1 |
|
---|
2 |
|
---|
3 |
|
---|
4 |
|
---|
5 |
|
---|
6 |
|
---|
7 | Network Working Group K. Zeilenga
|
---|
8 | Request for Comments: 4512 OpenLDAP Foundation
|
---|
9 | Obsoletes: 2251, 2252, 2256, 3674 June 2006
|
---|
10 | Category: Standards Track
|
---|
11 |
|
---|
12 |
|
---|
13 | Lightweight Directory Access Protocol (LDAP):
|
---|
14 | Directory Information Models
|
---|
15 |
|
---|
16 | Status of This Memo
|
---|
17 |
|
---|
18 | This document specifies an Internet standards track protocol for the
|
---|
19 | Internet community, and requests discussion and suggestions for
|
---|
20 | improvements. Please refer to the current edition of the "Internet
|
---|
21 | Official Protocol Standards" (STD 1) for the standardization state
|
---|
22 | and status of this protocol. Distribution of this memo is unlimited.
|
---|
23 |
|
---|
24 | Copyright Notice
|
---|
25 |
|
---|
26 | Copyright (C) The Internet Society (2006).
|
---|
27 |
|
---|
28 | Abstract
|
---|
29 |
|
---|
30 | The Lightweight Directory Access Protocol (LDAP) is an Internet
|
---|
31 | protocol for accessing distributed directory services that act in
|
---|
32 | accordance with X.500 data and service models. This document
|
---|
33 | describes the X.500 Directory Information Models, as used in LDAP.
|
---|
34 |
|
---|
35 |
|
---|
36 |
|
---|
37 |
|
---|
38 |
|
---|
39 |
|
---|
40 |
|
---|
41 |
|
---|
42 |
|
---|
43 |
|
---|
44 |
|
---|
45 |
|
---|
46 |
|
---|
47 |
|
---|
48 |
|
---|
49 |
|
---|
50 |
|
---|
51 |
|
---|
52 |
|
---|
53 |
|
---|
54 |
|
---|
55 |
|
---|
56 |
|
---|
57 |
|
---|
58 | Zeilenga Standards Track [Page 1]
|
---|
59 | |
---|
60 |
|
---|
61 | RFC 4512 LDAP Models June 2006
|
---|
62 |
|
---|
63 |
|
---|
64 | Table of Contents
|
---|
65 |
|
---|
66 | 1. Introduction ....................................................3
|
---|
67 | 1.1. Relationship to Other LDAP Specifications ..................3
|
---|
68 | 1.2. Relationship to X.501 ......................................4
|
---|
69 | 1.3. Conventions ................................................4
|
---|
70 | 1.4. Common ABNF Productions ....................................4
|
---|
71 | 2. Model of Directory User Information .............................6
|
---|
72 | 2.1. The Directory Information Tree .............................7
|
---|
73 | 2.2. Structure of an Entry ......................................7
|
---|
74 | 2.3. Naming of Entries ..........................................8
|
---|
75 | 2.4. Object Classes .............................................9
|
---|
76 | 2.5. Attribute Descriptions ....................................12
|
---|
77 | 2.6. Alias Entries .............................................16
|
---|
78 | 3. Directory Administrative and Operational Information ...........17
|
---|
79 | 3.1. Subtrees ..................................................17
|
---|
80 | 3.2. Subentries ................................................18
|
---|
81 | 3.3. The 'objectClass' attribute ...............................18
|
---|
82 | 3.4. Operational Attributes ....................................19
|
---|
83 | 4. Directory Schema ...............................................22
|
---|
84 | 4.1. Schema Definitions ........................................23
|
---|
85 | 4.2. Subschema Subentries ......................................32
|
---|
86 | 4.3. 'extensibleObject' object class ...........................35
|
---|
87 | 4.4. Subschema Discovery .......................................35
|
---|
88 | 5. DSA (Server) Informational Model ...............................36
|
---|
89 | 5.1. Server-Specific Data Requirements .........................36
|
---|
90 | 6. Other Considerations ...........................................40
|
---|
91 | 6.1. Preservation of User Information ..........................40
|
---|
92 | 6.2. Short Names ...............................................41
|
---|
93 | 6.3. Cache and Shadowing .......................................41
|
---|
94 | 7. Implementation Guidelines ......................................42
|
---|
95 | 7.1. Server Guidelines .........................................42
|
---|
96 | 7.2. Client Guidelines .........................................42
|
---|
97 | 8. Security Considerations ........................................43
|
---|
98 | 9. IANA Considerations ............................................43
|
---|
99 | 10. Acknowledgements ..............................................44
|
---|
100 | 11. Normative References ..........................................45
|
---|
101 | Appendix A. Changes ...............................................47
|
---|
102 | A.1. Changes to RFC 2251 .......................................47
|
---|
103 | A.2. Changes to RFC 2252 .......................................49
|
---|
104 | A.3. Changes to RFC 2256 .......................................50
|
---|
105 | A.4. Changes to RFC 3674 .......................................51
|
---|
106 |
|
---|
107 |
|
---|
108 |
|
---|
109 |
|
---|
110 |
|
---|
111 |
|
---|
112 |
|
---|
113 |
|
---|
114 |
|
---|
115 | Zeilenga Standards Track [Page 2]
|
---|
116 | |
---|
117 |
|
---|
118 | RFC 4512 LDAP Models June 2006
|
---|
119 |
|
---|
120 |
|
---|
121 | 1. Introduction
|
---|
122 |
|
---|
123 | This document discusses the X.500 Directory Information Models
|
---|
124 | [X.501], as used by the Lightweight Directory Access Protocol (LDAP)
|
---|
125 | [RFC4510].
|
---|
126 |
|
---|
127 | The Directory is "a collection of open systems cooperating to provide
|
---|
128 | directory services" [X.500]. The information held in the Directory
|
---|
129 | is collectively known as the Directory Information Base (DIB). A
|
---|
130 | Directory user, which may be a human or other entity, accesses the
|
---|
131 | Directory through a client (or Directory User Agent (DUA)). The
|
---|
132 | client, on behalf of the directory user, interacts with one or more
|
---|
133 | servers (or Directory System Agents (DSA)). A server holds a
|
---|
134 | fragment of the DIB.
|
---|
135 |
|
---|
136 | The DIB contains two classes of information:
|
---|
137 |
|
---|
138 | 1) user information (e.g., information provided and administrated
|
---|
139 | by users). Section 2 describes the Model of User Information.
|
---|
140 |
|
---|
141 | 2) administrative and operational information (e.g., information
|
---|
142 | used to administer and/or operate the directory). Section 3
|
---|
143 | describes the model of Directory Administrative and Operational
|
---|
144 | Information.
|
---|
145 |
|
---|
146 | These two models, referred to as the generic Directory Information
|
---|
147 | Models, describe how information is represented in the Directory.
|
---|
148 | These generic models provide a framework for other information
|
---|
149 | models. Section 4 discusses the subschema information model and
|
---|
150 | subschema discovery. Section 5 discusses the DSA (Server)
|
---|
151 | Informational Model.
|
---|
152 |
|
---|
153 | Other X.500 information models (such as access control distribution
|
---|
154 | knowledge and replication knowledge information models) may be
|
---|
155 | adapted for use in LDAP. Specification of how these models apply to
|
---|
156 | LDAP is left to future documents.
|
---|
157 |
|
---|
158 | 1.1. Relationship to Other LDAP Specifications
|
---|
159 |
|
---|
160 | This document is a integral part of the LDAP technical specification
|
---|
161 | [RFC4510], which obsoletes the previously defined LDAP technical
|
---|
162 | specification, RFC 3377, in its entirety.
|
---|
163 |
|
---|
164 | This document obsoletes RFC 2251, Sections 3.2 and 3.4, as well as
|
---|
165 | portions of Sections 4 and 6. Appendix A.1 summarizes changes to
|
---|
166 | these sections. The remainder of RFC 2251 is obsoleted by the
|
---|
167 | [RFC4511], [RFC4513], and [RFC4510] documents.
|
---|
168 |
|
---|
169 |
|
---|
170 |
|
---|
171 |
|
---|
172 | Zeilenga Standards Track [Page 3]
|
---|
173 | |
---|
174 |
|
---|
175 | RFC 4512 LDAP Models June 2006
|
---|
176 |
|
---|
177 |
|
---|
178 | This document obsoletes RFC 2252, Sections 4, 5, and 7. Appendix A.2
|
---|
179 | summarizes changes to these sections. The remainder of RFC 2252 is
|
---|
180 | obsoleted by [RFC4517].
|
---|
181 |
|
---|
182 | This document obsoletes RFC 2256, Sections 5.1, 5.2, 7.1, and 7.2.
|
---|
183 | Appendix A.3 summarizes changes to these sections. The remainder of
|
---|
184 | RFC 2256 is obsoleted by [RFC4519] and [RFC4517].
|
---|
185 |
|
---|
186 | This document obsoletes RFC 3674 in its entirety. Appendix A.4
|
---|
187 | summarizes changes since RFC 3674.
|
---|
188 |
|
---|
189 | 1.2. Relationship to X.501
|
---|
190 |
|
---|
191 | This document includes material, with and without adaptation, from
|
---|
192 | [X.501] as necessary to describe this protocol. These adaptations
|
---|
193 | (and any other differences herein) apply to this protocol, and only
|
---|
194 | this protocol.
|
---|
195 |
|
---|
196 | 1.3. Conventions
|
---|
197 |
|
---|
198 | The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
|
---|
199 | "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
|
---|
200 | document are to be interpreted as described in BCP 14 [RFC2119].
|
---|
201 |
|
---|
202 | Schema definitions are provided using LDAP description formats (as
|
---|
203 | defined in Section 4.1). Definitions provided here are formatted
|
---|
204 | (line wrapped) for readability. Matching rules and LDAP syntaxes
|
---|
205 | referenced in these definitions are specified in [RFC4517].
|
---|
206 |
|
---|
207 | 1.4. Common ABNF Productions
|
---|
208 |
|
---|
209 | A number of syntaxes in this document are described using Augmented
|
---|
210 | Backus-Naur Form (ABNF) [RFC4234]. These syntaxes (as well as a
|
---|
211 | number of syntaxes defined in other documents) rely on the following
|
---|
212 | common productions:
|
---|
213 |
|
---|
214 | keystring = leadkeychar *keychar
|
---|
215 | leadkeychar = ALPHA
|
---|
216 | keychar = ALPHA / DIGIT / HYPHEN
|
---|
217 | number = DIGIT / ( LDIGIT 1*DIGIT )
|
---|
218 |
|
---|
219 | ALPHA = %x41-5A / %x61-7A ; "A"-"Z" / "a"-"z"
|
---|
220 | DIGIT = %x30 / LDIGIT ; "0"-"9"
|
---|
221 | LDIGIT = %x31-39 ; "1"-"9"
|
---|
222 | HEX = DIGIT / %x41-46 / %x61-66 ; "0"-"9" / "A"-"F" / "a"-"f"
|
---|
223 |
|
---|
224 | SP = 1*SPACE ; one or more " "
|
---|
225 | WSP = 0*SPACE ; zero or more " "
|
---|
226 |
|
---|
227 |
|
---|
228 |
|
---|
229 | Zeilenga Standards Track [Page 4]
|
---|
230 | |
---|
231 |
|
---|
232 | RFC 4512 LDAP Models June 2006
|
---|
233 |
|
---|
234 |
|
---|
235 | NULL = %x00 ; null (0)
|
---|
236 | SPACE = %x20 ; space (" ")
|
---|
237 | DQUOTE = %x22 ; quote (""")
|
---|
238 | SHARP = %x23 ; octothorpe (or sharp sign) ("#")
|
---|
239 | DOLLAR = %x24 ; dollar sign ("$")
|
---|
240 | SQUOTE = %x27 ; single quote ("'")
|
---|
241 | LPAREN = %x28 ; left paren ("(")
|
---|
242 | RPAREN = %x29 ; right paren (")")
|
---|
243 | PLUS = %x2B ; plus sign ("+")
|
---|
244 | COMMA = %x2C ; comma (",")
|
---|
245 | HYPHEN = %x2D ; hyphen ("-")
|
---|
246 | DOT = %x2E ; period (".")
|
---|
247 | SEMI = %x3B ; semicolon (";")
|
---|
248 | LANGLE = %x3C ; left angle bracket ("<")
|
---|
249 | EQUALS = %x3D ; equals sign ("=")
|
---|
250 | RANGLE = %x3E ; right angle bracket (">")
|
---|
251 | ESC = %x5C ; backslash ("\")
|
---|
252 | USCORE = %x5F ; underscore ("_")
|
---|
253 | LCURLY = %x7B ; left curly brace "{"
|
---|
254 | RCURLY = %x7D ; right curly brace "}"
|
---|
255 |
|
---|
256 | ; Any UTF-8 [RFC3629] encoded Unicode [Unicode] character
|
---|
257 | UTF8 = UTF1 / UTFMB
|
---|
258 | UTFMB = UTF2 / UTF3 / UTF4
|
---|
259 | UTF0 = %x80-BF
|
---|
260 | UTF1 = %x00-7F
|
---|
261 | UTF2 = %xC2-DF UTF0
|
---|
262 | UTF3 = %xE0 %xA0-BF UTF0 / %xE1-EC 2(UTF0) /
|
---|
263 | %xED %x80-9F UTF0 / %xEE-EF 2(UTF0)
|
---|
264 | UTF4 = %xF0 %x90-BF 2(UTF0) / %xF1-F3 3(UTF0) /
|
---|
265 | %xF4 %x80-8F 2(UTF0)
|
---|
266 |
|
---|
267 | OCTET = %x00-FF ; Any octet (8-bit data unit)
|
---|
268 |
|
---|
269 | Object identifiers (OIDs) [X.680] are represented in LDAP using a
|
---|
270 | dot-decimal format conforming to the ABNF:
|
---|
271 |
|
---|
272 | numericoid = number 1*( DOT number )
|
---|
273 |
|
---|
274 | Short names, also known as descriptors, are used as more readable
|
---|
275 | aliases for object identifiers. Short names are case insensitive and
|
---|
276 | conform to the ABNF:
|
---|
277 |
|
---|
278 | descr = keystring
|
---|
279 |
|
---|
280 |
|
---|
281 |
|
---|
282 |
|
---|
283 |
|
---|
284 |
|
---|
285 |
|
---|
286 | Zeilenga Standards Track [Page 5]
|
---|
287 | |
---|
288 |
|
---|
289 | RFC 4512 LDAP Models June 2006
|
---|
290 |
|
---|
291 |
|
---|
292 | Where either an object identifier or a short name may be specified,
|
---|
293 | the following production is used:
|
---|
294 |
|
---|
295 | oid = descr / numericoid
|
---|
296 |
|
---|
297 | While the <descr> form is generally preferred when the usage is
|
---|
298 | restricted to short names referring to object identifiers that
|
---|
299 | identify like kinds of objects (e.g., attribute type descriptions,
|
---|
300 | matching rule descriptions, object class descriptions), the
|
---|
301 | <numericoid> form should be used when the object identifiers may
|
---|
302 | identify multiple kinds of objects or when an unambiguous short name
|
---|
303 | (descriptor) is not available.
|
---|
304 |
|
---|
305 | Implementations SHOULD treat short names (descriptors) used in an
|
---|
306 | ambiguous manner (as discussed above) as unrecognized.
|
---|
307 |
|
---|
308 | Short Names (descriptors) are discussed further in Section 6.2.
|
---|
309 |
|
---|
310 | 2. Model of Directory User Information
|
---|
311 |
|
---|
312 | As [X.501] states:
|
---|
313 |
|
---|
314 | The purpose of the Directory is to hold, and provide access to,
|
---|
315 | information about objects of interest (objects) in some 'world'.
|
---|
316 | An object can be anything which is identifiable (can be named).
|
---|
317 |
|
---|
318 | An object class is an identified family of objects, or conceivable
|
---|
319 | objects, which share certain characteristics. Every object
|
---|
320 | belongs to at least one class. An object class may be a subclass
|
---|
321 | of other object classes, in which case the members of the former
|
---|
322 | class, the subclass, are also considered to be members of the
|
---|
323 | latter classes, the superclasses. There may be subclasses of
|
---|
324 | subclasses, etc., to an arbitrary depth.
|
---|
325 |
|
---|
326 | A directory entry, a named collection of information, is the basic
|
---|
327 | unit of information held in the Directory. There are multiple kinds
|
---|
328 | of directory entries.
|
---|
329 |
|
---|
330 | An object entry represents a particular object. An alias entry
|
---|
331 | provides alternative naming. A subentry holds administrative and/or
|
---|
332 | operational information.
|
---|
333 |
|
---|
334 | The set of entries representing the DIB are organized hierarchically
|
---|
335 | in a tree structure known as the Directory Information Tree (DIT).
|
---|
336 |
|
---|
337 | Section 2.1 describes the Directory Information Tree.
|
---|
338 | Section 2.2 discusses the structure of entries.
|
---|
339 | Section 2.3 discusses naming of entries.
|
---|
340 |
|
---|
341 |
|
---|
342 |
|
---|
343 | Zeilenga Standards Track [Page 6]
|
---|
344 | |
---|
345 |
|
---|
346 | RFC 4512 LDAP Models June 2006
|
---|
347 |
|
---|
348 |
|
---|
349 | Section 2.4 discusses object classes.
|
---|
350 | Section 2.5 discusses attribute descriptions.
|
---|
351 | Section 2.6 discusses alias entries.
|
---|
352 |
|
---|
353 | 2.1. The Directory Information Tree
|
---|
354 |
|
---|
355 | As noted above, the DIB is composed of a set of entries organized
|
---|
356 | hierarchically in a tree structure known as the Directory Information
|
---|
357 | Tree (DIT); specifically, a tree where vertices are the entries.
|
---|
358 |
|
---|
359 | The arcs between vertices define relations between entries. If an
|
---|
360 | arc exists from X to Y, then the entry at X is the immediate superior
|
---|
361 | of Y, and Y is the immediate subordinate of X. An entry's superiors
|
---|
362 | are the entry's immediate superior and its superiors. An entry's
|
---|
363 | subordinates are all of its immediate subordinates and their
|
---|
364 | subordinates.
|
---|
365 |
|
---|
366 | Similarly, the superior/subordinate relationship between object
|
---|
367 | entries can be used to derive a relation between the objects they
|
---|
368 | represent. DIT structure rules can be used to govern relationships
|
---|
369 | between objects.
|
---|
370 |
|
---|
371 | Note: An entry's immediate superior is also known as the entry's
|
---|
372 | parent, and an entry's immediate subordinate is also known as
|
---|
373 | the entry's child. Entries that have the same parent are known
|
---|
374 | as siblings.
|
---|
375 |
|
---|
376 | 2.2. Structure of an Entry
|
---|
377 |
|
---|
378 | An entry consists of a set of attributes that hold information about
|
---|
379 | the object that the entry represents. Some attributes represent user
|
---|
380 | information and are called user attributes. Other attributes
|
---|
381 | represent operational and/or administrative information and are
|
---|
382 | called operational attributes.
|
---|
383 |
|
---|
384 | An attribute is an attribute description (a type and zero or more
|
---|
385 | options) with one or more associated values. An attribute is often
|
---|
386 | referred to by its attribute description. For example, the
|
---|
387 | 'givenName' attribute is the attribute that consists of the attribute
|
---|
388 | description 'givenName' (the 'givenName' attribute type [RFC4519] and
|
---|
389 | zero options) and one or more associated values.
|
---|
390 |
|
---|
391 | The attribute type governs whether the attribute can have multiple
|
---|
392 | values, the syntax and matching rules used to construct and compare
|
---|
393 | values of that attribute, and other functions. Options indicate
|
---|
394 | subtypes and other functions.
|
---|
395 |
|
---|
396 | Attribute values conform to the defined syntax of the attribute type.
|
---|
397 |
|
---|
398 |
|
---|
399 |
|
---|
400 | Zeilenga Standards Track [Page 7]
|
---|
401 | |
---|
402 |
|
---|
403 | RFC 4512 LDAP Models June 2006
|
---|
404 |
|
---|
405 |
|
---|
406 | No two values of an attribute may be equivalent. Two values are
|
---|
407 | considered equivalent if and only if they would match according to
|
---|
408 | the equality matching rule of the attribute type. Or, if the
|
---|
409 | attribute type is defined with no equality matching rule, two values
|
---|
410 | are equivalent if and only if they are identical. (See 2.5.1 for
|
---|
411 | other restrictions.)
|
---|
412 |
|
---|
413 | For example, a 'givenName' attribute can have more than one value,
|
---|
414 | they must be Directory Strings, and they are case insensitive. A
|
---|
415 | 'givenName' attribute cannot hold both "John" and "JOHN", as these
|
---|
416 | are equivalent values per the equality matching rule of the attribute
|
---|
417 | type.
|
---|
418 |
|
---|
419 | Additionally, no attribute is to have a value that is not equivalent
|
---|
420 | to itself. For example, the 'givenName' attribute cannot have as a
|
---|
421 | value a directory string that includes the REPLACEMENT CHARACTER
|
---|
422 | (U+FFFD) code point, as matching involving that directory string is
|
---|
423 | Undefined per this attribute's equality matching rule.
|
---|
424 |
|
---|
425 | When an attribute is used for naming of the entry, one and only one
|
---|
426 | value of the attribute is used in forming the Relative Distinguished
|
---|
427 | Name. This value is known as a distinguished value.
|
---|
428 |
|
---|
429 | 2.3. Naming of Entries
|
---|
430 |
|
---|
431 | 2.3.1. Relative Distinguished Names
|
---|
432 |
|
---|
433 | Each entry is named relative to its immediate superior. This
|
---|
434 | relative name, known as its Relative Distinguished Name (RDN)
|
---|
435 | [X.501], is composed of an unordered set of one or more attribute
|
---|
436 | value assertions (AVA) consisting of an attribute description with
|
---|
437 | zero options and an attribute value. These AVAs are chosen to match
|
---|
438 | attribute values (each a distinguished value) of the entry.
|
---|
439 |
|
---|
440 | An entry's relative distinguished name must be unique among all
|
---|
441 | immediate subordinates of the entry's immediate superior (i.e., all
|
---|
442 | siblings).
|
---|
443 |
|
---|
444 | The following are examples of string representations of RDNs
|
---|
445 | [RFC4514]:
|
---|
446 |
|
---|
447 | UID=12345
|
---|
448 | OU=Engineering
|
---|
449 | CN=Kurt Zeilenga+L=Redwood Shores
|
---|
450 |
|
---|
451 | The last is an example of a multi-valued RDN; that is, an RDN
|
---|
452 | composed of multiple AVAs.
|
---|
453 |
|
---|
454 |
|
---|
455 |
|
---|
456 |
|
---|
457 | Zeilenga Standards Track [Page 8]
|
---|
458 | |
---|
459 |
|
---|
460 | RFC 4512 LDAP Models June 2006
|
---|
461 |
|
---|
462 |
|
---|
463 | 2.3.2. Distinguished Names
|
---|
464 |
|
---|
465 | An entry's fully qualified name, known as its Distinguished Name (DN)
|
---|
466 | [X.501], is the concatenation of its RDN and its immediate superior's
|
---|
467 | DN. A Distinguished Name unambiguously refers to an entry in the
|
---|
468 | tree. The following are examples of string representations of DNs
|
---|
469 | [RFC4514]:
|
---|
470 |
|
---|
471 | UID=nobody@example.com,DC=example,DC=com
|
---|
472 | CN=John Smith,OU=Sales,O=ACME Limited,L=Moab,ST=Utah,C=US
|
---|
473 |
|
---|
474 | 2.3.3. Alias Names
|
---|
475 |
|
---|
476 | An alias, or alias name, is "an name for an object, provided by the
|
---|
477 | use of alias entries" [X.501]. Alias entries are described in
|
---|
478 | Section 2.6.
|
---|
479 |
|
---|
480 | 2.4. Object Classes
|
---|
481 |
|
---|
482 | An object class is "an identified family of objects (or conceivable
|
---|
483 | objects) that share certain characteristics" [X.501].
|
---|
484 |
|
---|
485 | As defined in [X.501]:
|
---|
486 |
|
---|
487 | Object classes are used in the Directory for a number of purposes:
|
---|
488 |
|
---|
489 | - describing and categorizing objects and the entries that
|
---|
490 | correspond to these objects;
|
---|
491 |
|
---|
492 | - where appropriate, controlling the operation of the Directory;
|
---|
493 |
|
---|
494 | - regulating, in conjunction with DIT structure rule
|
---|
495 | specifications, the position of entries in the DIT;
|
---|
496 |
|
---|
497 | - regulating, in conjunction with DIT content rule
|
---|
498 | specifications, the attributes that are contained in entries;
|
---|
499 |
|
---|
500 | - identifying classes of entry that are to be associated with a
|
---|
501 | particular policy by the appropriate administrative authority.
|
---|
502 |
|
---|
503 | An object class (a subclass) may be derived from an object class
|
---|
504 | (its direct superclass) which is itself derived from an even more
|
---|
505 | generic object class. For structural object classes, this process
|
---|
506 | stops at the most generic object class, 'top' (defined in Section
|
---|
507 | 2.4.1). An ordered set of superclasses up to the most superior
|
---|
508 | object class of an object class is its superclass chain.
|
---|
509 |
|
---|
510 |
|
---|
511 |
|
---|
512 |
|
---|
513 |
|
---|
514 | Zeilenga Standards Track [Page 9]
|
---|
515 | |
---|
516 |
|
---|
517 | RFC 4512 LDAP Models June 2006
|
---|
518 |
|
---|
519 |
|
---|
520 | An object class may be derived from two or more direct
|
---|
521 | superclasses (superclasses not part of the same superclass chain).
|
---|
522 | This feature of subclassing is termed multiple inheritance.
|
---|
523 |
|
---|
524 | Each object class identifies the set of attributes required to be
|
---|
525 | present in entries belonging to the class and the set of attributes
|
---|
526 | allowed to be present in entries belonging to the class. As an entry
|
---|
527 | of a class must meet the requirements of each class it belongs to, it
|
---|
528 | can be said that an object class inherits the sets of allowed and
|
---|
529 | required attributes from its superclasses. A subclass can identify
|
---|
530 | an attribute allowed by its superclass as being required. If an
|
---|
531 | attribute is a member of both sets, it is required to be present.
|
---|
532 |
|
---|
533 | Each object class is defined to be one of three kinds of object
|
---|
534 | classes: Abstract, Structural, or Auxiliary.
|
---|
535 |
|
---|
536 | Each object class is identified by an object identifier (OID) and,
|
---|
537 | optionally, one or more short names (descriptors).
|
---|
538 |
|
---|
539 | 2.4.1. Abstract Object Classes
|
---|
540 |
|
---|
541 | An abstract object class, as the name implies, provides a base of
|
---|
542 | characteristics from which other object classes can be defined to
|
---|
543 | inherit from. An entry cannot belong to an abstract object class
|
---|
544 | unless it belongs to a structural or auxiliary class that inherits
|
---|
545 | from that abstract class.
|
---|
546 |
|
---|
547 | Abstract object classes cannot derive from structural or auxiliary
|
---|
548 | object classes.
|
---|
549 |
|
---|
550 | All structural object classes derive (directly or indirectly) from
|
---|
551 | the 'top' abstract object class. Auxiliary object classes do not
|
---|
552 | necessarily derive from 'top'.
|
---|
553 |
|
---|
554 | The following is the object class definition (see Section 4.1.1) for
|
---|
555 | the 'top' object class:
|
---|
556 |
|
---|
557 | ( 2.5.6.0 NAME 'top' ABSTRACT MUST objectClass )
|
---|
558 |
|
---|
559 | All entries belong to the 'top' abstract object class.
|
---|
560 |
|
---|
561 |
|
---|
562 |
|
---|
563 |
|
---|
564 |
|
---|
565 |
|
---|
566 |
|
---|
567 |
|
---|
568 |
|
---|
569 |
|
---|
570 |
|
---|
571 | Zeilenga Standards Track [Page 10]
|
---|
572 | |
---|
573 |
|
---|
574 | RFC 4512 LDAP Models June 2006
|
---|
575 |
|
---|
576 |
|
---|
577 | 2.4.2. Structural Object Classes
|
---|
578 |
|
---|
579 | As stated in [X.501]:
|
---|
580 |
|
---|
581 | An object class defined for use in the structural specification of
|
---|
582 | the DIT is termed a structural object class. Structural object
|
---|
583 | classes are used in the definition of the structure of the names
|
---|
584 | of the objects for compliant entries.
|
---|
585 |
|
---|
586 | An object or alias entry is characterized by precisely one
|
---|
587 | structural object class superclass chain which has a single
|
---|
588 | structural object class as the most subordinate object class.
|
---|
589 | This structural object class is referred to as the structural
|
---|
590 | object class of the entry.
|
---|
591 |
|
---|
592 | Structural object classes are related to associated entries:
|
---|
593 |
|
---|
594 | - an entry conforming to a structural object class shall
|
---|
595 | represent the real-world object constrained by the object
|
---|
596 | class;
|
---|
597 |
|
---|
598 | - DIT structure rules only refer to structural object classes;
|
---|
599 | the structural object class of an entry is used to specify the
|
---|
600 | position of the entry in the DIT;
|
---|
601 |
|
---|
602 | - the structural object class of an entry is used, along with an
|
---|
603 | associated DIT content rule, to control the content of an
|
---|
604 | entry.
|
---|
605 |
|
---|
606 | The structural object class of an entry shall not be changed.
|
---|
607 |
|
---|
608 | Each structural object class is a (direct or indirect) subclass of
|
---|
609 | the 'top' abstract object class.
|
---|
610 |
|
---|
611 | Structural object classes cannot subclass auxiliary object classes.
|
---|
612 |
|
---|
613 | Each entry is said to belong to its structural object class as well
|
---|
614 | as all classes in its structural object class's superclass chain.
|
---|
615 |
|
---|
616 | 2.4.3. Auxiliary Object Classes
|
---|
617 |
|
---|
618 | Auxiliary object classes are used to augment the characteristics of
|
---|
619 | entries. They are commonly used to augment the sets of attributes
|
---|
620 | required and allowed to be present in an entry. They can be used to
|
---|
621 | describe entries or classes of entries.
|
---|
622 |
|
---|
623 | Auxiliary object classes cannot subclass structural object classes.
|
---|
624 |
|
---|
625 |
|
---|
626 |
|
---|
627 |
|
---|
628 | Zeilenga Standards Track [Page 11]
|
---|
629 | |
---|
630 |
|
---|
631 | RFC 4512 LDAP Models June 2006
|
---|
632 |
|
---|
633 |
|
---|
634 | An entry can belong to any subset of the set of auxiliary object
|
---|
635 | classes allowed by the DIT content rule associated with the
|
---|
636 | structural object class of the entry. If no DIT content rule is
|
---|
637 | associated with the structural object class of the entry, the entry
|
---|
638 | cannot belong to any auxiliary object class.
|
---|
639 |
|
---|
640 | The set of auxiliary object classes that an entry belongs to can
|
---|
641 | change over time.
|
---|
642 |
|
---|
643 | 2.5. Attribute Descriptions
|
---|
644 |
|
---|
645 | An attribute description is composed of an attribute type (see
|
---|
646 | Section 2.5.1) and a set of zero or more attribute options (see
|
---|
647 | Section 2.5.2).
|
---|
648 |
|
---|
649 | An attribute description is represented by the ABNF:
|
---|
650 |
|
---|
651 | attributedescription = attributetype options
|
---|
652 | attributetype = oid
|
---|
653 | options = *( SEMI option )
|
---|
654 | option = 1*keychar
|
---|
655 |
|
---|
656 | where <attributetype> identifies the attribute type and each <option>
|
---|
657 | identifies an attribute option. Both <attributetype> and <option>
|
---|
658 | productions are case insensitive. The order in which <option>s
|
---|
659 | appear is irrelevant. That is, any two <attributedescription>s that
|
---|
660 | consist of the same <attributetype> and same set of <option>s are
|
---|
661 | equivalent.
|
---|
662 |
|
---|
663 | Examples of valid attribute descriptions:
|
---|
664 |
|
---|
665 | 2.5.4.0
|
---|
666 | cn;lang-de;lang-en
|
---|
667 | owner
|
---|
668 |
|
---|
669 | An attribute description with an unrecognized attribute type is to be
|
---|
670 | treated as unrecognized. Servers SHALL treat an attribute
|
---|
671 | description with an unrecognized attribute option as unrecognized.
|
---|
672 | Clients MAY treat an unrecognized attribute option as a tagging
|
---|
673 | option (see Section 2.5.2.1).
|
---|
674 |
|
---|
675 | All attributes of an entry must have distinct attribute descriptions.
|
---|
676 |
|
---|
677 | 2.5.1. Attribute Types
|
---|
678 |
|
---|
679 | An attribute type governs whether the attribute can have multiple
|
---|
680 | values, the syntax and matching rules used to construct and compare
|
---|
681 | values of that attribute, and other functions.
|
---|
682 |
|
---|
683 |
|
---|
684 |
|
---|
685 | Zeilenga Standards Track [Page 12]
|
---|
686 | |
---|
687 |
|
---|
688 | RFC 4512 LDAP Models June 2006
|
---|
689 |
|
---|
690 |
|
---|
691 | If no equality matching is specified for the attribute type:
|
---|
692 |
|
---|
693 | - the attribute (of the type) cannot be used for naming;
|
---|
694 | - when adding the attribute (or replacing all values), no two
|
---|
695 | values may be equivalent (see 2.2);
|
---|
696 | - individual values of a multi-valued attribute are not to be
|
---|
697 | independently added or deleted;
|
---|
698 | - attribute value assertions (such as matching in search filters
|
---|
699 | and comparisons) using values of such a type cannot be
|
---|
700 | performed.
|
---|
701 |
|
---|
702 | Otherwise, the specified equality matching rule is to be used to
|
---|
703 | evaluate attribute value assertions concerning the attribute type.
|
---|
704 | The specified equality rule is to be transitive and commutative.
|
---|
705 |
|
---|
706 | The attribute type indicates whether the attribute is a user
|
---|
707 | attribute or an operational attribute. If operational, the attribute
|
---|
708 | type indicates the operational usage and whether or not the attribute
|
---|
709 | is modifiable by users. Operational attributes are discussed in
|
---|
710 | Section 3.4.
|
---|
711 |
|
---|
712 | An attribute type (a subtype) may derive from a more generic
|
---|
713 | attribute type (a direct supertype). The following restrictions
|
---|
714 | apply to subtyping:
|
---|
715 |
|
---|
716 | - a subtype must have the same usage as its direct supertype,
|
---|
717 | - a subtype's syntax must be the same, or a refinement of, its
|
---|
718 | supertype's syntax, and
|
---|
719 | - a subtype must be collective [RFC3671] if its supertype is
|
---|
720 | collective.
|
---|
721 |
|
---|
722 | An attribute description consisting of a subtype and no options is
|
---|
723 | said to be the direct description subtype of the attribute
|
---|
724 | description consisting of the subtype's direct supertype and no
|
---|
725 | options.
|
---|
726 |
|
---|
727 | Each attribute type is identified by an object identifier (OID) and,
|
---|
728 | optionally, one or more short names (descriptors).
|
---|
729 |
|
---|
730 | 2.5.2. Attribute Options
|
---|
731 |
|
---|
732 | There are multiple kinds of attribute description options. The LDAP
|
---|
733 | technical specification details one kind: tagging options.
|
---|
734 |
|
---|
735 | Not all options can be associated with attributes held in the
|
---|
736 | directory. Tagging options can be.
|
---|
737 |
|
---|
738 |
|
---|
739 |
|
---|
740 |
|
---|
741 |
|
---|
742 | Zeilenga Standards Track [Page 13]
|
---|
743 | |
---|
744 |
|
---|
745 | RFC 4512 LDAP Models June 2006
|
---|
746 |
|
---|
747 |
|
---|
748 | Not all options can be used in conjunction with all attribute types.
|
---|
749 | In such cases, the attribute description is to be treated as
|
---|
750 | unrecognized.
|
---|
751 |
|
---|
752 | An attribute description that contains mutually exclusive options
|
---|
753 | shall be treated as unrecognized. That is, "cn;x-bar;x-foo", where
|
---|
754 | "x-foo" and "x-bar" are mutually exclusive, is to be treated as
|
---|
755 | unrecognized.
|
---|
756 |
|
---|
757 | Other kinds of options may be specified in future documents. These
|
---|
758 | documents must detail how new kinds of options they define relate to
|
---|
759 | tagging options. In particular, these documents must detail whether
|
---|
760 | or not new kinds of options can be associated with attributes held in
|
---|
761 | the directory, how new kinds of options affect transfer of attribute
|
---|
762 | values, and how new kinds of options are treated in attribute
|
---|
763 | description hierarchies.
|
---|
764 |
|
---|
765 | Options are represented as short, case-insensitive textual strings
|
---|
766 | conforming to the <option> production defined in Section 2.5 of this
|
---|
767 | document.
|
---|
768 |
|
---|
769 | Procedures for registering options are detailed in BCP 64, RFC 4520
|
---|
770 | [RFC4520].
|
---|
771 |
|
---|
772 | 2.5.2.1. Tagging Options
|
---|
773 |
|
---|
774 | Attributes held in the directory can have attribute descriptions with
|
---|
775 | any number of tagging options. Tagging options are never mutually
|
---|
776 | exclusive.
|
---|
777 |
|
---|
778 | An attribute description with N tagging options is a direct
|
---|
779 | (description) subtype of all attribute descriptions of the same
|
---|
780 | attribute type and all but one of the N options. If the attribute
|
---|
781 | type has a supertype, then the attribute description is also a direct
|
---|
782 | (description) subtype of the attribute description of the supertype
|
---|
783 | and the N tagging options. That is, 'cn;lang-de;lang-en' is a direct
|
---|
784 | (description) subtype of 'cn;lang-de', 'cn;lang-en', and
|
---|
785 | 'name;lang-de;lang-en' ('cn' is a subtype of 'name'; both are defined
|
---|
786 | in [RFC4519]).
|
---|
787 |
|
---|
788 | 2.5.3. Attribute Description Hierarchies
|
---|
789 |
|
---|
790 | An attribute description can be the direct subtype of zero or more
|
---|
791 | other attribute descriptions as indicated by attribute type subtyping
|
---|
792 | (as described in Section 2.5.1) or attribute tagging option subtyping
|
---|
793 | (as described in Section 2.5.2.1). These subtyping relationships are
|
---|
794 | used to form hierarchies of attribute descriptions and attributes.
|
---|
795 |
|
---|
796 |
|
---|
797 |
|
---|
798 |
|
---|
799 | Zeilenga Standards Track [Page 14]
|
---|
800 | |
---|
801 |
|
---|
802 | RFC 4512 LDAP Models June 2006
|
---|
803 |
|
---|
804 |
|
---|
805 | As adapted from [X.501]:
|
---|
806 |
|
---|
807 | Attribute hierarchies allow access to the DIB with varying degrees
|
---|
808 | of granularity. This is achieved by allowing the value components
|
---|
809 | of attributes to be accessed by using either their specific
|
---|
810 | attribute description (a direct reference to the attribute) or a
|
---|
811 | more generic attribute description (an indirect reference).
|
---|
812 |
|
---|
813 | Semantically related attributes may be placed in a hierarchical
|
---|
814 | relationship, the more specialized being placed subordinate to the
|
---|
815 | more generalized. Searching for or retrieving attributes and
|
---|
816 | their values is made easier by quoting the more generalized
|
---|
817 | attribute description; a filter item so specified is evaluated for
|
---|
818 | the more specialized descriptions as well as for the quoted
|
---|
819 | description.
|
---|
820 |
|
---|
821 | Where subordinate specialized descriptions are selected to be
|
---|
822 | returned as part of a search result these descriptions shall be
|
---|
823 | returned if available. Where the more general descriptions are
|
---|
824 | selected to be returned as part of a search result both the
|
---|
825 | general and the specialized descriptions shall be returned, if
|
---|
826 | available. An attribute value shall always be returned as a value
|
---|
827 | of its own attribute description.
|
---|
828 |
|
---|
829 | All of the attribute descriptions in an attribute hierarchy are
|
---|
830 | treated as distinct and unrelated descriptions for user
|
---|
831 | modification of entry content.
|
---|
832 |
|
---|
833 | An attribute value stored in an object or alias entry is of
|
---|
834 | precisely one attribute description. The description is indicated
|
---|
835 | when the value is originally added to the entry.
|
---|
836 |
|
---|
837 | For the purpose of subschema administration of the entry, a
|
---|
838 | specification that an attribute is required is fulfilled if the entry
|
---|
839 | contains a value of an attribute description belonging to an
|
---|
840 | attribute hierarchy where the attribute type of that description is
|
---|
841 | the same as the required attribute's type. That is, a "MUST name"
|
---|
842 | specification is fulfilled by 'name' or 'name;x-tag-option', but is
|
---|
843 | not fulfilled by 'CN' or 'CN;x-tag-option' (even though 'CN' is a
|
---|
844 | subtype of 'name'). Likewise, an entry may contain a value of an
|
---|
845 | attribute description belonging to an attribute hierarchy where the
|
---|
846 | attribute type of that description is either explicitly included in
|
---|
847 | the definition of an object class to which the entry belongs or
|
---|
848 | allowed by the DIT content rule applicable to that entry. That is,
|
---|
849 | 'name' and 'name;x-tag-option' are allowed by "MAY name" (or by "MUST
|
---|
850 | name"), but 'CN' and 'CN;x-tag-option' are not allowed by "MAY name"
|
---|
851 | (or by "MUST name").
|
---|
852 |
|
---|
853 |
|
---|
854 |
|
---|
855 |
|
---|
856 | Zeilenga Standards Track [Page 15]
|
---|
857 | |
---|
858 |
|
---|
859 | RFC 4512 LDAP Models June 2006
|
---|
860 |
|
---|
861 |
|
---|
862 | For the purposes of other policy administration, unless stated
|
---|
863 | otherwise in the specification of the particular administrative
|
---|
864 | model, all of the attribute descriptions in an attribute hierarchy
|
---|
865 | are treated as distinct and unrelated descriptions.
|
---|
866 |
|
---|
867 | 2.6. Alias Entries
|
---|
868 |
|
---|
869 | As adapted from [X.501]:
|
---|
870 |
|
---|
871 | An alias, or an alias name, for an object is an alternative name
|
---|
872 | for an object or object entry which is provided by the use of
|
---|
873 | alias entries.
|
---|
874 |
|
---|
875 | Each alias entry contains, within the 'aliasedObjectName'
|
---|
876 | attribute (known as the 'aliasedEntryName' attribute in X.500), a
|
---|
877 | name of some object. The distinguished name of the alias entry is
|
---|
878 | thus also a name for this object.
|
---|
879 |
|
---|
880 | NOTE - The name within the 'aliasedObjectName' is said to be
|
---|
881 | pointed to by the alias. It does not have to be the
|
---|
882 | distinguished name of any entry.
|
---|
883 |
|
---|
884 | The conversion of an alias name to an object name is termed
|
---|
885 | (alias) dereferencing and comprises the systematic replacement of
|
---|
886 | alias names, where found within a purported name, by the value of
|
---|
887 | the corresponding 'aliasedObjectName' attribute. The process may
|
---|
888 | require the examination of more than one alias entry.
|
---|
889 |
|
---|
890 | Any particular entry in the DIT may have zero or more alias names.
|
---|
891 | It therefore follows that several alias entries may point to the
|
---|
892 | same entry. An alias entry may point to an entry that is not a
|
---|
893 | leaf entry and may point to another alias entry.
|
---|
894 |
|
---|
895 | An alias entry shall have no subordinates, so that an alias entry
|
---|
896 | is always a leaf entry.
|
---|
897 |
|
---|
898 | Every alias entry shall belong to the 'alias' object class.
|
---|
899 |
|
---|
900 | An entry with the 'alias' object class must also belong to an object
|
---|
901 | class (or classes), or be governed by a DIT content rule, which
|
---|
902 | allows suitable naming attributes to be present.
|
---|
903 |
|
---|
904 | Example:
|
---|
905 |
|
---|
906 | dn: cn=bar,dc=example,dc=com
|
---|
907 | objectClass: top
|
---|
908 | objectClass: alias
|
---|
909 | objectClass: extensibleObject
|
---|
910 |
|
---|
911 |
|
---|
912 |
|
---|
913 | Zeilenga Standards Track [Page 16]
|
---|
914 | |
---|
915 |
|
---|
916 | RFC 4512 LDAP Models June 2006
|
---|
917 |
|
---|
918 |
|
---|
919 | cn: bar
|
---|
920 | aliasedObjectName: cn=foo,dc=example,dc=com
|
---|
921 |
|
---|
922 | 2.6.1. 'alias' Object Class
|
---|
923 |
|
---|
924 | Alias entries belong to the 'alias' object class.
|
---|
925 |
|
---|
926 | ( 2.5.6.1 NAME 'alias'
|
---|
927 | SUP top STRUCTURAL
|
---|
928 | MUST aliasedObjectName )
|
---|
929 |
|
---|
930 | 2.6.2. 'aliasedObjectName' Attribute Type
|
---|
931 |
|
---|
932 | The 'aliasedObjectName' attribute holds the name of the entry an
|
---|
933 | alias points to. The 'aliasedObjectName' attribute is known as the
|
---|
934 | 'aliasedEntryName' attribute in X.500.
|
---|
935 |
|
---|
936 | ( 2.5.4.1 NAME 'aliasedObjectName'
|
---|
937 | EQUALITY distinguishedNameMatch
|
---|
938 | SYNTAX 1.3.6.1.4.1.1466.115.121.1.12
|
---|
939 | SINGLE-VALUE )
|
---|
940 |
|
---|
941 | The 'distinguishedNameMatch' matching rule and the DistinguishedName
|
---|
942 | (1.3.6.1.4.1.1466.115.121.1.12) syntax are defined in [RFC4517].
|
---|
943 |
|
---|
944 | 3. Directory Administrative and Operational Information
|
---|
945 |
|
---|
946 | This section discusses select aspects of the X.500 Directory
|
---|
947 | Administrative and Operational Information model [X.501]. LDAP
|
---|
948 | implementations MAY support other aspects of this model.
|
---|
949 |
|
---|
950 | 3.1. Subtrees
|
---|
951 |
|
---|
952 | As defined in [X.501]:
|
---|
953 |
|
---|
954 | A subtree is a collection of object and alias entries situated at
|
---|
955 | the vertices of a tree. Subtrees do not contain subentries. The
|
---|
956 | prefix sub, in subtree, emphasizes that the base (or root) vertex
|
---|
957 | of this tree is usually subordinate to the root of the DIT.
|
---|
958 |
|
---|
959 | A subtree begins at some vertex and extends to some identifiable
|
---|
960 | lower boundary, possibly extending to leaves. A subtree is always
|
---|
961 | defined within a context which implicitly bounds the subtree. For
|
---|
962 | example, the vertex and lower boundaries of a subtree defining a
|
---|
963 | replicated area are bounded by a naming context.
|
---|
964 |
|
---|
965 |
|
---|
966 |
|
---|
967 |
|
---|
968 |
|
---|
969 |
|
---|
970 | Zeilenga Standards Track [Page 17]
|
---|
971 | |
---|
972 |
|
---|
973 | RFC 4512 LDAP Models June 2006
|
---|
974 |
|
---|
975 |
|
---|
976 | 3.2. Subentries
|
---|
977 |
|
---|
978 | A subentry is a "special sort of entry, known by the Directory, used
|
---|
979 | to hold information associated with a subtree or subtree refinement"
|
---|
980 | [X.501]. Subentries are used in Directory to hold for administrative
|
---|
981 | and operational purposes as defined in [X.501]. Their use in LDAP is
|
---|
982 | detailed in [RFC3672].
|
---|
983 |
|
---|
984 | The term "(sub)entry" in this specification indicates that servers
|
---|
985 | implementing X.500(93) models are, in accordance with X.500(93) as
|
---|
986 | described in [RFC3672], to use a subentry and that other servers are
|
---|
987 | to use an object entry belonging to the appropriate auxiliary class
|
---|
988 | normally used with the subentry (e.g., 'subschema' for subschema
|
---|
989 | subentries) to mimic the subentry. This object entry's RDN SHALL be
|
---|
990 | formed from a value of the 'cn' (commonName) attribute [RFC4519] (as
|
---|
991 | all subentries are named with 'cn').
|
---|
992 |
|
---|
993 | 3.3. The 'objectClass' attribute
|
---|
994 |
|
---|
995 | Each entry in the DIT has an 'objectClass' attribute.
|
---|
996 |
|
---|
997 | ( 2.5.4.0 NAME 'objectClass'
|
---|
998 | EQUALITY objectIdentifierMatch
|
---|
999 | SYNTAX 1.3.6.1.4.1.1466.115.121.1.38 )
|
---|
1000 |
|
---|
1001 | The 'objectIdentifierMatch' matching rule and the OBJECT IDENTIFIER
|
---|
1002 | (1.3.6.1.4.1.1466.115.121.1.38) syntax are defined in [RFC4517].
|
---|
1003 |
|
---|
1004 | The 'objectClass' attribute specifies the object classes of an entry,
|
---|
1005 | which (among other things) are used in conjunction with the
|
---|
1006 | controlling schema to determine the permitted attributes of an entry.
|
---|
1007 | Values of this attribute can be modified by clients, but the
|
---|
1008 | 'objectClass' attribute cannot be removed.
|
---|
1009 |
|
---|
1010 | Servers that follow X.500(93) models SHALL restrict modifications of
|
---|
1011 | this attribute to prevent the basic structural class of the entry
|
---|
1012 | from being changed. That is, one cannot change a 'person' into a
|
---|
1013 | 'country'.
|
---|
1014 |
|
---|
1015 | When creating an entry or adding an 'objectClass' value to an entry,
|
---|
1016 | all superclasses of the named classes SHALL be implicitly added as
|
---|
1017 | well if not already present. That is, if the auxiliary class 'x-a'
|
---|
1018 | is a subclass of the class 'x-b', adding 'x-a' to 'objectClass'
|
---|
1019 | causes 'x-b' to be implicitly added (if is not already present).
|
---|
1020 |
|
---|
1021 | Servers SHALL restrict modifications of this attribute to prevent
|
---|
1022 | superclasses of remaining 'objectClass' values from being deleted.
|
---|
1023 | That is, if the auxiliary class 'x-a' is a subclass of the auxiliary
|
---|
1024 |
|
---|
1025 |
|
---|
1026 |
|
---|
1027 | Zeilenga Standards Track [Page 18]
|
---|
1028 | |
---|
1029 |
|
---|
1030 | RFC 4512 LDAP Models June 2006
|
---|
1031 |
|
---|
1032 |
|
---|
1033 | class 'x-b' and the 'objectClass' attribute contains 'x-a' and 'x-b',
|
---|
1034 | an attempt to delete only 'x-b' from the 'objectClass' attribute is
|
---|
1035 | an error.
|
---|
1036 |
|
---|
1037 | 3.4. Operational Attributes
|
---|
1038 |
|
---|
1039 | Some attributes, termed operational attributes, are used or
|
---|
1040 | maintained by servers for administrative and operational purposes.
|
---|
1041 | As stated in [X.501]: "There are three varieties of operational
|
---|
1042 | attributes: Directory operational attributes, DSA-shared operational
|
---|
1043 | attributes, and DSA-specific operational attributes".
|
---|
1044 |
|
---|
1045 | A directory operational attribute is used to represent operational
|
---|
1046 | and/or administrative information in the Directory Information Model.
|
---|
1047 | This includes operational attributes maintained by the server (e.g.,
|
---|
1048 | 'createTimestamp') as well as operational attributes that hold values
|
---|
1049 | administrated by the user (e.g., 'ditContentRules').
|
---|
1050 |
|
---|
1051 | A DSA-shared operational attribute is used to represent information
|
---|
1052 | of the DSA Information Model that is shared between DSAs.
|
---|
1053 |
|
---|
1054 | A DSA-specific operational attribute is used to represent information
|
---|
1055 | of the DSA Information Model that is specific to the DSA (though, in
|
---|
1056 | some cases, may be derived from information shared between DSAs;
|
---|
1057 | e.g., 'namingContexts').
|
---|
1058 |
|
---|
1059 | The DSA Information Model operational attributes are detailed in
|
---|
1060 | [X.501].
|
---|
1061 |
|
---|
1062 | Operational attributes are not normally visible. They are not
|
---|
1063 | returned in search results unless explicitly requested by name.
|
---|
1064 |
|
---|
1065 | Not all operational attributes are user modifiable.
|
---|
1066 |
|
---|
1067 | Entries may contain, among others, the following operational
|
---|
1068 | attributes:
|
---|
1069 |
|
---|
1070 | - creatorsName: the Distinguished Name of the user who added this
|
---|
1071 | entry to the directory,
|
---|
1072 |
|
---|
1073 | - createTimestamp: the time this entry was added to the directory,
|
---|
1074 |
|
---|
1075 | - modifiersName: the Distinguished Name of the user who last
|
---|
1076 | modified this entry, and
|
---|
1077 |
|
---|
1078 | - modifyTimestamp: the time this entry was last modified.
|
---|
1079 |
|
---|
1080 |
|
---|
1081 |
|
---|
1082 |
|
---|
1083 |
|
---|
1084 | Zeilenga Standards Track [Page 19]
|
---|
1085 | |
---|
1086 |
|
---|
1087 | RFC 4512 LDAP Models June 2006
|
---|
1088 |
|
---|
1089 |
|
---|
1090 | Servers SHOULD maintain the 'creatorsName', 'createTimestamp',
|
---|
1091 | 'modifiersName', and 'modifyTimestamp' attributes for all entries of
|
---|
1092 | the DIT.
|
---|
1093 |
|
---|
1094 | 3.4.1. 'creatorsName'
|
---|
1095 |
|
---|
1096 | This attribute appears in entries that were added using the protocol
|
---|
1097 | (e.g., using the Add operation). The value is the distinguished name
|
---|
1098 | of the creator.
|
---|
1099 |
|
---|
1100 | ( 2.5.18.3 NAME 'creatorsName'
|
---|
1101 | EQUALITY distinguishedNameMatch
|
---|
1102 | SYNTAX 1.3.6.1.4.1.1466.115.121.1.12
|
---|
1103 | SINGLE-VALUE NO-USER-MODIFICATION
|
---|
1104 | USAGE directoryOperation )
|
---|
1105 |
|
---|
1106 | The 'distinguishedNameMatch' matching rule and the DistinguishedName
|
---|
1107 | (1.3.6.1.4.1.1466.115.121.1.12) syntax are defined in [RFC4517].
|
---|
1108 |
|
---|
1109 | 3.4.2. 'createTimestamp'
|
---|
1110 |
|
---|
1111 | This attribute appears in entries that were added using the protocol
|
---|
1112 | (e.g., using the Add operation). The value is the time the entry was
|
---|
1113 | added.
|
---|
1114 |
|
---|
1115 | ( 2.5.18.1 NAME 'createTimestamp'
|
---|
1116 | EQUALITY generalizedTimeMatch
|
---|
1117 | ORDERING generalizedTimeOrderingMatch
|
---|
1118 | SYNTAX 1.3.6.1.4.1.1466.115.121.1.24
|
---|
1119 | SINGLE-VALUE NO-USER-MODIFICATION
|
---|
1120 | USAGE directoryOperation )
|
---|
1121 |
|
---|
1122 | The 'generalizedTimeMatch' and 'generalizedTimeOrderingMatch'
|
---|
1123 | matching rules and the GeneralizedTime
|
---|
1124 | (1.3.6.1.4.1.1466.115.121.1.24) syntax are defined in [RFC4517].
|
---|
1125 |
|
---|
1126 | 3.4.3. 'modifiersName'
|
---|
1127 |
|
---|
1128 | This attribute appears in entries that have been modified using the
|
---|
1129 | protocol (e.g., using the Modify operation). The value is the
|
---|
1130 | distinguished name of the last modifier.
|
---|
1131 |
|
---|
1132 | ( 2.5.18.4 NAME 'modifiersName'
|
---|
1133 | EQUALITY distinguishedNameMatch
|
---|
1134 | SYNTAX 1.3.6.1.4.1.1466.115.121.1.12
|
---|
1135 | SINGLE-VALUE NO-USER-MODIFICATION
|
---|
1136 | USAGE directoryOperation )
|
---|
1137 |
|
---|
1138 |
|
---|
1139 |
|
---|
1140 |
|
---|
1141 | Zeilenga Standards Track [Page 20]
|
---|
1142 | |
---|
1143 |
|
---|
1144 | RFC 4512 LDAP Models June 2006
|
---|
1145 |
|
---|
1146 |
|
---|
1147 | The 'distinguishedNameMatch' matching rule and the DistinguishedName
|
---|
1148 | (1.3.6.1.4.1.1466.115.121.1.12) syntax are defined in [RFC4517].
|
---|
1149 |
|
---|
1150 | 3.4.4. 'modifyTimestamp'
|
---|
1151 |
|
---|
1152 | This attribute appears in entries that have been modified using the
|
---|
1153 | protocol (e.g., using the Modify operation). The value is the time
|
---|
1154 | the entry was last modified.
|
---|
1155 |
|
---|
1156 | ( 2.5.18.2 NAME 'modifyTimestamp'
|
---|
1157 | EQUALITY generalizedTimeMatch
|
---|
1158 | ORDERING generalizedTimeOrderingMatch
|
---|
1159 | SYNTAX 1.3.6.1.4.1.1466.115.121.1.24
|
---|
1160 | SINGLE-VALUE NO-USER-MODIFICATION
|
---|
1161 | USAGE directoryOperation )
|
---|
1162 |
|
---|
1163 | The 'generalizedTimeMatch' and 'generalizedTimeOrderingMatch'
|
---|
1164 | matching rules and the GeneralizedTime
|
---|
1165 | (1.3.6.1.4.1.1466.115.121.1.24) syntax are defined in [RFC4517].
|
---|
1166 |
|
---|
1167 | 3.4.5. 'structuralObjectClass'
|
---|
1168 |
|
---|
1169 | This attribute indicates the structural object class of the entry.
|
---|
1170 |
|
---|
1171 | ( 2.5.21.9 NAME 'structuralObjectClass'
|
---|
1172 | EQUALITY objectIdentifierMatch
|
---|
1173 | SYNTAX 1.3.6.1.4.1.1466.115.121.1.38
|
---|
1174 | SINGLE-VALUE NO-USER-MODIFICATION
|
---|
1175 | USAGE directoryOperation )
|
---|
1176 |
|
---|
1177 | The 'objectIdentifierMatch' matching rule and OBJECT IDENTIFIER
|
---|
1178 | (1.3.6.1.4.1.1466.115.121.1.38) syntax is defined in [RFC4517].
|
---|
1179 |
|
---|
1180 | 3.4.6. 'governingStructureRule'
|
---|
1181 |
|
---|
1182 | This attribute indicates the structure rule governing the entry.
|
---|
1183 |
|
---|
1184 | ( 2.5.21.10 NAME 'governingStructureRule'
|
---|
1185 | EQUALITY integerMatch
|
---|
1186 | SYNTAX 1.3.6.1.4.1.1466.115.121.1.27
|
---|
1187 | SINGLE-VALUE NO-USER-MODIFICATION
|
---|
1188 | USAGE directoryOperation )
|
---|
1189 |
|
---|
1190 | The 'integerMatch' matching rule and INTEGER
|
---|
1191 | (1.3.6.1.4.1.1466.115.121.1.27) syntax is defined in [RFC4517].
|
---|
1192 |
|
---|
1193 |
|
---|
1194 |
|
---|
1195 |
|
---|
1196 |
|
---|
1197 |
|
---|
1198 | Zeilenga Standards Track [Page 21]
|
---|
1199 | |
---|
1200 |
|
---|
1201 | RFC 4512 LDAP Models June 2006
|
---|
1202 |
|
---|
1203 |
|
---|
1204 | 4. Directory Schema
|
---|
1205 |
|
---|
1206 | As defined in [X.501]:
|
---|
1207 |
|
---|
1208 | The Directory Schema is a set of definitions and constraints
|
---|
1209 | concerning the structure of the DIT, the possible ways entries are
|
---|
1210 | named, the information that can be held in an entry, the
|
---|
1211 | attributes used to represent that information and their
|
---|
1212 | organization into hierarchies to facilitate search and retrieval
|
---|
1213 | of the information and the ways in which values of attributes may
|
---|
1214 | be matched in attribute value and matching rule assertions.
|
---|
1215 |
|
---|
1216 | NOTE 1 - The schema enables the Directory system to, for example:
|
---|
1217 |
|
---|
1218 | - prevent the creation of subordinate entries of the wrong
|
---|
1219 | object-class (e.g., a country as a subordinate of a person);
|
---|
1220 |
|
---|
1221 | - prevent the addition of attribute-types to an entry
|
---|
1222 | inappropriate to the object-class (e.g., a serial number to a
|
---|
1223 | person's entry);
|
---|
1224 |
|
---|
1225 | - prevent the addition of an attribute value of a syntax not
|
---|
1226 | matching that defined for the attribute-type (e.g., a printable
|
---|
1227 | string to a bit string).
|
---|
1228 |
|
---|
1229 | Formally, the Directory Schema comprises a set of:
|
---|
1230 |
|
---|
1231 | a) Name Form definitions that define primitive naming relations
|
---|
1232 | for structural object classes;
|
---|
1233 |
|
---|
1234 | b) DIT Structure Rule definitions that define the names that
|
---|
1235 | entries may have and the ways in which the entries may be
|
---|
1236 | related to one another in the DIT;
|
---|
1237 |
|
---|
1238 | c) DIT Content Rule definitions that extend the specification of
|
---|
1239 | allowable attributes for entries beyond those indicated by the
|
---|
1240 | structural object classes of the entries;
|
---|
1241 |
|
---|
1242 | d) Object Class definitions that define the basic set of mandatory
|
---|
1243 | and optional attributes that shall be present, and may be
|
---|
1244 | present, respectively, in an entry of a given class, and which
|
---|
1245 | indicate the kind of object class that is being defined;
|
---|
1246 |
|
---|
1247 |
|
---|
1248 |
|
---|
1249 |
|
---|
1250 |
|
---|
1251 |
|
---|
1252 |
|
---|
1253 |
|
---|
1254 |
|
---|
1255 | Zeilenga Standards Track [Page 22]
|
---|
1256 | |
---|
1257 |
|
---|
1258 | RFC 4512 LDAP Models June 2006
|
---|
1259 |
|
---|
1260 |
|
---|
1261 | e) Attribute Type definitions that identify the object identifier
|
---|
1262 | by which an attribute is known, its syntax, associated matching
|
---|
1263 | rules, whether it is an operational attribute and if so its
|
---|
1264 | type, whether it is a collective attribute, whether it is
|
---|
1265 | permitted to have multiple values and whether or not it is
|
---|
1266 | derived from another attribute type;
|
---|
1267 |
|
---|
1268 | f) Matching Rule definitions that define matching rules.
|
---|
1269 |
|
---|
1270 | And in LDAP:
|
---|
1271 |
|
---|
1272 | g) LDAP Syntax definitions that define encodings used in LDAP.
|
---|
1273 |
|
---|
1274 | 4.1. Schema Definitions
|
---|
1275 |
|
---|
1276 | Schema definitions in this section are described using ABNF and rely
|
---|
1277 | on the common productions specified in Section 1.2 as well as these:
|
---|
1278 |
|
---|
1279 | noidlen = numericoid [ LCURLY len RCURLY ]
|
---|
1280 | len = number
|
---|
1281 |
|
---|
1282 | oids = oid / ( LPAREN WSP oidlist WSP RPAREN )
|
---|
1283 | oidlist = oid *( WSP DOLLAR WSP oid )
|
---|
1284 |
|
---|
1285 | extensions = *( SP xstring SP qdstrings )
|
---|
1286 | xstring = "X" HYPHEN 1*( ALPHA / HYPHEN / USCORE )
|
---|
1287 |
|
---|
1288 | qdescrs = qdescr / ( LPAREN WSP qdescrlist WSP RPAREN )
|
---|
1289 | qdescrlist = [ qdescr *( SP qdescr ) ]
|
---|
1290 | qdescr = SQUOTE descr SQUOTE
|
---|
1291 |
|
---|
1292 | qdstrings = qdstring / ( LPAREN WSP qdstringlist WSP RPAREN )
|
---|
1293 | qdstringlist = [ qdstring *( SP qdstring ) ]
|
---|
1294 | qdstring = SQUOTE dstring SQUOTE
|
---|
1295 | dstring = 1*( QS / QQ / QUTF8 ) ; escaped UTF-8 string
|
---|
1296 |
|
---|
1297 | QQ = ESC %x32 %x37 ; "\27"
|
---|
1298 | QS = ESC %x35 ( %x43 / %x63 ) ; "\5C" / "\5c"
|
---|
1299 |
|
---|
1300 | ; Any UTF-8 encoded Unicode character
|
---|
1301 | ; except %x27 ("\'") and %x5C ("\")
|
---|
1302 | QUTF8 = QUTF1 / UTFMB
|
---|
1303 |
|
---|
1304 | ; Any ASCII character except %x27 ("\'") and %x5C ("\")
|
---|
1305 | QUTF1 = %x00-26 / %x28-5B / %x5D-7F
|
---|
1306 |
|
---|
1307 | Schema definitions in this section also share a number of common
|
---|
1308 | terms.
|
---|
1309 |
|
---|
1310 |
|
---|
1311 |
|
---|
1312 | Zeilenga Standards Track [Page 23]
|
---|
1313 | |
---|
1314 |
|
---|
1315 | RFC 4512 LDAP Models June 2006
|
---|
1316 |
|
---|
1317 |
|
---|
1318 | The NAME field provides a set of short names (descriptors) that are
|
---|
1319 | to be used as aliases for the OID.
|
---|
1320 |
|
---|
1321 | The DESC field optionally allows a descriptive string to be provided
|
---|
1322 | by the directory administrator and/or implementor. While
|
---|
1323 | specifications may suggest a descriptive string, there is no
|
---|
1324 | requirement that the suggested (or any) descriptive string be used.
|
---|
1325 |
|
---|
1326 | The OBSOLETE field, if present, indicates the element is not active.
|
---|
1327 |
|
---|
1328 | Implementors should note that future versions of this document may
|
---|
1329 | expand these definitions to include additional terms. Terms whose
|
---|
1330 | identifier begins with "X-" are reserved for private experiments and
|
---|
1331 | are followed by <SP> and <qdstrings> tokens.
|
---|
1332 |
|
---|
1333 | 4.1.1. Object Class Definitions
|
---|
1334 |
|
---|
1335 | Object Class definitions are written according to the ABNF:
|
---|
1336 |
|
---|
1337 | ObjectClassDescription = LPAREN WSP
|
---|
1338 | numericoid ; object identifier
|
---|
1339 | [ SP "NAME" SP qdescrs ] ; short names (descriptors)
|
---|
1340 | [ SP "DESC" SP qdstring ] ; description
|
---|
1341 | [ SP "OBSOLETE" ] ; not active
|
---|
1342 | [ SP "SUP" SP oids ] ; superior object classes
|
---|
1343 | [ SP kind ] ; kind of class
|
---|
1344 | [ SP "MUST" SP oids ] ; attribute types
|
---|
1345 | [ SP "MAY" SP oids ] ; attribute types
|
---|
1346 | extensions WSP RPAREN
|
---|
1347 |
|
---|
1348 | kind = "ABSTRACT" / "STRUCTURAL" / "AUXILIARY"
|
---|
1349 |
|
---|
1350 | where:
|
---|
1351 | <numericoid> is object identifier assigned to this object class;
|
---|
1352 | NAME <qdescrs> are short names (descriptors) identifying this
|
---|
1353 | object class;
|
---|
1354 | DESC <qdstring> is a short descriptive string;
|
---|
1355 | OBSOLETE indicates this object class is not active;
|
---|
1356 | SUP <oids> specifies the direct superclasses of this object class;
|
---|
1357 | the kind of object class is indicated by one of ABSTRACT,
|
---|
1358 | STRUCTURAL, or AUXILIARY (the default is STRUCTURAL);
|
---|
1359 | MUST and MAY specify the sets of required and allowed attribute
|
---|
1360 | types, respectively; and
|
---|
1361 | <extensions> describe extensions.
|
---|
1362 |
|
---|
1363 |
|
---|
1364 |
|
---|
1365 |
|
---|
1366 |
|
---|
1367 |
|
---|
1368 |
|
---|
1369 | Zeilenga Standards Track [Page 24]
|
---|
1370 | |
---|
1371 |
|
---|
1372 | RFC 4512 LDAP Models June 2006
|
---|
1373 |
|
---|
1374 |
|
---|
1375 | 4.1.2. Attribute Types
|
---|
1376 |
|
---|
1377 | Attribute Type definitions are written according to the ABNF:
|
---|
1378 |
|
---|
1379 | AttributeTypeDescription = LPAREN WSP
|
---|
1380 | numericoid ; object identifier
|
---|
1381 | [ SP "NAME" SP qdescrs ] ; short names (descriptors)
|
---|
1382 | [ SP "DESC" SP qdstring ] ; description
|
---|
1383 | [ SP "OBSOLETE" ] ; not active
|
---|
1384 | [ SP "SUP" SP oid ] ; supertype
|
---|
1385 | [ SP "EQUALITY" SP oid ] ; equality matching rule
|
---|
1386 | [ SP "ORDERING" SP oid ] ; ordering matching rule
|
---|
1387 | [ SP "SUBSTR" SP oid ] ; substrings matching rule
|
---|
1388 | [ SP "SYNTAX" SP noidlen ] ; value syntax
|
---|
1389 | [ SP "SINGLE-VALUE" ] ; single-value
|
---|
1390 | [ SP "COLLECTIVE" ] ; collective
|
---|
1391 | [ SP "NO-USER-MODIFICATION" ] ; not user modifiable
|
---|
1392 | [ SP "USAGE" SP usage ] ; usage
|
---|
1393 | extensions WSP RPAREN ; extensions
|
---|
1394 |
|
---|
1395 | usage = "userApplications" / ; user
|
---|
1396 | "directoryOperation" / ; directory operational
|
---|
1397 | "distributedOperation" / ; DSA-shared operational
|
---|
1398 | "dSAOperation" ; DSA-specific operational
|
---|
1399 |
|
---|
1400 | where:
|
---|
1401 | <numericoid> is object identifier assigned to this attribute type;
|
---|
1402 | NAME <qdescrs> are short names (descriptors) identifying this
|
---|
1403 | attribute type;
|
---|
1404 | DESC <qdstring> is a short descriptive string;
|
---|
1405 | OBSOLETE indicates this attribute type is not active;
|
---|
1406 | SUP oid specifies the direct supertype of this type;
|
---|
1407 | EQUALITY, ORDERING, and SUBSTR provide the oid of the equality,
|
---|
1408 | ordering, and substrings matching rules, respectively;
|
---|
1409 | SYNTAX identifies value syntax by object identifier and may suggest
|
---|
1410 | a minimum upper bound;
|
---|
1411 | SINGLE-VALUE indicates attributes of this type are restricted to a
|
---|
1412 | single value;
|
---|
1413 | COLLECTIVE indicates this attribute type is collective
|
---|
1414 | [X.501][RFC3671];
|
---|
1415 | NO-USER-MODIFICATION indicates this attribute type is not user
|
---|
1416 | modifiable;
|
---|
1417 | USAGE indicates the application of this attribute type; and
|
---|
1418 | <extensions> describe extensions.
|
---|
1419 |
|
---|
1420 | Each attribute type description must contain at least one of the SUP
|
---|
1421 | or SYNTAX fields. If no SYNTAX field is provided, the attribute type
|
---|
1422 | description takes its value from the supertype.
|
---|
1423 |
|
---|
1424 |
|
---|
1425 |
|
---|
1426 | Zeilenga Standards Track [Page 25]
|
---|
1427 | |
---|
1428 |
|
---|
1429 | RFC 4512 LDAP Models June 2006
|
---|
1430 |
|
---|
1431 |
|
---|
1432 | If SUP field is provided, the EQUALITY, ORDERING, and SUBSTRING
|
---|
1433 | fields, if not specified, take their value from the supertype.
|
---|
1434 |
|
---|
1435 | Usage of userApplications, the default, indicates that attributes of
|
---|
1436 | this type represent user information. That is, they are user
|
---|
1437 | attributes.
|
---|
1438 |
|
---|
1439 | A usage of directoryOperation, distributedOperation, or dSAOperation
|
---|
1440 | indicates that attributes of this type represent operational and/or
|
---|
1441 | administrative information. That is, they are operational
|
---|
1442 | attributes.
|
---|
1443 |
|
---|
1444 | directoryOperation usage indicates that the attribute of this type is
|
---|
1445 | a directory operational attribute. distributedOperation usage
|
---|
1446 | indicates that the attribute of this type is a DSA-shared usage
|
---|
1447 | operational attribute. dSAOperation usage indicates that the
|
---|
1448 | attribute of this type is a DSA-specific operational attribute.
|
---|
1449 |
|
---|
1450 | COLLECTIVE requires usage userApplications. Use of collective
|
---|
1451 | attribute types in LDAP is discussed in [RFC3671].
|
---|
1452 |
|
---|
1453 | NO-USER-MODIFICATION requires an operational usage.
|
---|
1454 |
|
---|
1455 | Note that the <AttributeTypeDescription> does not list the matching
|
---|
1456 | rules that can be used with that attribute type in an extensibleMatch
|
---|
1457 | search filter [RFC4511]. This is done using the 'matchingRuleUse'
|
---|
1458 | attribute described in Section 4.1.4.
|
---|
1459 |
|
---|
1460 | This document refines the schema description of X.501 by requiring
|
---|
1461 | that the SYNTAX field in an <AttributeTypeDescription> be a string
|
---|
1462 | representation of an object identifier for the LDAP string syntax
|
---|
1463 | definition, with an optional indication of the suggested minimum
|
---|
1464 | bound of a value of this attribute.
|
---|
1465 |
|
---|
1466 | A suggested minimum upper bound on the number of characters in a
|
---|
1467 | value with a string-based syntax, or the number of bytes in a value
|
---|
1468 | for all other syntaxes, may be indicated by appending this bound
|
---|
1469 | count inside of curly braces following the syntax's OBJECT IDENTIFIER
|
---|
1470 | in an Attribute Type Description. This bound is not part of the
|
---|
1471 | syntax name itself. For instance, "1.3.6.4.1.1466.0{64}" suggests
|
---|
1472 | that server implementations should allow a string to be 64 characters
|
---|
1473 | long, although they may allow longer strings. Note that a single
|
---|
1474 | character of the Directory String syntax may be encoded in more than
|
---|
1475 | one octet since UTF-8 [RFC3629] is a variable-length encoding.
|
---|
1476 |
|
---|
1477 |
|
---|
1478 |
|
---|
1479 |
|
---|
1480 |
|
---|
1481 |
|
---|
1482 |
|
---|
1483 | Zeilenga Standards Track [Page 26]
|
---|
1484 | |
---|
1485 |
|
---|
1486 | RFC 4512 LDAP Models June 2006
|
---|
1487 |
|
---|
1488 |
|
---|
1489 | 4.1.3. Matching Rules
|
---|
1490 |
|
---|
1491 | Matching rules are used in performance of attribute value assertions,
|
---|
1492 | such as in performance of a Compare operation. They are also used in
|
---|
1493 | evaluating search filters, determining which individual values are to
|
---|
1494 | be added or deleted during performance of a Modify operation, and in
|
---|
1495 | comparing distinguished names.
|
---|
1496 |
|
---|
1497 | Each matching rule is identified by an object identifier (OID) and,
|
---|
1498 | optionally, one or more short names (descriptors).
|
---|
1499 |
|
---|
1500 | Matching rule definitions are written according to the ABNF:
|
---|
1501 |
|
---|
1502 | MatchingRuleDescription = LPAREN WSP
|
---|
1503 | numericoid ; object identifier
|
---|
1504 | [ SP "NAME" SP qdescrs ] ; short names (descriptors)
|
---|
1505 | [ SP "DESC" SP qdstring ] ; description
|
---|
1506 | [ SP "OBSOLETE" ] ; not active
|
---|
1507 | SP "SYNTAX" SP numericoid ; assertion syntax
|
---|
1508 | extensions WSP RPAREN ; extensions
|
---|
1509 |
|
---|
1510 | where:
|
---|
1511 | <numericoid> is object identifier assigned to this matching rule;
|
---|
1512 | NAME <qdescrs> are short names (descriptors) identifying this
|
---|
1513 | matching rule;
|
---|
1514 | DESC <qdstring> is a short descriptive string;
|
---|
1515 | OBSOLETE indicates this matching rule is not active;
|
---|
1516 | SYNTAX identifies the assertion syntax (the syntax of the assertion
|
---|
1517 | value) by object identifier; and
|
---|
1518 | <extensions> describe extensions.
|
---|
1519 |
|
---|
1520 | 4.1.4. Matching Rule Uses
|
---|
1521 |
|
---|
1522 | A matching rule use lists the attribute types that are suitable for
|
---|
1523 | use with an extensibleMatch search filter.
|
---|
1524 |
|
---|
1525 | Matching rule use descriptions are written according to the following
|
---|
1526 | ABNF:
|
---|
1527 |
|
---|
1528 | MatchingRuleUseDescription = LPAREN WSP
|
---|
1529 | numericoid ; object identifier
|
---|
1530 | [ SP "NAME" SP qdescrs ] ; short names (descriptors)
|
---|
1531 | [ SP "DESC" SP qdstring ] ; description
|
---|
1532 | [ SP "OBSOLETE" ] ; not active
|
---|
1533 | SP "APPLIES" SP oids ; attribute types
|
---|
1534 | extensions WSP RPAREN ; extensions
|
---|
1535 |
|
---|
1536 |
|
---|
1537 |
|
---|
1538 |
|
---|
1539 |
|
---|
1540 | Zeilenga Standards Track [Page 27]
|
---|
1541 | |
---|
1542 |
|
---|
1543 | RFC 4512 LDAP Models June 2006
|
---|
1544 |
|
---|
1545 |
|
---|
1546 | where:
|
---|
1547 | <numericoid> is the object identifier of the matching rule
|
---|
1548 | associated with this matching rule use description;
|
---|
1549 | NAME <qdescrs> are short names (descriptors) identifying this
|
---|
1550 | matching rule use;
|
---|
1551 | DESC <qdstring> is a short descriptive string;
|
---|
1552 | OBSOLETE indicates this matching rule use is not active;
|
---|
1553 | APPLIES provides a list of attribute types the matching rule
|
---|
1554 | applies to; and
|
---|
1555 | <extensions> describe extensions.
|
---|
1556 |
|
---|
1557 | 4.1.5. LDAP Syntaxes
|
---|
1558 |
|
---|
1559 | LDAP Syntaxes of (attribute and assertion) values are described in
|
---|
1560 | terms of ASN.1 [X.680] and, optionally, have an octet string encoding
|
---|
1561 | known as the LDAP-specific encoding. Commonly, the LDAP-specific
|
---|
1562 | encoding is constrained to a string of Unicode [Unicode] characters
|
---|
1563 | in UTF-8 [RFC3629] form.
|
---|
1564 |
|
---|
1565 | Each LDAP syntax is identified by an object identifier (OID).
|
---|
1566 |
|
---|
1567 | LDAP syntax definitions are written according to the ABNF:
|
---|
1568 |
|
---|
1569 | SyntaxDescription = LPAREN WSP
|
---|
1570 | numericoid ; object identifier
|
---|
1571 | [ SP "DESC" SP qdstring ] ; description
|
---|
1572 | extensions WSP RPAREN ; extensions
|
---|
1573 |
|
---|
1574 | where:
|
---|
1575 | <numericoid> is the object identifier assigned to this LDAP syntax;
|
---|
1576 | DESC <qdstring> is a short descriptive string; and
|
---|
1577 | <extensions> describe extensions.
|
---|
1578 |
|
---|
1579 | 4.1.6. DIT Content Rules
|
---|
1580 |
|
---|
1581 | A DIT content rule is a "rule governing the content of entries of a
|
---|
1582 | particular structural object class" [X.501].
|
---|
1583 |
|
---|
1584 | For DIT entries of a particular structural object class, a DIT
|
---|
1585 | content rule specifies which auxiliary object classes the entries are
|
---|
1586 | allowed to belong to and which additional attributes (by type) are
|
---|
1587 | required, allowed, or not allowed to appear in the entries.
|
---|
1588 |
|
---|
1589 | The list of precluded attributes cannot include any attribute listed
|
---|
1590 | as mandatory in the rule, the structural object class, or any of the
|
---|
1591 | allowed auxiliary object classes.
|
---|
1592 |
|
---|
1593 |
|
---|
1594 |
|
---|
1595 |
|
---|
1596 |
|
---|
1597 | Zeilenga Standards Track [Page 28]
|
---|
1598 | |
---|
1599 |
|
---|
1600 | RFC 4512 LDAP Models June 2006
|
---|
1601 |
|
---|
1602 |
|
---|
1603 | Each content rule is identified by the object identifier, as well as
|
---|
1604 | any short names (descriptors), of the structural object class it
|
---|
1605 | applies to.
|
---|
1606 |
|
---|
1607 | An entry may only belong to auxiliary object classes listed in the
|
---|
1608 | governing content rule.
|
---|
1609 |
|
---|
1610 | An entry must contain all attributes required by the object classes
|
---|
1611 | the entry belongs to as well as all attributes required by the
|
---|
1612 | governing content rule.
|
---|
1613 |
|
---|
1614 | An entry may contain any non-precluded attributes allowed by the
|
---|
1615 | object classes the entry belongs to as well as all attributes allowed
|
---|
1616 | by the governing content rule.
|
---|
1617 |
|
---|
1618 | An entry cannot include any attribute precluded by the governing
|
---|
1619 | content rule.
|
---|
1620 |
|
---|
1621 | An entry is governed by (if present and active in the subschema) the
|
---|
1622 | DIT content rule that applies to the structural object class of the
|
---|
1623 | entry (see Section 2.4.2). If no active rule is present for the
|
---|
1624 | entry's structural object class, the entry's content is governed by
|
---|
1625 | the structural object class (and possibly other aspects of user and
|
---|
1626 | system schema). DIT content rules for superclasses of the structural
|
---|
1627 | object class of an entry are not applicable to that entry.
|
---|
1628 |
|
---|
1629 | DIT content rule descriptions are written according to the ABNF:
|
---|
1630 |
|
---|
1631 | DITContentRuleDescription = LPAREN WSP
|
---|
1632 | numericoid ; object identifier
|
---|
1633 | [ SP "NAME" SP qdescrs ] ; short names (descriptors)
|
---|
1634 | [ SP "DESC" SP qdstring ] ; description
|
---|
1635 | [ SP "OBSOLETE" ] ; not active
|
---|
1636 | [ SP "AUX" SP oids ] ; auxiliary object classes
|
---|
1637 | [ SP "MUST" SP oids ] ; attribute types
|
---|
1638 | [ SP "MAY" SP oids ] ; attribute types
|
---|
1639 | [ SP "NOT" SP oids ] ; attribute types
|
---|
1640 | extensions WSP RPAREN ; extensions
|
---|
1641 |
|
---|
1642 | where:
|
---|
1643 | <numericoid> is the object identifier of the structural object
|
---|
1644 | class associated with this DIT content rule;
|
---|
1645 | NAME <qdescrs> are short names (descriptors) identifying this DIT
|
---|
1646 | content rule;
|
---|
1647 | DESC <qdstring> is a short descriptive string;
|
---|
1648 | OBSOLETE indicates this DIT content rule use is not active;
|
---|
1649 | AUX specifies a list of auxiliary object classes that entries
|
---|
1650 | subject to this DIT content rule may belong to;
|
---|
1651 |
|
---|
1652 |
|
---|
1653 |
|
---|
1654 | Zeilenga Standards Track [Page 29]
|
---|
1655 | |
---|
1656 |
|
---|
1657 | RFC 4512 LDAP Models June 2006
|
---|
1658 |
|
---|
1659 |
|
---|
1660 | MUST, MAY, and NOT specify lists of attribute types that are
|
---|
1661 | required, allowed, or precluded, respectively, from appearing
|
---|
1662 | in entries subject to this DIT content rule; and
|
---|
1663 | <extensions> describe extensions.
|
---|
1664 |
|
---|
1665 | 4.1.7. DIT Structure Rules and Name Forms
|
---|
1666 |
|
---|
1667 | It is sometimes desirable to regulate where object and alias entries
|
---|
1668 | can be placed in the DIT and how they can be named based upon their
|
---|
1669 | structural object class.
|
---|
1670 |
|
---|
1671 | 4.1.7.1. DIT Structure Rules
|
---|
1672 |
|
---|
1673 | A DIT structure rule is a "rule governing the structure of the DIT by
|
---|
1674 | specifying a permitted superior to subordinate entry relationship. A
|
---|
1675 | structure rule relates a name form, and therefore a structural object
|
---|
1676 | class, to superior structure rules. This permits entries of the
|
---|
1677 | structural object class identified by the name form to exist in the
|
---|
1678 | DIT as subordinates to entries governed by the indicated superior
|
---|
1679 | structure rules" [X.501].
|
---|
1680 |
|
---|
1681 | DIT structure rule descriptions are written according to the ABNF:
|
---|
1682 |
|
---|
1683 | DITStructureRuleDescription = LPAREN WSP
|
---|
1684 | ruleid ; rule identifier
|
---|
1685 | [ SP "NAME" SP qdescrs ] ; short names (descriptors)
|
---|
1686 | [ SP "DESC" SP qdstring ] ; description
|
---|
1687 | [ SP "OBSOLETE" ] ; not active
|
---|
1688 | SP "FORM" SP oid ; NameForm
|
---|
1689 | [ SP "SUP" ruleids ] ; superior rules
|
---|
1690 | extensions WSP RPAREN ; extensions
|
---|
1691 |
|
---|
1692 | ruleids = ruleid / ( LPAREN WSP ruleidlist WSP RPAREN )
|
---|
1693 | ruleidlist = ruleid *( SP ruleid )
|
---|
1694 | ruleid = number
|
---|
1695 |
|
---|
1696 | where:
|
---|
1697 | <ruleid> is the rule identifier of this DIT structure rule;
|
---|
1698 | NAME <qdescrs> are short names (descriptors) identifying this DIT
|
---|
1699 | structure rule;
|
---|
1700 | DESC <qdstring> is a short descriptive string;
|
---|
1701 | OBSOLETE indicates this DIT structure rule use is not active;
|
---|
1702 | FORM is specifies the name form associated with this DIT structure
|
---|
1703 | rule;
|
---|
1704 | SUP identifies superior rules (by rule id); and
|
---|
1705 | <extensions> describe extensions.
|
---|
1706 |
|
---|
1707 |
|
---|
1708 |
|
---|
1709 |
|
---|
1710 |
|
---|
1711 | Zeilenga Standards Track [Page 30]
|
---|
1712 | |
---|
1713 |
|
---|
1714 | RFC 4512 LDAP Models June 2006
|
---|
1715 |
|
---|
1716 |
|
---|
1717 | If no superior rules are identified, the DIT structure rule applies
|
---|
1718 | to an autonomous administrative point (e.g., the root vertex of the
|
---|
1719 | subtree controlled by the subschema) [X.501].
|
---|
1720 |
|
---|
1721 | 4.1.7.2. Name Forms
|
---|
1722 |
|
---|
1723 | A name form "specifies a permissible RDN for entries of a particular
|
---|
1724 | structural object class. A name form identifies a named object class
|
---|
1725 | and one or more attribute types to be used for naming (i.e., for the
|
---|
1726 | RDN). Name forms are primitive pieces of specification used in the
|
---|
1727 | definition of DIT structure rules" [X.501].
|
---|
1728 |
|
---|
1729 | Each name form indicates the structural object class to be named, a
|
---|
1730 | set of required attribute types, and a set of allowed attribute
|
---|
1731 | types. A particular attribute type cannot be in both sets.
|
---|
1732 |
|
---|
1733 | Entries governed by the form must be named using a value from each
|
---|
1734 | required attribute type and zero or more values from the allowed
|
---|
1735 | attribute types.
|
---|
1736 |
|
---|
1737 | Each name form is identified by an object identifier (OID) and,
|
---|
1738 | optionally, one or more short names (descriptors).
|
---|
1739 |
|
---|
1740 | Name form descriptions are written according to the ABNF:
|
---|
1741 |
|
---|
1742 | NameFormDescription = LPAREN WSP
|
---|
1743 | numericoid ; object identifier
|
---|
1744 | [ SP "NAME" SP qdescrs ] ; short names (descriptors)
|
---|
1745 | [ SP "DESC" SP qdstring ] ; description
|
---|
1746 | [ SP "OBSOLETE" ] ; not active
|
---|
1747 | SP "OC" SP oid ; structural object class
|
---|
1748 | SP "MUST" SP oids ; attribute types
|
---|
1749 | [ SP "MAY" SP oids ] ; attribute types
|
---|
1750 | extensions WSP RPAREN ; extensions
|
---|
1751 |
|
---|
1752 | where:
|
---|
1753 | <numericoid> is object identifier that identifies this name form;
|
---|
1754 | NAME <qdescrs> are short names (descriptors) identifying this name
|
---|
1755 | form;
|
---|
1756 | DESC <qdstring> is a short descriptive string;
|
---|
1757 | OBSOLETE indicates this name form is not active;
|
---|
1758 | OC identifies the structural object class this rule applies to,
|
---|
1759 | MUST and MAY specify the sets of required and allowed,
|
---|
1760 | respectively, naming attributes for this name form; and
|
---|
1761 | <extensions> describe extensions.
|
---|
1762 |
|
---|
1763 | All attribute types in the required ("MUST") and allowed ("MAY")
|
---|
1764 | lists shall be different.
|
---|
1765 |
|
---|
1766 |
|
---|
1767 |
|
---|
1768 | Zeilenga Standards Track [Page 31]
|
---|
1769 | |
---|
1770 |
|
---|
1771 | RFC 4512 LDAP Models June 2006
|
---|
1772 |
|
---|
1773 |
|
---|
1774 | 4.2. Subschema Subentries
|
---|
1775 |
|
---|
1776 | Subschema (sub)entries are used for administering information about
|
---|
1777 | the directory schema. A single subschema (sub)entry contains all
|
---|
1778 | schema definitions (see Section 4.1) used by entries in a particular
|
---|
1779 | part of the directory tree.
|
---|
1780 |
|
---|
1781 | Servers that follow X.500(93) models SHOULD implement subschema using
|
---|
1782 | the X.500 subschema mechanisms (as detailed in Section 12 of
|
---|
1783 | [X.501]), so these are not ordinary object entries but subentries
|
---|
1784 | (see Section 3.2). LDAP clients SHOULD NOT assume that servers
|
---|
1785 | implement any of the other aspects of X.500 subschema.
|
---|
1786 |
|
---|
1787 | Servers MAY allow subschema modification. Procedures for subschema
|
---|
1788 | modification are discussed in Section 14.5 of [X.501].
|
---|
1789 |
|
---|
1790 | A server that masters entries and permits clients to modify these
|
---|
1791 | entries SHALL implement and provide access to these subschema
|
---|
1792 | (sub)entries including providing a 'subschemaSubentry' attribute in
|
---|
1793 | each modifiable entry. This is so clients may discover the
|
---|
1794 | attributes and object classes that are permitted to be present. It
|
---|
1795 | is strongly RECOMMENDED that all other servers implement this as
|
---|
1796 | well.
|
---|
1797 |
|
---|
1798 | The value of the 'subschemaSubentry' attribute is the name of the
|
---|
1799 | subschema (sub)entry holding the subschema controlling the entry.
|
---|
1800 |
|
---|
1801 | ( 2.5.18.10 NAME 'subschemaSubentry'
|
---|
1802 | EQUALITY distinguishedNameMatch
|
---|
1803 | SYNTAX 1.3.6.1.4.1.1466.115.121.1.12
|
---|
1804 | SINGLE-VALUE NO-USER-MODIFICATION
|
---|
1805 | USAGE directoryOperation )
|
---|
1806 |
|
---|
1807 | The 'distinguishedNameMatch' matching rule and the DistinguishedName
|
---|
1808 | (1.3.6.1.4.1.1466.115.121.1.12) syntax are defined in [RFC4517].
|
---|
1809 |
|
---|
1810 | Subschema is held in (sub)entries belonging to the subschema
|
---|
1811 | auxiliary object class.
|
---|
1812 |
|
---|
1813 | ( 2.5.20.1 NAME 'subschema' AUXILIARY
|
---|
1814 | MAY ( dITStructureRules $ nameForms $ ditContentRules $
|
---|
1815 | objectClasses $ attributeTypes $ matchingRules $
|
---|
1816 | matchingRuleUse ) )
|
---|
1817 |
|
---|
1818 | The 'ldapSyntaxes' operational attribute may also be present in
|
---|
1819 | subschema entries.
|
---|
1820 |
|
---|
1821 |
|
---|
1822 |
|
---|
1823 |
|
---|
1824 |
|
---|
1825 | Zeilenga Standards Track [Page 32]
|
---|
1826 | |
---|
1827 |
|
---|
1828 | RFC 4512 LDAP Models June 2006
|
---|
1829 |
|
---|
1830 |
|
---|
1831 | Servers MAY provide additional attributes (described in other
|
---|
1832 | documents) in subschema (sub)entries.
|
---|
1833 |
|
---|
1834 | Servers SHOULD provide the attributes 'createTimestamp' and
|
---|
1835 | 'modifyTimestamp' in subschema (sub)entries, in order to allow
|
---|
1836 | clients to maintain their caches of schema information.
|
---|
1837 |
|
---|
1838 | The following subsections provide attribute type definitions for each
|
---|
1839 | of schema definition attribute types.
|
---|
1840 |
|
---|
1841 | 4.2.1. 'objectClasses'
|
---|
1842 |
|
---|
1843 | This attribute holds definitions of object classes.
|
---|
1844 |
|
---|
1845 | ( 2.5.21.6 NAME 'objectClasses'
|
---|
1846 | EQUALITY objectIdentifierFirstComponentMatch
|
---|
1847 | SYNTAX 1.3.6.1.4.1.1466.115.121.1.37
|
---|
1848 | USAGE directoryOperation )
|
---|
1849 |
|
---|
1850 | The 'objectIdentifierFirstComponentMatch' matching rule and the
|
---|
1851 | ObjectClassDescription (1.3.6.1.4.1.1466.115.121.1.37) syntax are
|
---|
1852 | defined in [RFC4517].
|
---|
1853 |
|
---|
1854 | 4.2.2. 'attributeTypes'
|
---|
1855 |
|
---|
1856 | This attribute holds definitions of attribute types.
|
---|
1857 |
|
---|
1858 | ( 2.5.21.5 NAME 'attributeTypes'
|
---|
1859 | EQUALITY objectIdentifierFirstComponentMatch
|
---|
1860 | SYNTAX 1.3.6.1.4.1.1466.115.121.1.3
|
---|
1861 | USAGE directoryOperation )
|
---|
1862 |
|
---|
1863 | The 'objectIdentifierFirstComponentMatch' matching rule and the
|
---|
1864 | AttributeTypeDescription (1.3.6.1.4.1.1466.115.121.1.3) syntax are
|
---|
1865 | defined in [RFC4517].
|
---|
1866 |
|
---|
1867 | 4.2.3. 'matchingRules'
|
---|
1868 |
|
---|
1869 | This attribute holds definitions of matching rules.
|
---|
1870 |
|
---|
1871 | ( 2.5.21.4 NAME 'matchingRules'
|
---|
1872 | EQUALITY objectIdentifierFirstComponentMatch
|
---|
1873 | SYNTAX 1.3.6.1.4.1.1466.115.121.1.30
|
---|
1874 | USAGE directoryOperation )
|
---|
1875 |
|
---|
1876 | The 'objectIdentifierFirstComponentMatch' matching rule and the
|
---|
1877 | MatchingRuleDescription (1.3.6.1.4.1.1466.115.121.1.30) syntax are
|
---|
1878 | defined in [RFC4517].
|
---|
1879 |
|
---|
1880 |
|
---|
1881 |
|
---|
1882 | Zeilenga Standards Track [Page 33]
|
---|
1883 | |
---|
1884 |
|
---|
1885 | RFC 4512 LDAP Models June 2006
|
---|
1886 |
|
---|
1887 |
|
---|
1888 | 4.2.4 'matchingRuleUse'
|
---|
1889 |
|
---|
1890 | This attribute holds definitions of matching rule uses.
|
---|
1891 |
|
---|
1892 | ( 2.5.21.8 NAME 'matchingRuleUse'
|
---|
1893 | EQUALITY objectIdentifierFirstComponentMatch
|
---|
1894 | SYNTAX 1.3.6.1.4.1.1466.115.121.1.31
|
---|
1895 | USAGE directoryOperation )
|
---|
1896 |
|
---|
1897 | The 'objectIdentifierFirstComponentMatch' matching rule and the
|
---|
1898 | MatchingRuleUseDescription (1.3.6.1.4.1.1466.115.121.1.31) syntax are
|
---|
1899 | defined in [RFC4517].
|
---|
1900 |
|
---|
1901 | 4.2.5. 'ldapSyntaxes'
|
---|
1902 |
|
---|
1903 | This attribute holds definitions of LDAP syntaxes.
|
---|
1904 |
|
---|
1905 | ( 1.3.6.1.4.1.1466.101.120.16 NAME 'ldapSyntaxes'
|
---|
1906 | EQUALITY objectIdentifierFirstComponentMatch
|
---|
1907 | SYNTAX 1.3.6.1.4.1.1466.115.121.1.54
|
---|
1908 | USAGE directoryOperation )
|
---|
1909 |
|
---|
1910 | The 'objectIdentifierFirstComponentMatch' matching rule and the
|
---|
1911 | SyntaxDescription (1.3.6.1.4.1.1466.115.121.1.54) syntax are defined
|
---|
1912 | in [RFC4517].
|
---|
1913 |
|
---|
1914 | 4.2.6. 'dITContentRules'
|
---|
1915 |
|
---|
1916 | This attribute lists DIT Content Rules that are present in the
|
---|
1917 | subschema.
|
---|
1918 |
|
---|
1919 | ( 2.5.21.2 NAME 'dITContentRules'
|
---|
1920 | EQUALITY objectIdentifierFirstComponentMatch
|
---|
1921 | SYNTAX 1.3.6.1.4.1.1466.115.121.1.16
|
---|
1922 | USAGE directoryOperation )
|
---|
1923 |
|
---|
1924 | The 'objectIdentifierFirstComponentMatch' matching rule and the
|
---|
1925 | DITContentRuleDescription (1.3.6.1.4.1.1466.115.121.1.16) syntax are
|
---|
1926 | defined in [RFC4517].
|
---|
1927 |
|
---|
1928 |
|
---|
1929 |
|
---|
1930 |
|
---|
1931 |
|
---|
1932 |
|
---|
1933 |
|
---|
1934 |
|
---|
1935 |
|
---|
1936 |
|
---|
1937 |
|
---|
1938 |
|
---|
1939 | Zeilenga Standards Track [Page 34]
|
---|
1940 | |
---|
1941 |
|
---|
1942 | RFC 4512 LDAP Models June 2006
|
---|
1943 |
|
---|
1944 |
|
---|
1945 | 4.2.7. 'dITStructureRules'
|
---|
1946 |
|
---|
1947 | This attribute lists DIT Structure Rules that are present in the
|
---|
1948 | subschema.
|
---|
1949 |
|
---|
1950 | ( 2.5.21.1 NAME 'dITStructureRules'
|
---|
1951 | EQUALITY integerFirstComponentMatch
|
---|
1952 | SYNTAX 1.3.6.1.4.1.1466.115.121.1.17
|
---|
1953 | USAGE directoryOperation )
|
---|
1954 |
|
---|
1955 | The 'integerFirstComponentMatch' matching rule and the
|
---|
1956 | DITStructureRuleDescription (1.3.6.1.4.1.1466.115.121.1.17) syntax
|
---|
1957 | are defined in [RFC4517].
|
---|
1958 |
|
---|
1959 | 4.2.8 'nameForms'
|
---|
1960 |
|
---|
1961 | This attribute lists Name Forms that are in force.
|
---|
1962 |
|
---|
1963 | ( 2.5.21.7 NAME 'nameForms'
|
---|
1964 | EQUALITY objectIdentifierFirstComponentMatch
|
---|
1965 | SYNTAX 1.3.6.1.4.1.1466.115.121.1.35
|
---|
1966 | USAGE directoryOperation )
|
---|
1967 |
|
---|
1968 | The 'objectIdentifierFirstComponentMatch' matching rule and the
|
---|
1969 | NameFormDescription (1.3.6.1.4.1.1466.115.121.1.35) syntax are
|
---|
1970 | defined in [RFC4517].
|
---|
1971 |
|
---|
1972 | 4.3. 'extensibleObject' object class
|
---|
1973 |
|
---|
1974 | The 'extensibleObject' auxiliary object class allows entries that
|
---|
1975 | belong to it to hold any user attribute. The set of allowed
|
---|
1976 | attribute types of this object class is implicitly the set of all
|
---|
1977 | attribute types of userApplications usage.
|
---|
1978 |
|
---|
1979 | ( 1.3.6.1.4.1.1466.101.120.111 NAME 'extensibleObject'
|
---|
1980 | SUP top AUXILIARY )
|
---|
1981 |
|
---|
1982 | The mandatory attributes of the other object classes of this entry
|
---|
1983 | are still required to be present, and any precluded attributes are
|
---|
1984 | still not allowed to be present.
|
---|
1985 |
|
---|
1986 | 4.4. Subschema Discovery
|
---|
1987 |
|
---|
1988 | To discover the DN of the subschema (sub)entry holding the subschema
|
---|
1989 | controlling a particular entry, a client reads that entry's
|
---|
1990 | 'subschemaSubentry' operational attribute. To read schema attributes
|
---|
1991 | from the subschema (sub)entry, clients MUST issue a Search operation
|
---|
1992 | [RFC4511] where baseObject is the DN of the subschema (sub)entry,
|
---|
1993 |
|
---|
1994 |
|
---|
1995 |
|
---|
1996 | Zeilenga Standards Track [Page 35]
|
---|
1997 | |
---|
1998 |
|
---|
1999 | RFC 4512 LDAP Models June 2006
|
---|
2000 |
|
---|
2001 |
|
---|
2002 | scope is baseObject, filter is "(objectClass=subschema)" [RFC4515],
|
---|
2003 | and the attributes field lists the names of the desired schema
|
---|
2004 | attributes (as they are operational). Note: the
|
---|
2005 | "(objectClass=subschema)" filter allows LDAP servers that gateway to
|
---|
2006 | X.500 to detect that subentry information is being requested.
|
---|
2007 |
|
---|
2008 | Clients SHOULD NOT assume that a published subschema is complete,
|
---|
2009 | that the server supports all of the schema elements it publishes, or
|
---|
2010 | that the server does not support an unpublished element.
|
---|
2011 |
|
---|
2012 | 5. DSA (Server) Informational Model
|
---|
2013 |
|
---|
2014 | The LDAP protocol assumes there are one or more servers that jointly
|
---|
2015 | provide access to a Directory Information Tree (DIT). The server
|
---|
2016 | holding the original information is called the "master" (for that
|
---|
2017 | information). Servers that hold copies of the original information
|
---|
2018 | are referred to as "shadowing" or "caching" servers.
|
---|
2019 |
|
---|
2020 |
|
---|
2021 | As defined in [X.501]:
|
---|
2022 |
|
---|
2023 | context prefix: The sequence of RDNs leading from the Root of the
|
---|
2024 | DIT to the initial vertex of a naming context; corresponds to
|
---|
2025 | the distinguished name of that vertex.
|
---|
2026 |
|
---|
2027 | naming context: A subtree of entries held in a single master DSA.
|
---|
2028 |
|
---|
2029 | That is, a naming context is the largest collection of entries,
|
---|
2030 | starting at an entry that is mastered by a particular server, and
|
---|
2031 | including all its subordinates and their subordinates, down to the
|
---|
2032 | entries that are mastered by different servers. The context prefix
|
---|
2033 | is the name of the initial entry.
|
---|
2034 |
|
---|
2035 | The root of the DIT is a DSA-specific Entry (DSE) and not part of any
|
---|
2036 | naming context (or any subtree); each server has different attribute
|
---|
2037 | values in the root DSE.
|
---|
2038 |
|
---|
2039 | 5.1. Server-Specific Data Requirements
|
---|
2040 |
|
---|
2041 | An LDAP server SHALL provide information about itself and other
|
---|
2042 | information that is specific to each server. This is represented as
|
---|
2043 | a group of attributes located in the root DSE, which is named with
|
---|
2044 | the DN with zero RDNs (whose [RFC4514] representation is as the
|
---|
2045 | zero-length string).
|
---|
2046 |
|
---|
2047 | These attributes are retrievable, subject to access control and other
|
---|
2048 | restrictions, if a client performs a Search operation [RFC4511] with
|
---|
2049 | an empty baseObject, scope of baseObject, the filter
|
---|
2050 |
|
---|
2051 |
|
---|
2052 |
|
---|
2053 | Zeilenga Standards Track [Page 36]
|
---|
2054 | |
---|
2055 |
|
---|
2056 | RFC 4512 LDAP Models June 2006
|
---|
2057 |
|
---|
2058 |
|
---|
2059 | "(objectClass=*)" [RFC4515], and the attributes field listing the
|
---|
2060 | names of the desired attributes. It is noted that root DSE
|
---|
2061 | attributes are operational and, like other operational attributes,
|
---|
2062 | are not returned in search requests unless requested by name.
|
---|
2063 |
|
---|
2064 | The root DSE SHALL NOT be included if the client performs a subtree
|
---|
2065 | search starting from the root.
|
---|
2066 |
|
---|
2067 | Servers may allow clients to modify attributes of the root DSE, where
|
---|
2068 | appropriate.
|
---|
2069 |
|
---|
2070 | The following attributes of the root DSE are defined below.
|
---|
2071 | Additional attributes may be defined in other documents.
|
---|
2072 |
|
---|
2073 | - altServer: alternative servers;
|
---|
2074 |
|
---|
2075 | - namingContexts: naming contexts;
|
---|
2076 |
|
---|
2077 | - supportedControl: recognized LDAP controls;
|
---|
2078 |
|
---|
2079 | - supportedExtension: recognized LDAP extended operations;
|
---|
2080 |
|
---|
2081 | - supportedFeatures: recognized LDAP features;
|
---|
2082 |
|
---|
2083 | - supportedLDAPVersion: LDAP versions supported; and
|
---|
2084 |
|
---|
2085 | - supportedSASLMechanisms: recognized Simple Authentication and
|
---|
2086 | Security Layers (SASL) [RFC4422] mechanisms.
|
---|
2087 |
|
---|
2088 | The values provided for these attributes may depend on session-
|
---|
2089 | specific and other factors. For example, a server supporting the
|
---|
2090 | SASL EXTERNAL mechanism might only list "EXTERNAL" when the client's
|
---|
2091 | identity has been established by a lower level. See [RFC4513].
|
---|
2092 |
|
---|
2093 | The root DSE may also include a 'subschemaSubentry' attribute. If it
|
---|
2094 | does, the attribute refers to the subschema (sub)entry holding the
|
---|
2095 | schema controlling the root DSE. Clients SHOULD NOT assume that this
|
---|
2096 | subschema (sub)entry controls other entries held by the server.
|
---|
2097 | General subschema discovery procedures are provided in Section 4.4.
|
---|
2098 |
|
---|
2099 |
|
---|
2100 |
|
---|
2101 |
|
---|
2102 |
|
---|
2103 |
|
---|
2104 |
|
---|
2105 |
|
---|
2106 |
|
---|
2107 |
|
---|
2108 |
|
---|
2109 |
|
---|
2110 | Zeilenga Standards Track [Page 37]
|
---|
2111 | |
---|
2112 |
|
---|
2113 | RFC 4512 LDAP Models June 2006
|
---|
2114 |
|
---|
2115 |
|
---|
2116 | 5.1.1. 'altServer'
|
---|
2117 |
|
---|
2118 | The 'altServer' attribute lists URIs referring to alternative servers
|
---|
2119 | that may be contacted when this server becomes unavailable. URIs for
|
---|
2120 | servers implementing the LDAP are written according to [RFC4516].
|
---|
2121 | Other kinds of URIs may be provided. If the server does not know of
|
---|
2122 | any other servers that could be used, this attribute will be absent.
|
---|
2123 | Clients may cache this information in case their preferred server
|
---|
2124 | later becomes unavailable.
|
---|
2125 |
|
---|
2126 | ( 1.3.6.1.4.1.1466.101.120.6 NAME 'altServer'
|
---|
2127 | SYNTAX 1.3.6.1.4.1.1466.115.121.1.26
|
---|
2128 | USAGE dSAOperation )
|
---|
2129 |
|
---|
2130 | The IA5String (1.3.6.1.4.1.1466.115.121.1.26) syntax is defined in
|
---|
2131 | [RFC4517].
|
---|
2132 |
|
---|
2133 | 5.1.2. 'namingContexts'
|
---|
2134 |
|
---|
2135 | The 'namingContexts' attribute lists the context prefixes of the
|
---|
2136 | naming contexts the server masters or shadows (in part or in whole).
|
---|
2137 | If the server is a first-level DSA [X.501], it should list (in
|
---|
2138 | addition) an empty string (indicating the root of the DIT). If the
|
---|
2139 | server does not master or shadow any information (e.g., it is an LDAP
|
---|
2140 | gateway to a public X.500 directory) this attribute will be absent.
|
---|
2141 | If the server believes it masters or shadows the entire directory,
|
---|
2142 | the attribute will have a single value, and that value will be the
|
---|
2143 | empty string (indicating the root of the DIT).
|
---|
2144 |
|
---|
2145 | This attribute may be used, for example, to select a suitable entry
|
---|
2146 | name for subsequent operations with this server.
|
---|
2147 |
|
---|
2148 | ( 1.3.6.1.4.1.1466.101.120.5 NAME 'namingContexts'
|
---|
2149 | SYNTAX 1.3.6.1.4.1.1466.115.121.1.12
|
---|
2150 | USAGE dSAOperation )
|
---|
2151 |
|
---|
2152 | The DistinguishedName (1.3.6.1.4.1.1466.115.121.1.12) syntax is
|
---|
2153 | defined in [RFC4517].
|
---|
2154 |
|
---|
2155 | 5.1.3. 'supportedControl'
|
---|
2156 |
|
---|
2157 | The 'supportedControl' attribute lists object identifiers identifying
|
---|
2158 | the request controls [RFC4511] the server supports. If the server
|
---|
2159 | does not support any request controls, this attribute will be absent.
|
---|
2160 | Object identifiers identifying response controls need not be listed.
|
---|
2161 |
|
---|
2162 | Procedures for registering object identifiers used to discovery of
|
---|
2163 | protocol mechanisms are detailed in BCP 64, RFC 4520 [RFC4520].
|
---|
2164 |
|
---|
2165 |
|
---|
2166 |
|
---|
2167 | Zeilenga Standards Track [Page 38]
|
---|
2168 | |
---|
2169 |
|
---|
2170 | RFC 4512 LDAP Models June 2006
|
---|
2171 |
|
---|
2172 |
|
---|
2173 | ( 1.3.6.1.4.1.1466.101.120.13 NAME 'supportedControl'
|
---|
2174 | SYNTAX 1.3.6.1.4.1.1466.115.121.1.38
|
---|
2175 | USAGE dSAOperation )
|
---|
2176 |
|
---|
2177 | The OBJECT IDENTIFIER (1.3.6.1.4.1.1466.115.121.1.38) syntax is
|
---|
2178 | defined in [RFC4517].
|
---|
2179 |
|
---|
2180 | 5.1.4. 'supportedExtension'
|
---|
2181 |
|
---|
2182 | The 'supportedExtension' attribute lists object identifiers
|
---|
2183 | identifying the extended operations [RFC4511] that the server
|
---|
2184 | supports. If the server does not support any extended operations,
|
---|
2185 | this attribute will be absent.
|
---|
2186 |
|
---|
2187 | An extended operation generally consists of an extended request and
|
---|
2188 | an extended response but may also include other protocol data units
|
---|
2189 | (such as intermediate responses). The object identifier assigned to
|
---|
2190 | the extended request is used to identify the extended operation.
|
---|
2191 | Other object identifiers used in the extended operation need not be
|
---|
2192 | listed as values of this attribute.
|
---|
2193 |
|
---|
2194 | Procedures for registering object identifiers used to discovery of
|
---|
2195 | protocol mechanisms are detailed in BCP 64, RFC 4520 [RFC4520].
|
---|
2196 |
|
---|
2197 | ( 1.3.6.1.4.1.1466.101.120.7 NAME 'supportedExtension'
|
---|
2198 | SYNTAX 1.3.6.1.4.1.1466.115.121.1.38
|
---|
2199 | USAGE dSAOperation )
|
---|
2200 |
|
---|
2201 | The OBJECT IDENTIFIER (1.3.6.1.4.1.1466.115.121.1.38) syntax is
|
---|
2202 | defined in [RFC4517].
|
---|
2203 |
|
---|
2204 | 5.1.5. 'supportedFeatures'
|
---|
2205 |
|
---|
2206 | The 'supportedFeatures' attribute lists object identifiers
|
---|
2207 | identifying elective features that the server supports. If the
|
---|
2208 | server does not support any discoverable elective features, this
|
---|
2209 | attribute will be absent.
|
---|
2210 |
|
---|
2211 | ( 1.3.6.1.4.1.4203.1.3.5 NAME 'supportedFeatures'
|
---|
2212 | EQUALITY objectIdentifierMatch
|
---|
2213 | SYNTAX 1.3.6.1.4.1.1466.115.121.1.38
|
---|
2214 | USAGE dSAOperation )
|
---|
2215 |
|
---|
2216 | Procedures for registering object identifiers used to discovery of
|
---|
2217 | protocol mechanisms are detailed in BCP 64, RFC 4520 [RFC4520].
|
---|
2218 |
|
---|
2219 | The OBJECT IDENTIFIER (1.3.6.1.4.1.1466.115.121.1.38) syntax and
|
---|
2220 | objectIdentifierMatch matching rule are defined in [RFC4517].
|
---|
2221 |
|
---|
2222 |
|
---|
2223 |
|
---|
2224 | Zeilenga Standards Track [Page 39]
|
---|
2225 | |
---|
2226 |
|
---|
2227 | RFC 4512 LDAP Models June 2006
|
---|
2228 |
|
---|
2229 |
|
---|
2230 | 5.1.6. 'supportedLDAPVersion'
|
---|
2231 |
|
---|
2232 | The 'supportedLDAPVersion' attribute lists the versions of LDAP that
|
---|
2233 | the server supports.
|
---|
2234 |
|
---|
2235 | ( 1.3.6.1.4.1.1466.101.120.15 NAME 'supportedLDAPVersion'
|
---|
2236 | SYNTAX 1.3.6.1.4.1.1466.115.121.1.27
|
---|
2237 | USAGE dSAOperation )
|
---|
2238 |
|
---|
2239 | The INTEGER (1.3.6.1.4.1.1466.115.121.1.27) syntax is defined in
|
---|
2240 | [RFC4517].
|
---|
2241 |
|
---|
2242 | 5.1.7. 'supportedSASLMechanisms'
|
---|
2243 |
|
---|
2244 | The 'supportedSASLMechanisms' attribute lists the SASL mechanisms
|
---|
2245 | [RFC4422] that the server recognizes and/or supports [RFC4513]. The
|
---|
2246 | contents of this attribute may depend on the current session state.
|
---|
2247 | If the server does not support any SASL mechanisms, this attribute
|
---|
2248 | will not be present.
|
---|
2249 |
|
---|
2250 | ( 1.3.6.1.4.1.1466.101.120.14 NAME 'supportedSASLMechanisms'
|
---|
2251 | SYNTAX 1.3.6.1.4.1.1466.115.121.1.15
|
---|
2252 | USAGE dSAOperation )
|
---|
2253 |
|
---|
2254 | The Directory String (1.3.6.1.4.1.1466.115.121.1.15) syntax is
|
---|
2255 | defined in [RFC4517].
|
---|
2256 |
|
---|
2257 | 6. Other Considerations
|
---|
2258 |
|
---|
2259 | 6.1. Preservation of User Information
|
---|
2260 |
|
---|
2261 | Syntaxes may be defined that have specific value and/or value form
|
---|
2262 | (representation) preservation requirements. For example, a syntax
|
---|
2263 | containing digitally signed data can mandate that the server preserve
|
---|
2264 | both the value and form of value presented to ensure that the
|
---|
2265 | signature is not invalidated.
|
---|
2266 |
|
---|
2267 | Where such requirements have not been explicitly stated, servers
|
---|
2268 | SHOULD preserve the value of user information but MAY return the
|
---|
2269 | value in a different form. And where a server is unable (or
|
---|
2270 | unwilling) to preserve the value of user information, the server
|
---|
2271 | SHALL ensure that an equivalent value (per Section 2.3) is returned.
|
---|
2272 |
|
---|
2273 |
|
---|
2274 |
|
---|
2275 |
|
---|
2276 |
|
---|
2277 |
|
---|
2278 |
|
---|
2279 |
|
---|
2280 |
|
---|
2281 | Zeilenga Standards Track [Page 40]
|
---|
2282 | |
---|
2283 |
|
---|
2284 | RFC 4512 LDAP Models June 2006
|
---|
2285 |
|
---|
2286 |
|
---|
2287 | 6.2. Short Names
|
---|
2288 |
|
---|
2289 | Short names, also known as descriptors, are used as more readable
|
---|
2290 | aliases for object identifiers and are used to identify various
|
---|
2291 | schema elements. However, it is not expected that LDAP
|
---|
2292 | implementations with human user interface would display these short
|
---|
2293 | names (or the object identifiers they refer to) to the user.
|
---|
2294 | Instead, they would most likely be performing translations (such as
|
---|
2295 | expressing the short name in one of the local national languages).
|
---|
2296 | For example, the short name "st" (stateOrProvinceName) might be
|
---|
2297 | displayed to a German-speaking user as "Land".
|
---|
2298 |
|
---|
2299 | The same short name might have different meaning in different
|
---|
2300 | subschemas, and, within a particular subschema, the same short name
|
---|
2301 | might refer to different object identifiers each identifying a
|
---|
2302 | different kind of schema element.
|
---|
2303 |
|
---|
2304 | Implementations MUST be prepared that the same short name might be
|
---|
2305 | used in a subschema to refer to the different kinds of schema
|
---|
2306 | elements. That is, there might be an object class 'x-fubar' and an
|
---|
2307 | attribute type 'x-fubar' in a subschema.
|
---|
2308 |
|
---|
2309 | Implementations MUST be prepared that the same short name might be
|
---|
2310 | used in the different subschemas to refer to the different schema
|
---|
2311 | elements. That is, there might be two matching rules 'x-fubar', each
|
---|
2312 | in different subschemas.
|
---|
2313 |
|
---|
2314 | Procedures for registering short names (descriptors) are detailed in
|
---|
2315 | BCP 64, RFC 4520 [RFC4520].
|
---|
2316 |
|
---|
2317 | 6.3. Cache and Shadowing
|
---|
2318 |
|
---|
2319 | Some servers may hold cache or shadow copies of entries, which can be
|
---|
2320 | used to answer search and comparison queries, but will return
|
---|
2321 | referrals or contact other servers if modification operations are
|
---|
2322 | requested. Servers that perform shadowing or caching MUST ensure
|
---|
2323 | that they do not violate any access control constraints placed on the
|
---|
2324 | data by the originating server.
|
---|
2325 |
|
---|
2326 |
|
---|
2327 |
|
---|
2328 |
|
---|
2329 |
|
---|
2330 |
|
---|
2331 |
|
---|
2332 |
|
---|
2333 |
|
---|
2334 |
|
---|
2335 |
|
---|
2336 |
|
---|
2337 |
|
---|
2338 | Zeilenga Standards Track [Page 41]
|
---|
2339 | |
---|
2340 |
|
---|
2341 | RFC 4512 LDAP Models June 2006
|
---|
2342 |
|
---|
2343 |
|
---|
2344 | 7. Implementation Guidelines
|
---|
2345 |
|
---|
2346 | 7.1. Server Guidelines
|
---|
2347 |
|
---|
2348 | Servers MUST recognize all names of attribute types and object
|
---|
2349 | classes defined in this document but, unless stated otherwise, need
|
---|
2350 | not support the associated functionality. Servers SHOULD recognize
|
---|
2351 | all the names of attribute types and object classes defined in
|
---|
2352 | Section 3 and 4, respectively, of [RFC4519].
|
---|
2353 |
|
---|
2354 | Servers MUST ensure that entries conform to user and system schema
|
---|
2355 | rules or other data model constraints.
|
---|
2356 |
|
---|
2357 | Servers MAY support DIT Content Rules. Servers MAY support DIT
|
---|
2358 | Structure Rules and Name Forms.
|
---|
2359 |
|
---|
2360 | Servers MAY support alias entries.
|
---|
2361 |
|
---|
2362 | Servers MAY support the 'extensibleObject' object class.
|
---|
2363 |
|
---|
2364 | Servers MAY support subentries. If so, they MUST do so in accordance
|
---|
2365 | with [RFC3672]. Servers that do not support subentries SHOULD use
|
---|
2366 | object entries to mimic subentries as detailed in Section 3.2.
|
---|
2367 |
|
---|
2368 | Servers MAY implement additional schema elements. Servers SHOULD
|
---|
2369 | provide definitions of all schema elements they support in subschema
|
---|
2370 | (sub)entries.
|
---|
2371 |
|
---|
2372 | 7.2. Client Guidelines
|
---|
2373 |
|
---|
2374 | In the absence of prior agreements with servers, clients SHOULD NOT
|
---|
2375 | assume that servers support any particular schema elements beyond
|
---|
2376 | those referenced in Section 7.1. The client can retrieve subschema
|
---|
2377 | information as described in Section 4.4.
|
---|
2378 |
|
---|
2379 | Clients MUST NOT display or attempt to decode a value as ASN.1 if the
|
---|
2380 | value's syntax is not known. Clients MUST NOT assume the LDAP-
|
---|
2381 | specific string encoding is restricted to a UTF-8 encoded string of
|
---|
2382 | Unicode characters or any particular subset of Unicode (such as a
|
---|
2383 | printable subset) unless such restriction is explicitly stated.
|
---|
2384 | Clients SHOULD NOT send attribute values in a request that are not
|
---|
2385 | valid according to the syntax defined for the attributes.
|
---|
2386 |
|
---|
2387 |
|
---|
2388 |
|
---|
2389 |
|
---|
2390 |
|
---|
2391 |
|
---|
2392 |
|
---|
2393 |
|
---|
2394 |
|
---|
2395 | Zeilenga Standards Track [Page 42]
|
---|
2396 | |
---|
2397 |
|
---|
2398 | RFC 4512 LDAP Models June 2006
|
---|
2399 |
|
---|
2400 |
|
---|
2401 | 8. Security Considerations
|
---|
2402 |
|
---|
2403 | Attributes of directory entries are used to provide descriptive
|
---|
2404 | information about the real-world objects they represent, which can be
|
---|
2405 | people, organizations, or devices. Most countries have privacy laws
|
---|
2406 | regarding the publication of information about people.
|
---|
2407 |
|
---|
2408 | General security considerations for accessing directory information
|
---|
2409 | with LDAP are discussed in [RFC4511] and [RFC4513].
|
---|
2410 |
|
---|
2411 | 9. IANA Considerations
|
---|
2412 |
|
---|
2413 | The Internet Assigned Numbers Authority (IANA) has updated the LDAP
|
---|
2414 | descriptors registry as indicated in the following template:
|
---|
2415 |
|
---|
2416 | Subject: Request for LDAP Descriptor Registration Update
|
---|
2417 | Descriptor (short name): see comment
|
---|
2418 | Object Identifier: see comment
|
---|
2419 | Person & email address to contact for further information:
|
---|
2420 | Kurt Zeilenga <kurt@OpenLDAP.org>
|
---|
2421 | Usage: see comment
|
---|
2422 | Specification: RFC 4512
|
---|
2423 | Author/Change Controller: IESG
|
---|
2424 | Comments:
|
---|
2425 |
|
---|
2426 | The following descriptors (short names) has been added to
|
---|
2427 | the registry.
|
---|
2428 |
|
---|
2429 | NAME Type OID
|
---|
2430 | ------------------------ ---- -----------------
|
---|
2431 | governingStructureRule A 2.5.21.10
|
---|
2432 | structuralObjectClass A 2.5.21.9
|
---|
2433 |
|
---|
2434 | The following descriptors (short names) have been updated to
|
---|
2435 | refer to this RFC.
|
---|
2436 |
|
---|
2437 | NAME Type OID
|
---|
2438 | ------------------------ ---- -----------------
|
---|
2439 | alias O 2.5.6.1
|
---|
2440 | aliasedObjectName A 2.5.4.1
|
---|
2441 | altServer A 1.3.6.1.4.1.1466.101.120.6
|
---|
2442 | attributeTypes A 2.5.21.5
|
---|
2443 | createTimestamp A 2.5.18.1
|
---|
2444 | creatorsName A 2.5.18.3
|
---|
2445 | dITContentRules A 2.5.21.2
|
---|
2446 | dITStructureRules A 2.5.21.1
|
---|
2447 | extensibleObject O 1.3.6.1.4.1.1466.101.120.111
|
---|
2448 | ldapSyntaxes A 1.3.6.1.4.1.1466.101.120.16
|
---|
2449 |
|
---|
2450 |
|
---|
2451 |
|
---|
2452 | Zeilenga Standards Track [Page 43]
|
---|
2453 | |
---|
2454 |
|
---|
2455 | RFC 4512 LDAP Models June 2006
|
---|
2456 |
|
---|
2457 |
|
---|
2458 | matchingRuleUse A 2.5.21.8
|
---|
2459 | matchingRules A 2.5.21.4
|
---|
2460 | modifiersName A 2.5.18.4
|
---|
2461 | modifyTimestamp A 2.5.18.2
|
---|
2462 | nameForms A 2.5.21.7
|
---|
2463 | namingContexts A 1.3.6.1.4.1.1466.101.120.5
|
---|
2464 | objectClass A 2.5.4.0
|
---|
2465 | objectClasses A 2.5.21.6
|
---|
2466 | subschema O 2.5.20.1
|
---|
2467 | subschemaSubentry A 2.5.18.10
|
---|
2468 | supportedControl A 1.3.6.1.4.1.1466.101.120.13
|
---|
2469 | supportedExtension A 1.3.6.1.4.1.1466.101.120.7
|
---|
2470 | supportedFeatures A 1.3.6.1.4.1.4203.1.3.5
|
---|
2471 | supportedLDAPVersion A 1.3.6.1.4.1.1466.101.120.15
|
---|
2472 | supportedSASLMechanisms A 1.3.6.1.4.1.1466.101.120.14
|
---|
2473 | top O 2.5.6.0
|
---|
2474 |
|
---|
2475 | 10. Acknowledgements
|
---|
2476 |
|
---|
2477 | This document is based in part on RFC 2251 by M. Wahl, T. Howes, and
|
---|
2478 | S. Kille; RFC 2252 by M. Wahl, A. Coulbeck, T. Howes, S. Kille; and
|
---|
2479 | RFC 2556 by M. Wahl, all products of the IETF Access, Searching and
|
---|
2480 | Indexing of Directories (ASID) Working Group. This document is also
|
---|
2481 | based in part on "The Directory: Models" [X.501], a product of the
|
---|
2482 | International Telephone Union (ITU). Additional text was borrowed
|
---|
2483 | from RFC 2253 by M. Wahl, T. Howes, and S. Kille.
|
---|
2484 |
|
---|
2485 | This document is a product of the IETF LDAP Revision (LDAPBIS)
|
---|
2486 | Working Group.
|
---|
2487 |
|
---|
2488 |
|
---|
2489 |
|
---|
2490 |
|
---|
2491 |
|
---|
2492 |
|
---|
2493 |
|
---|
2494 |
|
---|
2495 |
|
---|
2496 |
|
---|
2497 |
|
---|
2498 |
|
---|
2499 |
|
---|
2500 |
|
---|
2501 |
|
---|
2502 |
|
---|
2503 |
|
---|
2504 |
|
---|
2505 |
|
---|
2506 |
|
---|
2507 |
|
---|
2508 |
|
---|
2509 | Zeilenga Standards Track [Page 44]
|
---|
2510 | |
---|
2511 |
|
---|
2512 | RFC 4512 LDAP Models June 2006
|
---|
2513 |
|
---|
2514 |
|
---|
2515 | 11. Normative References
|
---|
2516 |
|
---|
2517 | [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
|
---|
2518 | Requirement Levels", BCP 14, RFC 2119, March 1997.
|
---|
2519 |
|
---|
2520 | [RFC3629] Yergeau, F., "UTF-8, a transformation format of ISO
|
---|
2521 | 10646", STD 63, RFC 3629, November 2003.
|
---|
2522 |
|
---|
2523 | [RFC3671] Zeilenga, K., "Collective Attributes in the Lightweight
|
---|
2524 | Directory Access Protocol (LDAP)", RFC 3671, December
|
---|
2525 | 2003.
|
---|
2526 |
|
---|
2527 | [RFC3672] Zeilenga, K., "Subentries in the Lightweight Directory
|
---|
2528 | Access Protocol (LDAP)", RFC 3672, December 2003.
|
---|
2529 |
|
---|
2530 | [RFC4234] Crocker, D. and P. Overell, "Augmented BNF for Syntax
|
---|
2531 | Specifications: ABNF", RFC 4234, October 2005.
|
---|
2532 |
|
---|
2533 | [RFC4422] Melnikov, A., Ed. and K. Zeilenga, Ed., "Simple
|
---|
2534 | Authentication and Security Layer (SASL)", RFC 4422,
|
---|
2535 | June 2006.
|
---|
2536 |
|
---|
2537 | [RFC4510] Zeilenga, K., Ed., "Lightweight Directory Access
|
---|
2538 | Protocol (LDAP): Technical Specification Road Map", RFC
|
---|
2539 | 4510, June 2006.
|
---|
2540 |
|
---|
2541 | [RFC4511] Sermersheim, J., Ed., "Lightweight Directory Access
|
---|
2542 | Protocol (LDAP): The Protocol", RFC 4511, June 2006.
|
---|
2543 |
|
---|
2544 | [RFC4513] Harrison, R., Ed., "Lightweight Directory Access
|
---|
2545 | Protocol (LDAP): Authentication Methods and Security
|
---|
2546 | Mechanisms", RFC 4513, June 2006.
|
---|
2547 |
|
---|
2548 | [RFC4514] Zeilenga, K., Ed., "Lightweight Directory Access
|
---|
2549 | Protocol (LDAP): String Representation of Distinguished
|
---|
2550 | Names", RFC 4514, June 2006.
|
---|
2551 |
|
---|
2552 | [RFC4515] Smith, M., Ed. and T. Howes, "Lightweight Directory
|
---|
2553 | Access Protocol (LDAP): String Representation of Search
|
---|
2554 | Filters", RFC 4515, June 2006.
|
---|
2555 |
|
---|
2556 | [RFC4516] Smith, M., Ed. and T. Howes, "Lightweight Directory
|
---|
2557 | Access Protocol (LDAP): Uniform Resource Locator", RFC
|
---|
2558 | 4516, June 2006.
|
---|
2559 |
|
---|
2560 | [RFC4517] Legg, S., Ed., "Lightweight Directory Access Protocol
|
---|
2561 | (LDAP): Syntaxes and Matching Rules", RFC 4517, June
|
---|
2562 | 2006.
|
---|
2563 |
|
---|
2564 |
|
---|
2565 |
|
---|
2566 | Zeilenga Standards Track [Page 45]
|
---|
2567 | |
---|
2568 |
|
---|
2569 | RFC 4512 LDAP Models June 2006
|
---|
2570 |
|
---|
2571 |
|
---|
2572 | [RFC4519] Sciberras, A., Ed., "Lightweight Directory Access
|
---|
2573 | Protocol (LDAP): Schema for User Applications", RFC
|
---|
2574 | 4519, June 2006.
|
---|
2575 |
|
---|
2576 | [RFC4520] Zeilenga, K., "Internet Assigned Numbers Authority
|
---|
2577 | (IANA) Considerations for the Lightweight Directory
|
---|
2578 | Access Protocol (LDAP)", BCP 64, RFC 4520, June 2006.
|
---|
2579 |
|
---|
2580 | [Unicode] The Unicode Consortium, "The Unicode Standard, Version
|
---|
2581 | 3.2.0" is defined by "The Unicode Standard, Version
|
---|
2582 | 3.0" (Reading, MA, Addison-Wesley, 2000. ISBN 0-201-
|
---|
2583 | 61633-5), as amended by the "Unicode Standard Annex
|
---|
2584 | #27: Unicode 3.1"
|
---|
2585 | (http://www.unicode.org/reports/tr27/) and by the
|
---|
2586 | "Unicode Standard Annex #28: Unicode 3.2"
|
---|
2587 | (http://www.unicode.org/reports/tr28/).
|
---|
2588 |
|
---|
2589 | [X.500] International Telecommunication Union -
|
---|
2590 | Telecommunication Standardization Sector, "The
|
---|
2591 | Directory -- Overview of concepts, models and
|
---|
2592 | services," X.500(1993) (also ISO/IEC 9594-1:1994).
|
---|
2593 |
|
---|
2594 | [X.501] International Telecommunication Union -
|
---|
2595 | Telecommunication Standardization Sector, "The
|
---|
2596 | Directory -- Models," X.501(1993) (also ISO/IEC 9594-
|
---|
2597 | 2:1994).
|
---|
2598 |
|
---|
2599 | [X.680] International Telecommunication Union -
|
---|
2600 | Telecommunication Standardization Sector, "Abstract
|
---|
2601 | Syntax Notation One (ASN.1) - Specification of Basic
|
---|
2602 | Notation", X.680(2002) (also ISO/IEC 8824-1:2002).
|
---|
2603 |
|
---|
2604 |
|
---|
2605 |
|
---|
2606 |
|
---|
2607 |
|
---|
2608 |
|
---|
2609 |
|
---|
2610 |
|
---|
2611 |
|
---|
2612 |
|
---|
2613 |
|
---|
2614 |
|
---|
2615 |
|
---|
2616 |
|
---|
2617 |
|
---|
2618 |
|
---|
2619 |
|
---|
2620 |
|
---|
2621 |
|
---|
2622 |
|
---|
2623 | Zeilenga Standards Track [Page 46]
|
---|
2624 | |
---|
2625 |
|
---|
2626 | RFC 4512 LDAP Models June 2006
|
---|
2627 |
|
---|
2628 |
|
---|
2629 | Appendix A. Changes
|
---|
2630 |
|
---|
2631 | This appendix is non-normative.
|
---|
2632 |
|
---|
2633 | This document amounts to nearly a complete rewrite of portions of RFC
|
---|
2634 | 2251, RFC 2252, and RFC 2256. This rewrite was undertaken to improve
|
---|
2635 | overall clarity of technical specification. This appendix provides a
|
---|
2636 | summary of substantive changes made to the portions of these
|
---|
2637 | documents incorporated into this document. Readers should consult
|
---|
2638 | [RFC4510], [RFC4511], [RFC4517], and [RFC4519] for summaries of
|
---|
2639 | remaining portions of these documents.
|
---|
2640 |
|
---|
2641 | A.1. Changes to RFC 2251
|
---|
2642 |
|
---|
2643 | This document incorporates from RFC 2251, Sections 3.2 and 3.4, and
|
---|
2644 | portions of Sections 4 and 6 as summarized below.
|
---|
2645 |
|
---|
2646 | A.1.1. Section 3.2 of RFC 2251
|
---|
2647 |
|
---|
2648 | Section 3.2 of RFC 2251 provided a brief introduction to the X.500
|
---|
2649 | data model, as used by LDAP. The previous specification relied on
|
---|
2650 | [X.501] but lacked clarity in how X.500 models are adapted for use by
|
---|
2651 | LDAP. This document describes the X.500 data models, as used by
|
---|
2652 | LDAP, in greater detail, especially in areas where adaptation is
|
---|
2653 | needed.
|
---|
2654 |
|
---|
2655 | Section 3.2.1 of RFC 2251 described an attribute as "a type with one
|
---|
2656 | or more associated values". In LDAP, an attribute is better
|
---|
2657 | described as an attribute description, a type with zero or more
|
---|
2658 | options, and one or more associated values.
|
---|
2659 |
|
---|
2660 | Section 3.2.2 of RFC 2251 mandated that subschema subentries contain
|
---|
2661 | objectClasses and attributeTypes attributes, yet X.500(93) treats
|
---|
2662 | these attributes as optional. While generally all implementations
|
---|
2663 | that support X.500(93) subschema mechanisms will provide both of
|
---|
2664 | these attributes, it is not absolutely required for interoperability
|
---|
2665 | that all servers do. The mandate was removed for consistency with
|
---|
2666 | X.500(93). The subschema discovery mechanism was also clarified to
|
---|
2667 | indicate that subschema controlling an entry is obtained by reading
|
---|
2668 | the (sub)entry referred to by that entry's 'subschemaSubentry'
|
---|
2669 | attribute.
|
---|
2670 |
|
---|
2671 |
|
---|
2672 |
|
---|
2673 |
|
---|
2674 |
|
---|
2675 |
|
---|
2676 |
|
---|
2677 |
|
---|
2678 |
|
---|
2679 |
|
---|
2680 | Zeilenga Standards Track [Page 47]
|
---|
2681 | |
---|
2682 |
|
---|
2683 | RFC 4512 LDAP Models June 2006
|
---|
2684 |
|
---|
2685 |
|
---|
2686 | A.1.2. Section 3.4 of RFC 2251
|
---|
2687 |
|
---|
2688 | Section 3.4 of RFC 2251 provided "Server-specific Data Requirements".
|
---|
2689 | This material, with changes, was incorporated in Section 5.1 of this
|
---|
2690 | document.
|
---|
2691 |
|
---|
2692 | Changes:
|
---|
2693 |
|
---|
2694 | - Clarify that attributes of the root DSE are subject to "other
|
---|
2695 | restrictions" in addition to access controls.
|
---|
2696 |
|
---|
2697 | - Clarify that only recognized extended requests need to be
|
---|
2698 | enumerated 'supportedExtension'.
|
---|
2699 |
|
---|
2700 | - Clarify that only recognized request controls need to be enumerated
|
---|
2701 | 'supportedControl'.
|
---|
2702 |
|
---|
2703 | - Clarify that root DSE attributes are operational and, like other
|
---|
2704 | operational attributes, will not be returned in search requests
|
---|
2705 | unless requested by name.
|
---|
2706 |
|
---|
2707 | - Clarify that not all root DSE attributes are user modifiable.
|
---|
2708 |
|
---|
2709 | - Remove inconsistent text regarding handling of the
|
---|
2710 | 'subschemaSubentry' attribute within the root DSE. The previous
|
---|
2711 | specification stated that the 'subschemaSubentry' attribute held in
|
---|
2712 | the root DSE referred to "subschema entries (or subentries) known
|
---|
2713 | by this server". This is inconsistent with the attribute's
|
---|
2714 | intended use as well as its formal definition as a single valued
|
---|
2715 | attribute [X.501]. It is also noted that a simple (possibly
|
---|
2716 | incomplete) list of subschema (sub)entries is not terribly useful.
|
---|
2717 | This document (in Section 5.1) specifies that the
|
---|
2718 | 'subschemaSubentry' attribute of the root DSE refers to the
|
---|
2719 | subschema controlling the root DSE. It is noted that the general
|
---|
2720 | subschema discovery mechanism remains available (see Section 4.4 of
|
---|
2721 | this document).
|
---|
2722 |
|
---|
2723 | A.1.3. Section 4 of RFC 2251
|
---|
2724 |
|
---|
2725 | Portions of Section 4 of RFC 2251 detailing aspects of the
|
---|
2726 | information model used by LDAP were incorporated in this document,
|
---|
2727 | including:
|
---|
2728 |
|
---|
2729 | - Restriction of distinguished values to attributes whose
|
---|
2730 | descriptions have no options (from Section 4.1.3);
|
---|
2731 |
|
---|
2732 |
|
---|
2733 |
|
---|
2734 |
|
---|
2735 |
|
---|
2736 |
|
---|
2737 | Zeilenga Standards Track [Page 48]
|
---|
2738 | |
---|
2739 |
|
---|
2740 | RFC 4512 LDAP Models June 2006
|
---|
2741 |
|
---|
2742 |
|
---|
2743 | - Data model aspects of Attribute Types (from Section 4.1.4),
|
---|
2744 | Attribute Descriptions (from 4.1.5), Attribute (from 4.1.8),
|
---|
2745 | Matching Rule Identifier (from 4.1.9); and
|
---|
2746 |
|
---|
2747 | - User schema requirements (from Sections 4.1.6, 4.5.1, and 4.7).
|
---|
2748 |
|
---|
2749 | Clarifications to these portions include:
|
---|
2750 |
|
---|
2751 | - Subtyping and AttributeDescriptions with options.
|
---|
2752 |
|
---|
2753 | A.1.4. Section 6 of RFC 2251
|
---|
2754 |
|
---|
2755 | The Section 6.1 and the second paragraph of Section 6.2 of RFC 2251
|
---|
2756 | where incorporated into this document.
|
---|
2757 |
|
---|
2758 | A.2. Changes to RFC 2252
|
---|
2759 |
|
---|
2760 | This document incorporates Sections 4, 5, and 7 from RFC 2252.
|
---|
2761 |
|
---|
2762 | A.2.1. Section 4 of RFC 2252
|
---|
2763 |
|
---|
2764 | The specification was updated to use Augmented BNF [RFC4234]. The
|
---|
2765 | string representation of an OBJECT IDENTIFIER was tightened to
|
---|
2766 | disallow leading zeros as described in RFC 2252.
|
---|
2767 |
|
---|
2768 | The <descr> syntax was changed to disallow semicolon (U+003B)
|
---|
2769 | characters in order to appear to be consistent its natural language
|
---|
2770 | specification "descr is the syntactic representation of an object
|
---|
2771 | descriptor, which consists of letters and digits, starting with a
|
---|
2772 | letter". In a related change, the statement "an AttributeDescription
|
---|
2773 | can be used as the value in a NAME part of an
|
---|
2774 | AttributeTypeDescription" was deleted. RFC 2252 provided no
|
---|
2775 | specification of the semantics of attribute options appearing in NAME
|
---|
2776 | fields.
|
---|
2777 |
|
---|
2778 | RFC 2252 stated that the <descr> form of <oid> SHOULD be preferred
|
---|
2779 | over the <numericoid> form. However, <descr> form can be ambiguous.
|
---|
2780 | To address this issue, the imperative was replaced with a statement
|
---|
2781 | (in Section 1.4) that while the <descr> form is generally preferred,
|
---|
2782 | <numericoid> should be used where an unambiguous <descr> is not
|
---|
2783 | available. Additionally, an expanded discussion of descriptor issues
|
---|
2784 | is in Section 6.2 ("Short Names").
|
---|
2785 |
|
---|
2786 | The ABNF for a quoted string (qdstring) was updated to reflect
|
---|
2787 | support for the escaping mechanism described in Section 4.3 of RFC
|
---|
2788 | 2252.
|
---|
2789 |
|
---|
2790 |
|
---|
2791 |
|
---|
2792 |
|
---|
2793 |
|
---|
2794 | Zeilenga Standards Track [Page 49]
|
---|
2795 | |
---|
2796 |
|
---|
2797 | RFC 4512 LDAP Models June 2006
|
---|
2798 |
|
---|
2799 |
|
---|
2800 | A.2.2. Section 5 of RFC 2252
|
---|
2801 |
|
---|
2802 | Definitions of operational attributes provided in Section 5 of RFC
|
---|
2803 | 2252 where incorporated into this document.
|
---|
2804 |
|
---|
2805 | The 'namingContexts' description was clarified. A first-level DSA
|
---|
2806 | should publish, in addition to other values, "" indicating the root
|
---|
2807 | of the DIT.
|
---|
2808 |
|
---|
2809 | The 'altServer' description was clarified. It may hold any URI.
|
---|
2810 |
|
---|
2811 | The 'supportedExtension' description was clarified. A server need
|
---|
2812 | only list the OBJECT IDENTIFIERs associated with the extended
|
---|
2813 | requests of the extended operations it recognizes.
|
---|
2814 |
|
---|
2815 | The 'supportedControl' description was clarified. A server need only
|
---|
2816 | list the OBJECT IDENTIFIERs associated with the request controls it
|
---|
2817 | recognizes.
|
---|
2818 |
|
---|
2819 | Descriptions for the 'structuralObjectClass' and
|
---|
2820 | 'governingStructureRule' operational attribute types were added.
|
---|
2821 |
|
---|
2822 | The attribute definition of 'subschemaSubentry' was corrected to list
|
---|
2823 | the terms SINGLE-VALUE and NO-USER-MODIFICATION in proper order.
|
---|
2824 |
|
---|
2825 | A.2.3. Section 7 of RFC 2252
|
---|
2826 |
|
---|
2827 | Section 7 of RFC 2252 provides definitions of the 'subschema' and
|
---|
2828 | 'extensibleObject' object classes. These definitions where
|
---|
2829 | integrated into Section 4.2 and Section 4.3 of this document,
|
---|
2830 | respectively. Section 7 of RFC 2252 also contained the object class
|
---|
2831 | implementation requirement. This was incorporated into Section 7 of
|
---|
2832 | this document.
|
---|
2833 |
|
---|
2834 | The specification of 'extensibleObject' was clarified regarding how
|
---|
2835 | it interacts with precluded attributes.
|
---|
2836 |
|
---|
2837 | A.3. Changes to RFC 2256
|
---|
2838 |
|
---|
2839 | This document incorporates Sections 5.1, 5.2, 7.1, and 7.2 of RFC
|
---|
2840 | 2256.
|
---|
2841 |
|
---|
2842 | Section 5.1 of RFC 2256 provided the definition of the 'objectClass'
|
---|
2843 | attribute type. This was integrated into Section 2.4.1 of this
|
---|
2844 | document. The statement "One of the values is either 'top' or
|
---|
2845 | 'alias'" was replaced with statement that one of the values is 'top'
|
---|
2846 | as entries belonging to 'alias' also belong to 'top'.
|
---|
2847 |
|
---|
2848 |
|
---|
2849 |
|
---|
2850 |
|
---|
2851 | Zeilenga Standards Track [Page 50]
|
---|
2852 | |
---|
2853 |
|
---|
2854 | RFC 4512 LDAP Models June 2006
|
---|
2855 |
|
---|
2856 |
|
---|
2857 | Section 5.2 of RFC 2256 provided the definition of the
|
---|
2858 | 'aliasedObjectName' attribute type. This was integrated into Section
|
---|
2859 | 2.6.2 of this document.
|
---|
2860 |
|
---|
2861 | Section 7.1 of RFC 2256 provided the definition of the 'top' object
|
---|
2862 | class. This was integrated into Section 2.4.1 of this document.
|
---|
2863 |
|
---|
2864 | Section 7.2 of RFC 2256 provided the definition of the 'alias' object
|
---|
2865 | class. This was integrated into Section 2.6.1 of this document.
|
---|
2866 |
|
---|
2867 | A.4. Changes to RFC 3674
|
---|
2868 |
|
---|
2869 | This document made no substantive change to the 'supportedFeatures'
|
---|
2870 | technical specification provided in RFC 3674.
|
---|
2871 |
|
---|
2872 | Editor's Address
|
---|
2873 |
|
---|
2874 | Kurt D. Zeilenga
|
---|
2875 | OpenLDAP Foundation
|
---|
2876 |
|
---|
2877 | EMail: Kurt@OpenLDAP.org
|
---|
2878 |
|
---|
2879 |
|
---|
2880 |
|
---|
2881 |
|
---|
2882 |
|
---|
2883 |
|
---|
2884 |
|
---|
2885 |
|
---|
2886 |
|
---|
2887 |
|
---|
2888 |
|
---|
2889 |
|
---|
2890 |
|
---|
2891 |
|
---|
2892 |
|
---|
2893 |
|
---|
2894 |
|
---|
2895 |
|
---|
2896 |
|
---|
2897 |
|
---|
2898 |
|
---|
2899 |
|
---|
2900 |
|
---|
2901 |
|
---|
2902 |
|
---|
2903 |
|
---|
2904 |
|
---|
2905 |
|
---|
2906 |
|
---|
2907 |
|
---|
2908 | Zeilenga Standards Track [Page 51]
|
---|
2909 | |
---|
2910 |
|
---|
2911 | RFC 4512 LDAP Models June 2006
|
---|
2912 |
|
---|
2913 |
|
---|
2914 | Full Copyright Statement
|
---|
2915 |
|
---|
2916 | Copyright (C) The Internet Society (2006).
|
---|
2917 |
|
---|
2918 | This document is subject to the rights, licenses and restrictions
|
---|
2919 | contained in BCP 78, and except as set forth therein, the authors
|
---|
2920 | retain all their rights.
|
---|
2921 |
|
---|
2922 | This document and the information contained herein are provided on an
|
---|
2923 | "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
|
---|
2924 | OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
|
---|
2925 | ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
|
---|
2926 | INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
|
---|
2927 | INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
|
---|
2928 | WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
|
---|
2929 |
|
---|
2930 | Intellectual Property
|
---|
2931 |
|
---|
2932 | The IETF takes no position regarding the validity or scope of any
|
---|
2933 | Intellectual Property Rights or other rights that might be claimed to
|
---|
2934 | pertain to the implementation or use of the technology described in
|
---|
2935 | this document or the extent to which any license under such rights
|
---|
2936 | might or might not be available; nor does it represent that it has
|
---|
2937 | made any independent effort to identify any such rights. Information
|
---|
2938 | on the procedures with respect to rights in RFC documents can be
|
---|
2939 | found in BCP 78 and BCP 79.
|
---|
2940 |
|
---|
2941 | Copies of IPR disclosures made to the IETF Secretariat and any
|
---|
2942 | assurances of licenses to be made available, or the result of an
|
---|
2943 | attempt made to obtain a general license or permission for the use of
|
---|
2944 | such proprietary rights by implementers or users of this
|
---|
2945 | specification can be obtained from the IETF on-line IPR repository at
|
---|
2946 | http://www.ietf.org/ipr.
|
---|
2947 |
|
---|
2948 | The IETF invites any interested party to bring to its attention any
|
---|
2949 | copyrights, patents or patent applications, or other proprietary
|
---|
2950 | rights that may cover technology that may be required to implement
|
---|
2951 | this standard. Please address the information to the IETF at
|
---|
2952 | ietf-ipr@ietf.org.
|
---|
2953 |
|
---|
2954 | Acknowledgement
|
---|
2955 |
|
---|
2956 | Funding for the RFC Editor function is provided by the IETF
|
---|
2957 | Administrative Support Activity (IASA).
|
---|
2958 |
|
---|
2959 |
|
---|
2960 |
|
---|
2961 |
|
---|
2962 |
|
---|
2963 |
|
---|
2964 |
|
---|
2965 | Zeilenga Standards Track [Page 52]
|
---|
2966 | |
---|
2967 |
|
---|