubs/9629399/apdxa.htm>),
|
||||
August 1997.
|
||||
[LDAPDN] Zeilenga, K. (editor), "LDAP: String Representation of
|
||||
Distinguished Names", draft-ietf-ldapbis-dn-xx.txt, a
|
||||
work in progress.
|
||||
|
||||
[BCP64bis] Zeilenga, K., "IANA Considerations for LDAP",
|
||||
draft-ietf-ldapbis-bcp64-xx.txt, a work in progress.
|
||||
|
||||
|
||||
|
||||
Intellectual Property Rights
|
||||
|
||||
The IETF takes no position regarding the validity or scope of any
|
||||
Intellectual Property Rights or other rights that might be claimed to
|
||||
pertain to the implementation or use of the technology described in
|
||||
this document or the extent to which any license under such rights
|
||||
might or might not be available; nor does it represent that it has
|
||||
made any independent effort to identify any such rights. Information
|
||||
on the procedures with respect to rights in RFC documents can be found
|
||||
in BCP 78 and BCP 79.
|
||||
|
||||
Copies of IPR disclosures made to the IETF Secretariat and any
|
||||
|
||||
|
||||
|
||||
Zeilenga draft-zeilenga-ldap-uuid-02 [Page 6]
|
||||
Zeilenga draft-zeilenga-ldap-uuid-06 [Page 7]
|
||||
|
||||
INTERNET-DRAFT LDAP entryUUID 25 October 2003
|
||||
INTERNET-DRAFT LDAP entryUUID 18 July 2005
|
||||
|
||||
|
||||
intellectual property or other rights that might be claimed to pertain
|
||||
to the implementation or use of the technology described in this
|
||||
document or the extent to which any license under such rights might or
|
||||
might not be available; neither does it represent that it has made any
|
||||
effort to identify any such rights. Information on the IETF's
|
||||
procedures with respect to rights in standards-track and
|
||||
standards-related documentation can be found in BCP-11. Copies of
|
||||
claims of rights made available for publication and any assurances of
|
||||
licenses to be made available, or the result of an attempt made to
|
||||
obtain a general license or permission for the use of such proprietary
|
||||
rights by implementors or users of this specification can be obtained
|
||||
from the IETF Secretariat.
|
||||
assurances of licenses to be made available, or the result of an
|
||||
attempt made to obtain a general license or permission for the use of
|
||||
such proprietary rights by implementers or users of this specification
|
||||
can be obtained from the IETF on-line IPR repository at
|
||||
http://www.ietf.org/ipr.
|
||||
|
||||
The IETF invites any interested party to bring to its attention any
|
||||
copyrights, patents or patent applications, or other proprietary
|
||||
rights which may cover technology that may be required to practice
|
||||
this standard. Please address the information to the IETF Executive
|
||||
Director.
|
||||
rights that may cover technology that may be required to implement
|
||||
this standard. Please address the information to the IETF at
|
||||
ietf-ipr@ietf.org.
|
||||
|
||||
|
||||
|
||||
Full Copyright
|
||||
|
||||
Copyright (C) The Internet Society (2003). All Rights Reserved.
|
||||
Copyright (C) The Internet Society (2005).
|
||||
|
||||
This document and translations of it may be copied and furnished to
|
||||
others, and derivative works that comment on or otherwise explain it
|
||||
or assist in its implmentation may be prepared, copied, published and
|
||||
distributed, in whole or in part, without restriction of any kind,
|
||||
provided that the above copyright notice and this paragraph are
|
||||
included on all such copies and derivative works. However, this
|
||||
document itself may not be modified in any way, such as by removing
|
||||
the copyright notice or references to the Internet Society or other
|
||||
Internet organizations, except as needed for the purpose of
|
||||
developing Internet standards in which case the procedures for
|
||||
copyrights defined in the Internet Standards process must be followed,
|
||||
or as required to translate it into languages other than English.
|
||||
This document is subject to the rights, licenses and restrictions
|
||||
contained in BCP 78, and except as set forth therein, the authors
|
||||
retain all their rights.
|
||||
|
||||
This document and the information contained herein are provided on an
|
||||
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
|
||||
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
|
||||
ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
|
||||
INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
|
||||
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
|
||||
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
|
||||
|
||||
|
||||
|
||||
|
|
@ -391,5 +439,13 @@ Full Copyright
|
|||
|
||||
|
||||
|
||||
Zeilenga draft-zeilenga-ldap-uuid-02 [Page 7]
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Zeilenga draft-zeilenga-ldap-uuid-06 [Page 8]
|
||||
|
||||
|
|
|
|||
1403
doc/drafts/draft-zeilenga-ldap-x509-xx.txt
Normal file
1403
doc/drafts/draft-zeilenga-ldap-x509-xx.txt
Normal file
File diff suppressed because it is too large
Load diff
|
|
@ -1,895 +0,0 @@
|
|||
|
||||
INTERNET-DRAFT Kurt D. Zeilenga
|
||||
Intended Category: Standard Track OpenLDAP Foundation
|
||||
Expires in six months 17 October 2004
|
||||
Obsoletes: RFC 2252, RFC 2256
|
||||
|
||||
|
||||
LDAP X.509 Certificate Schema
|
||||
<draft-zeilenga-ldap-x509-00.txt>
|
||||
|
||||
|
||||
Status of this Memo
|
||||
|
||||
This document is intended to be, after appropriate review and
|
||||
revision, submitted to the RFC Editor as an Standard Track document.
|
||||
Distribution of this memo is unlimited. Technical discussion of this
|
||||
document will take place on the IETF LDAP Extensions mailing list
|
||||
<ldapext@ietf.org>. Please send editorial comments directly to the
|
||||
author <Kurt@OpenLDAP.org>.
|
||||
|
||||
This document is intended to be published in conjunction to the
|
||||
revised LDAP TS [Roadmap] when, in conjunction with this document,
|
||||
obsoletes RFC 2252 and RFC 2256 in their entirety.
|
||||
|
||||
By submitting this Internet-Draft, I accept the provisions of Section
|
||||
4 of RFC 3667. By submitting this Internet-Draft, I certify that any
|
||||
applicable patent or other IPR claims of which I am aware have been
|
||||
disclosed, or will be disclosed, and any of which I become aware will
|
||||
be disclosed, in accordance with RFC 3668.
|
||||
|
||||
Internet-Drafts are working documents of the Internet Engineering Task
|
||||
Force (IETF), its areas, and its working groups. Note that other
|
||||
groups may also distribute working documents as Internet-Drafts.
|
||||
|
||||
Internet-Drafts are draft documents valid for a maximum of six months
|
||||
and may be updated, replaced, or obsoleted by other documents at any
|
||||
time. It is inappropriate to use Internet-Drafts as reference material
|
||||
or to cite them other than as "work in progress."
|
||||
|
||||
The list of current Internet-Drafts can be accessed at
|
||||
<http://www.ietf.org/ietf/1id-abstracts.txt>. The list of
|
||||
Internet-Draft Shadow Directories can be accessed at
|
||||
<http://www.ietf.org/shadow.html>.
|
||||
|
||||
Copyright (C) The Internet Society (2004). All Rights Reserved.
|
||||
|
||||
Please see the Full Copyright section near the end of this document
|
||||
for more information.
|
||||
|
||||
|
||||
|
||||
|
||||
Zeilenga draft-zeilenga-ldap-x509-00 [Page 1]
|
||||
|
||||
INTERNET-DRAFT LDAP X.509 Schema 17 October 2004
|
||||
|
||||
|
||||
Abstract
|
||||
|
||||
This document describes schema for representing X.509 certificates,
|
||||
X.521 security information, and related elements in directories
|
||||
accessible using the Lightweight Directory Access Protocol (LDAP).
|
||||
The LDAP definitions for these X.509 and X.521 schema elements
|
||||
replaces those provided in RFC 2252 and RFC 2256.
|
||||
|
||||
|
||||
1. Background and Intended Use
|
||||
|
||||
This document provides LDAP schema definitions for a subset of
|
||||
elements specified in X.509 [X.509] and X.521 [X.521], including
|
||||
attribute types for certificates, cross certificate pairs, and
|
||||
certificate revocation lists; matching rules to be used with these
|
||||
attribute types; and related object classes. LDAP syntax definitions
|
||||
are also provided for associated assertion and attribute values.
|
||||
|
||||
As the semantics of these elements are as defined in X.509 and X.521,
|
||||
knowledge of X.509 and X.521 is necessary to make use of the LDAP
|
||||
schema definitions provided herein.
|
||||
|
||||
This document, together with [Roadmap], obsoletes RFC 2252 and RFC
|
||||
2256 in their entirety. The changes made since RFC 2252 and RFC 2256
|
||||
include:
|
||||
- addition of pkiUser, pkiCA, and deltaCRL classes;
|
||||
- updated of attribute types to include equality matching rules in
|
||||
accordance with their X.500 specifications;
|
||||
- addition of certificate, certificate pair, certificate list, and
|
||||
algorithm identifer matching rules; and
|
||||
- addition of LDAP syntax for assertion syntaxes for these matching
|
||||
rules.
|
||||
|
||||
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
|
||||
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
|
||||
document are to be interpreted as described in BCP 14 [RFC2119].
|
||||
|
||||
Schema definitions are provided using LDAP description formats
|
||||
[Models]. Definitions provided here are formatted (line wrapped) for
|
||||
readability.
|
||||
|
||||
|
||||
2. Syntaxes
|
||||
|
||||
This section describes various syntaxes used to transfer certificates
|
||||
and related data types in LDAP.
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Zeilenga draft-zeilenga-ldap-x509-00 [Page 2]
|
||||
|
||||
INTERNET-DRAFT LDAP X.509 Schema 17 October 2004
|
||||
|
||||
|
||||
2.1. Certificate
|
||||
|
||||
( 1.3.6.1.4.1.1466.115.121.1.8 DESC 'X.509 Certificate' )
|
||||
|
||||
A value of this syntax is an X.509 Certificate [Section 7, X.509].
|
||||
|
||||
Due to changes made to the ASN.1 definition of a Certificate made
|
||||
through time, no LDAP-specific encoding is defined for this syntax.
|
||||
Values of this syntax are to encoded using DER [X.690] and MUST only
|
||||
be transferred using the ;binary transfer option [Binary]. That is,
|
||||
by requesting and returning values using attribute descriptions such
|
||||
as "userCertificate;binary".
|
||||
|
||||
As values of this syntax contain digitally-signed data, values of this
|
||||
syntax, and the form of the value, MUST be preserved as presented.
|
||||
|
||||
|
||||
2.2. CertificateList
|
||||
|
||||
( 1.3.6.1.4.1.1466.115.121.1.9 DESC 'X.509 Certificate List' )
|
||||
|
||||
A value of this syntax is an X.509 CertificateList [Section 7.3,
|
||||
X.509].
|
||||
|
||||
Due to changes made to the ASN.1 definition of a CertificateList made
|
||||
through time, no LDAP-specific encoding is defined for this syntax.
|
||||
Values of this syntax are to encoded using DER [X.690] and MUST only
|
||||
be transferred using the ;binary transfer option [Binary]. That is,
|
||||
by requesting and returning values using attribute descriptions such
|
||||
as "certificateRevocationList;binary".
|
||||
|
||||
As values of this syntax contain digitally-signed data, values of this
|
||||
syntax, and the form of the value, MUST be preserved as presented.
|
||||
|
||||
|
||||
2.3. CertificatePair
|
||||
|
||||
( 1.3.6.1.4.1.1466.115.121.1.10 DESC 'X.509 Certificate Pair' )
|
||||
|
||||
A value of this syntax is an X.509 CertificatePair [Section 11.2.3,
|
||||
X.509].
|
||||
|
||||
Due to changes made to the ASN.1 definition of an X.509
|
||||
CertificatePair made through time, no LDAP-specific encoding is
|
||||
defined for this syntax. Values of this syntax are to encoded using
|
||||
DER [X.690] and MUST only be transferred using the ;binary transfer
|
||||
option [Binary]. That is, by requesting and returning values using
|
||||
attribute descriptions such as "crossCertificatePair;binary".
|
||||
|
||||
|
||||
|
||||
Zeilenga draft-zeilenga-ldap-x509-00 [Page 3]
|
||||
|
||||
INTERNET-DRAFT LDAP X.509 Schema 17 October 2004
|
||||
|
||||
|
||||
As values of this syntax contain digitally-signed data, values of this
|
||||
syntax, and the form of the value, MUST be preserved as presented.
|
||||
|
||||
2.4 SupportedAlgorithm
|
||||
|
||||
( 1.3.6.1.4.1.1466.115.121.1.49
|
||||
DESC 'X.508 Supported Algorithm' )
|
||||
|
||||
A value of this syntax is an X.509 SupportedAlgorithm [Section 11.2.7,
|
||||
X.509].
|
||||
|
||||
Due to changes made to the ASN.1 definition of an X.509
|
||||
SupportedAlgorithm made through time, no LDAP-specific encoding is
|
||||
defined for this syntax. Values of this syntax are to encoded using
|
||||
DER [X.690] and MUST only be transferred using the ;binary transfer
|
||||
option [Binary]. That is, by requesting and returning values using
|
||||
attribute descriptions such as "supportedAlgorithms;binary".
|
||||
|
||||
As values of this syntax contain digitally-signed data, values of this
|
||||
syntax, and the form of the value, MUST be preserved as presented.
|
||||
|
||||
|
||||
2.5. CertificateExactAssertion
|
||||
|
||||
( IANA-ASSIGNED-OID.1 DESC 'X.509 Certificate Exact Assertion' )
|
||||
|
||||
A value of this syntax is an X.509 CertificateExactAssertion [Section
|
||||
11.3.1, X.509].
|
||||
|
||||
The LDAP-specific encoding used for this syntax is described by the
|
||||
following ABNF [RFC2234]:
|
||||
|
||||
certificateExactAssertion = serialNumber DOLLAR issuer
|
||||
serialNumber = number
|
||||
issuer = distinguishedName
|
||||
|
||||
where <number> and <DOLLAR> are as given in [Models] and
|
||||
<distinguishedName> is as given in [LDAPDN].
|
||||
|
||||
Example: 10$cn=Example$CA,dc=example,dc=com
|
||||
|
||||
Note: DOLLAR ('$') characters may appear in the <issuer> production.
|
||||
|
||||
|
||||
2.6. CertificateAssertion
|
||||
|
||||
( IANA-ASSIGNED-OID.2 DESC 'X.509 Certificate Assertion' )
|
||||
|
||||
|
||||
|
||||
|
||||
Zeilenga draft-zeilenga-ldap-x509-00 [Page 4]
|
||||
|
||||
INTERNET-DRAFT LDAP X.509 Schema 17 October 2004
|
||||
|
||||
|
||||
A value of this syntax is an X.509 CertificateAssertion [Section
|
||||
11.3.2, X.509].
|
||||
|
||||
Values of this syntax are to be encoded using GSER [RFC3641].
|
||||
Appendix A.1 provides an equivalent ABNF grammar for this syntax.
|
||||
|
||||
|
||||
2.7. CertificatePairExactAssertion
|
||||
|
||||
( IANA-ASSIGNED-OID.3
|
||||
DESC 'X.509 Certificate Pair Exact Assertion' )
|
||||
|
||||
A value of this syntax is an X.509 CertificatePairExactAssertion
|
||||
[Section 11.3.3, X.509].
|
||||
|
||||
Values of this syntax are to be encoded using GSER [RFC3641].
|
||||
Appendix A.2 provides an equivalent ABNF grammar for this syntax.
|
||||
|
||||
|
||||
2.8. CertificatePairAssertion
|
||||
|
||||
( IANA-ASSIGNED-OID.4 DESC 'X.509 Certificate Pair Assertion' )
|
||||
|
||||
A value of this syntax is an X.509 CertificatePairAssertion [Section
|
||||
11.3.4, X.509].
|
||||
|
||||
Values of this syntax are to be encoded using GSER [RFC3641].
|
||||
Appendix A.3 provides an equivalent ABNF grammar for this syntax.
|
||||
|
||||
|
||||
2.9. CertificateListExactAssertion
|
||||
|
||||
( IANA-ASSIGNED-OID.5
|
||||
DESC 'X.509 Certificate List Exact Assertion' )
|
||||
|
||||
A value of this syntax is an X.509 CertificateListExactAssertion
|
||||
[Section 11.3.5, X.509].
|
||||
|
||||
Values of this syntax are to be encoded using GSER [RFC3641].
|
||||
Appendix A.4 provides an equivalent ABNF grammar for this syntax.
|
||||
|
||||
|
||||
2.10. CertificateListAssertion
|
||||
|
||||
( IANA-ASSIGNED-OID.6 DESC 'X.509 Certificate List Assertion' )
|
||||
|
||||
A value of this syntax is an X.509 CertificateListAssertion [Section
|
||||
11.3.6, X.509].
|
||||
|
||||
|
||||
|
||||
Zeilenga draft-zeilenga-ldap-x509-00 [Page 5]
|
||||
|
||||
INTERNET-DRAFT LDAP X.509 Schema 17 October 2004
|
||||
|
||||
|
||||
Values of this syntax are to be encoded using GSER [RFC3641].
|
||||
Appendix A.5 provides an equivalent ABNF grammar for this syntax.
|
||||
|
||||
|
||||
2.11 AlgorithmIdentifier
|
||||
|
||||
( IANA-ASSIGNED-OID.7 DESC 'X.509 Algorithm Identifier' )
|
||||
|
||||
A value of this syntax is an X.509 AlgorithmIdentifier [Section 7,
|
||||
X.509].
|
||||
|
||||
Values of this syntax are to be encoded using GSER [RFC3641].
|
||||
Appendix A.6 provides an equivalent ABNF grammar for this syntax.
|
||||
|
||||
|
||||
3. Matching Rules
|
||||
|
||||
This section introduces a set of certificate and related matching
|
||||
rules for use in LDAP. These rules are intended to act in accordance
|
||||
with their X.500 counterparts.
|
||||
|
||||
|
||||
3.1. certificateExactMatch
|
||||
|
||||
The certificateExactMatch matching rule compares the presented
|
||||
certificate exact assertion value with an attribute value of the
|
||||
certificate syntax as described in Section 11.3.1 of [X.509].
|
||||
|
||||
( 2.5.13.34 NAME 'certificateExactMatch'
|
||||
DESC 'X.509 Certificate Exact Match'
|
||||
SYNTAX IANA-ASSIGNED-OID.1 )
|
||||
|
||||
|
||||
3.2. certificateMatch
|
||||
|
||||
The certificateMatch matching rule compares the presented certificate
|
||||
assertion value with an attribute value of the certificate syntax as
|
||||
described in Section 11.3.2 of [X.509].
|
||||
|
||||
( 2.5.13.35 NAME 'certificateMatch'
|
||||
DESC 'X.509 Certificate Match'
|
||||
SYNTAX IANA-ASSIGNED-OID.2 )
|
||||
|
||||
|
||||
3.3. certificatePairExactMatch
|
||||
|
||||
The certificatePairExactMatch matching rule compares the presented
|
||||
certificate pair exact assertion value with an attribute value of the
|
||||
|
||||
|
||||
|
||||
Zeilenga draft-zeilenga-ldap-x509-00 [Page 6]
|
||||
|
||||
INTERNET-DRAFT LDAP X.509 Schema 17 October 2004
|
||||
|
||||
|
||||
certificate pair syntax as described in Section 11.3.3 of [X.509].
|
||||
|
||||
( 2.5.13.36 NAME 'certificatePairExactMatch'
|
||||
DESC 'X.509 Certificate Pair Exact Match'
|
||||
SYNTAX IANA-ASSIGNED-OID.3 )
|
||||
|
||||
|
||||
3.4. certificatePairMatch
|
||||
|
||||
The certificatePairMatch matching rule compares the presented
|
||||
certificate pair assertion value with an attribute value of the
|
||||
certificate pair syntax as described in Section 11.3.4 of [X.509].
|
||||
|
||||
( 2.5.13.37 NAME 'certificatePairMatch'
|
||||
DESC 'X.509 Certificate Pair Match'
|
||||
SYNTAX IANA-ASSIGNED-OID.4 )
|
||||
|
||||
|
||||
3.5. certificateListExactMatch
|
||||
|
||||
The certificateListExactMatch matching rule compares the presented
|
||||
certificate list exact assertion value with an attribute value of the
|
||||
certificate pair syntax as described in Section 11.3.5 of [X.509].
|
||||
|
||||
( 2.5.13.38 NAME 'certificateListExactMatch'
|
||||
DESC 'X.509 Certificate List Exact Match'
|
||||
SYNTAX IANA-ASSIGNED-OID.5 )
|
||||
|
||||
|
||||
3.6. certificateListMatch
|
||||
|
||||
The certificateListMatch matching rule compares the presented
|
||||
certificate list assertion value with an attribute value of the
|
||||
certificate pair syntax as described in Section 11.3.6 of [X.509].
|
||||
|
||||
( 2.5.13.39 NAME 'certificateListMatch'
|
||||
DESC 'X.509 Certificate List Match'
|
||||
SYNTAX IANA-ASSIGNED-OID.6 )
|
||||
|
||||
|
||||
3.7. algorithmIdentifierMatch
|
||||
|
||||
The algorithmIdentifierMatch mating rule compares a presented
|
||||
algorithm identifier with an attribute value of supported algorithm as
|
||||
described in Section 11.3.7 of [X.509].
|
||||
|
||||
( 2.5.13.40 NAME 'algorithmIdentifier'
|
||||
DESC 'X.509 Algorithm Identifier Match'
|
||||
|
||||
|
||||
|
||||
Zeilenga draft-zeilenga-ldap-x509-00 [Page 7]
|
||||
|
||||
INTERNET-DRAFT LDAP X.509 Schema 17 October 2004
|
||||
|
||||
|
||||
SYNTAX IANA-ASSIGNED-OID.7 )
|
||||
|
||||
|
||||
4. Attribute Types
|
||||
|
||||
This section details a set of certificate and related attribute types
|
||||
for use in LDAP.
|
||||
|
||||
|
||||
4.1. userCertificate
|
||||
|
||||
The userCertificate attribute holds the X.509 certificates issued to
|
||||
the user by one or more certificate authorities, as discussed in
|
||||
Section 11.2.1 of [X.509].
|
||||
|
||||
( 2.5.4.36 NAME 'userCertificate'
|
||||
DESC 'X.509 user certificate'
|
||||
EQUALITY certificateExactMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.8 )
|
||||
|
||||
As required by this attribute type's syntax, values of this attribute
|
||||
are requested and transferred using the attribute description
|
||||
"userCertificate;binary".
|
||||
|
||||
|
||||
4.2. cACertificate
|
||||
|
||||
The cACertificate attribute holds the X.509 certificates issued to the
|
||||
certificate authority (CA), as discussed in Section 11.2.2 of [X.509].
|
||||
|
||||
( 2.5.4.37 NAME 'cACertificate'
|
||||
DESC 'X.509 CA certificate'
|
||||
EQUALITY certificateExactMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.8 )
|
||||
|
||||
As required by this attribute type's syntax, values of this attribute
|
||||
are requested and transferred using the attribute description
|
||||
"cACertificate;binary".
|
||||
|
||||
|
||||
4.3. crossCertificatePair
|
||||
|
||||
The crossCertificatePair attribute holds an X.509 certificate pair, as
|
||||
discussed in Section 11.2.3 of [X.509].
|
||||
|
||||
( 2.5.4.40 NAME 'crossCertificatePair'
|
||||
DESC 'X.509 cross certificate pair'
|
||||
EQUALITY certificatePairExactMatch
|
||||
|
||||
|
||||
|
||||
Zeilenga draft-zeilenga-ldap-x509-00 [Page 8]
|
||||
|
||||
INTERNET-DRAFT LDAP X.509 Schema 17 October 2004
|
||||
|
||||
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.10 )
|
||||
|
||||
As required by this attribute type's syntax, values of this attribute
|
||||
are requested and transferred using the attribute description
|
||||
"crossCertificatePair;binary".
|
||||
|
||||
|
||||
4.4. certificateRevocationList
|
||||
|
||||
The certificateRevocationList attribute holds certificate lists, as
|
||||
discussed in 11.2.4 of [X.509].
|
||||
|
||||
( 2.5.4.39 NAME 'certificateRevocationList'
|
||||
DESC 'X.509 certificate revocation list'
|
||||
EQUALITY certificateListExactMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.9 )
|
||||
|
||||
As required by this attribute type's syntax, values of this attribute
|
||||
are requested and transferred using the attribute description
|
||||
"certificateRevocationList;binary".
|
||||
|
||||
|
||||
4.5. authorityRevocationList
|
||||
|
||||
The authorityRevocationList attribute holds certificate lists, as
|
||||
discussed in 11.2.5 of [X.509].
|
||||
|
||||
( 2.5.4.38 NAME 'authorityRevocationList'
|
||||
DESC 'X.509 authority revocation list'
|
||||
EQUALITY certificateListExactMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.9 )
|
||||
|
||||
As required by this attribute type's syntax, values of this attribute
|
||||
are requested and transferred using the attribute description
|
||||
"authorityRevocationList;binary".
|
||||
|
||||
|
||||
4.6. deltaRevocationList
|
||||
|
||||
The deltaRevocationList attribute holds certificate lists, as
|
||||
discussed in 11.2.6 of [X.509].
|
||||
|
||||
( 2.5.4.53 NAME 'deltaRevocationList'
|
||||
DESC 'X.509 delta revocation list'
|
||||
EQUALITY certificateListExactMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.9 )
|
||||
|
||||
As required by this attribute type's syntax, values of this attribute
|
||||
|
||||
|
||||
|
||||
Zeilenga draft-zeilenga-ldap-x509-00 [Page 9]
|
||||
|
||||
INTERNET-DRAFT LDAP X.509 Schema 17 October 2004
|
||||
|
||||
|
||||
MUST be requested and transferred using the attribute description
|
||||
"deltaRevocationList;binary".
|
||||
|
||||
|
||||
4.7. supportedAlgorithms
|
||||
|
||||
The supportedAlgorithms attribute holds supported algorithms, as
|
||||
discussed in 11.2.7 of [X.509].
|
||||
|
||||
( 2.5.4.52 NAME 'supportedAlgorithms'
|
||||
DESC 'X.509 supported algorithms'
|
||||
EQUALITY algorithmIdentifierMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.49 )
|
||||
|
||||
As required by this attribute type's syntax, values of this attribute
|
||||
MUST be requested and transferred using the attribute description
|
||||
"supportedAlgorithms;binary".
|
||||
|
||||
|
||||
5. Object Classes
|
||||
|
||||
This section details a set of certificate-related object classes for
|
||||
use in LDAP.
|
||||
|
||||
|
||||
5.1. pkiUser
|
||||
|
||||
This object class is used in augment entries for objects that may be
|
||||
subject to certificates, as defined in Section 11.1.1 of [X.509].
|
||||
|
||||
( 2.5.6.21 NAME 'pkiUser'
|
||||
DESC 'X.509 PKI User'
|
||||
SUP top AUXILIARY
|
||||
MAY userCertificate )
|
||||
|
||||
|
||||
5.2. pkiCA
|
||||
|
||||
This object class is used to augment entries for objects which act as
|
||||
certificate authorities, as defined in Section 11.1.2 of [X.509]
|
||||
|
||||
( 2.5.6.22 NAME 'pkiCA'
|
||||
DESC 'X.509 PKI Certificate Authority'
|
||||
SUP top AUXILIARY
|
||||
MAY ( cACertificate $ certificateRevocationList $
|
||||
authorityRevocationList $ crossCertificatePair ) )
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Zeilenga draft-zeilenga-ldap-x509-00 [Page 10]
|
||||
|
||||
INTERNET-DRAFT LDAP X.509 Schema 17 October 2004
|
||||
|
||||
|
||||
5.3. cRLDistributionPoint
|
||||
|
||||
This class is used to represent objects which act as CRL distribution
|
||||
points, as discussed in Section 11.1.3 of [X.509].
|
||||
|
||||
( 2.5.6.19 NAME 'cRLDistributionPoint'
|
||||
DESC 'X.509 CRL distribution point'
|
||||
SUP top STRUCTURAL
|
||||
MUST cn
|
||||
MAY ( certificateRevocationList $
|
||||
authorityRevocationList $ deltaRevocationList ) )
|
||||
|
||||
|
||||
5.4 deltaCRL
|
||||
|
||||
The deltaCRL object class is used to augment entries no hold delta
|
||||
revocation lists, as discussed in Section 11.1.4 of [X.509].
|
||||
|
||||
( 2.5.6.23 NAME 'deltaCRL'
|
||||
DESC 'X.509 delta CRL'
|
||||
SUP top AUXILIARY
|
||||
MAY deltaRevocationList )
|
||||
|
||||
|
||||
5.5. strongAuthenticationUser
|
||||
|
||||
This object class is used to augment entries for objects participating
|
||||
in certificate-based authentication, as defined in Section 6.15 of
|
||||
[X.521]. This object class is deprecated in favor of pkiUser.
|
||||
|
||||
( 2.5.6.15 NAME 'strongAuthenticationUser'
|
||||
DESC 'X.521 strong authentication user'
|
||||
SUP top AUXILIARY
|
||||
MUST userCertificate )
|
||||
|
||||
|
||||
5.6. userSecurityInformation
|
||||
|
||||
This object class is used to augment entries with needed additional
|
||||
associated security information, as defined in Section 6.16 of
|
||||
[X.521].
|
||||
|
||||
( 2.5.6.18 NAME 'userSecurityInformation'
|
||||
DESC 'X.521 user security information'
|
||||
SUP top AUXILIARY
|
||||
MAY ( supportedAlgorithms ) )
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Zeilenga draft-zeilenga-ldap-x509-00 [Page 11]
|
||||
|
||||
INTERNET-DRAFT LDAP X.509 Schema 17 October 2004
|
||||
|
||||
|
||||
5.7. certificationAuthority
|
||||
|
||||
This object class is used to augment entries for objects which act as
|
||||
certificate authorities, as defined in Section 6.17 of [X.521]. This
|
||||
object class is deprecated in favor of pkiCA.
|
||||
|
||||
( 2.5.6.16 NAME 'certificationAuthority'
|
||||
DESC 'X.509 certificate authority'
|
||||
SUP top AUXILIARY
|
||||
MUST ( authorityRevocationList $
|
||||
certificateRevocationList $ cACertificate )
|
||||
MAY crossCertificatePair )
|
||||
|
||||
|
||||
5.8. certificationAuthority-V2
|
||||
|
||||
This object class is used to augment entries for objects which act as
|
||||
certificate authorities, as defined in Section 6.18 of [X.521]. This
|
||||
object class is deprecated in favor of pkiCA.
|
||||
|
||||
( 2.5.6.16.2 NAME 'certificationAuthority-V2'
|
||||
DESC 'X.509 certificate authority, version 2'
|
||||
SUP certificationAuthority AUXILIARY
|
||||
MAY deltaRevocationList )
|
||||
|
||||
|
||||
6. Security Considerations
|
||||
|
||||
The directory administrator is to use the server's access control
|
||||
facilities to restrict access as desired.
|
||||
|
||||
General LDAP security considerations [Roadmap] apply.
|
||||
|
||||
|
||||
7. IANA Considerations
|
||||
|
||||
7.1. Object Identifier Registration
|
||||
|
||||
It is requested that IANA register upon Standards Action an LDAP
|
||||
Object Identifier for use in this technical specification.
|
||||
|
||||
Subject: Request for LDAP OID Registration
|
||||
Person & email address to contact for further information:
|
||||
Kurt Zeilenga <kurt@OpenLDAP.org>
|
||||
Specification: RFC XXXX
|
||||
Author/Change Controller: IESG
|
||||
Comments:
|
||||
Identifies the LDAP X.509 Certificate schema elements
|
||||
|
||||
|
||||
|
||||
Zeilenga draft-zeilenga-ldap-x509-00 [Page 12]
|
||||
|
||||
INTERNET-DRAFT LDAP X.509 Schema 17 October 2004
|
||||
|
||||
|
||||
7.2. Registration of the descriptor
|
||||
|
||||
It is requested that IANA update upon Standards Action the LDAP
|
||||
Descriptor registry as indicated below.
|
||||
|
||||
Subject: Request for LDAP Descriptor Registration
|
||||
Descriptor (short name): see table
|
||||
Object Identifier: see table
|
||||
Person & email address to contact for further information:
|
||||
Kurt Zeilenga <kurt@OpenLDAP.org>
|
||||
Usage: see table
|
||||
Specification: RFC XXXX
|
||||
Author/Change Controller: IESG
|
||||
|
||||
algorithmIdentifierMatch R 2.5.13.40
|
||||
authorityRevocationList A 2.5.4.38 *
|
||||
cACertificate A 2.5.4.37 *
|
||||
cRLDistributionPoint O 2.5.6.19 *
|
||||
certificateExactMatch R 2.5.13.34
|
||||
certificateListExactMatch R 2.5.13.38
|
||||
certificateListMatch R 2.5.13.39
|
||||
certificateMatch R 2.5.13.35
|
||||
certificatePairExactMatch R 2.5.13.36
|
||||
certificatePairMatch R 2.5.13.37
|
||||
certificateRevocationList A 2.5.4.39 *
|
||||
certificationAuthority O 2.5.6.16 *
|
||||
certificationAuthority-V2 O 2.5.6.16.2 *
|
||||
crossCertificatePair A 2.5.4.40 *
|
||||
deltaCRL O 2.5.6.23
|
||||
deltaRevocationList A 2.5.4.53 *
|
||||
pkiCA O 2.5.6.22
|
||||
pkiUser O 2.5.6.21
|
||||
strongAuthenticationUser O 2.5.6.15 *
|
||||
supportedAlgorithms A 2.5.4.52 *
|
||||
userCertificate A 2.5.4.36 *
|
||||
userSecurityInformation O 2.5.6.18 *
|
||||
|
||||
* Updates previous registration
|
||||
|
||||
|
||||
8. Acknowledgments
|
||||
|
||||
This document is based upon X.509, a product of the ITU-T. A number
|
||||
of LDAP schema definitions were based on those found RFC 2252 and RFC
|
||||
2256, both products of the IETF ASID WG.
|
||||
|
||||
Additional material was borrowed from prior works by David Chadwick
|
||||
and/or Steven Legg to refine LDAP X.509 Schema.
|
||||
|
||||
|
||||
|
||||
Zeilenga draft-zeilenga-ldap-x509-00 [Page 13]
|
||||
|
||||
INTERNET-DRAFT LDAP X.509 Schema 17 October 2004
|
||||
|
||||
|
||||
9. Author's Address
|
||||
|
||||
Kurt D. Zeilenga
|
||||
OpenLDAP Foundation
|
||||
|
||||
Email: Kurt@OpenLDAP.org
|
||||
|
||||
|
||||
10. Normative References
|
||||
|
||||
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
|
||||
Requirement Levels", BCP 14 (also RFC 2119), March 1997.
|
||||
|
||||
[RFC2234] Crocker, D. and P. Overell, "Augmented BNF for Syntax
|
||||
Specifications: ABNF", RFC 2234, November 1997.
|
||||
|
||||
[RFC3641] Legg, S., "Generic String Encoding Rules for ASN.1
|
||||
Types", RFC 3641, October 2003.
|
||||
|
||||
[Roadmap] Zeilenga, K. (editor), "LDAP: Technical Specification
|
||||
Road Map", draft-ietf-ldapbis-roadmap-xx.txt, a work in
|
||||
progress.
|
||||
|
||||
[Models] Zeilenga, K. (editor), "LDAP: Directory Information
|
||||
Models", draft-ietf-ldapbis-models-xx.txt, a work in
|
||||
progress.
|
||||
|
||||
[Binary] Legg, S., "Lightweight Directory Access Protocol (LDAP):
|
||||
The Binary Encoding Option",
|
||||
draft-legg-ldap-binary-xx.txt, a work in progress.
|
||||
|
||||
[X.509] International Telecommunication Union -
|
||||
Telecommunication Standardization Sector, "The
|
||||
Directory: Authentication Framework", X.509(2000).
|
||||
|
||||
[X.521] International Telecommunication Union -
|
||||
Telecommunication Standardization Sector, "The
|
||||
Directory: Selected Object Classes", X.521(2000).
|
||||
|
||||
[X.680] International Telecommunication Union -
|
||||
Telecommunication Standardization Sector, "Abstract
|
||||
Syntax Notation One (ASN.1) - Specification of Basic
|
||||
Notation", X.680(1997) (also ISO/IEC 8824-1:1998).
|
||||
|
||||
[X.690] International Telecommunication Union -
|
||||
Telecommunication Standardization Sector, "Specification
|
||||
of ASN.1 encoding rules: Basic Encoding Rules (BER),
|
||||
Canonical Encoding Rules (CER), and Distinguished
|
||||
|
||||
|
||||
|
||||
Zeilenga draft-zeilenga-ldap-x509-00 [Page 14]
|
||||
|
||||
INTERNET-DRAFT LDAP X.509 Schema 17 October 2004
|
||||
|
||||
|
||||
Encoding Rules (DER)", X.690(1997) (also ISO/IEC
|
||||
8825-1:1998).
|
||||
|
||||
|
||||
11. Informative References
|
||||
|
||||
[RFC3383] Zeilenga, K., "IANA Considerations for LDAP", BCP 64
|
||||
(also RFC 3383), September 2002.
|
||||
|
||||
[RFC3642] Legg, S., "Common Elements of GSER Encodings", RFC 3642,
|
||||
October 2003.
|
||||
|
||||
[BCP64bis] Zeilenga, K., "IANA Considerations for LDAP",
|
||||
draft-ietf-ldapbis-bcp64-xx.txt, a work in progress.
|
||||
|
||||
|
||||
Appendix A.
|
||||
|
||||
This appendix is informative.
|
||||
|
||||
This appendix, once written, will provide ABNF [RFC2234] grammars for
|
||||
GSER-based LDAP-specific encodings specified in this document. These
|
||||
grammars where produced using, and rely on, Common Elements for GSER
|
||||
Encodings [RFC3342].
|
||||
|
||||
|
||||
|
||||
Intellectual Property Rights
|
||||
|
||||
The IETF takes no position regarding the validity or scope of any
|
||||
Intellectual Property Rights or other rights that might be claimed to
|
||||
pertain to the implementation or use of the technology described in
|
||||
this document or the extent to which any license under such rights
|
||||
might or might not be available; nor does it represent that it has
|
||||
made any independent effort to identify any such rights. Information
|
||||
on the procedures with respect to rights in RFC documents can be found
|
||||
in BCP 78 and BCP 79.
|
||||
|
||||
Copies of IPR disclosures made to the IETF Secretariat and any
|
||||
assurances of licenses to be made available, or the result of an
|
||||
attempt made to obtain a general license or permission for the use of
|
||||
such proprietary rights by implementers or users of this specification
|
||||
can be obtained from the IETF on-line IPR repository at
|
||||
http://www.ietf.org/ipr.
|
||||
|
||||
The IETF invites any interested party to bring to its attention any
|
||||
copyrights, patents or patent applications, or other proprietary
|
||||
rights that may cover technology that may be required to implement
|
||||
|
||||
|
||||
|
||||
Zeilenga draft-zeilenga-ldap-x509-00 [Page 15]
|
||||
|
||||
INTERNET-DRAFT LDAP X.509 Schema 17 October 2004
|
||||
|
||||
|
||||
this standard. Please address the information to the IETF at
|
||||
ietf-ipr@ietf.org.
|
||||
|
||||
|
||||
|
||||
Full Copyright
|
||||
|
||||
Copyright (C) The Internet Society (2004). This document is subject
|
||||
to the rights, licenses and restrictions contained in BCP 78, and
|
||||
except as set forth therein, the authors retain all their rights.
|
||||
|
||||
This document and the information contained herein are provided on an
|
||||
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
|
||||
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
|
||||
ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
|
||||
INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
|
||||
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
|
||||
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Zeilenga draft-zeilenga-ldap-x509-00 [Page 16]
|
||||
|
||||
|
||||
Loading…
Reference in a new issue