mirror of
https://git.openldap.org/openldap/openldap.git
synced 2024-12-15 03:01:09 +08:00
2804 lines
112 KiB
Plaintext
2804 lines
112 KiB
Plaintext
|
||
|
||
|
||
|
||
|
||
|
||
Network Working Group M. Wahl
|
||
Request for Comments: 2251 Critical Angle Inc.
|
||
Category: Standards Track T. Howes
|
||
Netscape Communications Corp.
|
||
S. Kille
|
||
Isode Limited
|
||
December 1997
|
||
|
||
|
||
Lightweight Directory Access Protocol (v3)
|
||
|
||
1. Status of this Memo
|
||
|
||
This document specifies an Internet standards track protocol for the
|
||
Internet community, and requests discussion and suggestions for
|
||
improvements. Please refer to the current edition of the "Internet
|
||
Official Protocol Standards" (STD 1) for the standardization state
|
||
and status of this protocol. Distribution of this memo is unlimited.
|
||
|
||
Copyright Notice
|
||
|
||
Copyright (C) The Internet Society (1997). All Rights Reserved.
|
||
|
||
IESG Note
|
||
|
||
This document describes a directory access protocol that provides
|
||
both read and update access. Update access requires secure
|
||
authentication, but this document does not mandate implementation of
|
||
any satisfactory authentication mechanisms.
|
||
|
||
In accordance with RFC 2026, section 4.4.1, this specification is
|
||
being approved by IESG as a Proposed Standard despite this
|
||
limitation, for the following reasons:
|
||
|
||
a. to encourage implementation and interoperability testing of
|
||
these protocols (with or without update access) before they
|
||
are deployed, and
|
||
|
||
b. to encourage deployment and use of these protocols in read-only
|
||
applications. (e.g. applications where LDAPv3 is used as
|
||
a query language for directories which are updated by some
|
||
secure mechanism other than LDAP), and
|
||
|
||
c. to avoid delaying the advancement and deployment of other Internet
|
||
standards-track protocols which require the ability to query, but
|
||
not update, LDAPv3 directory servers.
|
||
|
||
|
||
|
||
|
||
|
||
Wahl, et. al. Standards Track [Page 1]
|
||
|
||
RFC 2251 LDAPv3 December 1997
|
||
|
||
|
||
Readers are hereby warned that until mandatory authentication
|
||
mechanisms are standardized, clients and servers written according to
|
||
this specification which make use of update functionality are
|
||
UNLIKELY TO INTEROPERATE, or MAY INTEROPERATE ONLY IF AUTHENTICATION
|
||
IS REDUCED TO AN UNACCEPTABLY WEAK LEVEL.
|
||
|
||
Implementors are hereby discouraged from deploying LDAPv3 clients or
|
||
servers which implement the update functionality, until a Proposed
|
||
Standard for mandatory authentication in LDAPv3 has been approved and
|
||
published as an RFC.
|
||
|
||
Table of Contents
|
||
|
||
1. Status of this Memo .................................... 1
|
||
Copyright Notice ....................................... 1
|
||
IESG Note .............................................. 1
|
||
2. Abstract ............................................... 3
|
||
3. Models ................................................. 4
|
||
3.1. Protocol Model ........................................ 4
|
||
3.2. Data Model ............................................ 5
|
||
3.2.1. Attributes of Entries ............................... 5
|
||
3.2.2. Subschema Entries and Subentries .................... 7
|
||
3.3. Relationship to X.500 ................................. 8
|
||
3.4. Server-specific Data Requirements ..................... 8
|
||
4. Elements of Protocol ................................... 9
|
||
4.1. Common Elements ....................................... 9
|
||
4.1.1. Message Envelope .................................... 9
|
||
4.1.1.1. Message ID ........................................ 11
|
||
4.1.2. String Types ........................................ 11
|
||
4.1.3. Distinguished Name and Relative Distinguished Name .. 11
|
||
4.1.4. Attribute Type ...................................... 12
|
||
4.1.5. Attribute Description ............................... 13
|
||
4.1.5.1. Binary Option ..................................... 14
|
||
4.1.6. Attribute Value ..................................... 14
|
||
4.1.7. Attribute Value Assertion ........................... 15
|
||
4.1.8. Attribute ........................................... 15
|
||
4.1.9. Matching Rule Identifier ............................ 15
|
||
4.1.10. Result Message ..................................... 16
|
||
4.1.11. Referral ........................................... 18
|
||
4.1.12. Controls ........................................... 19
|
||
4.2. Bind Operation ........................................ 20
|
||
4.2.1. Sequencing of the Bind Request ...................... 21
|
||
4.2.2. Authentication and Other Security Services .......... 22
|
||
4.2.3. Bind Response ....................................... 23
|
||
4.3. Unbind Operation ...................................... 24
|
||
4.4. Unsolicited Notification .............................. 24
|
||
4.4.1. Notice of Disconnection ............................. 24
|
||
4.5. Search Operation ...................................... 25
|
||
|
||
|
||
|
||
Wahl, et. al. Standards Track [Page 2]
|
||
|
||
RFC 2251 LDAPv3 December 1997
|
||
|
||
|
||
4.5.1. Search Request ...................................... 25
|
||
4.5.2. Search Result ....................................... 29
|
||
4.5.3. Continuation References in the Search Result ........ 31
|
||
4.5.3.1. Example ........................................... 31
|
||
4.6. Modify Operation ...................................... 32
|
||
4.7. Add Operation ......................................... 34
|
||
4.8. Delete Operation ...................................... 35
|
||
4.9. Modify DN Operation ................................... 36
|
||
4.10. Compare Operation .................................... 37
|
||
4.11. Abandon Operation .................................... 38
|
||
4.12. Extended Operation ................................... 38
|
||
5. Protocol Element Encodings and Transfer ................ 39
|
||
5.1. Mapping Onto BER-based Transport Services ............. 39
|
||
5.2. Transfer Protocols .................................... 40
|
||
5.2.1. Transmission Control Protocol (TCP) ................. 40
|
||
6. Implementation Guidelines .............................. 40
|
||
6.1. Server Implementations ................................ 40
|
||
6.2. Client Implementations ................................ 40
|
||
7. Security Considerations ................................ 41
|
||
8. Acknowledgements ....................................... 41
|
||
9. Bibliography ........................................... 41
|
||
10. Authors' Addresses ..................................... 42
|
||
Appendix A - Complete ASN.1 Definition ..................... 44
|
||
Full Copyright Statement ................................... 50
|
||
|
||
2. Abstract
|
||
|
||
The protocol described in this document is designed to provide access
|
||
to directories supporting the X.500 models, while not incurring the
|
||
resource requirements of the X.500 Directory Access Protocol (DAP).
|
||
This protocol is specifically targeted at management applications and
|
||
browser applications that provide read/write interactive access to
|
||
directories. When used with a directory supporting the X.500
|
||
protocols, it is intended to be a complement to the X.500 DAP.
|
||
|
||
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
|
||
"SHOULD", "SHOULD NOT", "RECOMMENDED", and "MAY" in this document
|
||
are to be interpreted as described in RFC 2119 [10].
|
||
|
||
Key aspects of this version of LDAP are:
|
||
|
||
- All protocol elements of LDAPv2 (RFC 1777) are supported. The
|
||
protocol is carried directly over TCP or other transport, bypassing
|
||
much of the session/presentation overhead of X.500 DAP.
|
||
|
||
- Most protocol data elements can be encoded as ordinary strings
|
||
(e.g., Distinguished Names).
|
||
|
||
|
||
|
||
|
||
Wahl, et. al. Standards Track [Page 3]
|
||
|
||
RFC 2251 LDAPv3 December 1997
|
||
|
||
|
||
- Referrals to other servers may be returned.
|
||
|
||
- SASL mechanisms may be used with LDAP to provide association
|
||
security services.
|
||
|
||
- Attribute values and Distinguished Names have been
|
||
internationalized through the use of the ISO 10646 character set.
|
||
|
||
- The protocol can be extended to support new operations, and
|
||
controls may be used to extend existing operations.
|
||
|
||
- Schema is published in the directory for use by clients.
|
||
|
||
3. Models
|
||
|
||
Interest in X.500 [1] directory technologies in the Internet has led
|
||
to efforts to reduce the high cost of entry associated with use of
|
||
these technologies. This document continues the efforts to define
|
||
directory protocol alternatives, updating the LDAP [2] protocol
|
||
specification.
|
||
|
||
3.1. Protocol Model
|
||
|
||
The general model adopted by this protocol is one of clients
|
||
performing protocol operations against servers. In this model, a
|
||
client transmits a protocol request describing the operation to be
|
||
performed to a server. The server is then responsible for performing
|
||
the necessary operation(s) in the directory. Upon completion of the
|
||
operation(s), the server returns a response containing any results or
|
||
errors to the requesting client.
|
||
|
||
In keeping with the goal of easing the costs associated with use of
|
||
the directory, it is an objective of this protocol to minimize the
|
||
complexity of clients so as to facilitate widespread deployment of
|
||
applications capable of using the directory.
|
||
|
||
Note that although servers are required to return responses whenever
|
||
such responses are defined in the protocol, there is no requirement
|
||
for synchronous behavior on the part of either clients or servers.
|
||
Requests and responses for multiple operations may be exchanged
|
||
between a client and server in any order, provided the client
|
||
eventually receives a response for every request that requires one.
|
||
|
||
In LDAP versions 1 and 2, no provision was made for protocol servers
|
||
returning referrals to clients. However, for improved performance
|
||
and distribution this version of the protocol permits servers to
|
||
return to clients referrals to other servers. This allows servers to
|
||
offload the work of contacting other servers to progress operations.
|
||
|
||
|
||
|
||
Wahl, et. al. Standards Track [Page 4]
|
||
|
||
RFC 2251 LDAPv3 December 1997
|
||
|
||
|
||
Note that the core protocol operations defined in this document can
|
||
be mapped to a strict subset of the X.500(1997) directory abstract
|
||
service, so it can be cleanly provided by the DAP. However there is
|
||
not a one-to-one mapping between LDAP protocol operations and DAP
|
||
operations: server implementations acting as a gateway to X.500
|
||
directories may need to make multiple DAP requests.
|
||
|
||
3.2. Data Model
|
||
|
||
This section provides a brief introduction to the X.500 data model,
|
||
as used by LDAP.
|
||
|
||
The LDAP protocol assumes there are one or more servers which jointly
|
||
provide access to a Directory Information Tree (DIT). The tree is
|
||
made up of entries. Entries have names: one or more attribute values
|
||
from the entry form its relative distinguished name (RDN), which MUST
|
||
be unique among all its siblings. The concatenation of the relative
|
||
distinguished names of the sequence of entries from a particular
|
||
entry to an immediate subordinate of the root of the tree forms that
|
||
entry's Distinguished Name (DN), which is unique in the tree. An
|
||
example of a Distinguished Name is
|
||
|
||
CN=Steve Kille, O=Isode Limited, C=GB
|
||
|
||
Some servers may hold cache or shadow copies of entries, which can be
|
||
used to answer search and comparison queries, but will return
|
||
referrals or contact other servers if modification operations are
|
||
requested.
|
||
|
||
Servers which perform caching or shadowing MUST ensure that they do
|
||
not violate any access control constraints placed on the data by the
|
||
originating server.
|
||
|
||
The largest collection of entries, starting at an entry that is
|
||
mastered by a particular server, and including all its subordinates
|
||
and their subordinates, down to the entries which are mastered by
|
||
different servers, is termed a naming context. The root of the DIT
|
||
is a DSA-specific Entry (DSE) and not part of any naming context:
|
||
each server has different attribute values in the root DSE. (DSA is
|
||
an X.500 term for the directory server).
|
||
|
||
3.2.1. Attributes of Entries
|
||
|
||
Entries consist of a set of attributes. An attribute is a type with
|
||
one or more associated values. The attribute type is identified by a
|
||
short descriptive name and an OID (object identifier). The attribute
|
||
|
||
|
||
|
||
|
||
|
||
Wahl, et. al. Standards Track [Page 5]
|
||
|
||
RFC 2251 LDAPv3 December 1997
|
||
|
||
|
||
type governs whether there can be more than one value of an attribute
|
||
of that type in an entry, the syntax to which the values must
|
||
conform, the kinds of matching which can be performed on values of
|
||
that attribute, and other functions.
|
||
|
||
An example of an attribute is "mail". There may be one or more values
|
||
of this attribute, they must be IA5 (ASCII) strings, and they are
|
||
case insensitive (e.g. "foo@bar.com" will match "FOO@BAR.COM").
|
||
|
||
Schema is the collection of attribute type definitions, object class
|
||
definitions and other information which a server uses to determine
|
||
how to match a filter or attribute value assertion (in a compare
|
||
operation) against the attributes of an entry, and whether to permit
|
||
add and modify operations. The definition of schema for use with
|
||
LDAP is given in [5] and [6]. Additional schema elements may be
|
||
defined in other documents.
|
||
|
||
Each entry MUST have an objectClass attribute. The objectClass
|
||
attribute specifies the object classes of an entry, which along with
|
||
the system and user schema determine the permitted attributes of an
|
||
entry. Values of this attribute may be modified by clients, but the
|
||
objectClass attribute cannot be removed. Servers may restrict the
|
||
modifications of this attribute to prevent the basic structural class
|
||
of the entry from being changed (e.g. one cannot change a person into
|
||
a country). When creating an entry or adding an objectClass value to
|
||
an entry, all superclasses of the named classes are implicitly added
|
||
as well if not already present, and the client must supply values for
|
||
any mandatory attributes of new superclasses.
|
||
|
||
Some attributes, termed operational attributes, are used by servers
|
||
for administering the directory system itself. They are not returned
|
||
in search results unless explicitly requested by name. Attributes
|
||
which are not operational, such as "mail", will have their schema and
|
||
syntax constraints enforced by servers, but servers will generally
|
||
not make use of their values.
|
||
|
||
Servers MUST NOT permit clients to add attributes to an entry unless
|
||
those attributes are permitted by the object class definitions, the
|
||
schema controlling that entry (specified in the subschema - see
|
||
below), or are operational attributes known to that server and used
|
||
for administrative purposes. Note that there is a particular
|
||
objectClass 'extensibleObject' defined in [5] which permits all user
|
||
attributes to be present in an entry.
|
||
|
||
Entries MAY contain, among others, the following operational
|
||
attributes, defined in [5]. These attributes are maintained
|
||
automatically by the server and are not modifiable by clients:
|
||
|
||
|
||
|
||
|
||
Wahl, et. al. Standards Track [Page 6]
|
||
|
||
RFC 2251 LDAPv3 December 1997
|
||
|
||
|
||
- creatorsName: the Distinguished Name of the user who added this
|
||
entry to the directory.
|
||
|
||
- createTimestamp: the time this entry was added to the directory.
|
||
|
||
- modifiersName: the Distinguished Name of the user who last modified
|
||
this entry.
|
||
|
||
- modifyTimestamp: the time this entry was last modified.
|
||
|
||
- subschemaSubentry: the Distinguished Name of the subschema entry
|
||
(or subentry) which controls the schema for this entry.
|
||
|
||
3.2.2. Subschema Entries and Subentries
|
||
|
||
Subschema entries are used for administering information about the
|
||
directory schema, in particular the object classes and attribute
|
||
types supported by directory servers. A single subschema entry
|
||
contains all schema definitions used by entries in a particular part
|
||
of the directory tree.
|
||
|
||
Servers which follow X.500(93) models SHOULD implement subschema
|
||
using the X.500 subschema mechanisms, and so these subschemas are not
|
||
ordinary entries. LDAP clients SHOULD NOT assume that servers
|
||
implement any of the other aspects of X.500 subschema. A server
|
||
which masters entries and permits clients to modify these entries
|
||
MUST implement and provide access to these subschema entries, so that
|
||
its clients may discover the attributes and object classes which are
|
||
permitted to be present. It is strongly recommended that all other
|
||
servers implement this as well.
|
||
|
||
The following four attributes MUST be present in all subschema
|
||
entries:
|
||
|
||
- cn: this attribute MUST be used to form the RDN of the subschema
|
||
entry.
|
||
|
||
- objectClass: the attribute MUST have at least the values "top" and
|
||
"subschema".
|
||
|
||
- objectClasses: each value of this attribute specifies an object
|
||
class known to the server.
|
||
|
||
- attributeTypes: each value of this attribute specifies an attribute
|
||
type known to the server.
|
||
|
||
These are defined in [5]. Other attributes MAY be present in
|
||
subschema entries, to reflect additional supported capabilities.
|
||
|
||
|
||
|
||
Wahl, et. al. Standards Track [Page 7]
|
||
|
||
RFC 2251 LDAPv3 December 1997
|
||
|
||
|
||
These include matchingRules, matchingRuleUse, dITStructureRules,
|
||
dITContentRules, nameForms and ldapSyntaxes.
|
||
|
||
Servers SHOULD provide the attributes createTimestamp and
|
||
modifyTimestamp in subschema entries, in order to allow clients to
|
||
maintain their caches of schema information.
|
||
|
||
Clients MUST only retrieve attributes from a subschema entry by
|
||
requesting a base object search of the entry, where the search filter
|
||
is "(objectClass=subschema)". (This will allow LDAPv3 servers which
|
||
gateway to X.500(93) to detect that subentry information is being
|
||
requested.)
|
||
|
||
3.3. Relationship to X.500
|
||
|
||
This document defines LDAP in terms of X.500 as an X.500 access
|
||
mechanism. An LDAP server MUST act in accordance with the
|
||
X.500(1993) series of ITU recommendations when providing the service.
|
||
However, it is not required that an LDAP server make use of any X.500
|
||
protocols in providing this service, e.g. LDAP can be mapped onto any
|
||
other directory system so long as the X.500 data and service model as
|
||
used in LDAP is not violated in the LDAP interface.
|
||
|
||
3.4. Server-specific Data Requirements
|
||
|
||
An LDAP server MUST provide information about itself and other
|
||
information that is specific to each server. This is represented as
|
||
a group of attributes located in the root DSE (DSA-Specific Entry),
|
||
which is named with the zero-length LDAPDN. These attributes are
|
||
retrievable if a client performs a base object search of the root
|
||
with filter "(objectClass=*)", however they are subject to access
|
||
control restrictions. The root DSE MUST NOT be included if the
|
||
client performs a subtree search starting from the root.
|
||
|
||
Servers may allow clients to modify these attributes.
|
||
|
||
The following attributes of the root DSE are defined in section 5 of
|
||
[5]. Additional attributes may be defined in other documents.
|
||
|
||
- namingContexts: naming contexts held in the server. Naming contexts
|
||
are defined in section 17 of X.501 [6].
|
||
|
||
- subschemaSubentry: subschema entries (or subentries) known by this
|
||
server.
|
||
|
||
- altServer: alternative servers in case this one is later
|
||
unavailable.
|
||
|
||
|
||
|
||
|
||
Wahl, et. al. Standards Track [Page 8]
|
||
|
||
RFC 2251 LDAPv3 December 1997
|
||
|
||
|
||
- supportedExtension: list of supported extended operations.
|
||
|
||
- supportedControl: list of supported controls.
|
||
|
||
- supportedSASLMechanisms: list of supported SASL security features.
|
||
|
||
- supportedLDAPVersion: LDAP versions implemented by the server.
|
||
|
||
If the server does not master entries and does not know the locations
|
||
of schema information, the subschemaSubentry attribute is not present
|
||
in the root DSE. If the server masters directory entries under one
|
||
or more schema rules, there may be any number of values of the
|
||
subschemaSubentry attribute in the root DSE.
|
||
|
||
4. Elements of Protocol
|
||
|
||
The LDAP protocol is described using Abstract Syntax Notation 1
|
||
(ASN.1) [3], and is typically transferred using a subset of ASN.1
|
||
Basic Encoding Rules [11]. In order to support future extensions to
|
||
this protocol, clients and servers MUST ignore elements of SEQUENCE
|
||
encodings whose tags they do not recognize.
|
||
|
||
Note that unlike X.500, each change to the LDAP protocol other than
|
||
through the extension mechanisms will have a different version
|
||
number. A client will indicate the version it supports as part of
|
||
the bind request, described in section 4.2. If a client has not sent
|
||
a bind, the server MUST assume that version 3 is supported in the
|
||
client (since version 2 required that the client bind first).
|
||
|
||
Clients may determine the protocol version a server supports by
|
||
reading the supportedLDAPVersion attribute from the root DSE. Servers
|
||
which implement version 3 or later versions MUST provide this
|
||
attribute. Servers which only implement version 2 may not provide
|
||
this attribute.
|
||
|
||
4.1. Common Elements
|
||
|
||
This section describes the LDAPMessage envelope PDU (Protocol Data
|
||
Unit) format, as well as data type definitions which are used in the
|
||
protocol operations.
|
||
|
||
4.1.1. Message Envelope
|
||
|
||
For the purposes of protocol exchanges, all protocol operations are
|
||
encapsulated in a common envelope, the LDAPMessage, which is defined
|
||
as follows:
|
||
|
||
LDAPMessage ::= SEQUENCE {
|
||
|
||
|
||
|
||
Wahl, et. al. Standards Track [Page 9]
|
||
|
||
RFC 2251 LDAPv3 December 1997
|
||
|
||
|
||
messageID MessageID,
|
||
protocolOp CHOICE {
|
||
bindRequest BindRequest,
|
||
bindResponse BindResponse,
|
||
unbindRequest UnbindRequest,
|
||
searchRequest SearchRequest,
|
||
searchResEntry SearchResultEntry,
|
||
searchResDone SearchResultDone,
|
||
searchResRef SearchResultReference,
|
||
modifyRequest ModifyRequest,
|
||
modifyResponse ModifyResponse,
|
||
addRequest AddRequest,
|
||
addResponse AddResponse,
|
||
delRequest DelRequest,
|
||
delResponse DelResponse,
|
||
modDNRequest ModifyDNRequest,
|
||
modDNResponse ModifyDNResponse,
|
||
compareRequest CompareRequest,
|
||
compareResponse CompareResponse,
|
||
abandonRequest AbandonRequest,
|
||
extendedReq ExtendedRequest,
|
||
extendedResp ExtendedResponse },
|
||
controls [0] Controls OPTIONAL }
|
||
|
||
MessageID ::= INTEGER (0 .. maxInt)
|
||
|
||
maxInt INTEGER ::= 2147483647 -- (2^^31 - 1) --
|
||
|
||
The function of the LDAPMessage is to provide an envelope containing
|
||
common fields required in all protocol exchanges. At this time the
|
||
only common fields are the message ID and the controls.
|
||
|
||
If the server receives a PDU from the client in which the LDAPMessage
|
||
SEQUENCE tag cannot be recognized, the messageID cannot be parsed,
|
||
the tag of the protocolOp is not recognized as a request, or the
|
||
encoding structures or lengths of data fields are found to be
|
||
incorrect, then the server MUST return the notice of disconnection
|
||
described in section 4.4.1, with resultCode protocolError, and
|
||
immediately close the connection. In other cases that the server
|
||
cannot parse the request received by the client, the server MUST
|
||
return an appropriate response to the request, with the resultCode
|
||
set to protocolError.
|
||
|
||
If the client receives a PDU from the server which cannot be parsed,
|
||
the client may discard the PDU, or may abruptly close the connection.
|
||
|
||
The ASN.1 type Controls is defined in section 4.1.12.
|
||
|
||
|
||
|
||
|
||
Wahl, et. al. Standards Track [Page 10]
|
||
|
||
RFC 2251 LDAPv3 December 1997
|
||
|
||
|
||
4.1.1.1. Message ID
|
||
|
||
All LDAPMessage envelopes encapsulating responses contain the
|
||
messageID value of the corresponding request LDAPMessage.
|
||
|
||
The message ID of a request MUST have a value different from the
|
||
values of any other requests outstanding in the LDAP session of which
|
||
this message is a part.
|
||
|
||
A client MUST NOT send a second request with the same message ID as
|
||
an earlier request on the same connection if the client has not
|
||
received the final response from the earlier request. Otherwise the
|
||
behavior is undefined. Typical clients increment a counter for each
|
||
request.
|
||
|
||
A client MUST NOT reuse the message id of an abandonRequest or of the
|
||
abandoned operation until it has received a response from the server
|
||
for another request invoked subsequent to the abandonRequest, as the
|
||
abandonRequest itself does not have a response.
|
||
|
||
4.1.2. String Types
|
||
|
||
The LDAPString is a notational convenience to indicate that, although
|
||
strings of LDAPString type encode as OCTET STRING types, the ISO
|
||
10646 [13] character set (a superset of Unicode) is used, encoded
|
||
following the UTF-8 algorithm [14]. Note that in the UTF-8 algorithm
|
||
characters which are the same as ASCII (0x0000 through 0x007F) are
|
||
represented as that same ASCII character in a single byte. The other
|
||
byte values are used to form a variable-length encoding of an
|
||
arbitrary character.
|
||
|
||
LDAPString ::= OCTET STRING
|
||
|
||
The LDAPOID is a notational convenience to indicate that the
|
||
permitted value of this string is a (UTF-8 encoded) dotted-decimal
|
||
representation of an OBJECT IDENTIFIER.
|
||
|
||
LDAPOID ::= OCTET STRING
|
||
|
||
For example,
|
||
|
||
1.3.6.1.4.1.1466.1.2.3
|
||
|
||
4.1.3. Distinguished Name and Relative Distinguished Name
|
||
|
||
An LDAPDN and a RelativeLDAPDN are respectively defined to be the
|
||
representation of a Distinguished Name and a Relative Distinguished
|
||
Name after encoding according to the specification in [4], such that
|
||
|
||
|
||
|
||
Wahl, et. al. Standards Track [Page 11]
|
||
|
||
RFC 2251 LDAPv3 December 1997
|
||
|
||
|
||
<distinguished-name> ::= <name>
|
||
|
||
<relative-distinguished-name> ::= <name-component>
|
||
|
||
where <name> and <name-component> are as defined in [4].
|
||
|
||
LDAPDN ::= LDAPString
|
||
|
||
RelativeLDAPDN ::= LDAPString
|
||
|
||
Only Attribute Types can be present in a relative distinguished name
|
||
component; the options of Attribute Descriptions (next section) MUST
|
||
NOT be used in specifying distinguished names.
|
||
|
||
4.1.4. Attribute Type
|
||
|
||
An AttributeType takes on as its value the textual string associated
|
||
with that AttributeType in its specification.
|
||
|
||
AttributeType ::= LDAPString
|
||
|
||
Each attribute type has a unique OBJECT IDENTIFIER which has been
|
||
assigned to it. This identifier may be written as decimal digits
|
||
with components separated by periods, e.g. "2.5.4.10".
|
||
|
||
A specification may also assign one or more textual names for an
|
||
attribute type. These names MUST begin with a letter, and only
|
||
contain ASCII letters, digit characters and hyphens. They are case
|
||
insensitive. (These ASCII characters are identical to ISO 10646
|
||
characters whose UTF-8 encoding is a single byte between 0x00 and
|
||
0x7F.)
|
||
|
||
If the server has a textual name for an attribute type, it MUST use a
|
||
textual name for attributes returned in search results. The dotted-
|
||
decimal OBJECT IDENTIFIER is only used if there is no textual name
|
||
for an attribute type.
|
||
|
||
Attribute type textual names are non-unique, as two different
|
||
specifications (neither in standards track RFCs) may choose the same
|
||
name.
|
||
|
||
A server which masters or shadows entries SHOULD list all the
|
||
attribute types it supports in the subschema entries, using the
|
||
attributeTypes attribute. Servers which support an open-ended set of
|
||
attributes SHOULD include at least the attributeTypes value for the
|
||
'objectClass' attribute. Clients MAY retrieve the attributeTypes
|
||
value from subschema entries in order to obtain the OBJECT IDENTIFIER
|
||
and other information associated with attribute types.
|
||
|
||
|
||
|
||
Wahl, et. al. Standards Track [Page 12]
|
||
|
||
RFC 2251 LDAPv3 December 1997
|
||
|
||
|
||
Some attribute type names which are used in this version of LDAP are
|
||
described in [5]. Servers may implement additional attribute types.
|
||
|
||
4.1.5. Attribute Description
|
||
|
||
An AttributeDescription is a superset of the definition of the
|
||
AttributeType. It has the same ASN.1 definition, but allows
|
||
additional options to be specified. They are also case insensitive.
|
||
|
||
AttributeDescription ::= LDAPString
|
||
|
||
A value of AttributeDescription is based on the following BNF:
|
||
|
||
<AttributeDescription> ::= <AttributeType> [ ";" <options> ]
|
||
|
||
<options> ::= <option> | <option> ";" <options>
|
||
|
||
<option> ::= <opt-char> <opt-char>*
|
||
|
||
<opt-char> ::= ASCII-equivalent letters, numbers and hyphen
|
||
|
||
Examples of valid AttributeDescription:
|
||
|
||
cn
|
||
userCertificate;binary
|
||
|
||
One option, "binary", is defined in this document. Additional
|
||
options may be defined in IETF standards-track and experimental RFCs.
|
||
Options beginning with "x-" are reserved for private experiments.
|
||
Any option could be associated with any AttributeType, although not
|
||
all combinations may be supported by a server.
|
||
|
||
An AttributeDescription with one or more options is treated as a
|
||
subtype of the attribute type without any options. Options present
|
||
in an AttributeDescription are never mutually exclusive.
|
||
Implementations MUST generate the <options> list sorted in ascending
|
||
order, and servers MUST treat any two AttributeDescription with the
|
||
same AttributeType and options as equivalent. A server will treat an
|
||
AttributeDescription with any options it does not implement as an
|
||
unrecognized attribute type.
|
||
|
||
The data type "AttributeDescriptionList" describes a list of 0 or
|
||
more attribute types. (A list of zero elements has special
|
||
significance in the Search request.)
|
||
|
||
AttributeDescriptionList ::= SEQUENCE OF
|
||
AttributeDescription
|
||
|
||
|
||
|
||
|
||
Wahl, et. al. Standards Track [Page 13]
|
||
|
||
RFC 2251 LDAPv3 December 1997
|
||
|
||
|
||
4.1.5.1. Binary Option
|
||
|
||
If the "binary" option is present in an AttributeDescription, it
|
||
overrides any string-based encoding representation defined for that
|
||
attribute in [5]. Instead the attribute is to be transferred as a
|
||
binary value encoded using the Basic Encoding Rules [11]. The syntax
|
||
of the binary value is an ASN.1 data type definition which is
|
||
referenced by the "SYNTAX" part of the attribute type definition.
|
||
|
||
The presence or absence of the "binary" option only affects the
|
||
transfer of attribute values in protocol; servers store any
|
||
particular attribute in a single format. If a client requests that a
|
||
server return an attribute in the binary format, but the server
|
||
cannot generate that format, the server MUST treat this attribute
|
||
type as an unrecognized attribute type. Similarly, clients MUST NOT
|
||
expect servers to return an attribute in binary format if the client
|
||
requested that attribute by name without the binary option.
|
||
|
||
This option is intended to be used with attributes whose syntax is a
|
||
complex ASN.1 data type, and the structure of values of that type is
|
||
needed by clients. Examples of this kind of syntax are "Certificate"
|
||
and "CertificateList".
|
||
|
||
4.1.6. Attribute Value
|
||
|
||
A field of type AttributeValue takes on as its value either a string
|
||
encoding of a AttributeValue data type, or an OCTET STRING containing
|
||
an encoded binary value, depending on whether the "binary" option is
|
||
present in the companion AttributeDescription to this AttributeValue.
|
||
|
||
The definition of string encodings for different syntaxes and types
|
||
may be found in other documents, and in particular [5].
|
||
|
||
AttributeValue ::= OCTET STRING
|
||
|
||
Note that there is no defined limit on the size of this encoding;
|
||
thus protocol values may include multi-megabyte attributes (e.g.
|
||
photographs).
|
||
|
||
Attributes may be defined which have arbitrary and non-printable
|
||
syntax. Implementations MUST NEITHER simply display nor attempt to
|
||
decode as ASN.1 a value if its syntax is not known. The
|
||
implementation may attempt to discover the subschema of the source
|
||
entry, and retrieve the values of attributeTypes from it.
|
||
|
||
Clients MUST NOT send attribute values in a request which are not
|
||
valid according to the syntax defined for the attributes.
|
||
|
||
|
||
|
||
|
||
Wahl, et. al. Standards Track [Page 14]
|
||
|
||
RFC 2251 LDAPv3 December 1997
|
||
|
||
|
||
4.1.7. Attribute Value Assertion
|
||
|
||
The AttributeValueAssertion type definition is similar to the one in
|
||
the X.500 directory standards. It contains an attribute description
|
||
and a matching rule assertion value suitable for that type.
|
||
|
||
AttributeValueAssertion ::= SEQUENCE {
|
||
attributeDesc AttributeDescription,
|
||
assertionValue AssertionValue }
|
||
|
||
AssertionValue ::= OCTET STRING
|
||
|
||
If the "binary" option is present in attributeDesc, this signals to
|
||
the server that the assertionValue is a binary encoding of the
|
||
assertion value.
|
||
|
||
For all the string-valued user attributes described in [5], the
|
||
assertion value syntax is the same as the value syntax. Clients may
|
||
use attribute values as assertion values in compare requests and
|
||
search filters.
|
||
|
||
Note however that the assertion syntax may be different from the
|
||
value syntax for other attributes or for non-equality matching rules.
|
||
These may have an assertion syntax which contains only part of the
|
||
value. See section 20.2.1.8 of X.501 [6] for examples.
|
||
|
||
4.1.8. Attribute
|
||
|
||
An attribute consists of a type and one or more values of that type.
|
||
(Though attributes MUST have at least one value when stored, due to
|
||
access control restrictions the set may be empty when transferred in
|
||
protocol. This is described in section 4.5.2, concerning the
|
||
PartialAttributeList type.)
|
||
|
||
Attribute ::= SEQUENCE {
|
||
type AttributeDescription,
|
||
vals SET OF AttributeValue }
|
||
|
||
Each attribute value is distinct in the set (no duplicates). The
|
||
order of attribute values within the vals set is undefined and
|
||
implementation-dependent, and MUST NOT be relied upon.
|
||
|
||
4.1.9. Matching Rule Identifier
|
||
|
||
A matching rule is a means of expressing how a server should compare
|
||
an AssertionValue received in a search filter with an abstract data
|
||
value. The matching rule defines the syntax of the assertion value
|
||
and the process to be performed in the server.
|
||
|
||
|
||
|
||
Wahl, et. al. Standards Track [Page 15]
|
||
|
||
RFC 2251 LDAPv3 December 1997
|
||
|
||
|
||
An X.501(1993) Matching Rule is identified in the LDAP protocol by
|
||
the printable representation of its OBJECT IDENTIFIER, either as one
|
||
of the strings given in [5], or as decimal digits with components
|
||
separated by periods, e.g. "caseIgnoreIA5Match" or
|
||
"1.3.6.1.4.1.453.33.33".
|
||
|
||
MatchingRuleId ::= LDAPString
|
||
|
||
Servers which support matching rules for use in the extensibleMatch
|
||
search filter MUST list the matching rules they implement in
|
||
subschema entries, using the matchingRules attributes. The server
|
||
SHOULD also list there, using the matchingRuleUse attribute, the
|
||
attribute types with which each matching rule can be used. More
|
||
information is given in section 4.4 of [5].
|
||
|
||
4.1.10. Result Message
|
||
|
||
The LDAPResult is the construct used in this protocol to return
|
||
success or failure indications from servers to clients. In response
|
||
to various requests servers will return responses containing fields
|
||
of type LDAPResult to indicate the final status of a protocol
|
||
operation request.
|
||
|
||
LDAPResult ::= SEQUENCE {
|
||
resultCode ENUMERATED {
|
||
success (0),
|
||
operationsError (1),
|
||
protocolError (2),
|
||
timeLimitExceeded (3),
|
||
sizeLimitExceeded (4),
|
||
compareFalse (5),
|
||
compareTrue (6),
|
||
|
||
authMethodNotSupported (7),
|
||
strongAuthRequired (8),
|
||
-- 9 reserved --
|
||
referral (10), -- new
|
||
adminLimitExceeded (11), -- new
|
||
unavailableCriticalExtension (12), -- new
|
||
confidentialityRequired (13), -- new
|
||
saslBindInProgress (14), -- new
|
||
noSuchAttribute (16),
|
||
undefinedAttributeType (17),
|
||
inappropriateMatching (18),
|
||
constraintViolation (19),
|
||
attributeOrValueExists (20),
|
||
invalidAttributeSyntax (21),
|
||
-- 22-31 unused --
|
||
|
||
|
||
|
||
Wahl, et. al. Standards Track [Page 16]
|
||
|
||
RFC 2251 LDAPv3 December 1997
|
||
|
||
|
||
noSuchObject (32),
|
||
aliasProblem (33),
|
||
invalidDNSyntax (34),
|
||
-- 35 reserved for undefined isLeaf --
|
||
aliasDereferencingProblem (36),
|
||
-- 37-47 unused --
|
||
inappropriateAuthentication (48),
|
||
invalidCredentials (49),
|
||
insufficientAccessRights (50),
|
||
busy (51),
|
||
unavailable (52),
|
||
unwillingToPerform (53),
|
||
loopDetect (54),
|
||
-- 55-63 unused --
|
||
namingViolation (64),
|
||
objectClassViolation (65),
|
||
notAllowedOnNonLeaf (66),
|
||
notAllowedOnRDN (67),
|
||
entryAlreadyExists (68),
|
||
objectClassModsProhibited (69),
|
||
-- 70 reserved for CLDAP --
|
||
affectsMultipleDSAs (71), -- new
|
||
-- 72-79 unused --
|
||
other (80) },
|
||
-- 81-90 reserved for APIs --
|
||
matchedDN LDAPDN,
|
||
errorMessage LDAPString,
|
||
referral [3] Referral OPTIONAL }
|
||
|
||
All the result codes with the exception of success, compareFalse and
|
||
compareTrue are to be treated as meaning the operation could not be
|
||
completed in its entirety.
|
||
|
||
Most of the result codes are based on problem indications from X.511
|
||
error data types. Result codes from 16 to 21 indicate an
|
||
AttributeProblem, codes 32, 33, 34 and 36 indicate a NameProblem,
|
||
codes 48, 49 and 50 indicate a SecurityProblem, codes 51 to 54
|
||
indicate a ServiceProblem, and codes 64 to 69 and 71 indicates an
|
||
UpdateProblem.
|
||
|
||
If a client receives a result code which is not listed above, it is
|
||
to be treated as an unknown error condition.
|
||
|
||
The errorMessage field of this construct may, at the server's option,
|
||
be used to return a string containing a textual, human-readable
|
||
(terminal control and page formatting characters should be avoided)
|
||
error diagnostic. As this error diagnostic is not standardized,
|
||
|
||
|
||
|
||
|
||
Wahl, et. al. Standards Track [Page 17]
|
||
|
||
RFC 2251 LDAPv3 December 1997
|
||
|
||
|
||
implementations MUST NOT rely on the values returned. If the server
|
||
chooses not to return a textual diagnostic, the errorMessage field of
|
||
the LDAPResult type MUST contain a zero length string.
|
||
|
||
For result codes of noSuchObject, aliasProblem, invalidDNSyntax and
|
||
aliasDereferencingProblem, the matchedDN field is set to the name of
|
||
the lowest entry (object or alias) in the directory that was matched.
|
||
If no aliases were dereferenced while attempting to locate the entry,
|
||
this will be a truncated form of the name provided, or if aliases
|
||
were dereferenced, of the resulting name, as defined in section 12.5
|
||
of X.511 [8]. The matchedDN field is to be set to a zero length
|
||
string with all other result codes.
|
||
|
||
4.1.11. Referral
|
||
|
||
The referral error indicates that the contacted server does not hold
|
||
the target entry of the request. The referral field is present in an
|
||
LDAPResult if the LDAPResult.resultCode field value is referral, and
|
||
absent with all other result codes. It contains a reference to
|
||
another server (or set of servers) which may be accessed via LDAP or
|
||
other protocols. Referrals can be returned in response to any
|
||
operation request (except unbind and abandon which do not have
|
||
responses). At least one URL MUST be present in the Referral.
|
||
|
||
The referral is not returned for a singleLevel or wholeSubtree search
|
||
in which the search scope spans multiple naming contexts, and several
|
||
different servers would need to be contacted to complete the
|
||
operation. Instead, continuation references, described in section
|
||
4.5.3, are returned.
|
||
|
||
Referral ::= SEQUENCE OF LDAPURL -- one or more
|
||
|
||
LDAPURL ::= LDAPString -- limited to characters permitted in URLs
|
||
|
||
If the client wishes to progress the operation, it MUST follow the
|
||
referral by contacting any one of servers. All the URLs MUST be
|
||
equally capable of being used to progress the operation. (The
|
||
mechanisms for how this is achieved by multiple servers are outside
|
||
the scope of this document.)
|
||
|
||
URLs for servers implementing the LDAP protocol are written according
|
||
to [9]. If an alias was dereferenced, the <dn> part of the URL MUST
|
||
be present, with the new target object name. If the <dn> part is
|
||
present, the client MUST use this name in its next request to
|
||
progress the operation, and if it is not present the client will use
|
||
the same name as in the original request. Some servers (e.g.
|
||
participating in distributed indexing) may provide a different filter
|
||
in a referral for a search operation. If the filter part of the URL
|
||
|
||
|
||
|
||
Wahl, et. al. Standards Track [Page 18]
|
||
|
||
RFC 2251 LDAPv3 December 1997
|
||
|
||
|
||
is present in an LDAPURL, the client MUST use this filter in its next
|
||
request to progress this search, and if it is not present the client
|
||
MUST use the same filter as it used for that search. Other aspects
|
||
of the new request may be the same or different as the request which
|
||
generated the referral.
|
||
|
||
Note that UTF-8 characters appearing in a DN or search filter may not
|
||
be legal for URLs (e.g. spaces) and MUST be escaped using the %
|
||
method in RFC 1738 [7].
|
||
|
||
Other kinds of URLs may be returned, so long as the operation could
|
||
be performed using that protocol.
|
||
|
||
4.1.12. Controls
|
||
|
||
A control is a way to specify extension information. Controls which
|
||
are sent as part of a request apply only to that request and are not
|
||
saved.
|
||
|
||
Controls ::= SEQUENCE OF Control
|
||
|
||
Control ::= SEQUENCE {
|
||
controlType LDAPOID,
|
||
criticality BOOLEAN DEFAULT FALSE,
|
||
controlValue OCTET STRING OPTIONAL }
|
||
|
||
The controlType field MUST be a UTF-8 encoded dotted-decimal
|
||
representation of an OBJECT IDENTIFIER which uniquely identifies the
|
||
control. This prevents conflicts between control names.
|
||
|
||
The criticality field is either TRUE or FALSE.
|
||
|
||
If the server recognizes the control type and it is appropriate for
|
||
the operation, the server will make use of the control when
|
||
performing the operation.
|
||
|
||
If the server does not recognize the control type and the criticality
|
||
field is TRUE, the server MUST NOT perform the operation, and MUST
|
||
instead return the resultCode unsupportedCriticalExtension.
|
||
|
||
If the control is not appropriate for the operation and criticality
|
||
field is TRUE, the server MUST NOT perform the operation, and MUST
|
||
instead return the resultCode unsupportedCriticalExtension.
|
||
|
||
If the control is unrecognized or inappropriate but the criticality
|
||
field is FALSE, the server MUST ignore the control.
|
||
|
||
|
||
|
||
|
||
|
||
Wahl, et. al. Standards Track [Page 19]
|
||
|
||
RFC 2251 LDAPv3 December 1997
|
||
|
||
|
||
The controlValue contains any information associated with the
|
||
control, and its format is defined for the control. The server MUST
|
||
be prepared to handle arbitrary contents of the controlValue octet
|
||
string, including zero bytes. It is absent only if there is no value
|
||
information which is associated with a control of its type.
|
||
|
||
This document does not define any controls. Controls may be defined
|
||
in other documents. The definition of a control consists of:
|
||
|
||
- the OBJECT IDENTIFIER assigned to the control,
|
||
|
||
- whether the control is always noncritical, always critical, or
|
||
critical at the client's option,
|
||
|
||
- the format of the controlValue contents of the control.
|
||
|
||
Servers list the controls which they recognize in the
|
||
supportedControl attribute in the root DSE.
|
||
|
||
4.2. Bind Operation
|
||
|
||
The function of the Bind Operation is to allow authentication
|
||
information to be exchanged between the client and server.
|
||
|
||
The Bind Request is defined as follows:
|
||
|
||
BindRequest ::= [APPLICATION 0] SEQUENCE {
|
||
version INTEGER (1 .. 127),
|
||
name LDAPDN,
|
||
authentication AuthenticationChoice }
|
||
|
||
AuthenticationChoice ::= CHOICE {
|
||
simple [0] OCTET STRING,
|
||
-- 1 and 2 reserved
|
||
sasl [3] SaslCredentials }
|
||
|
||
SaslCredentials ::= SEQUENCE {
|
||
mechanism LDAPString,
|
||
credentials OCTET STRING OPTIONAL }
|
||
|
||
Parameters of the Bind Request are:
|
||
|
||
- version: A version number indicating the version of the protocol to
|
||
be used in this protocol session. This document describes version
|
||
3 of the LDAP protocol. Note that there is no version negotiation,
|
||
and the client just sets this parameter to the version it desires.
|
||
If the client requests protocol version 2, a server that supports
|
||
the version 2 protocol as described in [2] will not return any v3-
|
||
|
||
|
||
|
||
Wahl, et. al. Standards Track [Page 20]
|
||
|
||
RFC 2251 LDAPv3 December 1997
|
||
|
||
|
||
specific protocol fields. (Note that not all LDAP servers will
|
||
support protocol version 2, since they may be unable to generate
|
||
the attribute syntaxes associated with version 2.)
|
||
|
||
- name: The name of the directory object that the client wishes to
|
||
bind as. This field may take on a null value (a zero length
|
||
string) for the purposes of anonymous binds, when authentication
|
||
has been performed at a lower layer, or when using SASL credentials
|
||
with a mechanism that includes the LDAPDN in the credentials.
|
||
|
||
- authentication: information used to authenticate the name, if any,
|
||
provided in the Bind Request.
|
||
|
||
Upon receipt of a Bind Request, a protocol server will authenticate
|
||
the requesting client, if necessary. The server will then return a
|
||
Bind Response to the client indicating the status of the
|
||
authentication.
|
||
|
||
Authorization is the use of this authentication information when
|
||
performing operations. Authorization MAY be affected by factors
|
||
outside of the LDAP Bind request, such as lower layer security
|
||
services.
|
||
|
||
4.2.1. Sequencing of the Bind Request
|
||
|
||
For some SASL authentication mechanisms, it may be necessary for the
|
||
client to invoke the BindRequest multiple times. If at any stage the
|
||
client wishes to abort the bind process it MAY unbind and then drop
|
||
the underlying connection. Clients MUST NOT invoke operations
|
||
between two Bind requests made as part of a multi-stage bind.
|
||
|
||
A client may abort a SASL bind negotiation by sending a BindRequest
|
||
with a different value in the mechanism field of SaslCredentials, or
|
||
an AuthenticationChoice other than sasl.
|
||
|
||
If the client sends a BindRequest with the sasl mechanism field as an
|
||
empty string, the server MUST return a BindResponse with
|
||
authMethodNotSupported as the resultCode. This will allow clients to
|
||
abort a negotiation if it wishes to try again with the same SASL
|
||
mechanism.
|
||
|
||
Unlike LDAP v2, the client need not send a Bind Request in the first
|
||
PDU of the connection. The client may request any operations and the
|
||
server MUST treat these as unauthenticated. If the server requires
|
||
that the client bind before browsing or modifying the directory, the
|
||
server MAY reject a request other than binding, unbinding or an
|
||
extended request with the "operationsError" result.
|
||
|
||
|
||
|
||
|
||
Wahl, et. al. Standards Track [Page 21]
|
||
|
||
RFC 2251 LDAPv3 December 1997
|
||
|
||
|
||
If the client did not bind before sending a request and receives an
|
||
operationsError, it may then send a Bind Request. If this also fails
|
||
or the client chooses not to bind on the existing connection, it will
|
||
close the connection, reopen it and begin again by first sending a
|
||
PDU with a Bind Request. This will aid in interoperating with
|
||
servers implementing other versions of LDAP.
|
||
|
||
Clients MAY send multiple bind requests on a connection to change
|
||
their credentials. A subsequent bind process has the effect of
|
||
abandoning all operations outstanding on the connection. (This
|
||
simplifies server implementation.) Authentication from earlier binds
|
||
are subsequently ignored, and so if the bind fails, the connection
|
||
will be treated as anonymous. If a SASL transfer encryption or
|
||
integrity mechanism has been negotiated, and that mechanism does not
|
||
support the changing of credentials from one identity to another,
|
||
then the client MUST instead establish a new connection.
|
||
|
||
4.2.2. Authentication and Other Security Services
|
||
|
||
The simple authentication option provides minimal authentication
|
||
facilities, with the contents of the authentication field consisting
|
||
only of a cleartext password. Note that the use of cleartext
|
||
passwords is not recommended over open networks when there is no
|
||
authentication or encryption being performed by a lower layer; see
|
||
the "Security Considerations" section.
|
||
|
||
If no authentication is to be performed, then the simple
|
||
authentication option MUST be chosen, and the password be of zero
|
||
length. (This is often done by LDAPv2 clients.) Typically the DN is
|
||
also of zero length.
|
||
|
||
The sasl choice allows for any mechanism defined for use with SASL
|
||
[12]. The mechanism field contains the name of the mechanism. The
|
||
credentials field contains the arbitrary data used for
|
||
authentication, inside an OCTET STRING wrapper. Note that unlike
|
||
some Internet application protocols where SASL is used, LDAP is not
|
||
text-based, thus no base64 transformations are performed on the
|
||
credentials.
|
||
|
||
If any SASL-based integrity or confidentiality services are enabled,
|
||
they take effect following the transmission by the server and
|
||
reception by the client of the final BindResponse with resultCode
|
||
success.
|
||
|
||
The client can request that the server use authentication information
|
||
from a lower layer protocol by using the SASL EXTERNAL mechanism.
|
||
|
||
|
||
|
||
|
||
|
||
Wahl, et. al. Standards Track [Page 22]
|
||
|
||
RFC 2251 LDAPv3 December 1997
|
||
|
||
|
||
4.2.3. Bind Response
|
||
|
||
The Bind Response is defined as follows.
|
||
|
||
BindResponse ::= [APPLICATION 1] SEQUENCE {
|
||
COMPONENTS OF LDAPResult,
|
||
serverSaslCreds [7] OCTET STRING OPTIONAL }
|
||
|
||
BindResponse consists simply of an indication from the server of he
|
||
status of the client's request for authentication.
|
||
|
||
f the bind was successful, the resultCode will be success, therwise
|
||
it will be one of:
|
||
|
||
- operationsError: server encountered an internal error,
|
||
|
||
- protocolError: unrecognized version number or incorrect PDU
|
||
structure,
|
||
|
||
- authMethodNotSupported: unrecognized SASL mechanism name,
|
||
|
||
- strongAuthRequired: the server requires authentication be
|
||
performed with a SASL mechanism,
|
||
|
||
- referral: this server cannot accept this bind and the client
|
||
should try another,
|
||
|
||
- saslBindInProgress: the server requires the client to send a
|
||
new bind request, with the same sasl mechanism, to continue the
|
||
authentication process,
|
||
|
||
- inappropriateAuthentication: the server requires the client
|
||
which had attempted to bind anonymously or without supplying
|
||
credentials to provide some form of credentials,
|
||
|
||
- invalidCredentials: the wrong password was supplied or the SASL
|
||
credentials could not be processed,
|
||
|
||
- unavailable: the server is shutting down.
|
||
|
||
If the server does not support the client's requested protocol
|
||
version, it MUST set the resultCode to protocolError.
|
||
|
||
If the client receives a BindResponse response where the resultCode
|
||
was protocolError, it MUST close the connection as the server will be
|
||
unwilling to accept further operations. (This is for compatibility
|
||
with earlier versions of LDAP, in which the bind was always the first
|
||
operation, and there was no negotiation.)
|
||
|
||
|
||
|
||
Wahl, et. al. Standards Track [Page 23]
|
||
|
||
RFC 2251 LDAPv3 December 1997
|
||
|
||
|
||
The serverSaslCreds are used as part of a SASL-defined bind mechanism
|
||
to allow the client to authenticate the server to which it is
|
||
communicating, or to perform "challenge-response" authentication. If
|
||
the client bound with the password choice, or the SASL mechanism does
|
||
not require the server to return information to the client, then this
|
||
field is not to be included in the result.
|
||
|
||
4.3. Unbind Operation
|
||
|
||
The function of the Unbind Operation is to terminate a protocol
|
||
session. The Unbind Operation is defined as follows:
|
||
|
||
UnbindRequest ::= [APPLICATION 2] NULL
|
||
|
||
The Unbind Operation has no response defined. Upon transmission of an
|
||
UnbindRequest, a protocol client may assume that the protocol session
|
||
is terminated. Upon receipt of an UnbindRequest, a protocol server
|
||
may assume that the requesting client has terminated the session and
|
||
that all outstanding requests may be discarded, and may close the
|
||
connection.
|
||
|
||
4.4. Unsolicited Notification
|
||
|
||
An unsolicited notification is an LDAPMessage sent from the server to
|
||
the client which is not in response to any LDAPMessage received by
|
||
the server. It is used to signal an extraordinary condition in the
|
||
server or in the connection between the client and the server. The
|
||
notification is of an advisory nature, and the server will not expect
|
||
any response to be returned from the client.
|
||
|
||
The unsolicited notification is structured as an LDAPMessage in which
|
||
the messageID is 0 and protocolOp is of the extendedResp form. The
|
||
responseName field of the ExtendedResponse is present. The LDAPOID
|
||
value MUST be unique for this notification, and not be used in any
|
||
other situation.
|
||
|
||
One unsolicited notification is defined in this document.
|
||
|
||
4.4.1. Notice of Disconnection
|
||
|
||
This notification may be used by the server to advise the client that
|
||
the server is about to close the connection due to an error
|
||
condition. Note that this notification is NOT a response to an
|
||
unbind requested by the client: the server MUST follow the procedures
|
||
of section 4.3. This notification is intended to assist clients in
|
||
distinguishing between an error condition and a transient network
|
||
|
||
|
||
|
||
|
||
|
||
Wahl, et. al. Standards Track [Page 24]
|
||
|
||
RFC 2251 LDAPv3 December 1997
|
||
|
||
|
||
failure. As with a connection close due to network failure, the
|
||
client MUST NOT assume that any outstanding requests which modified
|
||
the directory have succeeded or failed.
|
||
|
||
The responseName is 1.3.6.1.4.1.1466.20036, the response field is
|
||
absent, and the resultCode is used to indicate the reason for the
|
||
disconnection.
|
||
|
||
The following resultCode values are to be used in this notification:
|
||
|
||
- protocolError: The server has received data from the client in
|
||
which
|
||
the LDAPMessage structure could not be parsed.
|
||
|
||
- strongAuthRequired: The server has detected that an established
|
||
underlying security association protecting communication between
|
||
the client and server has unexpectedly failed or been compromised.
|
||
|
||
- unavailable: This server will stop accepting new connections and
|
||
operations on all existing connections, and be unavailable for an
|
||
extended period of time. The client may make use of an alternative
|
||
server.
|
||
|
||
After sending this notice, the server MUST close the connection.
|
||
After receiving this notice, the client MUST NOT transmit any further
|
||
on the connection, and may abruptly close the connection.
|
||
|
||
4.5. Search Operation
|
||
|
||
The Search Operation allows a client to request that a search be
|
||
performed on its behalf by a server. This can be used to read
|
||
attributes from a single entry, from entries immediately below a
|
||
particular entry, or a whole subtree of entries.
|
||
|
||
4.5.1. Search Request
|
||
|
||
The Search Request is defined as follows:
|
||
|
||
SearchRequest ::= [APPLICATION 3] SEQUENCE {
|
||
baseObject LDAPDN,
|
||
scope ENUMERATED {
|
||
baseObject (0),
|
||
singleLevel (1),
|
||
wholeSubtree (2) },
|
||
derefAliases ENUMERATED {
|
||
neverDerefAliases (0),
|
||
derefInSearching (1),
|
||
derefFindingBaseObj (2),
|
||
|
||
|
||
|
||
Wahl, et. al. Standards Track [Page 25]
|
||
|
||
RFC 2251 LDAPv3 December 1997
|
||
|
||
|
||
derefAlways (3) },
|
||
sizeLimit INTEGER (0 .. maxInt),
|
||
timeLimit INTEGER (0 .. maxInt),
|
||
typesOnly BOOLEAN,
|
||
filter Filter,
|
||
attributes AttributeDescriptionList }
|
||
|
||
Filter ::= CHOICE {
|
||
and [0] SET OF Filter,
|
||
or [1] SET OF Filter,
|
||
not [2] Filter,
|
||
equalityMatch [3] AttributeValueAssertion,
|
||
substrings [4] SubstringFilter,
|
||
greaterOrEqual [5] AttributeValueAssertion,
|
||
lessOrEqual [6] AttributeValueAssertion,
|
||
present [7] AttributeDescription,
|
||
approxMatch [8] AttributeValueAssertion,
|
||
extensibleMatch [9] MatchingRuleAssertion }
|
||
|
||
SubstringFilter ::= SEQUENCE {
|
||
type AttributeDescription,
|
||
-- at least one must be present
|
||
substrings SEQUENCE OF CHOICE {
|
||
initial [0] LDAPString,
|
||
any [1] LDAPString,
|
||
final [2] LDAPString } }
|
||
|
||
MatchingRuleAssertion ::= SEQUENCE {
|
||
matchingRule [1] MatchingRuleId OPTIONAL,
|
||
type [2] AttributeDescription OPTIONAL,
|
||
matchValue [3] AssertionValue,
|
||
dnAttributes [4] BOOLEAN DEFAULT FALSE }
|
||
|
||
Parameters of the Search Request are:
|
||
|
||
- baseObject: An LDAPDN that is the base object entry relative to
|
||
which the search is to be performed.
|
||
|
||
- scope: An indicator of the scope of the search to be performed. The
|
||
semantics of the possible values of this field are identical to the
|
||
semantics of the scope field in the X.511 Search Operation.
|
||
|
||
- derefAliases: An indicator as to how alias objects (as defined in
|
||
X.501) are to be handled in searching. The semantics of the
|
||
possible values of this field are:
|
||
|
||
neverDerefAliases: do not dereference aliases in searching
|
||
or in locating the base object of the search;
|
||
|
||
|
||
|
||
Wahl, et. al. Standards Track [Page 26]
|
||
|
||
RFC 2251 LDAPv3 December 1997
|
||
|
||
|
||
derefInSearching: dereference aliases in subordinates of
|
||
the base object in searching, but not in locating the
|
||
base object of the search;
|
||
|
||
derefFindingBaseObj: dereference aliases in locating
|
||
the base object of the search, but not when searching
|
||
subordinates of the base object;
|
||
|
||
derefAlways: dereference aliases both in searching and in
|
||
locating the base object of the search.
|
||
|
||
- sizelimit: A sizelimit that restricts the maximum number of entries
|
||
to be returned as a result of the search. A value of 0 in this
|
||
field indicates that no client-requested sizelimit restrictions are
|
||
in effect for the search. Servers may enforce a maximum number of
|
||
entries to return.
|
||
|
||
- timelimit: A timelimit that restricts the maximum time (in seconds)
|
||
allowed for a search. A value of 0 in this field indicates that no
|
||
client-requested timelimit restrictions are in effect for the
|
||
search.
|
||
|
||
- typesOnly: An indicator as to whether search results will contain
|
||
both attribute types and values, or just attribute types. Setting
|
||
this field to TRUE causes only attribute types (no values) to be
|
||
returned. Setting this field to FALSE causes both attribute types
|
||
and values to be returned.
|
||
|
||
- filter: A filter that defines the conditions that must be fulfilled
|
||
in order for the search to match a given entry.
|
||
|
||
The 'and', 'or' and 'not' choices can be used to form combinations of
|
||
filters. At least one filter element MUST be present in an 'and' or
|
||
'or' choice. The others match against individual attribute values of
|
||
entries in the scope of the search. (Implementor's note: the 'not'
|
||
filter is an example of a tagged choice in an implicitly-tagged
|
||
module. In BER this is treated as if the tag was explicit.)
|
||
|
||
A server MUST evaluate filters according to the three-valued logic
|
||
of X.511(93) section 7.8.1. In summary, a filter is evaluated to
|
||
either "TRUE", "FALSE" or "Undefined". If the filter evaluates
|
||
to TRUE for a particular entry, then the attributes of that entry
|
||
are returned as part of the search result (subject to any applicable
|
||
access control restrictions). If the filter evaluates to FALSE or
|
||
Undefined, then the entry is ignored for the search.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Wahl, et. al. Standards Track [Page 27]
|
||
|
||
RFC 2251 LDAPv3 December 1997
|
||
|
||
|
||
A filter of the "and" choice is TRUE if all the filters in the SET
|
||
OF evaluate to TRUE, FALSE if at least one filter is FALSE, and
|
||
otherwise Undefined. A filter of the "or" choice is FALSE if all
|
||
of the filters in the SET OF evaluate to FALSE, TRUE if at least
|
||
one filter is TRUE, and Undefined otherwise. A filter of the "not"
|
||
choice is TRUE if the filter being negated is FALSE, FALSE if it is
|
||
TRUE, and Undefined if it is Undefined.
|
||
|
||
The present match evaluates to TRUE where there is an attribute or
|
||
subtype of the specified attribute description present in an entry,
|
||
and FALSE otherwise (including a presence test with an unrecognized
|
||
attribute description.)
|
||
|
||
The extensibleMatch is new in this version of LDAP. If the
|
||
matchingRule field is absent, the type field MUST be present, and
|
||
the equality match is performed for that type. If the type field is
|
||
absent and matchingRule is present, the matchValue is compared
|
||
against all attributes in an entry which support that matchingRule,
|
||
and the matchingRule determines the syntax for the assertion value
|
||
(the filter item evaluates to TRUE if it matches with at least
|
||
one attribute in the entry, FALSE if it does not match any attribute
|
||
in the entry, and Undefined if the matchingRule is not recognized
|
||
or the assertionValue cannot be parsed.) If the type field is
|
||
present and matchingRule is present, the matchingRule MUST be one
|
||
permitted for use with that type, otherwise the filter item is
|
||
undefined. If the dnAttributes field is set to TRUE, the match is
|
||
applied against all the attributes in an entry's distinguished name
|
||
as well, and also evaluates to TRUE if there is at least one
|
||
attribute in the distinguished name for which the filter item
|
||
evaluates to TRUE. (Editors note: The dnAttributes field is present
|
||
so that there does not need to be multiple versions of generic
|
||
matching rules such as for word matching, one to apply to entries
|
||
and another to apply to entries and dn attributes as well).
|
||
|
||
A filter item evaluates to Undefined when the server would not
|
||
be able to determine whether the assertion value matches an
|
||
entry. If an attribute description in an equalityMatch, substrings,
|
||
greaterOrEqual, lessOrEqual, approxMatch or extensibleMatch
|
||
filter is not recognized by the server, a matching rule id in the
|
||
extensibleMatch is not recognized by the server, the assertion
|
||
value cannot be parsed, or the type of filtering requested is not
|
||
implemented, then the filter is Undefined. Thus for example if a
|
||
server did not recognize the attribute type shoeSize, a filter of
|
||
(shoeSize=*) would evaluate to FALSE, and the filters (shoeSize=12),
|
||
(shoeSize>=12) and (shoeSize<=12) would evaluate to Undefined.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Wahl, et. al. Standards Track [Page 28]
|
||
|
||
RFC 2251 LDAPv3 December 1997
|
||
|
||
|
||
Servers MUST NOT return errors if attribute descriptions or matching
|
||
rule ids are not recognized, or assertion values cannot be parsed.
|
||
More details of filter processing are given in section 7.8 of X.511
|
||
[8].
|
||
|
||
- attributes: A list of the attributes to be returned from each entry
|
||
which matches the search filter. There are two special values which
|
||
may be used: an empty list with no attributes, and the attribute
|
||
description string "*". Both of these signify that all user
|
||
attributes are to be returned. (The "*" allows the client to
|
||
request all user attributes in addition to specific operational
|
||
attributes).
|
||
|
||
Attributes MUST be named at most once in the list, and are returned
|
||
at most once in an entry. If there are attribute descriptions in
|
||
the list which are not recognized, they are ignored by the server.
|
||
|
||
If the client does not want any attributes returned, it can specify
|
||
a list containing only the attribute with OID "1.1". This OID was
|
||
chosen arbitrarily and does not correspond to any attribute in use.
|
||
|
||
Client implementors should note that even if all user attributes are
|
||
requested, some attributes of the entry may not be included in
|
||
search results due to access control or other restrictions.
|
||
Furthermore, servers will not return operational attributes, such
|
||
as objectClasses or attributeTypes, unless they are listed by name,
|
||
since there may be extremely large number of values for certain
|
||
operational attributes. (A list of operational attributes for use
|
||
in LDAP is given in [5].)
|
||
|
||
Note that an X.500 "list"-like operation can be emulated by the client
|
||
requesting a one-level LDAP search operation with a filter checking
|
||
for the existence of the objectClass attribute, and that an X.500
|
||
"read"-like operation can be emulated by a base object LDAP search
|
||
operation with the same filter. A server which provides a gateway to
|
||
X.500 is not required to use the Read or List operations, although it
|
||
may choose to do so, and if it does must provide the same semantics
|
||
as the X.500 search operation.
|
||
|
||
4.5.2. Search Result
|
||
|
||
The results of the search attempted by the server upon receipt of a
|
||
Search Request are returned in Search Responses, which are LDAP
|
||
messages containing either SearchResultEntry, SearchResultReference,
|
||
ExtendedResponse or SearchResultDone data types.
|
||
|
||
SearchResultEntry ::= [APPLICATION 4] SEQUENCE {
|
||
objectName LDAPDN,
|
||
|
||
|
||
|
||
Wahl, et. al. Standards Track [Page 29]
|
||
|
||
RFC 2251 LDAPv3 December 1997
|
||
|
||
|
||
attributes PartialAttributeList }
|
||
|
||
PartialAttributeList ::= SEQUENCE OF SEQUENCE {
|
||
type AttributeDescription,
|
||
vals SET OF AttributeValue }
|
||
-- implementors should note that the PartialAttributeList may
|
||
-- have zero elements (if none of the attributes of that entry
|
||
-- were requested, or could be returned), and that the vals set
|
||
-- may also have zero elements (if types only was requested, or
|
||
-- all values were excluded from the result.)
|
||
|
||
SearchResultReference ::= [APPLICATION 19] SEQUENCE OF LDAPURL
|
||
-- at least one LDAPURL element must be present
|
||
|
||
SearchResultDone ::= [APPLICATION 5] LDAPResult
|
||
|
||
Upon receipt of a Search Request, a server will perform the necessary
|
||
search of the DIT.
|
||
|
||
If the LDAP session is operating over a connection-oriented transport
|
||
such as TCP, the server will return to the client a sequence of
|
||
responses in separate LDAP messages. There may be zero or more
|
||
responses containing SearchResultEntry, one for each entry found
|
||
during the search. There may also be zero or more responses
|
||
containing SearchResultReference, one for each area not explored by
|
||
this server during the search. The SearchResultEntry and
|
||
SearchResultReference PDUs may come in any order. Following all the
|
||
SearchResultReference responses and all SearchResultEntry responses
|
||
to be returned by the server, the server will return a response
|
||
containing the SearchResultDone, which contains an indication of
|
||
success, or detailing any errors that have occurred.
|
||
|
||
Each entry returned in a SearchResultEntry will contain all
|
||
attributes, complete with associated values if necessary, as
|
||
specified in the attributes field of the Search Request. Return of
|
||
attributes is subject to access control and other administrative
|
||
policy. Some attributes may be returned in binary format (indicated
|
||
by the AttributeDescription in the response having the binary option
|
||
present).
|
||
|
||
Some attributes may be constructed by the server and appear in a
|
||
SearchResultEntry attribute list, although they are not stored
|
||
attributes of an entry. Clients MUST NOT assume that all attributes
|
||
can be modified, even if permitted by access control.
|
||
|
||
LDAPMessage responses of the ExtendedResponse form are reserved for
|
||
returning information associated with a control requested by the
|
||
client. These may be defined in future versions of this document.
|
||
|
||
|
||
|
||
Wahl, et. al. Standards Track [Page 30]
|
||
|
||
RFC 2251 LDAPv3 December 1997
|
||
|
||
|
||
4.5.3. Continuation References in the Search Result
|
||
|
||
If the server was able to locate the entry referred to by the
|
||
baseObject but was unable to search all the entries in the scope at
|
||
and under the baseObject, the server may return one or more
|
||
SearchResultReference, each containing a reference to another set of
|
||
servers for continuing the operation. A server MUST NOT return any
|
||
SearchResultReference if it has not located the baseObject and
|
||
thus has not searched any entries; in this case it would return a
|
||
SearchResultDone containing a referral resultCode.
|
||
|
||
In the absence of indexing information provided to a server from
|
||
servers holding subordinate naming contexts, SearchResultReference
|
||
responses are not affected by search filters and are always returned
|
||
when in scope.
|
||
|
||
The SearchResultReference is of the same data type as the Referral.
|
||
URLs for servers implementing the LDAP protocol are written according
|
||
to [9]. The <dn> part MUST be present in the URL, with the new target
|
||
object name. The client MUST use this name in its next request.
|
||
Some servers (e.g. part of a distributed index exchange system) may
|
||
provide a different filter in the URLs of the SearchResultReference.
|
||
If the filter part of the URL is present in an LDAP URL, the client
|
||
MUST use the new filter in its next request to progress the search,
|
||
and if the filter part is absent the client will use again the same
|
||
filter. Other aspects of the new search request may be the same or
|
||
different as the search which generated the continuation references.
|
||
|
||
Other kinds of URLs may be returned so long as the operation could be
|
||
performed using that protocol.
|
||
|
||
The name of an unexplored subtree in a SearchResultReference need not
|
||
be subordinate to the base object.
|
||
|
||
In order to complete the search, the client MUST issue a new search
|
||
operation for each SearchResultReference that is returned. Note that
|
||
the abandon operation described in section 4.11 applies only to a
|
||
particular operation sent on a connection between a client and server,
|
||
and if the client has multiple outstanding search operations to
|
||
different servers, it MUST abandon each operation individually.
|
||
|
||
4.5.3.1. Example
|
||
|
||
For example, suppose the contacted server (hosta) holds the entry
|
||
"O=MNN,C=WW" and the entry "CN=Manager,O=MNN,C=WW". It knows that
|
||
either LDAP-capable servers (hostb) or (hostc) hold
|
||
"OU=People,O=MNN,C=WW" (one is the master and the other server a
|
||
|
||
|
||
|
||
|
||
Wahl, et. al. Standards Track [Page 31]
|
||
|
||
RFC 2251 LDAPv3 December 1997
|
||
|
||
|
||
shadow), and that LDAP-capable server (hostd) holds the subtree
|
||
"OU=Roles,O=MNN,C=WW". If a subtree search of "O=MNN,C=WW" is
|
||
requested to the contacted server, it may return the following:
|
||
|
||
SearchResultEntry for O=MNN,C=WW
|
||
SearchResultEntry for CN=Manager,O=MNN,C=WW
|
||
SearchResultReference {
|
||
ldap://hostb/OU=People,O=MNN,C=WW
|
||
ldap://hostc/OU=People,O=MNN,C=WW
|
||
}
|
||
SearchResultReference {
|
||
ldap://hostd/OU=Roles,O=MNN,C=WW
|
||
}
|
||
SearchResultDone (success)
|
||
|
||
Client implementors should note that when following a
|
||
SearchResultReference, additional SearchResultReference may be
|
||
generated. Continuing the example, if the client contacted the
|
||
server (hostb) and issued the search for the subtree
|
||
"OU=People,O=MNN,C=WW", the server might respond as follows:
|
||
|
||
SearchResultEntry for OU=People,O=MNN,C=WW
|
||
SearchResultReference {
|
||
ldap://hoste/OU=Managers,OU=People,O=MNN,C=WW
|
||
}
|
||
SearchResultReference {
|
||
ldap://hostf/OU=Consultants,OU=People,O=MNN,C=WW
|
||
}
|
||
SearchResultDone (success)
|
||
|
||
If the contacted server does not hold the base object for the search,
|
||
then it will return a referral to the client. For example, if the
|
||
client requests a subtree search of "O=XYZ,C=US" to hosta, the server
|
||
may return only a SearchResultDone containing a referral.
|
||
|
||
SearchResultDone (referral) {
|
||
ldap://hostg/
|
||
}
|
||
|
||
4.6. Modify Operation
|
||
|
||
The Modify Operation allows a client to request that a modification
|
||
of an entry be performed on its behalf by a server. The Modify
|
||
Request is defined as follows:
|
||
|
||
ModifyRequest ::= [APPLICATION 6] SEQUENCE {
|
||
object LDAPDN,
|
||
modification SEQUENCE OF SEQUENCE {
|
||
|
||
|
||
|
||
Wahl, et. al. Standards Track [Page 32]
|
||
|
||
RFC 2251 LDAPv3 December 1997
|
||
|
||
|
||
operation ENUMERATED {
|
||
add (0),
|
||
delete (1),
|
||
replace (2) },
|
||
modification AttributeTypeAndValues } }
|
||
|
||
AttributeTypeAndValues ::= SEQUENCE {
|
||
type AttributeDescription,
|
||
vals SET OF AttributeValue }
|
||
|
||
Parameters of the Modify Request are:
|
||
|
||
- object: The object to be modified. The value of this field contains
|
||
the DN of the entry to be modified. The server will not perform
|
||
any alias dereferencing in determining the object to be modified.
|
||
|
||
- modification: A list of modifications to be performed on the entry.
|
||
The entire list of entry modifications MUST be performed
|
||
in the order they are listed, as a single atomic operation. While
|
||
individual modifications may violate the directory schema, the
|
||
resulting entry after the entire list of modifications is performed
|
||
MUST conform to the requirements of the directory schema. The
|
||
values that may be taken on by the 'operation' field in each
|
||
modification construct have the following semantics respectively:
|
||
|
||
add: add values listed to the given attribute, creating
|
||
the attribute if necessary;
|
||
|
||
delete: delete values listed from the given attribute,
|
||
removing the entire attribute if no values are listed, or
|
||
if all current values of the attribute are listed for
|
||
deletion;
|
||
|
||
replace: replace all existing values of the given attribute
|
||
with the new values listed, creating the attribute if it
|
||
did not already exist. A replace with no value will delete
|
||
the entire attribute if it exists, and is ignored if the
|
||
attribute does not exist.
|
||
|
||
The result of the modify attempted by the server upon receipt of a
|
||
Modify Request is returned in a Modify Response, defined as follows:
|
||
|
||
ModifyResponse ::= [APPLICATION 7] LDAPResult
|
||
|
||
Upon receipt of a Modify Request, a server will perform the necessary
|
||
modifications to the DIT.
|
||
|
||
|
||
|
||
|
||
|
||
Wahl, et. al. Standards Track [Page 33]
|
||
|
||
RFC 2251 LDAPv3 December 1997
|
||
|
||
|
||
The server will return to the client a single Modify Response
|
||
indicating either the successful completion of the DIT modification,
|
||
or the reason that the modification failed. Note that due to the
|
||
requirement for atomicity in applying the list of modifications in
|
||
the Modify Request, the client may expect that no modifications of
|
||
the DIT have been performed if the Modify Response received indicates
|
||
any sort of error, and that all requested modifications have been
|
||
performed if the Modify Response indicates successful completion of
|
||
the Modify Operation. If the connection fails, whether the
|
||
modification occurred or not is indeterminate.
|
||
|
||
The Modify Operation cannot be used to remove from an entry any of
|
||
its distinguished values, those values which form the entry's
|
||
relative distinguished name. An attempt to do so will result in the
|
||
server returning the error notAllowedOnRDN. The Modify DN Operation
|
||
described in section 4.9 is used to rename an entry.
|
||
|
||
If an equality match filter has not been defined for an attribute type,
|
||
clients MUST NOT attempt to delete individual values of that attribute
|
||
from an entry using the "delete" form of a modification, and MUST
|
||
instead use the "replace" form.
|
||
|
||
Note that due to the simplifications made in LDAP, there is not a
|
||
direct mapping of the modifications in an LDAP ModifyRequest onto the
|
||
EntryModifications of a DAP ModifyEntry operation, and different
|
||
implementations of LDAP-DAP gateways may use different means of
|
||
representing the change. If successful, the final effect of the
|
||
operations on the entry MUST be identical.
|
||
|
||
4.7. Add Operation
|
||
|
||
The Add Operation allows a client to request the addition of an entry
|
||
into the directory. The Add Request is defined as follows:
|
||
|
||
AddRequest ::= [APPLICATION 8] SEQUENCE {
|
||
entry LDAPDN,
|
||
attributes AttributeList }
|
||
|
||
AttributeList ::= SEQUENCE OF SEQUENCE {
|
||
type AttributeDescription,
|
||
vals SET OF AttributeValue }
|
||
|
||
Parameters of the Add Request are:
|
||
|
||
- entry: the Distinguished Name of the entry to be added. Note that
|
||
the server will not dereference any aliases in locating the entry
|
||
to be added.
|
||
|
||
|
||
|
||
|
||
Wahl, et. al. Standards Track [Page 34]
|
||
|
||
RFC 2251 LDAPv3 December 1997
|
||
|
||
|
||
- attributes: the list of attributes that make up the content of the
|
||
entry being added. Clients MUST include distinguished values
|
||
(those forming the entry's own RDN) in this list, the objectClass
|
||
attribute, and values of any mandatory attributes of the listed
|
||
object classes. Clients MUST NOT supply the createTimestamp or
|
||
creatorsName attributes, since these will be generated
|
||
automatically by the server.
|
||
|
||
The entry named in the entry field of the AddRequest MUST NOT exist
|
||
for the AddRequest to succeed. The parent of the entry to be added
|
||
MUST exist. For example, if the client attempted to add
|
||
"CN=JS,O=Foo,C=US", the "O=Foo,C=US" entry did not exist, and the
|
||
"C=US" entry did exist, then the server would return the error
|
||
noSuchObject with the matchedDN field containing "C=US". If the
|
||
parent entry exists but is not in a naming context held by the
|
||
server, the server SHOULD return a referral to the server holding the
|
||
parent entry.
|
||
|
||
Servers implementations SHOULD NOT restrict where entries can be
|
||
located in the directory. Some servers MAY allow the administrator
|
||
to restrict the classes of entries which can be added to the
|
||
directory.
|
||
|
||
Upon receipt of an Add Request, a server will attempt to perform the
|
||
add requested. The result of the add attempt will be returned to the
|
||
client in the Add Response, defined as follows:
|
||
|
||
AddResponse ::= [APPLICATION 9] LDAPResult
|
||
|
||
A response of success indicates that the new entry is present in the
|
||
directory.
|
||
|
||
4.8. Delete Operation
|
||
|
||
The Delete Operation allows a client to request the removal of an
|
||
entry from the directory. The Delete Request is defined as follows:
|
||
|
||
DelRequest ::= [APPLICATION 10] LDAPDN
|
||
|
||
The Delete Request consists of the Distinguished Name of the entry to
|
||
be deleted. Note that the server will not dereference aliases while
|
||
resolving the name of the target entry to be removed, and that only
|
||
leaf entries (those with no subordinate entries) can be deleted with
|
||
this operation.
|
||
|
||
The result of the delete attempted by the server upon receipt of a
|
||
Delete Request is returned in the Delete Response, defined as
|
||
follows:
|
||
|
||
|
||
|
||
Wahl, et. al. Standards Track [Page 35]
|
||
|
||
RFC 2251 LDAPv3 December 1997
|
||
|
||
|
||
DelResponse ::= [APPLICATION 11] LDAPResult
|
||
|
||
Upon receipt of a Delete Request, a server will attempt to perform
|
||
the entry removal requested. The result of the delete attempt will be
|
||
returned to the client in the Delete Response.
|
||
|
||
4.9. Modify DN Operation
|
||
|
||
The Modify DN Operation allows a client to change the leftmost (least
|
||
significant) component of the name of an entry in the directory, or
|
||
to move a subtree of entries to a new location in the directory. The
|
||
Modify DN Request is defined as follows:
|
||
|
||
ModifyDNRequest ::= [APPLICATION 12] SEQUENCE {
|
||
entry LDAPDN,
|
||
newrdn RelativeLDAPDN,
|
||
deleteoldrdn BOOLEAN,
|
||
newSuperior [0] LDAPDN OPTIONAL }
|
||
|
||
Parameters of the Modify DN Request are:
|
||
|
||
- entry: the Distinguished Name of the entry to be changed. This
|
||
entry may or may not have subordinate entries.
|
||
|
||
- newrdn: the RDN that will form the leftmost component of the new
|
||
name of the entry.
|
||
|
||
- deleteoldrdn: a boolean parameter that controls whether the old RDN
|
||
attribute values are to be retained as attributes of the entry, or
|
||
deleted from the entry.
|
||
|
||
- newSuperior: if present, this is the Distinguished Name of the entry
|
||
which becomes the immediate superior of the existing entry.
|
||
|
||
The result of the name change attempted by the server upon receipt of
|
||
a Modify DN Request is returned in the Modify DN Response, defined
|
||
as follows:
|
||
|
||
ModifyDNResponse ::= [APPLICATION 13] LDAPResult
|
||
|
||
Upon receipt of a ModifyDNRequest, a server will attempt to
|
||
perform the name change. The result of the name change attempt will
|
||
be returned to the client in the Modify DN Response.
|
||
|
||
For example, if the entry named in the "entry" parameter was
|
||
"cn=John Smith,c=US", the newrdn parameter was "cn=John Cougar Smith",
|
||
and the newSuperior parameter was absent, then this operation would
|
||
|
||
|
||
|
||
|
||
Wahl, et. al. Standards Track [Page 36]
|
||
|
||
RFC 2251 LDAPv3 December 1997
|
||
|
||
|
||
attempt to rename the entry to be "cn=John Cougar Smith,c=US". If
|
||
there was already an entry with that name, the operation would fail
|
||
with error code entryAlreadyExists.
|
||
|
||
If the deleteoldrdn parameter is TRUE, the values forming the old
|
||
RDN are deleted from the entry. If the deleteoldrdn parameter is
|
||
FALSE, the values forming the old RDN will be retained as
|
||
non-distinguished attribute values of the entry. The server may
|
||
not perform the operation and return an error code if the setting of
|
||
the deleteoldrdn parameter would cause a schema inconsistency in the
|
||
entry.
|
||
|
||
Note that X.500 restricts the ModifyDN operation to only affect
|
||
entries that are contained within a single server. If the LDAP
|
||
server is mapped onto DAP, then this restriction will apply, and the
|
||
resultCode affectsMultipleDSAs will be returned if this error
|
||
occurred. In general clients MUST NOT expect to be able to perform
|
||
arbitrary movements of entries and subtrees between servers.
|
||
|
||
4.10. Compare Operation
|
||
|
||
The Compare Operation allows a client to compare an assertion
|
||
provided with an entry in the directory. The Compare Request is
|
||
defined as follows:
|
||
|
||
CompareRequest ::= [APPLICATION 14] SEQUENCE {
|
||
entry LDAPDN,
|
||
ava AttributeValueAssertion }
|
||
|
||
Parameters of the Compare Request are:
|
||
|
||
- entry: the name of the entry to be compared with.
|
||
|
||
- ava: the assertion with which an attribute in the entry is to be
|
||
compared.
|
||
|
||
The result of the compare attempted by the server upon receipt of a
|
||
Compare Request is returned in the Compare Response, defined as
|
||
follows:
|
||
|
||
CompareResponse ::= [APPLICATION 15] LDAPResult
|
||
|
||
Upon receipt of a Compare Request, a server will attempt to perform
|
||
the requested comparison. The result of the comparison will be
|
||
returned to the client in the Compare Response. Note that errors and
|
||
the result of comparison are all returned in the same construct.
|
||
|
||
|
||
|
||
|
||
|
||
Wahl, et. al. Standards Track [Page 37]
|
||
|
||
RFC 2251 LDAPv3 December 1997
|
||
|
||
|
||
Note that some directory systems may establish access controls which
|
||
permit the values of certain attributes (such as userPassword) to be
|
||
compared but not read. In a search result, it may be that an
|
||
attribute of that type would be returned, but with an empty set of
|
||
values.
|
||
|
||
4.11. Abandon Operation
|
||
|
||
The function of the Abandon Operation is to allow a client to request
|
||
that the server abandon an outstanding operation. The Abandon
|
||
Request is defined as follows:
|
||
|
||
AbandonRequest ::= [APPLICATION 16] MessageID
|
||
|
||
The MessageID MUST be that of a an operation which was requested
|
||
earlier in this connection.
|
||
|
||
(The abandon request itself has its own message id. This is distinct
|
||
from the id of the earlier operation being abandoned.)
|
||
|
||
There is no response defined in the Abandon Operation. Upon
|
||
transmission of an Abandon Operation, a client may expect that the
|
||
operation identified by the Message ID in the Abandon Request has
|
||
been abandoned. In the event that a server receives an Abandon
|
||
Request on a Search Operation in the midst of transmitting responses
|
||
to the search, that server MUST cease transmitting entry responses to
|
||
the abandoned request immediately, and MUST NOT send the
|
||
SearchResponseDone. Of course, the server MUST ensure that only
|
||
properly encoded LDAPMessage PDUs are transmitted.
|
||
|
||
Clients MUST NOT send abandon requests for the same operation
|
||
multiple times, and MUST also be prepared to receive results from
|
||
operations it has abandoned (since these may have been in transit
|
||
when the abandon was requested).
|
||
|
||
Servers MUST discard abandon requests for message IDs they do not
|
||
recognize, for operations which cannot be abandoned, and for
|
||
operations which have already been abandoned.
|
||
|
||
4.12. Extended Operation
|
||
|
||
An extension mechanism has been added in this version of LDAP, in
|
||
order to allow additional operations to be defined for services not
|
||
available elsewhere in this protocol, for instance digitally signed
|
||
operations and results.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Wahl, et. al. Standards Track [Page 38]
|
||
|
||
RFC 2251 LDAPv3 December 1997
|
||
|
||
|
||
The extended operation allows clients to make requests and receive
|
||
responses with predefined syntaxes and semantics. These may be
|
||
defined in RFCs or be private to particular implementations. Each
|
||
request MUST have a unique OBJECT IDENTIFIER assigned to it.
|
||
|
||
ExtendedRequest ::= [APPLICATION 23] SEQUENCE {
|
||
requestName [0] LDAPOID,
|
||
requestValue [1] OCTET STRING OPTIONAL }
|
||
|
||
The requestName is a dotted-decimal representation of the OBJECT
|
||
IDENTIFIER corresponding to the request. The requestValue is
|
||
information in a form defined by that request, encapsulated inside an
|
||
OCTET STRING.
|
||
|
||
The server will respond to this with an LDAPMessage containing the
|
||
ExtendedResponse.
|
||
|
||
ExtendedResponse ::= [APPLICATION 24] SEQUENCE {
|
||
COMPONENTS OF LDAPResult,
|
||
responseName [10] LDAPOID OPTIONAL,
|
||
response [11] OCTET STRING OPTIONAL }
|
||
|
||
If the server does not recognize the request name, it MUST return
|
||
only the response fields from LDAPResult, containing the
|
||
protocolError result code.
|
||
|
||
5. Protocol Element Encodings and Transfer
|
||
|
||
One underlying service is defined here. Clients and servers SHOULD
|
||
implement the mapping of LDAP over TCP described in 5.2.1.
|
||
|
||
5.1. Mapping Onto BER-based Transport Services
|
||
|
||
The protocol elements of LDAP are encoded for exchange using the
|
||
Basic Encoding Rules (BER) [11] of ASN.1 [3]. However, due to the
|
||
high overhead involved in using certain elements of the BER, the
|
||
following additional restrictions are placed on BER-encodings of LDAP
|
||
protocol elements:
|
||
|
||
(1) Only the definite form of length encoding will be used.
|
||
|
||
(2) OCTET STRING values will be encoded in the primitive form only.
|
||
|
||
(3) If the value of a BOOLEAN type is true, the encoding MUST have
|
||
its contents octets set to hex "FF".
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Wahl, et. al. Standards Track [Page 39]
|
||
|
||
RFC 2251 LDAPv3 December 1997
|
||
|
||
|
||
(4) If a value of a type is its default value, it MUST be absent.
|
||
Only some BOOLEAN and INTEGER types have default values in this
|
||
protocol definition.
|
||
|
||
These restrictions do not apply to ASN.1 types encapsulated inside of
|
||
OCTET STRING values, such as attribute values, unless otherwise
|
||
noted.
|
||
|
||
5.2. Transfer Protocols
|
||
|
||
This protocol is designed to run over connection-oriented, reliable
|
||
transports, with all 8 bits in an octet being significant in the data
|
||
stream.
|
||
|
||
5.2.1. Transmission Control Protocol (TCP)
|
||
|
||
The LDAPMessage PDUs are mapped directly onto the TCP bytestream. It
|
||
is recommended that server implementations running over the TCP MAY
|
||
provide a protocol listener on the assigned port, 389. Servers may
|
||
instead provide a listener on a different port number. Clients MUST
|
||
support contacting servers on any valid TCP port.
|
||
|
||
6. Implementation Guidelines
|
||
|
||
This document describes an Internet protocol.
|
||
|
||
6.1. Server Implementations
|
||
|
||
The server MUST be capable of recognizing all the mandatory attribute
|
||
type names and implement the syntaxes specified in [5]. Servers MAY
|
||
also recognize additional attribute type names.
|
||
|
||
6.2. Client Implementations
|
||
|
||
Clients which request referrals MUST ensure that they do not loop
|
||
between servers. They MUST NOT repeatedly contact the same server for
|
||
the same request with the same target entry name, scope and filter.
|
||
Some clients may be using a counter that is incremented each time
|
||
referral handling occurs for an operation, and these kinds of clients
|
||
MUST be able to handle a DIT with at least ten layers of naming
|
||
contexts between the root and a leaf entry.
|
||
|
||
In the absence of prior agreements with servers, clients SHOULD NOT
|
||
assume that servers support any particular schemas beyond those
|
||
referenced in section 6.1. Different schemas can have different
|
||
attribute types with the same names. The client can retrieve the
|
||
subschema entries referenced by the subschemaSubentry attribute in
|
||
the server's root DSE or in entries held by the server.
|
||
|
||
|
||
|
||
Wahl, et. al. Standards Track [Page 40]
|
||
|
||
RFC 2251 LDAPv3 December 1997
|
||
|
||
|
||
7. Security Considerations
|
||
|
||
When used with a connection-oriented transport, this version of the
|
||
protocol provides facilities for the LDAP v2 authentication
|
||
mechanism, simple authentication using a cleartext password, as well
|
||
as any SASL mechanism [12]. SASL allows for integrity and privacy
|
||
services to be negotiated.
|
||
|
||
It is also permitted that the server can return its credentials to
|
||
the client, if it chooses to do so.
|
||
|
||
Use of cleartext password is strongly discouraged where the
|
||
underlying transport service cannot guarantee confidentiality and may
|
||
result in disclosure of the password to unauthorized parties.
|
||
|
||
When used with SASL, it should be noted that the name field of the
|
||
BindRequest is not protected against modification. Thus if the
|
||
distinguished name of the client (an LDAPDN) is agreed through the
|
||
negotiation of the credentials, it takes precedence over any value in
|
||
the unprotected name field.
|
||
|
||
Implementations which cache attributes and entries obtained via LDAP
|
||
MUST ensure that access controls are maintained if that information
|
||
is to be provided to multiple clients, since servers may have access
|
||
control policies which prevent the return of entries or attributes in
|
||
search results except to particular authenticated clients. For
|
||
example, caches could serve result information only to the client
|
||
whose request caused it to be cache.
|
||
|
||
8. Acknowledgements
|
||
|
||
This document is an update to RFC 1777, by Wengyik Yeong, Tim Howes,
|
||
and Steve Kille. Design ideas included in this document are based on
|
||
those discussed in ASID and other IETF Working Groups. The
|
||
contributions of individuals in these working groups is gratefully
|
||
acknowledged.
|
||
|
||
9. Bibliography
|
||
|
||
[1] ITU-T Rec. X.500, "The Directory: Overview of Concepts, Models
|
||
and Service", 1993.
|
||
|
||
[2] Yeong, W., Howes, T., and S. Kille, "Lightweight Directory Access
|
||
Protocol", RFC 1777, March 1995.
|
||
|
||
[3] ITU-T Rec. X.680, "Abstract Syntax Notation One (ASN.1) -
|
||
Specification of Basic Notation", 1994.
|
||
|
||
|
||
|
||
|
||
Wahl, et. al. Standards Track [Page 41]
|
||
|
||
RFC 2251 LDAPv3 December 1997
|
||
|
||
|
||
[4] Kille, S., Wahl, M., and T. Howes, "Lightweight Directory Access
|
||
Protocol (v3): UTF-8 String Representation of Distinguished
|
||
Names", RFC 2253, December 1997.
|
||
|
||
[5] Wahl, M., Coulbeck, A., Howes, T., and S. Kille, "Lightweight
|
||
Directory Access Protocol (v3): Attribute Syntax Definitions",
|
||
RFC 2252, December 1997.
|
||
|
||
[6] ITU-T Rec. X.501, "The Directory: Models", 1993.
|
||
|
||
[7] Berners-Lee, T., Masinter, L., and M. McCahill, "Uniform
|
||
Resource Locators (URL)", RFC 1738, December 1994.
|
||
|
||
[8] ITU-T Rec. X.511, "The Directory: Abstract Service Definition",
|
||
1993.
|
||
|
||
[9] Howes, T., and M. Smith, "The LDAP URL Format", RFC 2255,
|
||
December 1997.
|
||
|
||
[10] Bradner, S., "Key words for use in RFCs to Indicate Requirement
|
||
Levels", RFC 2119, March 1997.
|
||
|
||
[11] ITU-T Rec. X.690, "Specification of ASN.1 encoding rules: Basic,
|
||
Canonical, and Distinguished Encoding Rules", 1994.
|
||
|
||
[12] Meyers, J., "Simple Authentication and Security Layer",
|
||
RFC 2222, October 1997.
|
||
|
||
[13] Universal Multiple-Octet Coded Character Set (UCS) -
|
||
Architecture and Basic Multilingual Plane, ISO/IEC 10646-1 :
|
||
1993.
|
||
|
||
[14] Yergeau, F., "UTF-8, a transformation format of Unicode and ISO
|
||
10646", RFC 2044, October 1996.
|
||
|
||
10. Authors' Addresses
|
||
|
||
Mark Wahl
|
||
Critical Angle Inc.
|
||
4815 W Braker Lane #502-385
|
||
Austin, TX 78759
|
||
USA
|
||
|
||
Phone: +1 512 372-3160
|
||
EMail: M.Wahl@critical-angle.com
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Wahl, et. al. Standards Track [Page 42]
|
||
|
||
RFC 2251 LDAPv3 December 1997
|
||
|
||
|
||
Tim Howes
|
||
Netscape Communications Corp.
|
||
501 E. Middlefield Rd., MS MV068
|
||
Mountain View, CA 94043
|
||
USA
|
||
|
||
Phone: +1 650 937-3419
|
||
EMail: howes@netscape.com
|
||
|
||
Steve Kille
|
||
Isode Limited
|
||
The Dome, The Square
|
||
Richmond
|
||
TW9 1DT
|
||
UK
|
||
|
||
Phone: +44-181-332-9091
|
||
EMail: S.Kille@isode.com
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Wahl, et. al. Standards Track [Page 43]
|
||
|
||
RFC 2251 LDAPv3 December 1997
|
||
|
||
|
||
Appendix A - Complete ASN.1 Definition
|
||
|
||
Lightweight-Directory-Access-Protocol-V3 DEFINITIONS
|
||
IMPLICIT TAGS ::=
|
||
|
||
BEGIN
|
||
|
||
LDAPMessage ::= SEQUENCE {
|
||
messageID MessageID,
|
||
protocolOp CHOICE {
|
||
bindRequest BindRequest,
|
||
bindResponse BindResponse,
|
||
unbindRequest UnbindRequest,
|
||
searchRequest SearchRequest,
|
||
searchResEntry SearchResultEntry,
|
||
searchResDone SearchResultDone,
|
||
searchResRef SearchResultReference,
|
||
modifyRequest ModifyRequest,
|
||
modifyResponse ModifyResponse,
|
||
addRequest AddRequest,
|
||
addResponse AddResponse,
|
||
delRequest DelRequest,
|
||
delResponse DelResponse,
|
||
modDNRequest ModifyDNRequest,
|
||
modDNResponse ModifyDNResponse,
|
||
compareRequest CompareRequest,
|
||
compareResponse CompareResponse,
|
||
abandonRequest AbandonRequest,
|
||
extendedReq ExtendedRequest,
|
||
extendedResp ExtendedResponse },
|
||
controls [0] Controls OPTIONAL }
|
||
|
||
MessageID ::= INTEGER (0 .. maxInt)
|
||
|
||
maxInt INTEGER ::= 2147483647 -- (2^^31 - 1) --
|
||
|
||
LDAPString ::= OCTET STRING
|
||
|
||
LDAPOID ::= OCTET STRING
|
||
|
||
LDAPDN ::= LDAPString
|
||
|
||
RelativeLDAPDN ::= LDAPString
|
||
|
||
AttributeType ::= LDAPString
|
||
|
||
AttributeDescription ::= LDAPString
|
||
|
||
|
||
|
||
|
||
Wahl, et. al. Standards Track [Page 44]
|
||
|
||
RFC 2251 LDAPv3 December 1997
|
||
|
||
|
||
AttributeDescriptionList ::= SEQUENCE OF
|
||
AttributeDescription
|
||
|
||
AttributeValue ::= OCTET STRING
|
||
|
||
AttributeValueAssertion ::= SEQUENCE {
|
||
attributeDesc AttributeDescription,
|
||
assertionValue AssertionValue }
|
||
|
||
AssertionValue ::= OCTET STRING
|
||
|
||
Attribute ::= SEQUENCE {
|
||
type AttributeDescription,
|
||
vals SET OF AttributeValue }
|
||
|
||
MatchingRuleId ::= LDAPString
|
||
|
||
LDAPResult ::= SEQUENCE {
|
||
resultCode ENUMERATED {
|
||
success (0),
|
||
operationsError (1),
|
||
protocolError (2),
|
||
timeLimitExceeded (3),
|
||
sizeLimitExceeded (4),
|
||
compareFalse (5),
|
||
compareTrue (6),
|
||
authMethodNotSupported (7),
|
||
strongAuthRequired (8),
|
||
-- 9 reserved --
|
||
referral (10), -- new
|
||
adminLimitExceeded (11), -- new
|
||
unavailableCriticalExtension (12), -- new
|
||
confidentialityRequired (13), -- new
|
||
saslBindInProgress (14), -- new
|
||
noSuchAttribute (16),
|
||
undefinedAttributeType (17),
|
||
inappropriateMatching (18),
|
||
constraintViolation (19),
|
||
attributeOrValueExists (20),
|
||
invalidAttributeSyntax (21),
|
||
-- 22-31 unused --
|
||
noSuchObject (32),
|
||
aliasProblem (33),
|
||
invalidDNSyntax (34),
|
||
-- 35 reserved for undefined isLeaf --
|
||
aliasDereferencingProblem (36),
|
||
-- 37-47 unused --
|
||
inappropriateAuthentication (48),
|
||
|
||
|
||
|
||
Wahl, et. al. Standards Track [Page 45]
|
||
|
||
RFC 2251 LDAPv3 December 1997
|
||
|
||
|
||
invalidCredentials (49),
|
||
insufficientAccessRights (50),
|
||
busy (51),
|
||
unavailable (52),
|
||
unwillingToPerform (53),
|
||
loopDetect (54),
|
||
-- 55-63 unused --
|
||
namingViolation (64),
|
||
objectClassViolation (65),
|
||
notAllowedOnNonLeaf (66),
|
||
notAllowedOnRDN (67),
|
||
entryAlreadyExists (68),
|
||
objectClassModsProhibited (69),
|
||
-- 70 reserved for CLDAP --
|
||
affectsMultipleDSAs (71), -- new
|
||
-- 72-79 unused --
|
||
other (80) },
|
||
-- 81-90 reserved for APIs --
|
||
matchedDN LDAPDN,
|
||
errorMessage LDAPString,
|
||
referral [3] Referral OPTIONAL }
|
||
|
||
Referral ::= SEQUENCE OF LDAPURL
|
||
|
||
LDAPURL ::= LDAPString -- limited to characters permitted in URLs
|
||
|
||
Controls ::= SEQUENCE OF Control
|
||
|
||
Control ::= SEQUENCE {
|
||
controlType LDAPOID,
|
||
criticality BOOLEAN DEFAULT FALSE,
|
||
controlValue OCTET STRING OPTIONAL }
|
||
|
||
BindRequest ::= [APPLICATION 0] SEQUENCE {
|
||
version INTEGER (1 .. 127),
|
||
name LDAPDN,
|
||
authentication AuthenticationChoice }
|
||
|
||
AuthenticationChoice ::= CHOICE {
|
||
simple [0] OCTET STRING,
|
||
-- 1 and 2 reserved
|
||
sasl [3] SaslCredentials }
|
||
|
||
SaslCredentials ::= SEQUENCE {
|
||
mechanism LDAPString,
|
||
credentials OCTET STRING OPTIONAL }
|
||
|
||
BindResponse ::= [APPLICATION 1] SEQUENCE {
|
||
|
||
|
||
|
||
Wahl, et. al. Standards Track [Page 46]
|
||
|
||
RFC 2251 LDAPv3 December 1997
|
||
|
||
|
||
COMPONENTS OF LDAPResult,
|
||
serverSaslCreds [7] OCTET STRING OPTIONAL }
|
||
|
||
UnbindRequest ::= [APPLICATION 2] NULL
|
||
|
||
SearchRequest ::= [APPLICATION 3] SEQUENCE {
|
||
baseObject LDAPDN,
|
||
scope ENUMERATED {
|
||
baseObject (0),
|
||
singleLevel (1),
|
||
wholeSubtree (2) },
|
||
derefAliases ENUMERATED {
|
||
neverDerefAliases (0),
|
||
derefInSearching (1),
|
||
derefFindingBaseObj (2),
|
||
derefAlways (3) },
|
||
sizeLimit INTEGER (0 .. maxInt),
|
||
timeLimit INTEGER (0 .. maxInt),
|
||
typesOnly BOOLEAN,
|
||
filter Filter,
|
||
attributes AttributeDescriptionList }
|
||
|
||
Filter ::= CHOICE {
|
||
and [0] SET OF Filter,
|
||
or [1] SET OF Filter,
|
||
not [2] Filter,
|
||
equalityMatch [3] AttributeValueAssertion,
|
||
substrings [4] SubstringFilter,
|
||
greaterOrEqual [5] AttributeValueAssertion,
|
||
lessOrEqual [6] AttributeValueAssertion,
|
||
present [7] AttributeDescription,
|
||
approxMatch [8] AttributeValueAssertion,
|
||
extensibleMatch [9] MatchingRuleAssertion }
|
||
|
||
SubstringFilter ::= SEQUENCE {
|
||
type AttributeDescription,
|
||
-- at least one must be present
|
||
substrings SEQUENCE OF CHOICE {
|
||
initial [0] LDAPString,
|
||
any [1] LDAPString,
|
||
final [2] LDAPString } }
|
||
|
||
MatchingRuleAssertion ::= SEQUENCE {
|
||
matchingRule [1] MatchingRuleId OPTIONAL,
|
||
type [2] AttributeDescription OPTIONAL,
|
||
matchValue [3] AssertionValue,
|
||
dnAttributes [4] BOOLEAN DEFAULT FALSE }
|
||
|
||
|
||
|
||
|
||
Wahl, et. al. Standards Track [Page 47]
|
||
|
||
RFC 2251 LDAPv3 December 1997
|
||
|
||
|
||
SearchResultEntry ::= [APPLICATION 4] SEQUENCE {
|
||
objectName LDAPDN,
|
||
attributes PartialAttributeList }
|
||
|
||
PartialAttributeList ::= SEQUENCE OF SEQUENCE {
|
||
type AttributeDescription,
|
||
vals SET OF AttributeValue }
|
||
|
||
SearchResultReference ::= [APPLICATION 19] SEQUENCE OF LDAPURL
|
||
|
||
SearchResultDone ::= [APPLICATION 5] LDAPResult
|
||
|
||
ModifyRequest ::= [APPLICATION 6] SEQUENCE {
|
||
object LDAPDN,
|
||
modification SEQUENCE OF SEQUENCE {
|
||
operation ENUMERATED {
|
||
add (0),
|
||
delete (1),
|
||
replace (2) },
|
||
modification AttributeTypeAndValues } }
|
||
|
||
AttributeTypeAndValues ::= SEQUENCE {
|
||
type AttributeDescription,
|
||
vals SET OF AttributeValue }
|
||
|
||
ModifyResponse ::= [APPLICATION 7] LDAPResult
|
||
|
||
AddRequest ::= [APPLICATION 8] SEQUENCE {
|
||
entry LDAPDN,
|
||
attributes AttributeList }
|
||
|
||
AttributeList ::= SEQUENCE OF SEQUENCE {
|
||
type AttributeDescription,
|
||
vals SET OF AttributeValue }
|
||
|
||
AddResponse ::= [APPLICATION 9] LDAPResult
|
||
|
||
DelRequest ::= [APPLICATION 10] LDAPDN
|
||
|
||
DelResponse ::= [APPLICATION 11] LDAPResult
|
||
|
||
ModifyDNRequest ::= [APPLICATION 12] SEQUENCE {
|
||
entry LDAPDN,
|
||
newrdn RelativeLDAPDN,
|
||
deleteoldrdn BOOLEAN,
|
||
newSuperior [0] LDAPDN OPTIONAL }
|
||
|
||
ModifyDNResponse ::= [APPLICATION 13] LDAPResult
|
||
|
||
|
||
|
||
Wahl, et. al. Standards Track [Page 48]
|
||
|
||
RFC 2251 LDAPv3 December 1997
|
||
|
||
|
||
CompareRequest ::= [APPLICATION 14] SEQUENCE {
|
||
entry LDAPDN,
|
||
ava AttributeValueAssertion }
|
||
|
||
CompareResponse ::= [APPLICATION 15] LDAPResult
|
||
|
||
AbandonRequest ::= [APPLICATION 16] MessageID
|
||
|
||
ExtendedRequest ::= [APPLICATION 23] SEQUENCE {
|
||
requestName [0] LDAPOID,
|
||
requestValue [1] OCTET STRING OPTIONAL }
|
||
|
||
ExtendedResponse ::= [APPLICATION 24] SEQUENCE {
|
||
COMPONENTS OF LDAPResult,
|
||
responseName [10] LDAPOID OPTIONAL,
|
||
response [11] OCTET STRING OPTIONAL }
|
||
|
||
END
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Wahl, et. al. Standards Track [Page 49]
|
||
|
||
RFC 2251 LDAPv3 December 1997
|
||
|
||
|
||
Full Copyright Statement
|
||
|
||
Copyright (C) The Internet Society (1997). All Rights Reserved.
|
||
|
||
This document and translations of it may be copied and furnished to
|
||
others, and derivative works that comment on or otherwise explain it
|
||
or assist in its implementation may be prepared, copied, published
|
||
and distributed, in whole or in part, without restriction of any
|
||
kind, provided that the above copyright notice and this paragraph are
|
||
included on all such copies and derivative works. However, this
|
||
document itself may not be modified in any way, such as by removing
|
||
the copyright notice or references to the Internet Society or other
|
||
Internet organizations, except as needed for the purpose of
|
||
developing Internet standards in which case the procedures for
|
||
copyrights defined in the Internet Standards process must be
|
||
followed, or as required to translate it into languages other than
|
||
English.
|
||
|
||
The limited permissions granted above are perpetual and will not be
|
||
revoked by the Internet Society or its successors or assigns.
|
||
|
||
This document and the information contained herein is provided on an
|
||
"AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
|
||
TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
|
||
BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
|
||
HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
|
||
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Wahl, et. al. Standards Track [Page 50]
|
||
|