|
DataMuseum.dkPresents historical artifacts from the history of: DKUUG/EUUG Conference tapes |
This is an automatic "excavation" of a thematic subset of
See our Wiki for more about DKUUG/EUUG Conference tapes Excavated with: AutoArchaeologist - Free & Open Source Software. |
top - metrics - downloadIndex: T d
Length: 15653 (0x3d25) Types: TextFile Names: »ds.tex«
└─⟦3d0c2be1b⟧ Bits:30001254 ISODE-5.0 Tape └─⟦eba4602b1⟧ »./isode-5.0.tar.Z« └─⟦d3ac74d73⟧ └─⟦this⟧ »isode-5.0/doc/ds/ds.tex« └─⟦2d1937cfd⟧ Bits:30007241 EUUGD22: P.P 5.0 └─⟦35176feda⟧ »EurOpenD22/isode/isode-6.tar.Z« └─⟦de7628f85⟧ └─⟦this⟧ »isode-6.0/doc/ds/ds.tex«
% -*- LaTeX -*- (really SLiTeX) \def\emph#1{\underline{#1}} \font\xx=cmbx10 \font\yy=cmbx7 \documentstyle[blackandwhite,landscape,oval,pagenumbers,small]{NRslides} \raggedright %\input trademark \let\tradeNAMfont=\relax \let\tradeORGfont=\relax \begin{document} \title {OSI Directory Services} \author {Christopher W.~Moore\\ The Wollongong Group, Inc.} \date {December 13, 1988} \maketitlepage \f \begin{bwslide} \part* {Agenda} \begin{description} \item[Part I:] Introduction to Directory Services \item[Part II:] Directory Services in Detail \item[Part III:] Upper Layer Requirements \item[Part IV:] Reference Points \item[Part V:] Conclusions \end{description} \end{bwslide} \f \begin{bwslide} \ctitle {Part I: Introduction to Directory Services} \end{bwslide} \f \begin{bwslide} \ctitle {Introduction} \begin{nrtc} \item Specialized distributed database \item Holds and provides access to information about objects \item OSI application \end{nrtc} \end{bwslide} \f \begin{bwslide} \ctitle {Scope \& Field of Application} \begin{nrtc} \item Provide Directory Capability Required by: \begin{nrtc} \item OSI Applications \item OSI Management Processes \item OSI Layer Entities \end{nrtc} \item ``User Friendly'' Naming --- Name to Address Mapping \end{nrtc} \end{bwslide} \f \begin{bwslide} \ctitle {Scope \& Field (cont.)} \begin{nrtc} \item Is NOT a General-Purpose Database itself; but, \item May be built on a General-Purpose Database \item Transient Conditions \item More Frequent Queries than Updates \end{nrtc} \end{bwslide} \f \begin{bwslide} \ctitle {Scope \& Field (cont.)} \begin{nrtc} \item Query results independent \begin{nrtc} \item Identity \item Location \end{nrtc} \item Variances \begin{nrtc} \item Differing access rights \item Unpropagated updates \end{nrtc} \end{nrtc} \end{bwslide} \f \begin{bwslide} \ctitle {Directory and Users} \begin{nrtc} \item Directory user \begin{nrtc} \item Person \item Application process \end{nrtc} \item Services obtained by accessing the directory \item Access achieved through directory user agent, {\em DUA} \end{nrtc} \end{bwslide} \f \begin{bwslide} \ctitle {Directory and Users} \vskip.5in \diagram[p]{figure1} \end{bwslide} \f \begin{bwslide} \ctitle {Directory Information Base\\ (DIB)} \begin{nrtc} \item Information model \item All information to which the Directory provides access \item Not concerned with distributed or centralized architecture \end{nrtc} \end{bwslide} \f \begin{bwslide} \ctitle {Directory Access\\ ( Abstract Service )} \begin{nrtc} \item Services provided to DUAs through access points \item Access point supports a specific combination of services, {\em Ports} \item Ports define particular types of interaction with the directory \end{nrtc} \end{bwslide} \f \begin{bwslide} \ctitle {Objects} \begin{nrtc} \item Many types of objects will be stored in the directory \item An object may be used by multiple applications \item General set of useful objects and attributes defined by Directory \item Individual applications may define Directory objects and attributes \end{nrtc} \end{bwslide} \f \begin{bwslide} \ctitle {Part II: Directory Services in Detail} \begin{nrtc} \item Informational Model \item Functional Model \item Organizational Model \item Security Model \item Applying The Directory \item The Directory Service \end{nrtc} \end{bwslide} \f \begin{bwslide} \ctitle {Information Model\\ Directory Information Base} \begin{nrtc} \item Composed of information about objects, {\em entries}. \item Tree structure, {\em Directory Information Tree (DIT)} \item Entries have {\em Distinguished Names} \item Aliases \item Schema \end{nrtc} \end{bwslide} \f \begin{bwslide} \ctitle {Information Model\\ DIT Structure} \vskip.5in \diagram[p]{figure2} \end{bwslide} \f \begin{bwslide} \ctitle {Information Model\\ Entries} \vskip.5in \diagram[p]{figure9} \end{bwslide} \f \begin{bwslide} \ctitle {Example Directory Tree} \vskip.5in \diagram[p]{figure3} \end{bwslide} \f \begin{bwslide} \ctitle {Functional Model} \begin{nrtc} \item The Directory is manifested by one or more DSAs \item Directory System Agent, {\em DSA} \end{nrtc} \end{bwslide} \f \begin{bwslide} \ctitle {Functional Model} \vskip.5in \diagram[p]{figure4} \end{bwslide} \f \begin{bwslide} \ctitle {Operation of the Functional Model} \begin{nrtc} \item Interactions \begin{nrtc} \item DUAs interact with one or more DSAs \item DSAs interact with other DSAs \end{nrtc} \item Referral \item Chaining \end{nrtc} \end{bwslide} \f \begin{bwslide} \ctitle {Operation of the Model\\ Referral} \vskip.5in \diagram[p]{figure5} \end{bwslide} \f \begin{bwslide} \ctitle {Operation of the Model\\ Referral (cont.)} \vskip.5in \diagram[p]{figure6} \end{bwslide} \f \begin{bwslide} \ctitle {Operation of the Model\\ Chaining} \vskip.5in \diagram[p]{figure7} \end{bwslide} \f \begin{bwslide} \ctitle {Operation of the Model\\ Multicasting} \vskip.5in \diagram[p]{figure8} \end{bwslide} \f \begin{bwslide} \ctitle {Organizational Model} \begin{nrtc} \item Directory Management Domain, {\em DMD} \begin{nrtc} \item One or more DSAs \item Zero or more DUAs \item External behavior (Multiple DSAs in a DMD) \end{nrtc} \item Administration Directory Management Domain, {\em ADDMD} \item Private Directory Management Domain, {\em PRDMD} \end{nrtc} \end{bwslide} \f \begin{bwslide} \ctitle {Security Model} \end{bwslide} \f \begin{bwslide} \ctitle {Security Model\\ Security Policy} \begin{nrtc} \item Various authorities provide access to parts of the DIB \item Authorization Policy \begin{nrtc} \item Specify access rights \item Enforce access rights {\em (Access control)} \item Maintain access rights \end{nrtc} \item Authentication Policy \begin{nrtc} \item Identity of DSAs and directory users \item identity of received informations origin \end{nrtc} \end{nrtc} \end{bwslide} \f \begin{bwslide} \ctitle {Security Model\\ Local Matters} \begin{nrtc} \item Actual definition of a security policy \item Specifying access rights {\em (Guidelines given)} \end{nrtc} \end{bwslide} \f \begin{bwslide} \ctitle {Applying the Directory} \end{bwslide} \f \begin{bwslide} \ctitle {Applying the Directory \\ Directory Environment} \begin{nrtc} \item Large scale networks \begin{nrtc} \item Various objects enter and leave \item Connectivity of objects changes \item Characteristic of objects change \end{nrtc} \item Object interrogation is more frequent than object changes \item Object identification methods \begin{nrtc} \item Chosen for ease of allocation \end{nrtc} \end{nrtc} \end{bwslide} \f \begin{bwslide} \ctitle {Applying the Directory \\ Directory Service Characteristics} \begin{nrtc} \item Isolate user from frequent changes to network \item Provide ``user friendly'' view of network \begin{nrtc} \item Aliases \item ``Yellow Pages'' \end{nrtc} \end{nrtc} \end{bwslide} \f \begin{bwslide} \ctitle {Applying the Directory \\ Patterns of Usage} \end{bwslide} \f \begin{bwslide} \ctitle {Applying the Directory \\ Look---Up} \begin{nrtc} \item DUA Supplies \begin{nrtc} \item Distinguished name of object \item Attribute type {\em (Optional)} \end{nrtc} \item Directory Returns \begin{nrtc} \item Value(s) requested \end{nrtc} \item Additionally \begin{nrtc} \item Multiple attribute types may be requested \end{nrtc} \end{nrtc} \end{bwslide} \f \begin{bwslide} \ctitle {Applying the Directory \\ Naming} \begin{nrtc} \item Names chosen to maximize predictability by humans \item Common among all applications using an object \end{nrtc} \end{bwslide} \f \begin{bwslide} \ctitle {Applying the Directory \\ Browsing} \begin{nrtc} \item Combination of list and search \item Enables user to ``guess'' object name \end{nrtc} \end{bwslide} \f \begin{bwslide} \ctitle {Applying the Directory \\ ``Yellow Pages''} \begin{nrtc} \item Matching objects for a specific category\\ (i.e., Business Category = ``Window Washing'') \item Two Approaches \begin{nrtc} \item Search with filter on attributes \item Construct special subtrees \end{nrtc} \end{nrtc} \end{bwslide} \f \begin{bwslide} \ctitle {Applying the Directory \\ Groups} \begin{nrtc} \item Are objects \item Members are objects \item Membership changes over time \item Directory will \begin{nrtc} \item Indicate if object is member of group \item List membership of group \end{nrtc} \item {\em Group member may be a group} \end{nrtc} \end{bwslide} \f \begin{bwslide} \ctitle {Applying the Directory \\ Authentication} \begin{nrtc} \item Directory supports applications by storing authentication information \item Directory may uses authentication information \item Directory Contains \begin{nrtc} \item Passwords, {\em Simple Authentication} \item Public encryption keys, {\em Strong Authentication} \end{nrtc} \end{nrtc} \end{bwslide} \f \begin{bwslide} \ctitle {Applying the Directory \\ Generic Directory Applications} \begin{nrtc} \item Inter---Personal Communications \item Inter---System Communications \end{nrtc} \end{bwslide} \f \begin{bwslide} \ctitle {Applying the Directory \\ Inter---Personal Communications Directory} \begin{nrtc} \item Provide humans with communication information for others \item {\em Some} Typical object classes \begin{nrtc} \item Person \item Organizational role \item Group \end{nrtc} \item Typical attributes retrieved \begin{nrtc} \item Electronic mail address \item Telephone number \item Physical delivery information \end{nrtc} \end{nrtc} \end{bwslide} \f \begin{bwslide} \ctitle {Applying the Directory \\ Inter---System Communications Directory} \begin{nrtc} \item OSI Reference Model \emph{Requires} Two Directory Functions \begin{nrtc} \item Application Layer: \\ Application Title to Presentation Address \item Network Layer: \\ NSAP Addresses to SNPA Address \end{nrtc} \item Typical Object Class \begin{nrtc} \item Application Entity \end{nrtc} \item Typical Attribute Retrieved \begin{nrtc} \item Presentation Address \end{nrtc} \end{nrtc} \end{bwslide} \f \begin{bwslide} \ctitle {Directory Service} \begin{nrtc} \item Provided to user through DUA \item Responds to requests from DUA \item Request Types: \begin{nrtc} \item Interrogation \item Modification \end{nrtc} \item Requests may be qualified \item Result / Response \begin{nrtc} \item Requests always generate a result \item Normal: Form specific to request \item Error: Common to other requests \end{nrtc} \end{nrtc} \end{bwslide} \f \begin{bwslide} \ctitle {Directory Service (cont.)} \begin{nrtc} \item ``Outside'' the Standards \begin{nrtc} \item Addition/Deletion of arbitrary entries \item Management of access Control \item Management of schema \item Management of knowledge information \end{nrtc} \end{nrtc} \end{bwslide} \f \begin{bwslide} \ctitle {Directory Service (cont.)} \begin{nrtc} \item Connection oriented \item Peer entity authentication performed at association establishment \end{nrtc} \end{bwslide} \f \begin{bwslide} \ctitle {Directory Service --- Service Qualification} Qualifying Requests: \begin{nrtc} \item Service controls \item Security parameters \item Filters \end{nrtc} \end{bwslide} \f \begin{bwslide} \ctitle {Directory Service --- Directory Interrogation} Types of requests: \begin{nrtc} \item Read \item Compare \item List \item Search \item {\em Abandon} \end{nrtc} \end{bwslide} \f \begin{bwslide} \ctitle {Directory Service --- Directory Modification} \begin{nrtc} \item Add entry \item Remove entry \item Modify entry \item Modify relative distinguished name \end{nrtc} \end{bwslide} \f \begin{bwslide} \ctitle {Directory Service --- Outcomes} Requests may result in: \begin{nrtc} \item Normal response \item Errors \item Referrals \end{nrtc} \end{bwslide} \f \begin{bwslide} \ctitle {Directory Protocols} \begin{nrtc} \item Directory Access Protocol --- $DAP$ --- $(DUA \longleftrightarrow DSA)$ \item Directory System Protocol --- $DSP$ --- $(DSA \longleftrightarrow DSA)$ \end{nrtc} \end{bwslide} \f \begin{bwslide} \ctitle {Directory Protocols} \vskip .5in \diagram[p]{figure21} \end{bwslide} \f \begin{bwslide} \ctitle {Part II: Quick Summary} \begin{nrtc} \item Information Model --- DIB, DIT, Entries \item Functional Model --- ``The Directory'' \item Organizational Model --- Directory Management Domains \item Security Model --- Security Policies \item Applying the Directory --- User approach \item The Directory Service --- An internal approach \end{nrtc} \end{bwslide} \f \begin{bwslide} \ctitle {Part III: Upper Layer Requirements} \begin{nrtc} \item Association Control \item Remote Operations \item Session {\em --- Version 2} \item Transport \end{nrtc} \end{bwslide} \f \begin{bwslide} \ctitle {Lower Layer Requirements} \begin{nrtc} \item ISO/IEC - No specific Transport Class requirement \item CCITT - Transport Class 0 over X.25 \end{nrtc} \end{bwslide} \f \begin{bwslide} \ctitle {Part IV: Reference Points} \end{bwslide} \f \begin{bwslide} \ctitle {Standards \& Status} \begin{nrtc} \item ISO/IEC 9594 --- {\em The Directory} \item CCITT X.500 --- {\em The Directory} \item CCITT F.500 --- {\em International Public Directory Services} \end{nrtc} \end{bwslide} \f \begin{bwslide} \ctitle {Directory\\ References} \begin{nrtc} \item {The Directory--Overview of concepts, models and service} (ISO/IEC 9594-1, CCITT Recommendation X.500) \item {The Directory--Models} (ISO/IEC 9594-2, CCITT Recommendation X.501) \item {The Directory--Abstract service definition} (ISO/IEC 9594-3, CCITT Recommendation X.511) \item {The Directory--Procedures for distributed operations} (ISO/IEC 9594-4, CCITT Recommendation X.518) \item {The Directory--Protocol specifications} (ISO/IEC 9594-5, CCITT Recommendation X.519) \item {The Directory--Selected attribute types} (ISO/IEC 9594-6, CCITT Recommendation X.520) \item {The Directory--Selected object classes} (ISO/IEC 9594-7, CCITT Recommendation X.521) \item {The Directory--Authentication framework} (ISO/IEC 9594-8, CCITT Recommendation X.509) \end{nrtc} \end{bwslide} \f \begin{bwslide} \ctitle {Remote Operations\\ References} \begin{nrtc} \item {Remote Operations--Part 1: Model, Notation and Service Definition} (ISO/IEC 9072-1, CCITT Recommendation X.219) \item {Remote Operations--Part 2: Protocol Specification} (ISO/IEC 9072-2, CCITT Recommendation X.229) \end{nrtc} \end{bwslide} \f \begin{bwslide} \ctitle {Association Control\\ References} \begin{nrtc} \item {Association Control--Service Definition} (ISO/IEC 8649-2, CCITT Recommendation X.217) \item {Association Control--Protocol Definition} (ISO/IEC 8650-2, CCITT Recommendation X.217) \end{nrtc} \end{bwslide} \f \begin{bwslide} \ctitle {Implementation Profiles\\ References \& Status} \begin{nrtc} \item NIST: December 1987 {\em (December 1988 to be approved this week)} \item SPAG: Status unknown, work being combined with EWOS \item EWOS: No stable profile at this time. \end{nrtc} \end{bwslide} \f \begin{bwslide} \ctitle {Demonstrations} \begin{nrtc} \item Enterprise Networking Event '88 {\em (ENE)} \item CeBIT '89 {\em (Hanover Fair)} \begin{nrtc} \item EurOSInet / OSITOP \item MultiNET \end{nrtc} \end{nrtc} \end{bwslide} \f \begin{bwslide} \ctitle {Part V: Conclusions} \end{bwslide} \f \begin{bwslide} \ctitle {Summary} \begin{nrtc} \item General introduction to Directory --- Names to Addresses \item Detailed examination of Directory \item Overview of OSI upper layers \item Current activities and references \end{nrtc} \end{bwslide} \f \begin{bwslide} \ctitle {Directory} \begin{nrtc} \item Simplifies distribution of large networks \item Allows OSI networks to be self configuring \item Hides complex underpinings from users \end{nrtc} \end{bwslide} \end{document}