[Date Prev][Date Next] [Chronological] [Thread] [Top]

Re: LDAP URI scheme that specify alternative transport protocols



> There was some work along this line (I think in the IMAP context) that I 
> think fizzled due to the obvious complexity of this, and the realization 
> that jamming security policy into a URI is probably a bad idea in most 
> cases.  But it may be that the time is ripe to try this again.

There seems to be three issues:
 - what aspects to model
 - how to represent them
 - how to put them into URIs

The RESCAP BOF dealt with the middle and a bit of the first.  

Those who are interested in this topic might want to talk to the RESCAP 
chairs about this to find out if there is a mailing list.

Mark Wahl, Directory Product Architect
Innosoft International, Inc.


    To: IETF-Announce: ; 
    Subject: 44th IETF: BOFs - RESCAP, REMBOOT 
    From: Steve Coya <scoya@ns.cnri.reston.va.us> 
    Date: Tue, 09 Mar 1999 06:54:02 -0500 
    cc: new-work@search.ietf.org 


Resource Capabilities Discovery BOF (rescap)

Monday, March 15 at 1530-1730
=============================

Chairs: James M Galvin <galvin@commerce.net>
        Ned Freed <Ned.Freed@innosoft.com>

DESCRIPTION:

A variety of resource identifiers have been widely deployed on the 
Internet as a means of identifying various resources, services, and 
destinations. However, a means of attaching a set of attributes or 
characteristics to a given resource identifier and subsequently 
assessing those attributes or characteristics has not been specified 
and deployed.

A particularly important resolution service of this general type is 
one which, when given a mail address identifying a particular mail 
recipient, will return a series of attributes describing the 
capabilities of that recipient. This differs from a directory service 
in that no searching or other advanced query operations are involved.

The first task of this working group will be to define a general 
resolution protocol that will translate resource identifiers to a list 
of attributes. At a minimum the service must be capable of returning 
mail recipient capabilities as described above, but ideally the service 
should also handle more general capability and characteristics 
discovery.

The second task of this working group will be to define an 
administrative model and update protocol that can be used to set up and 
maintain the information the resolution protocol accesses.

The service resulting from the combination of these two protocols must 
meet the following requirements:

(0) The resolution protocol must be highly scalable, as the intent is 
    to deploy it very widely.

(1) Resolution protocol and server overhead must be very low, as some
    applications will make very heavy use of it.

(2) Identifiers input to the resolution service must be formatted as
    Uniform Resource Identifiers (URIs) containing one or more DNS 
    domains. Note that mail addresses can be presented as mailto: URIs  
    to meet this requirement.

(3) Facilities to support inheritance within the attribute store will
    be essential, as the number of identifiers may be very large. 
    Specifically, mechanisms must be provided by which administrators 
    can set default values for members of their administrative domains.

(4) Existing protocols will be profiled for use as part of this service
    whenever possible rather than developing new protocols. In 
    particular:

    (a) The DNS must be used as the first step in the resolution
        service. This is because all the URIs under consideration here
        contain a DNS domain and the DNS is already properly delegated.
    (b) Existing DNS record types such as SRV and NAPTR will be used if
        feasible, to ease deployment.
    (c) A lightweight resolution protocol may be defined by this working 
        group if no existing protocol proves to be suitable.
    (c) A lightweight resolution protocol may be defined by this working
        group if no existing protocol proves to be suitable.
    (d) An existing administrative model and maintenance protocol will 
        be used if feasible. Possible candidates for this include ACAP
        and LDAPv3. The protocol and security model by which a user can
        update his or her own attributes must be covered.

The means to register and extend the set of attributes must be 
specified. However, specification of actual attributes needed by 
various applications of this service is outside of the scope of this 
working group.

AGENDA:

Charter review/bashing (20 mins)
Query protocol requirements (30 mins)
Administrative/update protocol requirements (30 mins)
Use of existing protocols for administration/update (10 mins)