[Date Prev][Date Next]
[Chronological]
[Thread]
[Top]
Re: I-D ACTION:draft-ietf-ldapbis-url-05.txt
At 03:05 PM 2/16/2004, Mark Smith wrote:
>>>If an LDAP URL extension is recognised by an implementation, the
>>>implementation MUST make use of it.
>>What if you recognise it, but don't implement it?
>>If it is not critical then I see no reason why the operation should not
>>proceed.
>
>Kurt can probably explain this better than I can... but the goal is to be consistent the philopsophy used for LDAP controls in the Protocol document.
>I think "recognized" implies "ability to use" an extension; that is, if an implementation recognizes an extension it is able to use it.
I prefer "implement" here over "recognize". Like a number of
other protocol tokens, it is possible to "recognize" an
token without actually implementing the syntax and semantics
associated with that token. For instance, a implementation
could recognize the bindname extension but not implement it
(maybe the implementation only supports the mandatory-to-implement
authentication mechanism (e.g., DIGEST-MD5)).
Ron asked:
>Why are they called extensions and not controls? It looks a bit misleading to me. (LDAP can be extended in a number of ways.)
I think it would be misleading to call them LDAP URL Controls
as they would confused with LDAP Controls. LDAP URL Extensions
are not necessarily LDAP Controls.
Kurt