source: branches/samba-3.5.x/source4/ldap_server/devdocs/rfc4512.txt

Last change on this file was 414, checked in by Herwig Bauernfeind, 15 years ago

Samba 3.5.0: Initial import

File size: 105.8 KB
Line 
1
2
3
4
5
6
7Network Working Group K. Zeilenga
8Request for Comments: 4512 OpenLDAP Foundation
9Obsoletes: 2251, 2252, 2256, 3674 June 2006
10Category: Standards Track
11
12
13 Lightweight Directory Access Protocol (LDAP):
14 Directory Information Models
15
16Status of This Memo
17
18 This document specifies an Internet standards track protocol for the
19 Internet community, and requests discussion and suggestions for
20 improvements. Please refer to the current edition of the "Internet
21 Official Protocol Standards" (STD 1) for the standardization state
22 and status of this protocol. Distribution of this memo is unlimited.
23
24Copyright Notice
25
26 Copyright (C) The Internet Society (2006).
27
28Abstract
29
30 The Lightweight Directory Access Protocol (LDAP) is an Internet
31 protocol for accessing distributed directory services that act in
32 accordance with X.500 data and service models. This document
33 describes the X.500 Directory Information Models, as used in LDAP.
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58Zeilenga Standards Track [Page 1]
59
60
61RFC 4512 LDAP Models June 2006
62
63
64Table of Contents
65
66 1. Introduction ....................................................3
67 1.1. Relationship to Other LDAP Specifications ..................3
68 1.2. Relationship to X.501 ......................................4
69 1.3. Conventions ................................................4
70 1.4. Common ABNF Productions ....................................4
71 2. Model of Directory User Information .............................6
72 2.1. The Directory Information Tree .............................7
73 2.2. Structure of an Entry ......................................7
74 2.3. Naming of Entries ..........................................8
75 2.4. Object Classes .............................................9
76 2.5. Attribute Descriptions ....................................12
77 2.6. Alias Entries .............................................16
78 3. Directory Administrative and Operational Information ...........17
79 3.1. Subtrees ..................................................17
80 3.2. Subentries ................................................18
81 3.3. The 'objectClass' attribute ...............................18
82 3.4. Operational Attributes ....................................19
83 4. Directory Schema ...............................................22
84 4.1. Schema Definitions ........................................23
85 4.2. Subschema Subentries ......................................32
86 4.3. 'extensibleObject' object class ...........................35
87 4.4. Subschema Discovery .......................................35
88 5. DSA (Server) Informational Model ...............................36
89 5.1. Server-Specific Data Requirements .........................36
90 6. Other Considerations ...........................................40
91 6.1. Preservation of User Information ..........................40
92 6.2. Short Names ...............................................41
93 6.3. Cache and Shadowing .......................................41
94 7. Implementation Guidelines ......................................42
95 7.1. Server Guidelines .........................................42
96 7.2. Client Guidelines .........................................42
97 8. Security Considerations ........................................43
98 9. IANA Considerations ............................................43
99 10. Acknowledgements ..............................................44
100 11. Normative References ..........................................45
101 Appendix A. Changes ...............................................47
102 A.1. Changes to RFC 2251 .......................................47
103 A.2. Changes to RFC 2252 .......................................49
104 A.3. Changes to RFC 2256 .......................................50
105 A.4. Changes to RFC 3674 .......................................51
106
107
108
109
110
111
112
113
114
115Zeilenga Standards Track [Page 2]
116
117
118RFC 4512 LDAP Models June 2006
119
120
1211. Introduction
122
123 This document discusses the X.500 Directory Information Models
124 [X.501], as used by the Lightweight Directory Access Protocol (LDAP)
125 [RFC4510].
126
127 The Directory is "a collection of open systems cooperating to provide
128 directory services" [X.500]. The information held in the Directory
129 is collectively known as the Directory Information Base (DIB). A
130 Directory user, which may be a human or other entity, accesses the
131 Directory through a client (or Directory User Agent (DUA)). The
132 client, on behalf of the directory user, interacts with one or more
133 servers (or Directory System Agents (DSA)). A server holds a
134 fragment of the DIB.
135
136 The DIB contains two classes of information:
137
138 1) user information (e.g., information provided and administrated
139 by users). Section 2 describes the Model of User Information.
140
141 2) administrative and operational information (e.g., information
142 used to administer and/or operate the directory). Section 3
143 describes the model of Directory Administrative and Operational
144 Information.
145
146 These two models, referred to as the generic Directory Information
147 Models, describe how information is represented in the Directory.
148 These generic models provide a framework for other information
149 models. Section 4 discusses the subschema information model and
150 subschema discovery. Section 5 discusses the DSA (Server)
151 Informational Model.
152
153 Other X.500 information models (such as access control distribution
154 knowledge and replication knowledge information models) may be
155 adapted for use in LDAP. Specification of how these models apply to
156 LDAP is left to future documents.
157
1581.1. Relationship to Other LDAP Specifications
159
160 This document is a integral part of the LDAP technical specification
161 [RFC4510], which obsoletes the previously defined LDAP technical
162 specification, RFC 3377, in its entirety.
163
164 This document obsoletes RFC 2251, Sections 3.2 and 3.4, as well as
165 portions of Sections 4 and 6. Appendix A.1 summarizes changes to
166 these sections. The remainder of RFC 2251 is obsoleted by the
167 [RFC4511], [RFC4513], and [RFC4510] documents.
168
169
170
171
172Zeilenga Standards Track [Page 3]
173
174
175RFC 4512 LDAP Models June 2006
176
177
178 This document obsoletes RFC 2252, Sections 4, 5, and 7. Appendix A.2
179 summarizes changes to these sections. The remainder of RFC 2252 is
180 obsoleted by [RFC4517].
181
182 This document obsoletes RFC 2256, Sections 5.1, 5.2, 7.1, and 7.2.
183 Appendix A.3 summarizes changes to these sections. The remainder of
184 RFC 2256 is obsoleted by [RFC4519] and [RFC4517].
185
186 This document obsoletes RFC 3674 in its entirety. Appendix A.4
187 summarizes changes since RFC 3674.
188
1891.2. Relationship to X.501
190
191 This document includes material, with and without adaptation, from
192 [X.501] as necessary to describe this protocol. These adaptations
193 (and any other differences herein) apply to this protocol, and only
194 this protocol.
195
1961.3. Conventions
197
198 The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
199 "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
200 document are to be interpreted as described in BCP 14 [RFC2119].
201
202 Schema definitions are provided using LDAP description formats (as
203 defined in Section 4.1). Definitions provided here are formatted
204 (line wrapped) for readability. Matching rules and LDAP syntaxes
205 referenced in these definitions are specified in [RFC4517].
206
2071.4. Common ABNF Productions
208
209 A number of syntaxes in this document are described using Augmented
210 Backus-Naur Form (ABNF) [RFC4234]. These syntaxes (as well as a
211 number of syntaxes defined in other documents) rely on the following
212 common productions:
213
214 keystring = leadkeychar *keychar
215 leadkeychar = ALPHA
216 keychar = ALPHA / DIGIT / HYPHEN
217 number = DIGIT / ( LDIGIT 1*DIGIT )
218
219 ALPHA = %x41-5A / %x61-7A ; "A"-"Z" / "a"-"z"
220 DIGIT = %x30 / LDIGIT ; "0"-"9"
221 LDIGIT = %x31-39 ; "1"-"9"
222 HEX = DIGIT / %x41-46 / %x61-66 ; "0"-"9" / "A"-"F" / "a"-"f"
223
224 SP = 1*SPACE ; one or more " "
225 WSP = 0*SPACE ; zero or more " "
226
227
228
229Zeilenga Standards Track [Page 4]
230
231
232RFC 4512 LDAP Models June 2006
233
234
235 NULL = %x00 ; null (0)
236 SPACE = %x20 ; space (" ")
237 DQUOTE = %x22 ; quote (""")
238 SHARP = %x23 ; octothorpe (or sharp sign) ("#")
239 DOLLAR = %x24 ; dollar sign ("$")
240 SQUOTE = %x27 ; single quote ("'")
241 LPAREN = %x28 ; left paren ("(")
242 RPAREN = %x29 ; right paren (")")
243 PLUS = %x2B ; plus sign ("+")
244 COMMA = %x2C ; comma (",")
245 HYPHEN = %x2D ; hyphen ("-")
246 DOT = %x2E ; period (".")
247 SEMI = %x3B ; semicolon (";")
248 LANGLE = %x3C ; left angle bracket ("<")
249 EQUALS = %x3D ; equals sign ("=")
250 RANGLE = %x3E ; right angle bracket (">")
251 ESC = %x5C ; backslash ("\")
252 USCORE = %x5F ; underscore ("_")
253 LCURLY = %x7B ; left curly brace "{"
254 RCURLY = %x7D ; right curly brace "}"
255
256 ; Any UTF-8 [RFC3629] encoded Unicode [Unicode] character
257 UTF8 = UTF1 / UTFMB
258 UTFMB = UTF2 / UTF3 / UTF4
259 UTF0 = %x80-BF
260 UTF1 = %x00-7F
261 UTF2 = %xC2-DF UTF0
262 UTF3 = %xE0 %xA0-BF UTF0 / %xE1-EC 2(UTF0) /
263 %xED %x80-9F UTF0 / %xEE-EF 2(UTF0)
264 UTF4 = %xF0 %x90-BF 2(UTF0) / %xF1-F3 3(UTF0) /
265 %xF4 %x80-8F 2(UTF0)
266
267 OCTET = %x00-FF ; Any octet (8-bit data unit)
268
269 Object identifiers (OIDs) [X.680] are represented in LDAP using a
270 dot-decimal format conforming to the ABNF:
271
272 numericoid = number 1*( DOT number )
273
274 Short names, also known as descriptors, are used as more readable
275 aliases for object identifiers. Short names are case insensitive and
276 conform to the ABNF:
277
278 descr = keystring
279
280
281
282
283
284
285
286Zeilenga Standards Track [Page 5]
287
288
289RFC 4512 LDAP Models June 2006
290
291
292 Where either an object identifier or a short name may be specified,
293 the following production is used:
294
295 oid = descr / numericoid
296
297 While the <descr> form is generally preferred when the usage is
298 restricted to short names referring to object identifiers that
299 identify like kinds of objects (e.g., attribute type descriptions,
300 matching rule descriptions, object class descriptions), the
301 <numericoid> form should be used when the object identifiers may
302 identify multiple kinds of objects or when an unambiguous short name
303 (descriptor) is not available.
304
305 Implementations SHOULD treat short names (descriptors) used in an
306 ambiguous manner (as discussed above) as unrecognized.
307
308 Short Names (descriptors) are discussed further in Section 6.2.
309
3102. Model of Directory User Information
311
312 As [X.501] states:
313
314 The purpose of the Directory is to hold, and provide access to,
315 information about objects of interest (objects) in some 'world'.
316 An object can be anything which is identifiable (can be named).
317
318 An object class is an identified family of objects, or conceivable
319 objects, which share certain characteristics. Every object
320 belongs to at least one class. An object class may be a subclass
321 of other object classes, in which case the members of the former
322 class, the subclass, are also considered to be members of the
323 latter classes, the superclasses. There may be subclasses of
324 subclasses, etc., to an arbitrary depth.
325
326 A directory entry, a named collection of information, is the basic
327 unit of information held in the Directory. There are multiple kinds
328 of directory entries.
329
330 An object entry represents a particular object. An alias entry
331 provides alternative naming. A subentry holds administrative and/or
332 operational information.
333
334 The set of entries representing the DIB are organized hierarchically
335 in a tree structure known as the Directory Information Tree (DIT).
336
337 Section 2.1 describes the Directory Information Tree.
338 Section 2.2 discusses the structure of entries.
339 Section 2.3 discusses naming of entries.
340
341
342
343Zeilenga Standards Track [Page 6]
344
345
346RFC 4512 LDAP Models June 2006
347
348
349 Section 2.4 discusses object classes.
350 Section 2.5 discusses attribute descriptions.
351 Section 2.6 discusses alias entries.
352
3532.1. The Directory Information Tree
354
355 As noted above, the DIB is composed of a set of entries organized
356 hierarchically in a tree structure known as the Directory Information
357 Tree (DIT); specifically, a tree where vertices are the entries.
358
359 The arcs between vertices define relations between entries. If an
360 arc exists from X to Y, then the entry at X is the immediate superior
361 of Y, and Y is the immediate subordinate of X. An entry's superiors
362 are the entry's immediate superior and its superiors. An entry's
363 subordinates are all of its immediate subordinates and their
364 subordinates.
365
366 Similarly, the superior/subordinate relationship between object
367 entries can be used to derive a relation between the objects they
368 represent. DIT structure rules can be used to govern relationships
369 between objects.
370
371 Note: An entry's immediate superior is also known as the entry's
372 parent, and an entry's immediate subordinate is also known as
373 the entry's child. Entries that have the same parent are known
374 as siblings.
375
3762.2. Structure of an Entry
377
378 An entry consists of a set of attributes that hold information about
379 the object that the entry represents. Some attributes represent user
380 information and are called user attributes. Other attributes
381 represent operational and/or administrative information and are
382 called operational attributes.
383
384 An attribute is an attribute description (a type and zero or more
385 options) with one or more associated values. An attribute is often
386 referred to by its attribute description. For example, the
387 'givenName' attribute is the attribute that consists of the attribute
388 description 'givenName' (the 'givenName' attribute type [RFC4519] and
389 zero options) and one or more associated values.
390
391 The attribute type governs whether the attribute can have multiple
392 values, the syntax and matching rules used to construct and compare
393 values of that attribute, and other functions. Options indicate
394 subtypes and other functions.
395
396 Attribute values conform to the defined syntax of the attribute type.
397
398
399
400Zeilenga Standards Track [Page 7]
401
402
403RFC 4512 LDAP Models June 2006
404
405
406 No two values of an attribute may be equivalent. Two values are
407 considered equivalent if and only if they would match according to
408 the equality matching rule of the attribute type. Or, if the
409 attribute type is defined with no equality matching rule, two values
410 are equivalent if and only if they are identical. (See 2.5.1 for
411 other restrictions.)
412
413 For example, a 'givenName' attribute can have more than one value,
414 they must be Directory Strings, and they are case insensitive. A
415 'givenName' attribute cannot hold both "John" and "JOHN", as these
416 are equivalent values per the equality matching rule of the attribute
417 type.
418
419 Additionally, no attribute is to have a value that is not equivalent
420 to itself. For example, the 'givenName' attribute cannot have as a
421 value a directory string that includes the REPLACEMENT CHARACTER
422 (U+FFFD) code point, as matching involving that directory string is
423 Undefined per this attribute's equality matching rule.
424
425 When an attribute is used for naming of the entry, one and only one
426 value of the attribute is used in forming the Relative Distinguished
427 Name. This value is known as a distinguished value.
428
4292.3. Naming of Entries
430
4312.3.1. Relative Distinguished Names
432
433 Each entry is named relative to its immediate superior. This
434 relative name, known as its Relative Distinguished Name (RDN)
435 [X.501], is composed of an unordered set of one or more attribute
436 value assertions (AVA) consisting of an attribute description with
437 zero options and an attribute value. These AVAs are chosen to match
438 attribute values (each a distinguished value) of the entry.
439
440 An entry's relative distinguished name must be unique among all
441 immediate subordinates of the entry's immediate superior (i.e., all
442 siblings).
443
444 The following are examples of string representations of RDNs
445 [RFC4514]:
446
447 UID=12345
448 OU=Engineering
449 CN=Kurt Zeilenga+L=Redwood Shores
450
451 The last is an example of a multi-valued RDN; that is, an RDN
452 composed of multiple AVAs.
453
454
455
456
457Zeilenga Standards Track [Page 8]
458
459
460RFC 4512 LDAP Models June 2006
461
462
4632.3.2. Distinguished Names
464
465 An entry's fully qualified name, known as its Distinguished Name (DN)
466 [X.501], is the concatenation of its RDN and its immediate superior's
467 DN. A Distinguished Name unambiguously refers to an entry in the
468 tree. The following are examples of string representations of DNs
469 [RFC4514]:
470
471 UID=nobody@example.com,DC=example,DC=com
472 CN=John Smith,OU=Sales,O=ACME Limited,L=Moab,ST=Utah,C=US
473
4742.3.3. Alias Names
475
476 An alias, or alias name, is "an name for an object, provided by the
477 use of alias entries" [X.501]. Alias entries are described in
478 Section 2.6.
479
4802.4. Object Classes
481
482 An object class is "an identified family of objects (or conceivable
483 objects) that share certain characteristics" [X.501].
484
485 As defined in [X.501]:
486
487 Object classes are used in the Directory for a number of purposes:
488
489 - describing and categorizing objects and the entries that
490 correspond to these objects;
491
492 - where appropriate, controlling the operation of the Directory;
493
494 - regulating, in conjunction with DIT structure rule
495 specifications, the position of entries in the DIT;
496
497 - regulating, in conjunction with DIT content rule
498 specifications, the attributes that are contained in entries;
499
500 - identifying classes of entry that are to be associated with a
501 particular policy by the appropriate administrative authority.
502
503 An object class (a subclass) may be derived from an object class
504 (its direct superclass) which is itself derived from an even more
505 generic object class. For structural object classes, this process
506 stops at the most generic object class, 'top' (defined in Section
507 2.4.1). An ordered set of superclasses up to the most superior
508 object class of an object class is its superclass chain.
509
510
511
512
513
514Zeilenga Standards Track [Page 9]
515
516
517RFC 4512 LDAP Models June 2006
518
519
520 An object class may be derived from two or more direct
521 superclasses (superclasses not part of the same superclass chain).
522 This feature of subclassing is termed multiple inheritance.
523
524 Each object class identifies the set of attributes required to be
525 present in entries belonging to the class and the set of attributes
526 allowed to be present in entries belonging to the class. As an entry
527 of a class must meet the requirements of each class it belongs to, it
528 can be said that an object class inherits the sets of allowed and
529 required attributes from its superclasses. A subclass can identify
530 an attribute allowed by its superclass as being required. If an
531 attribute is a member of both sets, it is required to be present.
532
533 Each object class is defined to be one of three kinds of object
534 classes: Abstract, Structural, or Auxiliary.
535
536 Each object class is identified by an object identifier (OID) and,
537 optionally, one or more short names (descriptors).
538
5392.4.1. Abstract Object Classes
540
541 An abstract object class, as the name implies, provides a base of
542 characteristics from which other object classes can be defined to
543 inherit from. An entry cannot belong to an abstract object class
544 unless it belongs to a structural or auxiliary class that inherits
545 from that abstract class.
546
547 Abstract object classes cannot derive from structural or auxiliary
548 object classes.
549
550 All structural object classes derive (directly or indirectly) from
551 the 'top' abstract object class. Auxiliary object classes do not
552 necessarily derive from 'top'.
553
554 The following is the object class definition (see Section 4.1.1) for
555 the 'top' object class:
556
557 ( 2.5.6.0 NAME 'top' ABSTRACT MUST objectClass )
558
559 All entries belong to the 'top' abstract object class.
560
561
562
563
564
565
566
567
568
569
570
571Zeilenga Standards Track [Page 10]
572
573
574RFC 4512 LDAP Models June 2006
575
576
5772.4.2. Structural Object Classes
578
579 As stated in [X.501]:
580
581 An object class defined for use in the structural specification of
582 the DIT is termed a structural object class. Structural object
583 classes are used in the definition of the structure of the names
584 of the objects for compliant entries.
585
586 An object or alias entry is characterized by precisely one
587 structural object class superclass chain which has a single
588 structural object class as the most subordinate object class.
589 This structural object class is referred to as the structural
590 object class of the entry.
591
592 Structural object classes are related to associated entries:
593
594 - an entry conforming to a structural object class shall
595 represent the real-world object constrained by the object
596 class;
597
598 - DIT structure rules only refer to structural object classes;
599 the structural object class of an entry is used to specify the
600 position of the entry in the DIT;
601
602 - the structural object class of an entry is used, along with an
603 associated DIT content rule, to control the content of an
604 entry.
605
606 The structural object class of an entry shall not be changed.
607
608 Each structural object class is a (direct or indirect) subclass of
609 the 'top' abstract object class.
610
611 Structural object classes cannot subclass auxiliary object classes.
612
613 Each entry is said to belong to its structural object class as well
614 as all classes in its structural object class's superclass chain.
615
6162.4.3. Auxiliary Object Classes
617
618 Auxiliary object classes are used to augment the characteristics of
619 entries. They are commonly used to augment the sets of attributes
620 required and allowed to be present in an entry. They can be used to
621 describe entries or classes of entries.
622
623 Auxiliary object classes cannot subclass structural object classes.
624
625
626
627
628Zeilenga Standards Track [Page 11]
629
630
631RFC 4512 LDAP Models June 2006
632
633
634 An entry can belong to any subset of the set of auxiliary object
635 classes allowed by the DIT content rule associated with the
636 structural object class of the entry. If no DIT content rule is
637 associated with the structural object class of the entry, the entry
638 cannot belong to any auxiliary object class.
639
640 The set of auxiliary object classes that an entry belongs to can
641 change over time.
642
6432.5. Attribute Descriptions
644
645 An attribute description is composed of an attribute type (see
646 Section 2.5.1) and a set of zero or more attribute options (see
647 Section 2.5.2).
648
649 An attribute description is represented by the ABNF:
650
651 attributedescription = attributetype options
652 attributetype = oid
653 options = *( SEMI option )
654 option = 1*keychar
655
656 where <attributetype> identifies the attribute type and each <option>
657 identifies an attribute option. Both <attributetype> and <option>
658 productions are case insensitive. The order in which <option>s
659 appear is irrelevant. That is, any two <attributedescription>s that
660 consist of the same <attributetype> and same set of <option>s are
661 equivalent.
662
663 Examples of valid attribute descriptions:
664
665 2.5.4.0
666 cn;lang-de;lang-en
667 owner
668
669 An attribute description with an unrecognized attribute type is to be
670 treated as unrecognized. Servers SHALL treat an attribute
671 description with an unrecognized attribute option as unrecognized.
672 Clients MAY treat an unrecognized attribute option as a tagging
673 option (see Section 2.5.2.1).
674
675 All attributes of an entry must have distinct attribute descriptions.
676
6772.5.1. Attribute Types
678
679 An attribute type governs whether the attribute can have multiple
680 values, the syntax and matching rules used to construct and compare
681 values of that attribute, and other functions.
682
683
684
685Zeilenga Standards Track [Page 12]
686
687
688RFC 4512 LDAP Models June 2006
689
690
691 If no equality matching is specified for the attribute type:
692
693 - the attribute (of the type) cannot be used for naming;
694 - when adding the attribute (or replacing all values), no two
695 values may be equivalent (see 2.2);
696 - individual values of a multi-valued attribute are not to be
697 independently added or deleted;
698 - attribute value assertions (such as matching in search filters
699 and comparisons) using values of such a type cannot be
700 performed.
701
702 Otherwise, the specified equality matching rule is to be used to
703 evaluate attribute value assertions concerning the attribute type.
704 The specified equality rule is to be transitive and commutative.
705
706 The attribute type indicates whether the attribute is a user
707 attribute or an operational attribute. If operational, the attribute
708 type indicates the operational usage and whether or not the attribute
709 is modifiable by users. Operational attributes are discussed in
710 Section 3.4.
711
712 An attribute type (a subtype) may derive from a more generic
713 attribute type (a direct supertype). The following restrictions
714 apply to subtyping:
715
716 - a subtype must have the same usage as its direct supertype,
717 - a subtype's syntax must be the same, or a refinement of, its
718 supertype's syntax, and
719 - a subtype must be collective [RFC3671] if its supertype is
720 collective.
721
722 An attribute description consisting of a subtype and no options is
723 said to be the direct description subtype of the attribute
724 description consisting of the subtype's direct supertype and no
725 options.
726
727 Each attribute type is identified by an object identifier (OID) and,
728 optionally, one or more short names (descriptors).
729
7302.5.2. Attribute Options
731
732 There are multiple kinds of attribute description options. The LDAP
733 technical specification details one kind: tagging options.
734
735 Not all options can be associated with attributes held in the
736 directory. Tagging options can be.
737
738
739
740
741
742Zeilenga Standards Track [Page 13]
743
744
745RFC 4512 LDAP Models June 2006
746
747
748 Not all options can be used in conjunction with all attribute types.
749 In such cases, the attribute description is to be treated as
750 unrecognized.
751
752 An attribute description that contains mutually exclusive options
753 shall be treated as unrecognized. That is, "cn;x-bar;x-foo", where
754 "x-foo" and "x-bar" are mutually exclusive, is to be treated as
755 unrecognized.
756
757 Other kinds of options may be specified in future documents. These
758 documents must detail how new kinds of options they define relate to
759 tagging options. In particular, these documents must detail whether
760 or not new kinds of options can be associated with attributes held in
761 the directory, how new kinds of options affect transfer of attribute
762 values, and how new kinds of options are treated in attribute
763 description hierarchies.
764
765 Options are represented as short, case-insensitive textual strings
766 conforming to the <option> production defined in Section 2.5 of this
767 document.
768
769 Procedures for registering options are detailed in BCP 64, RFC 4520
770 [RFC4520].
771
7722.5.2.1. Tagging Options
773
774 Attributes held in the directory can have attribute descriptions with
775 any number of tagging options. Tagging options are never mutually
776 exclusive.
777
778 An attribute description with N tagging options is a direct
779 (description) subtype of all attribute descriptions of the same
780 attribute type and all but one of the N options. If the attribute
781 type has a supertype, then the attribute description is also a direct
782 (description) subtype of the attribute description of the supertype
783 and the N tagging options. That is, 'cn;lang-de;lang-en' is a direct
784 (description) subtype of 'cn;lang-de', 'cn;lang-en', and
785 'name;lang-de;lang-en' ('cn' is a subtype of 'name'; both are defined
786 in [RFC4519]).
787
7882.5.3. Attribute Description Hierarchies
789
790 An attribute description can be the direct subtype of zero or more
791 other attribute descriptions as indicated by attribute type subtyping
792 (as described in Section 2.5.1) or attribute tagging option subtyping
793 (as described in Section 2.5.2.1). These subtyping relationships are
794 used to form hierarchies of attribute descriptions and attributes.
795
796
797
798
799Zeilenga Standards Track [Page 14]
800
801
802RFC 4512 LDAP Models June 2006
803
804
805 As adapted from [X.501]:
806
807 Attribute hierarchies allow access to the DIB with varying degrees
808 of granularity. This is achieved by allowing the value components
809 of attributes to be accessed by using either their specific
810 attribute description (a direct reference to the attribute) or a
811 more generic attribute description (an indirect reference).
812
813 Semantically related attributes may be placed in a hierarchical
814 relationship, the more specialized being placed subordinate to the
815 more generalized. Searching for or retrieving attributes and
816 their values is made easier by quoting the more generalized
817 attribute description; a filter item so specified is evaluated for
818 the more specialized descriptions as well as for the quoted
819 description.
820
821 Where subordinate specialized descriptions are selected to be
822 returned as part of a search result these descriptions shall be
823 returned if available. Where the more general descriptions are
824 selected to be returned as part of a search result both the
825 general and the specialized descriptions shall be returned, if
826 available. An attribute value shall always be returned as a value
827 of its own attribute description.
828
829 All of the attribute descriptions in an attribute hierarchy are
830 treated as distinct and unrelated descriptions for user
831 modification of entry content.
832
833 An attribute value stored in an object or alias entry is of
834 precisely one attribute description. The description is indicated
835 when the value is originally added to the entry.
836
837 For the purpose of subschema administration of the entry, a
838 specification that an attribute is required is fulfilled if the entry
839 contains a value of an attribute description belonging to an
840 attribute hierarchy where the attribute type of that description is
841 the same as the required attribute's type. That is, a "MUST name"
842 specification is fulfilled by 'name' or 'name;x-tag-option', but is
843 not fulfilled by 'CN' or 'CN;x-tag-option' (even though 'CN' is a
844 subtype of 'name'). Likewise, an entry may contain a value of an
845 attribute description belonging to an attribute hierarchy where the
846 attribute type of that description is either explicitly included in
847 the definition of an object class to which the entry belongs or
848 allowed by the DIT content rule applicable to that entry. That is,
849 'name' and 'name;x-tag-option' are allowed by "MAY name" (or by "MUST
850 name"), but 'CN' and 'CN;x-tag-option' are not allowed by "MAY name"
851 (or by "MUST name").
852
853
854
855
856Zeilenga Standards Track [Page 15]
857
858
859RFC 4512 LDAP Models June 2006
860
861
862 For the purposes of other policy administration, unless stated
863 otherwise in the specification of the particular administrative
864 model, all of the attribute descriptions in an attribute hierarchy
865 are treated as distinct and unrelated descriptions.
866
8672.6. Alias Entries
868
869 As adapted from [X.501]:
870
871 An alias, or an alias name, for an object is an alternative name
872 for an object or object entry which is provided by the use of
873 alias entries.
874
875 Each alias entry contains, within the 'aliasedObjectName'
876 attribute (known as the 'aliasedEntryName' attribute in X.500), a
877 name of some object. The distinguished name of the alias entry is
878 thus also a name for this object.
879
880 NOTE - The name within the 'aliasedObjectName' is said to be
881 pointed to by the alias. It does not have to be the
882 distinguished name of any entry.
883
884 The conversion of an alias name to an object name is termed
885 (alias) dereferencing and comprises the systematic replacement of
886 alias names, where found within a purported name, by the value of
887 the corresponding 'aliasedObjectName' attribute. The process may
888 require the examination of more than one alias entry.
889
890 Any particular entry in the DIT may have zero or more alias names.
891 It therefore follows that several alias entries may point to the
892 same entry. An alias entry may point to an entry that is not a
893 leaf entry and may point to another alias entry.
894
895 An alias entry shall have no subordinates, so that an alias entry
896 is always a leaf entry.
897
898 Every alias entry shall belong to the 'alias' object class.
899
900 An entry with the 'alias' object class must also belong to an object
901 class (or classes), or be governed by a DIT content rule, which
902 allows suitable naming attributes to be present.
903
904 Example:
905
906 dn: cn=bar,dc=example,dc=com
907 objectClass: top
908 objectClass: alias
909 objectClass: extensibleObject
910
911
912
913Zeilenga Standards Track [Page 16]
914
915
916RFC 4512 LDAP Models June 2006
917
918
919 cn: bar
920 aliasedObjectName: cn=foo,dc=example,dc=com
921
9222.6.1. 'alias' Object Class
923
924 Alias entries belong to the 'alias' object class.
925
926 ( 2.5.6.1 NAME 'alias'
927 SUP top STRUCTURAL
928 MUST aliasedObjectName )
929
9302.6.2. 'aliasedObjectName' Attribute Type
931
932 The 'aliasedObjectName' attribute holds the name of the entry an
933 alias points to. The 'aliasedObjectName' attribute is known as the
934 'aliasedEntryName' attribute in X.500.
935
936 ( 2.5.4.1 NAME 'aliasedObjectName'
937 EQUALITY distinguishedNameMatch
938 SYNTAX 1.3.6.1.4.1.1466.115.121.1.12
939 SINGLE-VALUE )
940
941 The 'distinguishedNameMatch' matching rule and the DistinguishedName
942 (1.3.6.1.4.1.1466.115.121.1.12) syntax are defined in [RFC4517].
943
9443. Directory Administrative and Operational Information
945
946 This section discusses select aspects of the X.500 Directory
947 Administrative and Operational Information model [X.501]. LDAP
948 implementations MAY support other aspects of this model.
949
9503.1. Subtrees
951
952 As defined in [X.501]:
953
954 A subtree is a collection of object and alias entries situated at
955 the vertices of a tree. Subtrees do not contain subentries. The
956 prefix sub, in subtree, emphasizes that the base (or root) vertex
957 of this tree is usually subordinate to the root of the DIT.
958
959 A subtree begins at some vertex and extends to some identifiable
960 lower boundary, possibly extending to leaves. A subtree is always
961 defined within a context which implicitly bounds the subtree. For
962 example, the vertex and lower boundaries of a subtree defining a
963 replicated area are bounded by a naming context.
964
965
966
967
968
969
970Zeilenga Standards Track [Page 17]
971
972
973RFC 4512 LDAP Models June 2006
974
975
9763.2. Subentries
977
978 A subentry is a "special sort of entry, known by the Directory, used
979 to hold information associated with a subtree or subtree refinement"
980 [X.501]. Subentries are used in Directory to hold for administrative
981 and operational purposes as defined in [X.501]. Their use in LDAP is
982 detailed in [RFC3672].
983
984 The term "(sub)entry" in this specification indicates that servers
985 implementing X.500(93) models are, in accordance with X.500(93) as
986 described in [RFC3672], to use a subentry and that other servers are
987 to use an object entry belonging to the appropriate auxiliary class
988 normally used with the subentry (e.g., 'subschema' for subschema
989 subentries) to mimic the subentry. This object entry's RDN SHALL be
990 formed from a value of the 'cn' (commonName) attribute [RFC4519] (as
991 all subentries are named with 'cn').
992
9933.3. The 'objectClass' attribute
994
995 Each entry in the DIT has an 'objectClass' attribute.
996
997 ( 2.5.4.0 NAME 'objectClass'
998 EQUALITY objectIdentifierMatch
999 SYNTAX 1.3.6.1.4.1.1466.115.121.1.38 )
1000
1001 The 'objectIdentifierMatch' matching rule and the OBJECT IDENTIFIER
1002 (1.3.6.1.4.1.1466.115.121.1.38) syntax are defined in [RFC4517].
1003
1004 The 'objectClass' attribute specifies the object classes of an entry,
1005 which (among other things) are used in conjunction with the
1006 controlling schema to determine the permitted attributes of an entry.
1007 Values of this attribute can be modified by clients, but the
1008 'objectClass' attribute cannot be removed.
1009
1010 Servers that follow X.500(93) models SHALL restrict modifications of
1011 this attribute to prevent the basic structural class of the entry
1012 from being changed. That is, one cannot change a 'person' into a
1013 'country'.
1014
1015 When creating an entry or adding an 'objectClass' value to an entry,
1016 all superclasses of the named classes SHALL be implicitly added as
1017 well if not already present. That is, if the auxiliary class 'x-a'
1018 is a subclass of the class 'x-b', adding 'x-a' to 'objectClass'
1019 causes 'x-b' to be implicitly added (if is not already present).
1020
1021 Servers SHALL restrict modifications of this attribute to prevent
1022 superclasses of remaining 'objectClass' values from being deleted.
1023 That is, if the auxiliary class 'x-a' is a subclass of the auxiliary
1024
1025
1026
1027Zeilenga Standards Track [Page 18]
1028
1029
1030RFC 4512 LDAP Models June 2006
1031
1032
1033 class 'x-b' and the 'objectClass' attribute contains 'x-a' and 'x-b',
1034 an attempt to delete only 'x-b' from the 'objectClass' attribute is
1035 an error.
1036
10373.4. Operational Attributes
1038
1039 Some attributes, termed operational attributes, are used or
1040 maintained by servers for administrative and operational purposes.
1041 As stated in [X.501]: "There are three varieties of operational
1042 attributes: Directory operational attributes, DSA-shared operational
1043 attributes, and DSA-specific operational attributes".
1044
1045 A directory operational attribute is used to represent operational
1046 and/or administrative information in the Directory Information Model.
1047 This includes operational attributes maintained by the server (e.g.,
1048 'createTimestamp') as well as operational attributes that hold values
1049 administrated by the user (e.g., 'ditContentRules').
1050
1051 A DSA-shared operational attribute is used to represent information
1052 of the DSA Information Model that is shared between DSAs.
1053
1054 A DSA-specific operational attribute is used to represent information
1055 of the DSA Information Model that is specific to the DSA (though, in
1056 some cases, may be derived from information shared between DSAs;
1057 e.g., 'namingContexts').
1058
1059 The DSA Information Model operational attributes are detailed in
1060 [X.501].
1061
1062 Operational attributes are not normally visible. They are not
1063 returned in search results unless explicitly requested by name.
1064
1065 Not all operational attributes are user modifiable.
1066
1067 Entries may contain, among others, the following operational
1068 attributes:
1069
1070 - creatorsName: the Distinguished Name of the user who added this
1071 entry to the directory,
1072
1073 - createTimestamp: the time this entry was added to the directory,
1074
1075 - modifiersName: the Distinguished Name of the user who last
1076 modified this entry, and
1077
1078 - modifyTimestamp: the time this entry was last modified.
1079
1080
1081
1082
1083
1084Zeilenga Standards Track [Page 19]
1085
1086
1087RFC 4512 LDAP Models June 2006
1088
1089
1090 Servers SHOULD maintain the 'creatorsName', 'createTimestamp',
1091 'modifiersName', and 'modifyTimestamp' attributes for all entries of
1092 the DIT.
1093
10943.4.1. 'creatorsName'
1095
1096 This attribute appears in entries that were added using the protocol
1097 (e.g., using the Add operation). The value is the distinguished name
1098 of the creator.
1099
1100 ( 2.5.18.3 NAME 'creatorsName'
1101 EQUALITY distinguishedNameMatch
1102 SYNTAX 1.3.6.1.4.1.1466.115.121.1.12
1103 SINGLE-VALUE NO-USER-MODIFICATION
1104 USAGE directoryOperation )
1105
1106 The 'distinguishedNameMatch' matching rule and the DistinguishedName
1107 (1.3.6.1.4.1.1466.115.121.1.12) syntax are defined in [RFC4517].
1108
11093.4.2. 'createTimestamp'
1110
1111 This attribute appears in entries that were added using the protocol
1112 (e.g., using the Add operation). The value is the time the entry was
1113 added.
1114
1115 ( 2.5.18.1 NAME 'createTimestamp'
1116 EQUALITY generalizedTimeMatch
1117 ORDERING generalizedTimeOrderingMatch
1118 SYNTAX 1.3.6.1.4.1.1466.115.121.1.24
1119 SINGLE-VALUE NO-USER-MODIFICATION
1120 USAGE directoryOperation )
1121
1122 The 'generalizedTimeMatch' and 'generalizedTimeOrderingMatch'
1123 matching rules and the GeneralizedTime
1124 (1.3.6.1.4.1.1466.115.121.1.24) syntax are defined in [RFC4517].
1125
11263.4.3. 'modifiersName'
1127
1128 This attribute appears in entries that have been modified using the
1129 protocol (e.g., using the Modify operation). The value is the
1130 distinguished name of the last modifier.
1131
1132 ( 2.5.18.4 NAME 'modifiersName'
1133 EQUALITY distinguishedNameMatch
1134 SYNTAX 1.3.6.1.4.1.1466.115.121.1.12
1135 SINGLE-VALUE NO-USER-MODIFICATION
1136 USAGE directoryOperation )
1137
1138
1139
1140
1141Zeilenga Standards Track [Page 20]
1142
1143
1144RFC 4512 LDAP Models June 2006
1145
1146
1147 The 'distinguishedNameMatch' matching rule and the DistinguishedName
1148 (1.3.6.1.4.1.1466.115.121.1.12) syntax are defined in [RFC4517].
1149
11503.4.4. 'modifyTimestamp'
1151
1152 This attribute appears in entries that have been modified using the
1153 protocol (e.g., using the Modify operation). The value is the time
1154 the entry was last modified.
1155
1156 ( 2.5.18.2 NAME 'modifyTimestamp'
1157 EQUALITY generalizedTimeMatch
1158 ORDERING generalizedTimeOrderingMatch
1159 SYNTAX 1.3.6.1.4.1.1466.115.121.1.24
1160 SINGLE-VALUE NO-USER-MODIFICATION
1161 USAGE directoryOperation )
1162
1163 The 'generalizedTimeMatch' and 'generalizedTimeOrderingMatch'
1164 matching rules and the GeneralizedTime
1165 (1.3.6.1.4.1.1466.115.121.1.24) syntax are defined in [RFC4517].
1166
11673.4.5. 'structuralObjectClass'
1168
1169 This attribute indicates the structural object class of the entry.
1170
1171 ( 2.5.21.9 NAME 'structuralObjectClass'
1172 EQUALITY objectIdentifierMatch
1173 SYNTAX 1.3.6.1.4.1.1466.115.121.1.38
1174 SINGLE-VALUE NO-USER-MODIFICATION
1175 USAGE directoryOperation )
1176
1177 The 'objectIdentifierMatch' matching rule and OBJECT IDENTIFIER
1178 (1.3.6.1.4.1.1466.115.121.1.38) syntax is defined in [RFC4517].
1179
11803.4.6. 'governingStructureRule'
1181
1182 This attribute indicates the structure rule governing the entry.
1183
1184 ( 2.5.21.10 NAME 'governingStructureRule'
1185 EQUALITY integerMatch
1186 SYNTAX 1.3.6.1.4.1.1466.115.121.1.27
1187 SINGLE-VALUE NO-USER-MODIFICATION
1188 USAGE directoryOperation )
1189
1190 The 'integerMatch' matching rule and INTEGER
1191 (1.3.6.1.4.1.1466.115.121.1.27) syntax is defined in [RFC4517].
1192
1193
1194
1195
1196
1197
1198Zeilenga Standards Track [Page 21]
1199
1200
1201RFC 4512 LDAP Models June 2006
1202
1203
12044. Directory Schema
1205
1206 As defined in [X.501]:
1207
1208 The Directory Schema is a set of definitions and constraints
1209 concerning the structure of the DIT, the possible ways entries are
1210 named, the information that can be held in an entry, the
1211 attributes used to represent that information and their
1212 organization into hierarchies to facilitate search and retrieval
1213 of the information and the ways in which values of attributes may
1214 be matched in attribute value and matching rule assertions.
1215
1216 NOTE 1 - The schema enables the Directory system to, for example:
1217
1218 - prevent the creation of subordinate entries of the wrong
1219 object-class (e.g., a country as a subordinate of a person);
1220
1221 - prevent the addition of attribute-types to an entry
1222 inappropriate to the object-class (e.g., a serial number to a
1223 person's entry);
1224
1225 - prevent the addition of an attribute value of a syntax not
1226 matching that defined for the attribute-type (e.g., a printable
1227 string to a bit string).
1228
1229 Formally, the Directory Schema comprises a set of:
1230
1231 a) Name Form definitions that define primitive naming relations
1232 for structural object classes;
1233
1234 b) DIT Structure Rule definitions that define the names that
1235 entries may have and the ways in which the entries may be
1236 related to one another in the DIT;
1237
1238 c) DIT Content Rule definitions that extend the specification of
1239 allowable attributes for entries beyond those indicated by the
1240 structural object classes of the entries;
1241
1242 d) Object Class definitions that define the basic set of mandatory
1243 and optional attributes that shall be present, and may be
1244 present, respectively, in an entry of a given class, and which
1245 indicate the kind of object class that is being defined;
1246
1247
1248
1249
1250
1251
1252
1253
1254
1255Zeilenga Standards Track [Page 22]
1256
1257
1258RFC 4512 LDAP Models June 2006
1259
1260
1261 e) Attribute Type definitions that identify the object identifier
1262 by which an attribute is known, its syntax, associated matching
1263 rules, whether it is an operational attribute and if so its
1264 type, whether it is a collective attribute, whether it is
1265 permitted to have multiple values and whether or not it is
1266 derived from another attribute type;
1267
1268 f) Matching Rule definitions that define matching rules.
1269
1270 And in LDAP:
1271
1272 g) LDAP Syntax definitions that define encodings used in LDAP.
1273
12744.1. Schema Definitions
1275
1276 Schema definitions in this section are described using ABNF and rely
1277 on the common productions specified in Section 1.2 as well as these:
1278
1279 noidlen = numericoid [ LCURLY len RCURLY ]
1280 len = number
1281
1282 oids = oid / ( LPAREN WSP oidlist WSP RPAREN )
1283 oidlist = oid *( WSP DOLLAR WSP oid )
1284
1285 extensions = *( SP xstring SP qdstrings )
1286 xstring = "X" HYPHEN 1*( ALPHA / HYPHEN / USCORE )
1287
1288 qdescrs = qdescr / ( LPAREN WSP qdescrlist WSP RPAREN )
1289 qdescrlist = [ qdescr *( SP qdescr ) ]
1290 qdescr = SQUOTE descr SQUOTE
1291
1292 qdstrings = qdstring / ( LPAREN WSP qdstringlist WSP RPAREN )
1293 qdstringlist = [ qdstring *( SP qdstring ) ]
1294 qdstring = SQUOTE dstring SQUOTE
1295 dstring = 1*( QS / QQ / QUTF8 ) ; escaped UTF-8 string
1296
1297 QQ = ESC %x32 %x37 ; "\27"
1298 QS = ESC %x35 ( %x43 / %x63 ) ; "\5C" / "\5c"
1299
1300 ; Any UTF-8 encoded Unicode character
1301 ; except %x27 ("\'") and %x5C ("\")
1302 QUTF8 = QUTF1 / UTFMB
1303
1304 ; Any ASCII character except %x27 ("\'") and %x5C ("\")
1305 QUTF1 = %x00-26 / %x28-5B / %x5D-7F
1306
1307 Schema definitions in this section also share a number of common
1308 terms.
1309
1310
1311
1312Zeilenga Standards Track [Page 23]
1313
1314
1315RFC 4512 LDAP Models June 2006
1316
1317
1318 The NAME field provides a set of short names (descriptors) that are
1319 to be used as aliases for the OID.
1320
1321 The DESC field optionally allows a descriptive string to be provided
1322 by the directory administrator and/or implementor. While
1323 specifications may suggest a descriptive string, there is no
1324 requirement that the suggested (or any) descriptive string be used.
1325
1326 The OBSOLETE field, if present, indicates the element is not active.
1327
1328 Implementors should note that future versions of this document may
1329 expand these definitions to include additional terms. Terms whose
1330 identifier begins with "X-" are reserved for private experiments and
1331 are followed by <SP> and <qdstrings> tokens.
1332
13334.1.1. Object Class Definitions
1334
1335 Object Class definitions are written according to the ABNF:
1336
1337 ObjectClassDescription = LPAREN WSP
1338 numericoid ; object identifier
1339 [ SP "NAME" SP qdescrs ] ; short names (descriptors)
1340 [ SP "DESC" SP qdstring ] ; description
1341 [ SP "OBSOLETE" ] ; not active
1342 [ SP "SUP" SP oids ] ; superior object classes
1343 [ SP kind ] ; kind of class
1344 [ SP "MUST" SP oids ] ; attribute types
1345 [ SP "MAY" SP oids ] ; attribute types
1346 extensions WSP RPAREN
1347
1348 kind = "ABSTRACT" / "STRUCTURAL" / "AUXILIARY"
1349
1350 where:
1351 <numericoid> is object identifier assigned to this object class;
1352 NAME <qdescrs> are short names (descriptors) identifying this
1353 object class;
1354 DESC <qdstring> is a short descriptive string;
1355 OBSOLETE indicates this object class is not active;
1356 SUP <oids> specifies the direct superclasses of this object class;
1357 the kind of object class is indicated by one of ABSTRACT,
1358 STRUCTURAL, or AUXILIARY (the default is STRUCTURAL);
1359 MUST and MAY specify the sets of required and allowed attribute
1360 types, respectively; and
1361 <extensions> describe extensions.
1362
1363
1364
1365
1366
1367
1368
1369Zeilenga Standards Track [Page 24]
1370
1371
1372RFC 4512 LDAP Models June 2006
1373
1374
13754.1.2. Attribute Types
1376
1377 Attribute Type definitions are written according to the ABNF:
1378
1379 AttributeTypeDescription = LPAREN WSP
1380 numericoid ; object identifier
1381 [ SP "NAME" SP qdescrs ] ; short names (descriptors)
1382 [ SP "DESC" SP qdstring ] ; description
1383 [ SP "OBSOLETE" ] ; not active
1384 [ SP "SUP" SP oid ] ; supertype
1385 [ SP "EQUALITY" SP oid ] ; equality matching rule
1386 [ SP "ORDERING" SP oid ] ; ordering matching rule
1387 [ SP "SUBSTR" SP oid ] ; substrings matching rule
1388 [ SP "SYNTAX" SP noidlen ] ; value syntax
1389 [ SP "SINGLE-VALUE" ] ; single-value
1390 [ SP "COLLECTIVE" ] ; collective
1391 [ SP "NO-USER-MODIFICATION" ] ; not user modifiable
1392 [ SP "USAGE" SP usage ] ; usage
1393 extensions WSP RPAREN ; extensions
1394
1395 usage = "userApplications" / ; user
1396 "directoryOperation" / ; directory operational
1397 "distributedOperation" / ; DSA-shared operational
1398 "dSAOperation" ; DSA-specific operational
1399
1400 where:
1401 <numericoid> is object identifier assigned to this attribute type;
1402 NAME <qdescrs> are short names (descriptors) identifying this
1403 attribute type;
1404 DESC <qdstring> is a short descriptive string;
1405 OBSOLETE indicates this attribute type is not active;
1406 SUP oid specifies the direct supertype of this type;
1407 EQUALITY, ORDERING, and SUBSTR provide the oid of the equality,
1408 ordering, and substrings matching rules, respectively;
1409 SYNTAX identifies value syntax by object identifier and may suggest
1410 a minimum upper bound;
1411 SINGLE-VALUE indicates attributes of this type are restricted to a
1412 single value;
1413 COLLECTIVE indicates this attribute type is collective
1414 [X.501][RFC3671];
1415 NO-USER-MODIFICATION indicates this attribute type is not user
1416 modifiable;
1417 USAGE indicates the application of this attribute type; and
1418 <extensions> describe extensions.
1419
1420 Each attribute type description must contain at least one of the SUP
1421 or SYNTAX fields. If no SYNTAX field is provided, the attribute type
1422 description takes its value from the supertype.
1423
1424
1425
1426Zeilenga Standards Track [Page 25]
1427
1428
1429RFC 4512 LDAP Models June 2006
1430
1431
1432 If SUP field is provided, the EQUALITY, ORDERING, and SUBSTRING
1433 fields, if not specified, take their value from the supertype.
1434
1435 Usage of userApplications, the default, indicates that attributes of
1436 this type represent user information. That is, they are user
1437 attributes.
1438
1439 A usage of directoryOperation, distributedOperation, or dSAOperation
1440 indicates that attributes of this type represent operational and/or
1441 administrative information. That is, they are operational
1442 attributes.
1443
1444 directoryOperation usage indicates that the attribute of this type is
1445 a directory operational attribute. distributedOperation usage
1446 indicates that the attribute of this type is a DSA-shared usage
1447 operational attribute. dSAOperation usage indicates that the
1448 attribute of this type is a DSA-specific operational attribute.
1449
1450 COLLECTIVE requires usage userApplications. Use of collective
1451 attribute types in LDAP is discussed in [RFC3671].
1452
1453 NO-USER-MODIFICATION requires an operational usage.
1454
1455 Note that the <AttributeTypeDescription> does not list the matching
1456 rules that can be used with that attribute type in an extensibleMatch
1457 search filter [RFC4511]. This is done using the 'matchingRuleUse'
1458 attribute described in Section 4.1.4.
1459
1460 This document refines the schema description of X.501 by requiring
1461 that the SYNTAX field in an <AttributeTypeDescription> be a string
1462 representation of an object identifier for the LDAP string syntax
1463 definition, with an optional indication of the suggested minimum
1464 bound of a value of this attribute.
1465
1466 A suggested minimum upper bound on the number of characters in a
1467 value with a string-based syntax, or the number of bytes in a value
1468 for all other syntaxes, may be indicated by appending this bound
1469 count inside of curly braces following the syntax's OBJECT IDENTIFIER
1470 in an Attribute Type Description. This bound is not part of the
1471 syntax name itself. For instance, "1.3.6.4.1.1466.0{64}" suggests
1472 that server implementations should allow a string to be 64 characters
1473 long, although they may allow longer strings. Note that a single
1474 character of the Directory String syntax may be encoded in more than
1475 one octet since UTF-8 [RFC3629] is a variable-length encoding.
1476
1477
1478
1479
1480
1481
1482
1483Zeilenga Standards Track [Page 26]
1484
1485
1486RFC 4512 LDAP Models June 2006
1487
1488
14894.1.3. Matching Rules
1490
1491 Matching rules are used in performance of attribute value assertions,
1492 such as in performance of a Compare operation. They are also used in
1493 evaluating search filters, determining which individual values are to
1494 be added or deleted during performance of a Modify operation, and in
1495 comparing distinguished names.
1496
1497 Each matching rule is identified by an object identifier (OID) and,
1498 optionally, one or more short names (descriptors).
1499
1500 Matching rule definitions are written according to the ABNF:
1501
1502 MatchingRuleDescription = LPAREN WSP
1503 numericoid ; object identifier
1504 [ SP "NAME" SP qdescrs ] ; short names (descriptors)
1505 [ SP "DESC" SP qdstring ] ; description
1506 [ SP "OBSOLETE" ] ; not active
1507 SP "SYNTAX" SP numericoid ; assertion syntax
1508 extensions WSP RPAREN ; extensions
1509
1510 where:
1511 <numericoid> is object identifier assigned to this matching rule;
1512 NAME <qdescrs> are short names (descriptors) identifying this
1513 matching rule;
1514 DESC <qdstring> is a short descriptive string;
1515 OBSOLETE indicates this matching rule is not active;
1516 SYNTAX identifies the assertion syntax (the syntax of the assertion
1517 value) by object identifier; and
1518 <extensions> describe extensions.
1519
15204.1.4. Matching Rule Uses
1521
1522 A matching rule use lists the attribute types that are suitable for
1523 use with an extensibleMatch search filter.
1524
1525 Matching rule use descriptions are written according to the following
1526 ABNF:
1527
1528 MatchingRuleUseDescription = LPAREN WSP
1529 numericoid ; object identifier
1530 [ SP "NAME" SP qdescrs ] ; short names (descriptors)
1531 [ SP "DESC" SP qdstring ] ; description
1532 [ SP "OBSOLETE" ] ; not active
1533 SP "APPLIES" SP oids ; attribute types
1534 extensions WSP RPAREN ; extensions
1535
1536
1537
1538
1539
1540Zeilenga Standards Track [Page 27]
1541
1542
1543RFC 4512 LDAP Models June 2006
1544
1545
1546 where:
1547 <numericoid> is the object identifier of the matching rule
1548 associated with this matching rule use description;
1549 NAME <qdescrs> are short names (descriptors) identifying this
1550 matching rule use;
1551 DESC <qdstring> is a short descriptive string;
1552 OBSOLETE indicates this matching rule use is not active;
1553 APPLIES provides a list of attribute types the matching rule
1554 applies to; and
1555 <extensions> describe extensions.
1556
15574.1.5. LDAP Syntaxes
1558
1559 LDAP Syntaxes of (attribute and assertion) values are described in
1560 terms of ASN.1 [X.680] and, optionally, have an octet string encoding
1561 known as the LDAP-specific encoding. Commonly, the LDAP-specific
1562 encoding is constrained to a string of Unicode [Unicode] characters
1563 in UTF-8 [RFC3629] form.
1564
1565 Each LDAP syntax is identified by an object identifier (OID).
1566
1567 LDAP syntax definitions are written according to the ABNF:
1568
1569 SyntaxDescription = LPAREN WSP
1570 numericoid ; object identifier
1571 [ SP "DESC" SP qdstring ] ; description
1572 extensions WSP RPAREN ; extensions
1573
1574 where:
1575 <numericoid> is the object identifier assigned to this LDAP syntax;
1576 DESC <qdstring> is a short descriptive string; and
1577 <extensions> describe extensions.
1578
15794.1.6. DIT Content Rules
1580
1581 A DIT content rule is a "rule governing the content of entries of a
1582 particular structural object class" [X.501].
1583
1584 For DIT entries of a particular structural object class, a DIT
1585 content rule specifies which auxiliary object classes the entries are
1586 allowed to belong to and which additional attributes (by type) are
1587 required, allowed, or not allowed to appear in the entries.
1588
1589 The list of precluded attributes cannot include any attribute listed
1590 as mandatory in the rule, the structural object class, or any of the
1591 allowed auxiliary object classes.
1592
1593
1594
1595
1596
1597Zeilenga Standards Track [Page 28]
1598
1599
1600RFC 4512 LDAP Models June 2006
1601
1602
1603 Each content rule is identified by the object identifier, as well as
1604 any short names (descriptors), of the structural object class it
1605 applies to.
1606
1607 An entry may only belong to auxiliary object classes listed in the
1608 governing content rule.
1609
1610 An entry must contain all attributes required by the object classes
1611 the entry belongs to as well as all attributes required by the
1612 governing content rule.
1613
1614 An entry may contain any non-precluded attributes allowed by the
1615 object classes the entry belongs to as well as all attributes allowed
1616 by the governing content rule.
1617
1618 An entry cannot include any attribute precluded by the governing
1619 content rule.
1620
1621 An entry is governed by (if present and active in the subschema) the
1622 DIT content rule that applies to the structural object class of the
1623 entry (see Section 2.4.2). If no active rule is present for the
1624 entry's structural object class, the entry's content is governed by
1625 the structural object class (and possibly other aspects of user and
1626 system schema). DIT content rules for superclasses of the structural
1627 object class of an entry are not applicable to that entry.
1628
1629 DIT content rule descriptions are written according to the ABNF:
1630
1631 DITContentRuleDescription = LPAREN WSP
1632 numericoid ; object identifier
1633 [ SP "NAME" SP qdescrs ] ; short names (descriptors)
1634 [ SP "DESC" SP qdstring ] ; description
1635 [ SP "OBSOLETE" ] ; not active
1636 [ SP "AUX" SP oids ] ; auxiliary object classes
1637 [ SP "MUST" SP oids ] ; attribute types
1638 [ SP "MAY" SP oids ] ; attribute types
1639 [ SP "NOT" SP oids ] ; attribute types
1640 extensions WSP RPAREN ; extensions
1641
1642 where:
1643 <numericoid> is the object identifier of the structural object
1644 class associated with this DIT content rule;
1645 NAME <qdescrs> are short names (descriptors) identifying this DIT
1646 content rule;
1647 DESC <qdstring> is a short descriptive string;
1648 OBSOLETE indicates this DIT content rule use is not active;
1649 AUX specifies a list of auxiliary object classes that entries
1650 subject to this DIT content rule may belong to;
1651
1652
1653
1654Zeilenga Standards Track [Page 29]
1655
1656
1657RFC 4512 LDAP Models June 2006
1658
1659
1660 MUST, MAY, and NOT specify lists of attribute types that are
1661 required, allowed, or precluded, respectively, from appearing
1662 in entries subject to this DIT content rule; and
1663 <extensions> describe extensions.
1664
16654.1.7. DIT Structure Rules and Name Forms
1666
1667 It is sometimes desirable to regulate where object and alias entries
1668 can be placed in the DIT and how they can be named based upon their
1669 structural object class.
1670
16714.1.7.1. DIT Structure Rules
1672
1673 A DIT structure rule is a "rule governing the structure of the DIT by
1674 specifying a permitted superior to subordinate entry relationship. A
1675 structure rule relates a name form, and therefore a structural object
1676 class, to superior structure rules. This permits entries of the
1677 structural object class identified by the name form to exist in the
1678 DIT as subordinates to entries governed by the indicated superior
1679 structure rules" [X.501].
1680
1681 DIT structure rule descriptions are written according to the ABNF:
1682
1683 DITStructureRuleDescription = LPAREN WSP
1684 ruleid ; rule identifier
1685 [ SP "NAME" SP qdescrs ] ; short names (descriptors)
1686 [ SP "DESC" SP qdstring ] ; description
1687 [ SP "OBSOLETE" ] ; not active
1688 SP "FORM" SP oid ; NameForm
1689 [ SP "SUP" ruleids ] ; superior rules
1690 extensions WSP RPAREN ; extensions
1691
1692 ruleids = ruleid / ( LPAREN WSP ruleidlist WSP RPAREN )
1693 ruleidlist = ruleid *( SP ruleid )
1694 ruleid = number
1695
1696 where:
1697 <ruleid> is the rule identifier of this DIT structure rule;
1698 NAME <qdescrs> are short names (descriptors) identifying this DIT
1699 structure rule;
1700 DESC <qdstring> is a short descriptive string;
1701 OBSOLETE indicates this DIT structure rule use is not active;
1702 FORM is specifies the name form associated with this DIT structure
1703 rule;
1704 SUP identifies superior rules (by rule id); and
1705 <extensions> describe extensions.
1706
1707
1708
1709
1710
1711Zeilenga Standards Track [Page 30]
1712
1713
1714RFC 4512 LDAP Models June 2006
1715
1716
1717 If no superior rules are identified, the DIT structure rule applies
1718 to an autonomous administrative point (e.g., the root vertex of the
1719 subtree controlled by the subschema) [X.501].
1720
17214.1.7.2. Name Forms
1722
1723 A name form "specifies a permissible RDN for entries of a particular
1724 structural object class. A name form identifies a named object class
1725 and one or more attribute types to be used for naming (i.e., for the
1726 RDN). Name forms are primitive pieces of specification used in the
1727 definition of DIT structure rules" [X.501].
1728
1729 Each name form indicates the structural object class to be named, a
1730 set of required attribute types, and a set of allowed attribute
1731 types. A particular attribute type cannot be in both sets.
1732
1733 Entries governed by the form must be named using a value from each
1734 required attribute type and zero or more values from the allowed
1735 attribute types.
1736
1737 Each name form is identified by an object identifier (OID) and,
1738 optionally, one or more short names (descriptors).
1739
1740 Name form descriptions are written according to the ABNF:
1741
1742 NameFormDescription = LPAREN WSP
1743 numericoid ; object identifier
1744 [ SP "NAME" SP qdescrs ] ; short names (descriptors)
1745 [ SP "DESC" SP qdstring ] ; description
1746 [ SP "OBSOLETE" ] ; not active
1747 SP "OC" SP oid ; structural object class
1748 SP "MUST" SP oids ; attribute types
1749 [ SP "MAY" SP oids ] ; attribute types
1750 extensions WSP RPAREN ; extensions
1751
1752 where:
1753 <numericoid> is object identifier that identifies this name form;
1754 NAME <qdescrs> are short names (descriptors) identifying this name
1755 form;
1756 DESC <qdstring> is a short descriptive string;
1757 OBSOLETE indicates this name form is not active;
1758 OC identifies the structural object class this rule applies to,
1759 MUST and MAY specify the sets of required and allowed,
1760 respectively, naming attributes for this name form; and
1761 <extensions> describe extensions.
1762
1763 All attribute types in the required ("MUST") and allowed ("MAY")
1764 lists shall be different.
1765
1766
1767
1768Zeilenga Standards Track [Page 31]
1769
1770
1771RFC 4512 LDAP Models June 2006
1772
1773
17744.2. Subschema Subentries
1775
1776 Subschema (sub)entries are used for administering information about
1777 the directory schema. A single subschema (sub)entry contains all
1778 schema definitions (see Section 4.1) used by entries in a particular
1779 part of the directory tree.
1780
1781 Servers that follow X.500(93) models SHOULD implement subschema using
1782 the X.500 subschema mechanisms (as detailed in Section 12 of
1783 [X.501]), so these are not ordinary object entries but subentries
1784 (see Section 3.2). LDAP clients SHOULD NOT assume that servers
1785 implement any of the other aspects of X.500 subschema.
1786
1787 Servers MAY allow subschema modification. Procedures for subschema
1788 modification are discussed in Section 14.5 of [X.501].
1789
1790 A server that masters entries and permits clients to modify these
1791 entries SHALL implement and provide access to these subschema
1792 (sub)entries including providing a 'subschemaSubentry' attribute in
1793 each modifiable entry. This is so clients may discover the
1794 attributes and object classes that are permitted to be present. It
1795 is strongly RECOMMENDED that all other servers implement this as
1796 well.
1797
1798 The value of the 'subschemaSubentry' attribute is the name of the
1799 subschema (sub)entry holding the subschema controlling the entry.
1800
1801 ( 2.5.18.10 NAME 'subschemaSubentry'
1802 EQUALITY distinguishedNameMatch
1803 SYNTAX 1.3.6.1.4.1.1466.115.121.1.12
1804 SINGLE-VALUE NO-USER-MODIFICATION
1805 USAGE directoryOperation )
1806
1807 The 'distinguishedNameMatch' matching rule and the DistinguishedName
1808 (1.3.6.1.4.1.1466.115.121.1.12) syntax are defined in [RFC4517].
1809
1810 Subschema is held in (sub)entries belonging to the subschema
1811 auxiliary object class.
1812
1813 ( 2.5.20.1 NAME 'subschema' AUXILIARY
1814 MAY ( dITStructureRules $ nameForms $ ditContentRules $
1815 objectClasses $ attributeTypes $ matchingRules $
1816 matchingRuleUse ) )
1817
1818 The 'ldapSyntaxes' operational attribute may also be present in
1819 subschema entries.
1820
1821
1822
1823
1824
1825Zeilenga Standards Track [Page 32]
1826
1827
1828RFC 4512 LDAP Models June 2006
1829
1830
1831 Servers MAY provide additional attributes (described in other
1832 documents) in subschema (sub)entries.
1833
1834 Servers SHOULD provide the attributes 'createTimestamp' and
1835 'modifyTimestamp' in subschema (sub)entries, in order to allow
1836 clients to maintain their caches of schema information.
1837
1838 The following subsections provide attribute type definitions for each
1839 of schema definition attribute types.
1840
18414.2.1. 'objectClasses'
1842
1843 This attribute holds definitions of object classes.
1844
1845 ( 2.5.21.6 NAME 'objectClasses'
1846 EQUALITY objectIdentifierFirstComponentMatch
1847 SYNTAX 1.3.6.1.4.1.1466.115.121.1.37
1848 USAGE directoryOperation )
1849
1850 The 'objectIdentifierFirstComponentMatch' matching rule and the
1851 ObjectClassDescription (1.3.6.1.4.1.1466.115.121.1.37) syntax are
1852 defined in [RFC4517].
1853
18544.2.2. 'attributeTypes'
1855
1856 This attribute holds definitions of attribute types.
1857
1858 ( 2.5.21.5 NAME 'attributeTypes'
1859 EQUALITY objectIdentifierFirstComponentMatch
1860 SYNTAX 1.3.6.1.4.1.1466.115.121.1.3
1861 USAGE directoryOperation )
1862
1863 The 'objectIdentifierFirstComponentMatch' matching rule and the
1864 AttributeTypeDescription (1.3.6.1.4.1.1466.115.121.1.3) syntax are
1865 defined in [RFC4517].
1866
18674.2.3. 'matchingRules'
1868
1869 This attribute holds definitions of matching rules.
1870
1871 ( 2.5.21.4 NAME 'matchingRules'
1872 EQUALITY objectIdentifierFirstComponentMatch
1873 SYNTAX 1.3.6.1.4.1.1466.115.121.1.30
1874 USAGE directoryOperation )
1875
1876 The 'objectIdentifierFirstComponentMatch' matching rule and the
1877 MatchingRuleDescription (1.3.6.1.4.1.1466.115.121.1.30) syntax are
1878 defined in [RFC4517].
1879
1880
1881
1882Zeilenga Standards Track [Page 33]
1883
1884
1885RFC 4512 LDAP Models June 2006
1886
1887
18884.2.4 'matchingRuleUse'
1889
1890 This attribute holds definitions of matching rule uses.
1891
1892 ( 2.5.21.8 NAME 'matchingRuleUse'
1893 EQUALITY objectIdentifierFirstComponentMatch
1894 SYNTAX 1.3.6.1.4.1.1466.115.121.1.31
1895 USAGE directoryOperation )
1896
1897 The 'objectIdentifierFirstComponentMatch' matching rule and the
1898 MatchingRuleUseDescription (1.3.6.1.4.1.1466.115.121.1.31) syntax are
1899 defined in [RFC4517].
1900
19014.2.5. 'ldapSyntaxes'
1902
1903 This attribute holds definitions of LDAP syntaxes.
1904
1905 ( 1.3.6.1.4.1.1466.101.120.16 NAME 'ldapSyntaxes'
1906 EQUALITY objectIdentifierFirstComponentMatch
1907 SYNTAX 1.3.6.1.4.1.1466.115.121.1.54
1908 USAGE directoryOperation )
1909
1910 The 'objectIdentifierFirstComponentMatch' matching rule and the
1911 SyntaxDescription (1.3.6.1.4.1.1466.115.121.1.54) syntax are defined
1912 in [RFC4517].
1913
19144.2.6. 'dITContentRules'
1915
1916 This attribute lists DIT Content Rules that are present in the
1917 subschema.
1918
1919 ( 2.5.21.2 NAME 'dITContentRules'
1920 EQUALITY objectIdentifierFirstComponentMatch
1921 SYNTAX 1.3.6.1.4.1.1466.115.121.1.16
1922 USAGE directoryOperation )
1923
1924 The 'objectIdentifierFirstComponentMatch' matching rule and the
1925 DITContentRuleDescription (1.3.6.1.4.1.1466.115.121.1.16) syntax are
1926 defined in [RFC4517].
1927
1928
1929
1930
1931
1932
1933
1934
1935
1936
1937
1938
1939Zeilenga Standards Track [Page 34]
1940
1941
1942RFC 4512 LDAP Models June 2006
1943
1944
19454.2.7. 'dITStructureRules'
1946
1947 This attribute lists DIT Structure Rules that are present in the
1948 subschema.
1949
1950 ( 2.5.21.1 NAME 'dITStructureRules'
1951 EQUALITY integerFirstComponentMatch
1952 SYNTAX 1.3.6.1.4.1.1466.115.121.1.17
1953 USAGE directoryOperation )
1954
1955 The 'integerFirstComponentMatch' matching rule and the
1956 DITStructureRuleDescription (1.3.6.1.4.1.1466.115.121.1.17) syntax
1957 are defined in [RFC4517].
1958
19594.2.8 'nameForms'
1960
1961 This attribute lists Name Forms that are in force.
1962
1963 ( 2.5.21.7 NAME 'nameForms'
1964 EQUALITY objectIdentifierFirstComponentMatch
1965 SYNTAX 1.3.6.1.4.1.1466.115.121.1.35
1966 USAGE directoryOperation )
1967
1968 The 'objectIdentifierFirstComponentMatch' matching rule and the
1969 NameFormDescription (1.3.6.1.4.1.1466.115.121.1.35) syntax are
1970 defined in [RFC4517].
1971
19724.3. 'extensibleObject' object class
1973
1974 The 'extensibleObject' auxiliary object class allows entries that
1975 belong to it to hold any user attribute. The set of allowed
1976 attribute types of this object class is implicitly the set of all
1977 attribute types of userApplications usage.
1978
1979 ( 1.3.6.1.4.1.1466.101.120.111 NAME 'extensibleObject'
1980 SUP top AUXILIARY )
1981
1982 The mandatory attributes of the other object classes of this entry
1983 are still required to be present, and any precluded attributes are
1984 still not allowed to be present.
1985
19864.4. Subschema Discovery
1987
1988 To discover the DN of the subschema (sub)entry holding the subschema
1989 controlling a particular entry, a client reads that entry's
1990 'subschemaSubentry' operational attribute. To read schema attributes
1991 from the subschema (sub)entry, clients MUST issue a Search operation
1992 [RFC4511] where baseObject is the DN of the subschema (sub)entry,
1993
1994
1995
1996Zeilenga Standards Track [Page 35]
1997
1998
1999RFC 4512 LDAP Models June 2006
2000
2001
2002 scope is baseObject, filter is "(objectClass=subschema)" [RFC4515],
2003 and the attributes field lists the names of the desired schema
2004 attributes (as they are operational). Note: the
2005 "(objectClass=subschema)" filter allows LDAP servers that gateway to
2006 X.500 to detect that subentry information is being requested.
2007
2008 Clients SHOULD NOT assume that a published subschema is complete,
2009 that the server supports all of the schema elements it publishes, or
2010 that the server does not support an unpublished element.
2011
20125. DSA (Server) Informational Model
2013
2014 The LDAP protocol assumes there are one or more servers that jointly
2015 provide access to a Directory Information Tree (DIT). The server
2016 holding the original information is called the "master" (for that
2017 information). Servers that hold copies of the original information
2018 are referred to as "shadowing" or "caching" servers.
2019
2020
2021 As defined in [X.501]:
2022
2023 context prefix: The sequence of RDNs leading from the Root of the
2024 DIT to the initial vertex of a naming context; corresponds to
2025 the distinguished name of that vertex.
2026
2027 naming context: A subtree of entries held in a single master DSA.
2028
2029 That is, a naming context is the largest collection of entries,
2030 starting at an entry that is mastered by a particular server, and
2031 including all its subordinates and their subordinates, down to the
2032 entries that are mastered by different servers. The context prefix
2033 is the name of the initial entry.
2034
2035 The root of the DIT is a DSA-specific Entry (DSE) and not part of any
2036 naming context (or any subtree); each server has different attribute
2037 values in the root DSE.
2038
20395.1. Server-Specific Data Requirements
2040
2041 An LDAP server SHALL provide information about itself and other
2042 information that is specific to each server. This is represented as
2043 a group of attributes located in the root DSE, which is named with
2044 the DN with zero RDNs (whose [RFC4514] representation is as the
2045 zero-length string).
2046
2047 These attributes are retrievable, subject to access control and other
2048 restrictions, if a client performs a Search operation [RFC4511] with
2049 an empty baseObject, scope of baseObject, the filter
2050
2051
2052
2053Zeilenga Standards Track [Page 36]
2054
2055
2056RFC 4512 LDAP Models June 2006
2057
2058
2059 "(objectClass=*)" [RFC4515], and the attributes field listing the
2060 names of the desired attributes. It is noted that root DSE
2061 attributes are operational and, like other operational attributes,
2062 are not returned in search requests unless requested by name.
2063
2064 The root DSE SHALL NOT be included if the client performs a subtree
2065 search starting from the root.
2066
2067 Servers may allow clients to modify attributes of the root DSE, where
2068 appropriate.
2069
2070 The following attributes of the root DSE are defined below.
2071 Additional attributes may be defined in other documents.
2072
2073 - altServer: alternative servers;
2074
2075 - namingContexts: naming contexts;
2076
2077 - supportedControl: recognized LDAP controls;
2078
2079 - supportedExtension: recognized LDAP extended operations;
2080
2081 - supportedFeatures: recognized LDAP features;
2082
2083 - supportedLDAPVersion: LDAP versions supported; and
2084
2085 - supportedSASLMechanisms: recognized Simple Authentication and
2086 Security Layers (SASL) [RFC4422] mechanisms.
2087
2088 The values provided for these attributes may depend on session-
2089 specific and other factors. For example, a server supporting the
2090 SASL EXTERNAL mechanism might only list "EXTERNAL" when the client's
2091 identity has been established by a lower level. See [RFC4513].
2092
2093 The root DSE may also include a 'subschemaSubentry' attribute. If it
2094 does, the attribute refers to the subschema (sub)entry holding the
2095 schema controlling the root DSE. Clients SHOULD NOT assume that this
2096 subschema (sub)entry controls other entries held by the server.
2097 General subschema discovery procedures are provided in Section 4.4.
2098
2099
2100
2101
2102
2103
2104
2105
2106
2107
2108
2109
2110Zeilenga Standards Track [Page 37]
2111
2112
2113RFC 4512 LDAP Models June 2006
2114
2115
21165.1.1. 'altServer'
2117
2118 The 'altServer' attribute lists URIs referring to alternative servers
2119 that may be contacted when this server becomes unavailable. URIs for
2120 servers implementing the LDAP are written according to [RFC4516].
2121 Other kinds of URIs may be provided. If the server does not know of
2122 any other servers that could be used, this attribute will be absent.
2123 Clients may cache this information in case their preferred server
2124 later becomes unavailable.
2125
2126 ( 1.3.6.1.4.1.1466.101.120.6 NAME 'altServer'
2127 SYNTAX 1.3.6.1.4.1.1466.115.121.1.26
2128 USAGE dSAOperation )
2129
2130 The IA5String (1.3.6.1.4.1.1466.115.121.1.26) syntax is defined in
2131 [RFC4517].
2132
21335.1.2. 'namingContexts'
2134
2135 The 'namingContexts' attribute lists the context prefixes of the
2136 naming contexts the server masters or shadows (in part or in whole).
2137 If the server is a first-level DSA [X.501], it should list (in
2138 addition) an empty string (indicating the root of the DIT). If the
2139 server does not master or shadow any information (e.g., it is an LDAP
2140 gateway to a public X.500 directory) this attribute will be absent.
2141 If the server believes it masters or shadows the entire directory,
2142 the attribute will have a single value, and that value will be the
2143 empty string (indicating the root of the DIT).
2144
2145 This attribute may be used, for example, to select a suitable entry
2146 name for subsequent operations with this server.
2147
2148 ( 1.3.6.1.4.1.1466.101.120.5 NAME 'namingContexts'
2149 SYNTAX 1.3.6.1.4.1.1466.115.121.1.12
2150 USAGE dSAOperation )
2151
2152 The DistinguishedName (1.3.6.1.4.1.1466.115.121.1.12) syntax is
2153 defined in [RFC4517].
2154
21555.1.3. 'supportedControl'
2156
2157 The 'supportedControl' attribute lists object identifiers identifying
2158 the request controls [RFC4511] the server supports. If the server
2159 does not support any request controls, this attribute will be absent.
2160 Object identifiers identifying response controls need not be listed.
2161
2162 Procedures for registering object identifiers used to discovery of
2163 protocol mechanisms are detailed in BCP 64, RFC 4520 [RFC4520].
2164
2165
2166
2167Zeilenga Standards Track [Page 38]
2168
2169
2170RFC 4512 LDAP Models June 2006
2171
2172
2173 ( 1.3.6.1.4.1.1466.101.120.13 NAME 'supportedControl'
2174 SYNTAX 1.3.6.1.4.1.1466.115.121.1.38
2175 USAGE dSAOperation )
2176
2177 The OBJECT IDENTIFIER (1.3.6.1.4.1.1466.115.121.1.38) syntax is
2178 defined in [RFC4517].
2179
21805.1.4. 'supportedExtension'
2181
2182 The 'supportedExtension' attribute lists object identifiers
2183 identifying the extended operations [RFC4511] that the server
2184 supports. If the server does not support any extended operations,
2185 this attribute will be absent.
2186
2187 An extended operation generally consists of an extended request and
2188 an extended response but may also include other protocol data units
2189 (such as intermediate responses). The object identifier assigned to
2190 the extended request is used to identify the extended operation.
2191 Other object identifiers used in the extended operation need not be
2192 listed as values of this attribute.
2193
2194 Procedures for registering object identifiers used to discovery of
2195 protocol mechanisms are detailed in BCP 64, RFC 4520 [RFC4520].
2196
2197 ( 1.3.6.1.4.1.1466.101.120.7 NAME 'supportedExtension'
2198 SYNTAX 1.3.6.1.4.1.1466.115.121.1.38
2199 USAGE dSAOperation )
2200
2201 The OBJECT IDENTIFIER (1.3.6.1.4.1.1466.115.121.1.38) syntax is
2202 defined in [RFC4517].
2203
22045.1.5. 'supportedFeatures'
2205
2206 The 'supportedFeatures' attribute lists object identifiers
2207 identifying elective features that the server supports. If the
2208 server does not support any discoverable elective features, this
2209 attribute will be absent.
2210
2211 ( 1.3.6.1.4.1.4203.1.3.5 NAME 'supportedFeatures'
2212 EQUALITY objectIdentifierMatch
2213 SYNTAX 1.3.6.1.4.1.1466.115.121.1.38
2214 USAGE dSAOperation )
2215
2216 Procedures for registering object identifiers used to discovery of
2217 protocol mechanisms are detailed in BCP 64, RFC 4520 [RFC4520].
2218
2219 The OBJECT IDENTIFIER (1.3.6.1.4.1.1466.115.121.1.38) syntax and
2220 objectIdentifierMatch matching rule are defined in [RFC4517].
2221
2222
2223
2224Zeilenga Standards Track [Page 39]
2225
2226
2227RFC 4512 LDAP Models June 2006
2228
2229
22305.1.6. 'supportedLDAPVersion'
2231
2232 The 'supportedLDAPVersion' attribute lists the versions of LDAP that
2233 the server supports.
2234
2235 ( 1.3.6.1.4.1.1466.101.120.15 NAME 'supportedLDAPVersion'
2236 SYNTAX 1.3.6.1.4.1.1466.115.121.1.27
2237 USAGE dSAOperation )
2238
2239 The INTEGER (1.3.6.1.4.1.1466.115.121.1.27) syntax is defined in
2240 [RFC4517].
2241
22425.1.7. 'supportedSASLMechanisms'
2243
2244 The 'supportedSASLMechanisms' attribute lists the SASL mechanisms
2245 [RFC4422] that the server recognizes and/or supports [RFC4513]. The
2246 contents of this attribute may depend on the current session state.
2247 If the server does not support any SASL mechanisms, this attribute
2248 will not be present.
2249
2250 ( 1.3.6.1.4.1.1466.101.120.14 NAME 'supportedSASLMechanisms'
2251 SYNTAX 1.3.6.1.4.1.1466.115.121.1.15
2252 USAGE dSAOperation )
2253
2254 The Directory String (1.3.6.1.4.1.1466.115.121.1.15) syntax is
2255 defined in [RFC4517].
2256
22576. Other Considerations
2258
22596.1. Preservation of User Information
2260
2261 Syntaxes may be defined that have specific value and/or value form
2262 (representation) preservation requirements. For example, a syntax
2263 containing digitally signed data can mandate that the server preserve
2264 both the value and form of value presented to ensure that the
2265 signature is not invalidated.
2266
2267 Where such requirements have not been explicitly stated, servers
2268 SHOULD preserve the value of user information but MAY return the
2269 value in a different form. And where a server is unable (or
2270 unwilling) to preserve the value of user information, the server
2271 SHALL ensure that an equivalent value (per Section 2.3) is returned.
2272
2273
2274
2275
2276
2277
2278
2279
2280
2281Zeilenga Standards Track [Page 40]
2282
2283
2284RFC 4512 LDAP Models June 2006
2285
2286
22876.2. Short Names
2288
2289 Short names, also known as descriptors, are used as more readable
2290 aliases for object identifiers and are used to identify various
2291 schema elements. However, it is not expected that LDAP
2292 implementations with human user interface would display these short
2293 names (or the object identifiers they refer to) to the user.
2294 Instead, they would most likely be performing translations (such as
2295 expressing the short name in one of the local national languages).
2296 For example, the short name "st" (stateOrProvinceName) might be
2297 displayed to a German-speaking user as "Land".
2298
2299 The same short name might have different meaning in different
2300 subschemas, and, within a particular subschema, the same short name
2301 might refer to different object identifiers each identifying a
2302 different kind of schema element.
2303
2304 Implementations MUST be prepared that the same short name might be
2305 used in a subschema to refer to the different kinds of schema
2306 elements. That is, there might be an object class 'x-fubar' and an
2307 attribute type 'x-fubar' in a subschema.
2308
2309 Implementations MUST be prepared that the same short name might be
2310 used in the different subschemas to refer to the different schema
2311 elements. That is, there might be two matching rules 'x-fubar', each
2312 in different subschemas.
2313
2314 Procedures for registering short names (descriptors) are detailed in
2315 BCP 64, RFC 4520 [RFC4520].
2316
23176.3. Cache and Shadowing
2318
2319 Some servers may hold cache or shadow copies of entries, which can be
2320 used to answer search and comparison queries, but will return
2321 referrals or contact other servers if modification operations are
2322 requested. Servers that perform shadowing or caching MUST ensure
2323 that they do not violate any access control constraints placed on the
2324 data by the originating server.
2325
2326
2327
2328
2329
2330
2331
2332
2333
2334
2335
2336
2337
2338Zeilenga Standards Track [Page 41]
2339
2340
2341RFC 4512 LDAP Models June 2006
2342
2343
23447. Implementation Guidelines
2345
23467.1. Server Guidelines
2347
2348 Servers MUST recognize all names of attribute types and object
2349 classes defined in this document but, unless stated otherwise, need
2350 not support the associated functionality. Servers SHOULD recognize
2351 all the names of attribute types and object classes defined in
2352 Section 3 and 4, respectively, of [RFC4519].
2353
2354 Servers MUST ensure that entries conform to user and system schema
2355 rules or other data model constraints.
2356
2357 Servers MAY support DIT Content Rules. Servers MAY support DIT
2358 Structure Rules and Name Forms.
2359
2360 Servers MAY support alias entries.
2361
2362 Servers MAY support the 'extensibleObject' object class.
2363
2364 Servers MAY support subentries. If so, they MUST do so in accordance
2365 with [RFC3672]. Servers that do not support subentries SHOULD use
2366 object entries to mimic subentries as detailed in Section 3.2.
2367
2368 Servers MAY implement additional schema elements. Servers SHOULD
2369 provide definitions of all schema elements they support in subschema
2370 (sub)entries.
2371
23727.2. Client Guidelines
2373
2374 In the absence of prior agreements with servers, clients SHOULD NOT
2375 assume that servers support any particular schema elements beyond
2376 those referenced in Section 7.1. The client can retrieve subschema
2377 information as described in Section 4.4.
2378
2379 Clients MUST NOT display or attempt to decode a value as ASN.1 if the
2380 value's syntax is not known. Clients MUST NOT assume the LDAP-
2381 specific string encoding is restricted to a UTF-8 encoded string of
2382 Unicode characters or any particular subset of Unicode (such as a
2383 printable subset) unless such restriction is explicitly stated.
2384 Clients SHOULD NOT send attribute values in a request that are not
2385 valid according to the syntax defined for the attributes.
2386
2387
2388
2389
2390
2391
2392
2393
2394
2395Zeilenga Standards Track [Page 42]
2396
2397
2398RFC 4512 LDAP Models June 2006
2399
2400
24018. Security Considerations
2402
2403 Attributes of directory entries are used to provide descriptive
2404 information about the real-world objects they represent, which can be
2405 people, organizations, or devices. Most countries have privacy laws
2406 regarding the publication of information about people.
2407
2408 General security considerations for accessing directory information
2409 with LDAP are discussed in [RFC4511] and [RFC4513].
2410
24119. IANA Considerations
2412
2413 The Internet Assigned Numbers Authority (IANA) has updated the LDAP
2414 descriptors registry as indicated in the following template:
2415
2416 Subject: Request for LDAP Descriptor Registration Update
2417 Descriptor (short name): see comment
2418 Object Identifier: see comment
2419 Person & email address to contact for further information:
2420 Kurt Zeilenga <kurt@OpenLDAP.org>
2421 Usage: see comment
2422 Specification: RFC 4512
2423 Author/Change Controller: IESG
2424 Comments:
2425
2426 The following descriptors (short names) has been added to
2427 the registry.
2428
2429 NAME Type OID
2430 ------------------------ ---- -----------------
2431 governingStructureRule A 2.5.21.10
2432 structuralObjectClass A 2.5.21.9
2433
2434 The following descriptors (short names) have been updated to
2435 refer to this RFC.
2436
2437 NAME Type OID
2438 ------------------------ ---- -----------------
2439 alias O 2.5.6.1
2440 aliasedObjectName A 2.5.4.1
2441 altServer A 1.3.6.1.4.1.1466.101.120.6
2442 attributeTypes A 2.5.21.5
2443 createTimestamp A 2.5.18.1
2444 creatorsName A 2.5.18.3
2445 dITContentRules A 2.5.21.2
2446 dITStructureRules A 2.5.21.1
2447 extensibleObject O 1.3.6.1.4.1.1466.101.120.111
2448 ldapSyntaxes A 1.3.6.1.4.1.1466.101.120.16
2449
2450
2451
2452Zeilenga Standards Track [Page 43]
2453
2454
2455RFC 4512 LDAP Models June 2006
2456
2457
2458 matchingRuleUse A 2.5.21.8
2459 matchingRules A 2.5.21.4
2460 modifiersName A 2.5.18.4
2461 modifyTimestamp A 2.5.18.2
2462 nameForms A 2.5.21.7
2463 namingContexts A 1.3.6.1.4.1.1466.101.120.5
2464 objectClass A 2.5.4.0
2465 objectClasses A 2.5.21.6
2466 subschema O 2.5.20.1
2467 subschemaSubentry A 2.5.18.10
2468 supportedControl A 1.3.6.1.4.1.1466.101.120.13
2469 supportedExtension A 1.3.6.1.4.1.1466.101.120.7
2470 supportedFeatures A 1.3.6.1.4.1.4203.1.3.5
2471 supportedLDAPVersion A 1.3.6.1.4.1.1466.101.120.15
2472 supportedSASLMechanisms A 1.3.6.1.4.1.1466.101.120.14
2473 top O 2.5.6.0
2474
247510. Acknowledgements
2476
2477 This document is based in part on RFC 2251 by M. Wahl, T. Howes, and
2478 S. Kille; RFC 2252 by M. Wahl, A. Coulbeck, T. Howes, S. Kille; and
2479 RFC 2556 by M. Wahl, all products of the IETF Access, Searching and
2480 Indexing of Directories (ASID) Working Group. This document is also
2481 based in part on "The Directory: Models" [X.501], a product of the
2482 International Telephone Union (ITU). Additional text was borrowed
2483 from RFC 2253 by M. Wahl, T. Howes, and S. Kille.
2484
2485 This document is a product of the IETF LDAP Revision (LDAPBIS)
2486 Working Group.
2487
2488
2489
2490
2491
2492
2493
2494
2495
2496
2497
2498
2499
2500
2501
2502
2503
2504
2505
2506
2507
2508
2509Zeilenga Standards Track [Page 44]
2510
2511
2512RFC 4512 LDAP Models June 2006
2513
2514
251511. Normative References
2516
2517 [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
2518 Requirement Levels", BCP 14, RFC 2119, March 1997.
2519
2520 [RFC3629] Yergeau, F., "UTF-8, a transformation format of ISO
2521 10646", STD 63, RFC 3629, November 2003.
2522
2523 [RFC3671] Zeilenga, K., "Collective Attributes in the Lightweight
2524 Directory Access Protocol (LDAP)", RFC 3671, December
2525 2003.
2526
2527 [RFC3672] Zeilenga, K., "Subentries in the Lightweight Directory
2528 Access Protocol (LDAP)", RFC 3672, December 2003.
2529
2530 [RFC4234] Crocker, D. and P. Overell, "Augmented BNF for Syntax
2531 Specifications: ABNF", RFC 4234, October 2005.
2532
2533 [RFC4422] Melnikov, A., Ed. and K. Zeilenga, Ed., "Simple
2534 Authentication and Security Layer (SASL)", RFC 4422,
2535 June 2006.
2536
2537 [RFC4510] Zeilenga, K., Ed., "Lightweight Directory Access
2538 Protocol (LDAP): Technical Specification Road Map", RFC
2539 4510, June 2006.
2540
2541 [RFC4511] Sermersheim, J., Ed., "Lightweight Directory Access
2542 Protocol (LDAP): The Protocol", RFC 4511, June 2006.
2543
2544 [RFC4513] Harrison, R., Ed., "Lightweight Directory Access
2545 Protocol (LDAP): Authentication Methods and Security
2546 Mechanisms", RFC 4513, June 2006.
2547
2548 [RFC4514] Zeilenga, K., Ed., "Lightweight Directory Access
2549 Protocol (LDAP): String Representation of Distinguished
2550 Names", RFC 4514, June 2006.
2551
2552 [RFC4515] Smith, M., Ed. and T. Howes, "Lightweight Directory
2553 Access Protocol (LDAP): String Representation of Search
2554 Filters", RFC 4515, June 2006.
2555
2556 [RFC4516] Smith, M., Ed. and T. Howes, "Lightweight Directory
2557 Access Protocol (LDAP): Uniform Resource Locator", RFC
2558 4516, June 2006.
2559
2560 [RFC4517] Legg, S., Ed., "Lightweight Directory Access Protocol
2561 (LDAP): Syntaxes and Matching Rules", RFC 4517, June
2562 2006.
2563
2564
2565
2566Zeilenga Standards Track [Page 45]
2567
2568
2569RFC 4512 LDAP Models June 2006
2570
2571
2572 [RFC4519] Sciberras, A., Ed., "Lightweight Directory Access
2573 Protocol (LDAP): Schema for User Applications", RFC
2574 4519, June 2006.
2575
2576 [RFC4520] Zeilenga, K., "Internet Assigned Numbers Authority
2577 (IANA) Considerations for the Lightweight Directory
2578 Access Protocol (LDAP)", BCP 64, RFC 4520, June 2006.
2579
2580 [Unicode] The Unicode Consortium, "The Unicode Standard, Version
2581 3.2.0" is defined by "The Unicode Standard, Version
2582 3.0" (Reading, MA, Addison-Wesley, 2000. ISBN 0-201-
2583 61633-5), as amended by the "Unicode Standard Annex
2584 #27: Unicode 3.1"
2585 (http://www.unicode.org/reports/tr27/) and by the
2586 "Unicode Standard Annex #28: Unicode 3.2"
2587 (http://www.unicode.org/reports/tr28/).
2588
2589 [X.500] International Telecommunication Union -
2590 Telecommunication Standardization Sector, "The
2591 Directory -- Overview of concepts, models and
2592 services," X.500(1993) (also ISO/IEC 9594-1:1994).
2593
2594 [X.501] International Telecommunication Union -
2595 Telecommunication Standardization Sector, "The
2596 Directory -- Models," X.501(1993) (also ISO/IEC 9594-
2597 2:1994).
2598
2599 [X.680] International Telecommunication Union -
2600 Telecommunication Standardization Sector, "Abstract
2601 Syntax Notation One (ASN.1) - Specification of Basic
2602 Notation", X.680(2002) (also ISO/IEC 8824-1:2002).
2603
2604
2605
2606
2607
2608
2609
2610
2611
2612
2613
2614
2615
2616
2617
2618
2619
2620
2621
2622
2623Zeilenga Standards Track [Page 46]
2624
2625
2626RFC 4512 LDAP Models June 2006
2627
2628
2629Appendix A. Changes
2630
2631 This appendix is non-normative.
2632
2633 This document amounts to nearly a complete rewrite of portions of RFC
2634 2251, RFC 2252, and RFC 2256. This rewrite was undertaken to improve
2635 overall clarity of technical specification. This appendix provides a
2636 summary of substantive changes made to the portions of these
2637 documents incorporated into this document. Readers should consult
2638 [RFC4510], [RFC4511], [RFC4517], and [RFC4519] for summaries of
2639 remaining portions of these documents.
2640
2641A.1. Changes to RFC 2251
2642
2643 This document incorporates from RFC 2251, Sections 3.2 and 3.4, and
2644 portions of Sections 4 and 6 as summarized below.
2645
2646A.1.1. Section 3.2 of RFC 2251
2647
2648 Section 3.2 of RFC 2251 provided a brief introduction to the X.500
2649 data model, as used by LDAP. The previous specification relied on
2650 [X.501] but lacked clarity in how X.500 models are adapted for use by
2651 LDAP. This document describes the X.500 data models, as used by
2652 LDAP, in greater detail, especially in areas where adaptation is
2653 needed.
2654
2655 Section 3.2.1 of RFC 2251 described an attribute as "a type with one
2656 or more associated values". In LDAP, an attribute is better
2657 described as an attribute description, a type with zero or more
2658 options, and one or more associated values.
2659
2660 Section 3.2.2 of RFC 2251 mandated that subschema subentries contain
2661 objectClasses and attributeTypes attributes, yet X.500(93) treats
2662 these attributes as optional. While generally all implementations
2663 that support X.500(93) subschema mechanisms will provide both of
2664 these attributes, it is not absolutely required for interoperability
2665 that all servers do. The mandate was removed for consistency with
2666 X.500(93). The subschema discovery mechanism was also clarified to
2667 indicate that subschema controlling an entry is obtained by reading
2668 the (sub)entry referred to by that entry's 'subschemaSubentry'
2669 attribute.
2670
2671
2672
2673
2674
2675
2676
2677
2678
2679
2680Zeilenga Standards Track [Page 47]
2681
2682
2683RFC 4512 LDAP Models June 2006
2684
2685
2686A.1.2. Section 3.4 of RFC 2251
2687
2688 Section 3.4 of RFC 2251 provided "Server-specific Data Requirements".
2689 This material, with changes, was incorporated in Section 5.1 of this
2690 document.
2691
2692 Changes:
2693
2694 - Clarify that attributes of the root DSE are subject to "other
2695 restrictions" in addition to access controls.
2696
2697 - Clarify that only recognized extended requests need to be
2698 enumerated 'supportedExtension'.
2699
2700 - Clarify that only recognized request controls need to be enumerated
2701 'supportedControl'.
2702
2703 - Clarify that root DSE attributes are operational and, like other
2704 operational attributes, will not be returned in search requests
2705 unless requested by name.
2706
2707 - Clarify that not all root DSE attributes are user modifiable.
2708
2709 - Remove inconsistent text regarding handling of the
2710 'subschemaSubentry' attribute within the root DSE. The previous
2711 specification stated that the 'subschemaSubentry' attribute held in
2712 the root DSE referred to "subschema entries (or subentries) known
2713 by this server". This is inconsistent with the attribute's
2714 intended use as well as its formal definition as a single valued
2715 attribute [X.501]. It is also noted that a simple (possibly
2716 incomplete) list of subschema (sub)entries is not terribly useful.
2717 This document (in Section 5.1) specifies that the
2718 'subschemaSubentry' attribute of the root DSE refers to the
2719 subschema controlling the root DSE. It is noted that the general
2720 subschema discovery mechanism remains available (see Section 4.4 of
2721 this document).
2722
2723A.1.3. Section 4 of RFC 2251
2724
2725 Portions of Section 4 of RFC 2251 detailing aspects of the
2726 information model used by LDAP were incorporated in this document,
2727 including:
2728
2729 - Restriction of distinguished values to attributes whose
2730 descriptions have no options (from Section 4.1.3);
2731
2732
2733
2734
2735
2736
2737Zeilenga Standards Track [Page 48]
2738
2739
2740RFC 4512 LDAP Models June 2006
2741
2742
2743 - Data model aspects of Attribute Types (from Section 4.1.4),
2744 Attribute Descriptions (from 4.1.5), Attribute (from 4.1.8),
2745 Matching Rule Identifier (from 4.1.9); and
2746
2747 - User schema requirements (from Sections 4.1.6, 4.5.1, and 4.7).
2748
2749 Clarifications to these portions include:
2750
2751 - Subtyping and AttributeDescriptions with options.
2752
2753A.1.4. Section 6 of RFC 2251
2754
2755 The Section 6.1 and the second paragraph of Section 6.2 of RFC 2251
2756 where incorporated into this document.
2757
2758A.2. Changes to RFC 2252
2759
2760 This document incorporates Sections 4, 5, and 7 from RFC 2252.
2761
2762A.2.1. Section 4 of RFC 2252
2763
2764 The specification was updated to use Augmented BNF [RFC4234]. The
2765 string representation of an OBJECT IDENTIFIER was tightened to
2766 disallow leading zeros as described in RFC 2252.
2767
2768 The <descr> syntax was changed to disallow semicolon (U+003B)
2769 characters in order to appear to be consistent its natural language
2770 specification "descr is the syntactic representation of an object
2771 descriptor, which consists of letters and digits, starting with a
2772 letter". In a related change, the statement "an AttributeDescription
2773 can be used as the value in a NAME part of an
2774 AttributeTypeDescription" was deleted. RFC 2252 provided no
2775 specification of the semantics of attribute options appearing in NAME
2776 fields.
2777
2778 RFC 2252 stated that the <descr> form of <oid> SHOULD be preferred
2779 over the <numericoid> form. However, <descr> form can be ambiguous.
2780 To address this issue, the imperative was replaced with a statement
2781 (in Section 1.4) that while the <descr> form is generally preferred,
2782 <numericoid> should be used where an unambiguous <descr> is not
2783 available. Additionally, an expanded discussion of descriptor issues
2784 is in Section 6.2 ("Short Names").
2785
2786 The ABNF for a quoted string (qdstring) was updated to reflect
2787 support for the escaping mechanism described in Section 4.3 of RFC
2788 2252.
2789
2790
2791
2792
2793
2794Zeilenga Standards Track [Page 49]
2795
2796
2797RFC 4512 LDAP Models June 2006
2798
2799
2800A.2.2. Section 5 of RFC 2252
2801
2802 Definitions of operational attributes provided in Section 5 of RFC
2803 2252 where incorporated into this document.
2804
2805 The 'namingContexts' description was clarified. A first-level DSA
2806 should publish, in addition to other values, "" indicating the root
2807 of the DIT.
2808
2809 The 'altServer' description was clarified. It may hold any URI.
2810
2811 The 'supportedExtension' description was clarified. A server need
2812 only list the OBJECT IDENTIFIERs associated with the extended
2813 requests of the extended operations it recognizes.
2814
2815 The 'supportedControl' description was clarified. A server need only
2816 list the OBJECT IDENTIFIERs associated with the request controls it
2817 recognizes.
2818
2819 Descriptions for the 'structuralObjectClass' and
2820 'governingStructureRule' operational attribute types were added.
2821
2822 The attribute definition of 'subschemaSubentry' was corrected to list
2823 the terms SINGLE-VALUE and NO-USER-MODIFICATION in proper order.
2824
2825A.2.3. Section 7 of RFC 2252
2826
2827 Section 7 of RFC 2252 provides definitions of the 'subschema' and
2828 'extensibleObject' object classes. These definitions where
2829 integrated into Section 4.2 and Section 4.3 of this document,
2830 respectively. Section 7 of RFC 2252 also contained the object class
2831 implementation requirement. This was incorporated into Section 7 of
2832 this document.
2833
2834 The specification of 'extensibleObject' was clarified regarding how
2835 it interacts with precluded attributes.
2836
2837A.3. Changes to RFC 2256
2838
2839 This document incorporates Sections 5.1, 5.2, 7.1, and 7.2 of RFC
2840 2256.
2841
2842 Section 5.1 of RFC 2256 provided the definition of the 'objectClass'
2843 attribute type. This was integrated into Section 2.4.1 of this
2844 document. The statement "One of the values is either 'top' or
2845 'alias'" was replaced with statement that one of the values is 'top'
2846 as entries belonging to 'alias' also belong to 'top'.
2847
2848
2849
2850
2851Zeilenga Standards Track [Page 50]
2852
2853
2854RFC 4512 LDAP Models June 2006
2855
2856
2857 Section 5.2 of RFC 2256 provided the definition of the
2858 'aliasedObjectName' attribute type. This was integrated into Section
2859 2.6.2 of this document.
2860
2861 Section 7.1 of RFC 2256 provided the definition of the 'top' object
2862 class. This was integrated into Section 2.4.1 of this document.
2863
2864 Section 7.2 of RFC 2256 provided the definition of the 'alias' object
2865 class. This was integrated into Section 2.6.1 of this document.
2866
2867A.4. Changes to RFC 3674
2868
2869 This document made no substantive change to the 'supportedFeatures'
2870 technical specification provided in RFC 3674.
2871
2872Editor's Address
2873
2874 Kurt D. Zeilenga
2875 OpenLDAP Foundation
2876
2877 EMail: Kurt@OpenLDAP.org
2878
2879
2880
2881
2882
2883
2884
2885
2886
2887
2888
2889
2890
2891
2892
2893
2894
2895
2896
2897
2898
2899
2900
2901
2902
2903
2904
2905
2906
2907
2908Zeilenga Standards Track [Page 51]
2909
2910
2911RFC 4512 LDAP Models June 2006
2912
2913
2914Full Copyright Statement
2915
2916 Copyright (C) The Internet Society (2006).
2917
2918 This document is subject to the rights, licenses and restrictions
2919 contained in BCP 78, and except as set forth therein, the authors
2920 retain all their rights.
2921
2922 This document and the information contained herein are provided on an
2923 "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
2924 OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
2925 ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
2926 INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
2927 INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
2928 WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
2929
2930Intellectual Property
2931
2932 The IETF takes no position regarding the validity or scope of any
2933 Intellectual Property Rights or other rights that might be claimed to
2934 pertain to the implementation or use of the technology described in
2935 this document or the extent to which any license under such rights
2936 might or might not be available; nor does it represent that it has
2937 made any independent effort to identify any such rights. Information
2938 on the procedures with respect to rights in RFC documents can be
2939 found in BCP 78 and BCP 79.
2940
2941 Copies of IPR disclosures made to the IETF Secretariat and any
2942 assurances of licenses to be made available, or the result of an
2943 attempt made to obtain a general license or permission for the use of
2944 such proprietary rights by implementers or users of this
2945 specification can be obtained from the IETF on-line IPR repository at
2946 http://www.ietf.org/ipr.
2947
2948 The IETF invites any interested party to bring to its attention any
2949 copyrights, patents or patent applications, or other proprietary
2950 rights that may cover technology that may be required to implement
2951 this standard. Please address the information to the IETF at
2952 ietf-ipr@ietf.org.
2953
2954Acknowledgement
2955
2956 Funding for the RFC Editor function is provided by the IETF
2957 Administrative Support Activity (IASA).
2958
2959
2960
2961
2962
2963
2964
2965Zeilenga Standards Track [Page 52]
2966
2967
Note: See TracBrowser for help on using the repository browser.