ACP133D
ACP133D
ACP 133(D)
ACP 133(D)
COMBINED COMMUNICATIONS-ELECTRONICS
BOARD (CCEB)
JULY 2009
i Original
UNCLASSIFIED (Reverse Blank)
UNCLASSIFIED
ACP 133(D)
FOREWORD
1. The Combined Communications-Electronics Board (CCEB) is comprised of the
five member nations, Australia, Canada, New Zealand, United Kingdom and United
States and is the Sponsoring Authority for all Allied Communications Publications
(ACPs). ACPs are raised and issued under common agreement between the member
nations.
3. This publication contains Allied military information for official purposes only.
iii Original
UNCLASSIFIED (Reverse Blank)
UNCLASSIFIED
ACP 133(D)
EFFECTIVE STATUS
Paul Foster
P. FOSTER
Major, CF
CCEB Permanent Secretary
v Original
UNCLASSIFIED (Reverse Blank)
UNCLASSIFIED
ACP 133(D)
Original
UNCLASSIFIED (Reverse Blank)
UNCLASSIFIED
ACP 133(D)
vii Original
UNCLASSIFIED (Reverse Blank)
UNCLASSIFIED
ACP 133(D)
TABLE OF CONTENTS
TITLE PAGE ....................................................................................................................... i
FOREWORD ..................................................................................................................... iii
THE COMBINED COMMUNICATION-ELECTRONICS BOARD LETTER OF
PROMULGATION..............................................................................................................v
RECORD OF MESSAGE CORRECTIONS.................................................................... vii
TABLE OF CONTENTS................................................................................................... ix
LISTS OF FIGURES AND TABLES .............................................................................. xii
CHAPTER 1 .................................................................................................................... 1-1
INTRODUCTION ........................................................................................................... 1-1
GENERAL AND SCOPE.................................................................................... 1-1
BACKGROUND ................................................................................................. 1-2
FUTURE EVOLUTION...................................................................................... 1-2
OVERVIEW OF ALLIED DIRECTORY SERVICES....................................... 1-2
CHAPTER 2 .................................................................................................................... 2-1
SYSTEM ARCHITECTURE .......................................................................................... 2-1
Section I - Directory System............................................................................................ 2-1
GENERAL........................................................................................................... 2-1
Section II - The Directory Information Base ................................................................... 2-2
ALLIED DIRECTORY SCHEMA...................................................................... 2-2
DIRECTORY ENTRIES FOR MESSAGING USERS....................................... 2-2
CONTENT RULES ............................................................................................. 2-2
DIRECTORY INFORMATION TREE............................................................... 2-3
SUBTREES.......................................................................................................... 2-3
Section III - User Services ............................................................................................... 2-5
USER ACCESS TO THE DIRECTORY ............................................................ 2-5
Section IV - Components................................................................................................. 2-7
GENERAL........................................................................................................... 2-7
DSAS ................................................................................................................... 2-8
BORDER DSAS .................................................................................................. 2-8
DUAS................................................................................................................... 2-9
Section V - Protocols ..................................................................................................... 2-11
GENERAL......................................................................................................... 2-11
DAP.................................................................................................................... 2-11
DSP .................................................................................................................... 2-11
DISP................................................................................................................... 2-12
DOP.................................................................................................................... 2-12
UNDERLYING PROTOCOLS ......................................................................... 2-12
LDAP ................................................................................................................. 2-12
DIRECTORY DATA REPRESENTATIONS .................................................. 2-13
LDIF................................................................................................................... 2-14
DSML ................................................................................................................ 2-14
ix Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
x Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
xi Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
LIST OF FIGURES
LIST OF TABLES
xii Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
CHAPTER 1
INTRODUCTION
GENERAL AND SCOPE
101. The function of this document, Allied Communication Publication (ACP) 133, is
to define the Directory services, architecture(s), protocols, schema, policies, and
procedures to support Allied communications, including Military Message Handling
System (MMHS) services based on ACP 123, in both the strategic and tactical
environments. The Directory services are based on the International Telecommunication
Union Telecommunication Standardization Sector (ITU-T) X.500 Series of
Recommendations and the International Organization for Standardization (ISO) /
International Electrotechnical Commission (IEC) 9594. These Directory specifications
will be referred to as X.500 in this document. Note that familiarity with X.500 is
assumed.
102. The Allied Directory Services defined in this document are based on the X.500
Directory recommendations (exact documents and version numbers listed in References
on page REF-1). It is expected that an evolutionary period will be necessary for existing
Directory Services to become ACP 133-compliant. In this sense, ACP 133 is viewed as a
“target”. The manner, means, and duration of such evolution are outside the scope of
ACP 133.
103. This ACP applies to communication among the Allied Directory domains and
within a domain for combined operations. It defines a common Directory schema which
shall be supported by all Allies for international and combined operations. It offers
support for Internet mail users and transitional support for ACP 127/Joint Army, Navy,
Air Force Procedure (JANAP) 128. The Directory has the potential to support different
views of directory information such as white pages and yellow pages services.
104. Local interfaces and requirements, such as the specifics of terminal display and
local caching, are part of this publication where required to ensure interoperability.
ACP 133 includes requirements for which directory information must be displayed to the
user, but the format of the display is outside the scope of this document.
105. The third version of ACP 133 defines the services, schema, and protocols required
of X.500 Directory System Agents (DSAs) and Directory User Agents (DUAs) to support
electronic mail (e-mail), S/MIME, Message Handling System (MHS), MMHS, ACP 127
interworking and traditional communications. It also identifies security mechanisms that
meet the security requirements for strong authentication, confidentiality, integrity,
availability, and privilege/label management. As national systems and products mature,
this document will be expanded to include more procedural guidance for managing the
directory, support for other applications, and additional guidance for operation of tactical,
mobile and deployed directories.
1-1 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
106. In order to maximize the number of products supporting ACP 133, the schema
definition has been split into a core schema, to which all products must conform, plus
optional schema sections relating to PKI Infrastructures and legacy (ACP 127 /
JANAP 128) messaging. In addition, Lightweight Directory Access Protocol (LDAP)
has been added as an alternative Directory Access Protocol (DAP), thus reflecting its
almost universal adoption over X.500 DAP for general user access to the Directory.
Where possible, to maximize compatibility with existing COTS Directory Products, the
ACP 133 schema has been redefined to utilize standard attribute syntaxes in preference to
proprietary ones used in earlier versions of this document.
BACKGROUND
107. This ACP was originally written and coordinated by the Combined
Communications Electronics Board (CCEB) with the Allied Message Handling (AMH)
International Subject Matter Experts (ISME) working group. This group was organized
to develop a common messaging strategy that can be deployed to facilitate
interoperability among the Allies for military message traffic. Part of this task, and the
subject of this ACP 133, was to develop a directory service that could provide access to
information needed for messaging. An ACP 133 Task Force was formed to develop
Directory requirements and this ACP.
109. Responsibility for the maintenance of this ACP currently rests with the CCEB
DSWG.
FUTURE EVOLUTION
110. This ACP is based on civilian international standards in order to take advantage of
the availability of Commercial Off-The-Shelf (COTS) directory products. As a result, the
CCEB and NATO DSWGs should monitor the future development of the international
standards and the resultant products. As new capabilities are standardized those that are
found to be useful and appropriate should be added to ACP 133. In order to maintain
consistent directory service among the Allies, new versions of this ACP will be
developed with formal review and coordination.
111. The Allied Directory is the combination of the parts of the national directories and
those Combined Task Force (CTF) directories, when they exist, that are to be shared with
the Allies. For example, specific unique directory requirements must be satisfied to
1-2 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
support operations which would result from dynamic military operations. Thus, it is
envisioned that the Allied Directory will consist of relatively stable, shared national and
combined domains, as well as periodic dynamic combined domains to satisfy specific
operations involving coalitions of national military forces and organizations, such as
NATO. An overview of the Allied Directory is shown in Figure 1-1. It should be noted
that whilst this section describes an X.500 implementation of the Allied Directory, it does
not preclude the use of other technologies such as LDAP Servers.
112. A third class of directory making up the Allied Directory belong to organizations,
which could be permanent collectives (such as NATO) or functionally based
organizations requiring their own directory, such as a coalition collaborative tool
management organization. This latter organization could manage the membership of
collaboration services (such as “chat rooms”) on behalf of the user nations. Directory
entries held by it could be chat room names, with membership being defined by pointers
to entries in national directories.
113. The information accessible using the Allied Directory System is contained in the
Allied Directory Information Base (DIB). The information published in the Allied
Directory DIB is provided to support Allied communications, including MMHS services
based on ACP 123, in both the strategic and tactical environments. Besides the
information used by the messaging application, the Allied Directory System supports the
storage of certificates needed for secure messaging (e.g., ACP 120) and for other secure
1-3 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
applications such as Electronic Data Interchange (EDI). The Allied Directory DIB also
contains information for managing the components of the Allied communications system.
115. A CTF domain is a subset of the Allied Directory that is provided by two or more
Allies and includes unique mission-related information, policy, and components. The
combined domain is owned, operated and administered by a multi-national military unit.
The commander of the CTF establishes the rules and procedures for its domain. No
information and components are supplied or maintained by the CCEB. Rather, this ACP
defines mechanisms for sharing information and interconnection of national assets to
support combined operations. Note that, in this ACP, the significance of the term
“combined task force” is very broad and should not be confused with specific “task
force” designations already in use by various organizations such as Naval Task Force,
defined by AUSCANZUKUS.
116. The Directory is composed of one or more DSAs that are the repositories for
some portion of the DIB. The DIB contains user information and operational information
for use by the Directory system. Each user of the Directory, whether a person or an
application, uses a DUA to access the Directory. The Directory schema contains the
rules governing the contents of the DIB. Within a Nation, a specialized Directory, known
as a “Border” DSA, will normally be used to provide separation between the Nation’s
internal domains and the Allied Directory domain. The Border DSA will normally
contain that subset of the Nation’s DIT which it is prepared to share with other Nations,
thus insulating itself and protecting against accidental or malicious extraction of National
directory information.
117. In a native X.500 environment, DUAs and DSAs communicate with each other by
using the Directory Access Protocol (DAP), whilst DSAs communicate with each other
using the Directory System Protocol (DSP), the Directory Information Shadowing
Protocol (DISP) or the Directory Operational Binding Management Protocol (DOP).
DSP is used by DSAs to “chain” requests from users when the originating or “home”
DSA of the user does not have the requested information. DISP is used in the process of
replicating information among DSAs. DOP is used to perform the management aspects
of replication necessary for DISP and to maintain the knowledge and access control,
collective attributes, and other administrative information. These components and
protocols are pictured in Figure 1-2.
118. There are many different architectural models which may be adopted to
implement a specific instance of an Allied Directory, and this ACP is not intended to be
1-4 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
prescriptive as to how this should be achieved. The two most popular architectures
which have been considered are:
a. Hub and Spoke: In this scenario, a central Hub Directory acts as a routing
point for all partcipants, allowing them to share their information once to
the Hub, whilst receiving all other participants’ information back from the
Hub; and
119. In some architectures, a copy of all other nations’ data is held locally, whilst in
others, the DSP protocol is used to get required information from a remote server on
demand from users. There is no single architecture which is better than any other, the
choice should be based on the particular needs and characteristics of the Directory service
required by its users and the underlying network capabilities available.
120. Where non-X.500 components comprise part of the directory environment, other
protocols such as LDAP (Lightweight Directory Access Protocol) may be used. In
particular, LDAP will often be preferred over DAP as a more efficient protocol for user
access to the directory. It may also be used in place of X.500 DISP for replication of
directory data to and from a National Border Directory and the Allied Directory. Other
non-X.500 protocols and mechanisms also exist such as LDIF (Lightweight Directory
Interchange Format), which allows directory data to be exchanged as text files and is
already used for data interchange within CCEB and NATO.
121. The logical arrangement of the structure of the DIB is called the Directory
Information Tree (DIT). Different parts of the DIT will be managed by different
organizations. To accomplish this, the DIT can be divided into subtrees called
administrative areas. Policies concerning access control, schema, and collective
attributes, which are explained later in this document, may then be formulated for
particular subtrees.
1-5 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
122. The Allied Directory schema contains the rules governing the contents of the
DIB. The schema includes a set of definitions for DIT Structure Rules, Object Classes,
Attribute Types and Matching Rules. The Allied Directory Schema is based to the extent
possible on definitions in the ITU-T X.400 and X.500 Series of Recommendations and
other applicable standards for object classes, attribute types, and matching rules. Where
necessary, ACP 133 defines these elements or imports definitions from other sources. In
this document, schema elements are highlighted by bold italics.
123. Because of the almost universal use of LDAP as the user access protocol of
choice, the schema definition has been augmented with corresponding LDAP definitions
of X.500 schema elements. However, it is not intended at this time to enhance the
schema to provide all information necessary to allow full implementation of LDAP
servers to replace X.500 servers. If this becomes a requirement in future, the schema can
be augmented to add this information.
124. In addition to the user information which is controlled by the Allied Directory
Schema, an X.500 implementation of the Allied Directory System can contain directory
administrative and operational information. This system information is governed by the
Allied Directory System Schema which is a set of definitions and constraints concerning
the information that the Allied Directory System itself needs to know in order to operate
correctly. This information is specified in terms of subentries and operational attributes.
Subentries contain information relevant to a particular subtree of the DIT, and contain
operational attributes. Also, user entries may contain operational attributes, such as, the
last time the entry was modified.
125. Whilst X.500 and other directory standards and recommendations describe the
complete directory service model, and this and subsequent chapters describe how the
complete Allied directory may be built, the key requirement of ACP 133 is how the
nations and organizations making up the Allied Directory service actually share their
information. Thus nations may extend schemas and change their system to meet local
needs and policies, but how they share this information with other nations must conform
to the schema and rules (i.e., only entries, objects and attributes defined in this document
may be shared using mechanisms defined here). This is to allow maximum scope to
nations to build directories which meet their needs, whilst still ensuring interoperability
in the Allied Directory arena.
1-6 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
CHAPTER 2
SYSTEM ARCHITECTURE
c. The systems in which the information is housed or used i.e., the directory
physical architecture;
202. Whilst this and the following chapters consider the directory system in general,
much of this is beyond the scope of ACP 133, which is primarily concerned with the
sharing of information between nations and authorized organizations. It is anticipated
that nations will extend schemas beyond those defined in this document and will provide
services to users and administrators which may not always conform to the services
described here, dependent upon local policies and rules. However, when nations or
organizations need to share information through the Allied Directory, rules for
interoperability (i.e., what may be shared and how) must be adhered to.
2-1 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
203. The Allied Directory Schema encompasses the directory entry types, object
classes, attributes, matching rules, name forms and structure rules that are necessary for
specifying the information that is stored in the Allied Directory System. Components of
the Allied Directory System shall implement all of the standard object classes, attributes,
and name forms defined in X.501, X.509, X.520, X.521 and X.402, as specified in ACP
133 Supp-1. The Allied Directory Schema, called Common Content, employs the
standard schema elements and also includes object classes, attributes and name forms
defined in this ACP especially to meet Allied requirements. The Allied Directory
Schema is described in chapter 6 and specified fully in ACP 133 Supp-1.
204. One purpose of the Allied Directory is to provide access to stored information
about organizations and individuals in various Allied domains to enable them to
exchange messages i.e., to be users of the message exchange services defined in
ACP 123. The stored information is the DIB in which each entry represents a user or
group of users. Three types of entries are defined, corresponding to the organizational
unit, organizational role, and organizational person (i.e., an individual) categories of
messaging users. A fourth type of entry, address list, is defined for representing groups
of users.
CONTENT RULES
205. Content rules, which are part of the X.500 schema definition, are used for two
purposes:
a. A content rule can be used to define one or more entry types with a base
structural object class by adding auxiliary object classes and adding (or
deleting) attributes without creating a new object class; and
b. The X.500 directory standard requires the use of a content rule to allow
the application of collective attributes to an entry type, since none of the
defined object classes are allowed to contain collective attributes.
206. Recent experience with interoperability testing between Nations using different
directory products has identified significant issues relating to the use of content rules. In
view of this, content rules have been removed from the ACP 133 Common Content
schema (ACP 133 Supp-1), for the following reasons:
2-2 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
b. Collective attributes are no longer included with the ACP 133 Schema;
and
c. DISP Replication testing has identified that the key requirement for
successful replication is use of a common schema, exactly matching
Object Classes and attributes to entries. Modification to the contents of
entries beyond that explicitly defined by the associated Object Classes is a
major cause of replication failure. Thus ACP 133 Supp-1 contains Object
Class definitions which must be fully conformed to for data sharing
between Nations and Coalitions.
207. The removal of content rules from ACP 133 SUPP-1 does not preclude their use
internally within a specific directory product. However, when attempting
interoperability, strict adherence to ACP 133 SUPP-1 is required.
208. Entries in the Allied Directory are arranged in the form of an inverted tree, called
the DIT, where the vertices represent the entries. Each entry adds the value of one or
more attributes. The ordered list of the values of the branches through the tree to a user
entry is the Distinguished Name (DN) for the entry. The entries highest in the Allied
Directory tree represent countries and international/multinational organizations (such as
NATO), those in the middle represent organizations and localities, and those at the
bottom represent individuals, application processes, address lists, etc.
SUBTREES
209. The Allied Directory DIT is composed of a number of subtrees obtained from
participating Nations, Allies and Coalitions. Nations will normally provide a national
subtree whose most superior element is a country entry (as defined by X.521),
immediately below the root 1 . Additional subtrees may be provided, again normally
immediately below the root, by associated organizations (such as NATO), by Coalition
members with responsibility for directory management within the Coalition and even by
Nations which have already provided their country entry. These additional subtrees will
be headed by a superior element comprising either an organization or a locality entry
(again both as defined in X.521).
210. The arrangement of the levels of the DIT below a top-level entry, and the values
of the entries, are a matter of national or coalition policy and are outside the scope of this
ACP as long as the structure rules defined by this ACP are not violated when entries are
shared in the Allied Directory.
1The root is the notional top of the DIT, below which top-level entries are created. Only
certain Object Classes may be held immediately below the root.
2-3 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
211. Typically, below the country entry of a Nation is one of the subtrees that include
the armed forces of the Ally, e.g., Department of Defense for the U.S. The armed forces
are usually represented by an organization or organizationalUnit. Below the armed
forces level, each Nation will define the subtrees that contain the information needed to
represent its forces, including services, agencies, and commands. The commands may
also include the CTFs that are led by the Nation.
2-4 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
212. ACP 123 defines message handling services offered to the user in terms of
Elements of Service (EoS) according to the definitions in the X.400 Recommendations.
The X.500 Recommendations do not define services offered to the users in this way. In
this document, the services that are offered to the Directory user are referred to by the
term “user services”. Some user services are described as optional, that is, they are
available to the user only if they are offered by the Allied Directory System. The user
shall be able to select the appropriate user services for interrogation, modification and
administration of the Allied Directory.
213. Generally, the user services are employed to deal with “directory user
information”, i.e., the information in the directory about the entities represented by the
entries. Administration is a special case of directory usage where access is also necessary
to the “directory system information”, which is the information in the entries and
subentries concerning the operation of the Directory itself, such as Access Control
Information (ACI). Interrogation, modification, and administration usages of the
directory are illustrated in Figure 2-1. Although the figure shows human users, a
directory user may be an application process, such as an MMHS User Agent (UA).
2-5 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
214. The Allied Directory System provides all standard X.500 directory user services,
which correspond to the formal operations specified for access to a directory system.
However, the Allied Directory System limits the use of some services by some users. For
example, only authorized personnel may be allowed to employ the user services that
create new entries in the Allied Directory.
215. User authentication is also required by the Allied Directory Service, but in a local
environment, this will be defined by national policy. Additional authentication
requirements and details are addressed in paragraph 402. In the national domain, read-
only access to local information (including copies of other nation’s data) may be
provided in “anonymous” mode, in which no authentication information is required from
the user.
216. For every user service, the results or errors from each request shall be provided,
either in textual form to a human user or through a result code to an application.
217. The preferred protocol used by many nations for directory access is LDAP, rather
than the DAP protocol defined for directory access in X.500. LDAP (Lightweight
Directory Access Protocol) was originally developed for smaller user access devices
(e.g., PCs) when computing power and memory was much more limited, and employs
simpler and less memory and processor intensive protocols, with fewer, simpler
operations available plus the use of text strings for data transfer in all but the most
complex situations. Although the arguments for use of LDAP to match available
computing power are not longer applicable, the directory world, and CCEB/NATO
nations, has almost entirely adopted LDAP as the user access protocol of choice. In order
to use it, national directories need to provide an LDAP service, either built-in directly to a
DSA or as a separate LDAP server, which accepts LDAP requests and translates these to
DAP before relaying them on to the DSA.
2-6 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
Section IV - Components
GENERAL
2-7 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
219. This section applies to both national and combined domains described in
paragraph 111. The DSAs within a CTF domain are termed “National” and “Border” in a
manner analogous to a national domain. That is, a National DSA in a CTF domain is
only connected to DSAs within the domain and connections to other domains are made
by Border DSAs.
DSAS
220. DSAs collectively hold the Allied DIB and interact with one another to make the
entire DIB accessible to the directory users. The directory system is comprised of DSAs
that interact with one another to perform the directory services described above. The
DSAs interact with DUAs to get user requests and provide the results from processing the
requests.
221. Within each DMD, the distribution of directory information among multiple
DSAs is a national/combined task force matter, subject to the quality of service,
management and security provisions of this ACP.
223. The contents of National DSAs are a national matter, except that a common
definition of National DSA contents is necessary for interoperability of assets from
different nations in CTF domains. The contents of the Border DSAs are the information
the ally makes available in the Allied Directory System. Which
Services/agencies/commands, entries or attributes from the national directory service are
included in the Allied Directory System is a national or CTF matter. A combination of
Directory access controls and other separation mechanisms such as entry subsetting may
be used to effect the segregation of domain-specific and shared information.
BORDER DSAS
224. A Border DSA is a logical or physical DSA that has been designated to provide
the primary international interface for a nation’s or CTF’s directory system. The
implementation of an instance of a Border DSA may be a specific or separate component
or a logical partition of the information, or even a process which subsets the information
into a non-directory form which can be shared bilaterally with other nations (e.g., a CSV
or LDIF file). Where Border DSAs actually exist, they may be interconnected to enable
the sharing of directory information across DMDs. Within a CTF, DSAs from the
participating Allies shall interoperate in accordance with this ACP.
225. A Border DSA shall perform many functions that ordinary DSAs within a nation
or CTF need not support. One of the major functions of a Border DSA is to provide the
portion of the national/task force DIB available for access in the Allied Directory System.
Thus, some portions of the national DIB may be unavailable to the Allied Directory
2-8 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
System. Also, a different security policy may apply to Border DSAs than to national
DSAs. How these subsetting and security requirements are met is implementation
independent.
226. The process for resolving directory queries within a particular national directory
domain is beyond the scope of ACP 133. Valid options include utilizing a shadow of the
national/task force DIB maintained locally within the Border DSA, chaining the query
onward into the national/task force domain, or providing a referral to a specific internal
DSA that can be accessed by the user. A nation/task force may designate any number of
DSAs as Border DSAs.
DUAS
227. The directory access facilities required by the Allies dictate that DUA
functionality is provided in a number of forms. DUA functionality will be embedded into
commercial products which provide the user desktop services. It is no longer envisaged
that information retrieval for Message Transfer Agents (MTAs) and other messaging
processes is provided other than within the National Domain, and therefore is not
considered further.
228. DUAs make requests on behalf of the directory user and present results back to
the user. For example, a user can request the Originator/Recipient (O/R) address of a
messaging user in another country. DUAs are interconnected with DSAs (possibly
including Border DSAs within other Nations or Coalitions).
229. The degree to which a DUA is integrated with another application, e.g., a Military
Messaging User Agent (MMUA) or Mail List Agent (MLA), varies according to the
application, its implementation, and the degree of human involvement in directory
information access. A DUA may also be an entirely independent application, requiring
no user interfaces to operate.
230. ACP 133 defines three types of DUA functionality. DUAs with different
functionality than is defined here may be used as a national option 2 :
2 It should be noted that LDAP only provides a subset of the operations listed in the
following paragraphs, although the same effects can be achieved using a combination of
the available operations.
2-9 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
233. Some DUAs may be designed for use in environments where such references are
never used, or a DUA may be simplified such that it cannot pursue a reference.
Alternatively, a DUA may be designed to be capable of pursuing references. Another
possibility is that a DUA product is designed to be configurable such that the capability
to pursue references may be controlled (either by the user or by the system
administrator). In any case, when a DUA does not automatically pursue a continuation
reference, the reference shall be passed to the user so that a procedure can be used
instead.
2-10 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
Section V - Protocols
GENERAL
235. To ensure interoperability among DUAs and DSAs from different nations, the
X.500 standard protocols are used for Allied Directory communications. These protocols
are:
a. DAP;
b. DSP;
c. DISP;
d. DOP; and
e. LDAP.
236. Use of these protocols may be a requirement within an Allied or CTF domain
dependent upon the architecture chosen. Otherwise, use of these protocols within a
national domain is outside the scope of this ACP.
DAP
237. DAP is used to convey requests for directory information to a DSA and to return
the results to the DUA. DAP is usually only used within a national or CTF domain
between a DUA and an internal DSA. If the architecture permits, DAP may also be used
between a DUA and a Border DSA in another domain and between a DUA and a DSA in
a CTF domain.
DSP
238. DSP is used to convey an information request to another DSA when the
requesting DSA does not have the complete information requested (i.e., to perform
chaining and to return the results to the requesting DSA). If allowed by the architecture,
DSP may be used between Border DSAs in different domains and between a DSA/Border
DSA and another DSA in a CTF domain.
239. When requested information is not present in the home DSA, chaining is
preferred over referral for access to the international information. To access information
that is specific to country B, a DUA within country A would access the directory through
its home DSA. The home DSA would chain the operation to the appropriate Border DSA
within country A. Depending on the specific information requested and on the
shadowing agreements that are in place, the country A Border DSA may either complete
the operation locally or further chain the operation to a country B Border DSA.
Similarly, the Border DSA in country B may contain a master or shadow copy of the
desired information, or it may chain the request onward within country B. Both chaining
2-11 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
and referrals may need to be supported in the Allied Directory dependent upon the
architecture chosen.
DISP
DOP
241. DOP is used to activate, deactivate, and modify shadowing agreements that have
been arranged between DSAs and to exchange knowledge and access control, collective
attributes, and other administrative information contained in subentries. DOP is used
between Border DSAs in different domains and between a DSA/Border DSA and another
DSA in a CTF domain.
UNDERLYING PROTOCOLS
242. All of the Directory protocols described above require use of the Association
Control Service Element (ACSE) and operate over the Presentation and Session Layer
protocols. These protocols are profiled in ISO/IEC ISP 15125-0, Common Upper Layer
Requirements (CULR) for the Directory. Below the Session Layer, the directory
applications require a connection-oriented transport service that may be provided in a
variety of ways, depending on the underlying networks and internetworking environment.
LDAP
243. LDAP was created for small, end-user clients, such as personal computers, to
provide lightweight access to an electronic directory. It simplifies the client
implementation by using text string variants of the most commonly required X.500 data
structures and cutting out some X.500 functionality that was considered unessential. The
protocol stack for LDAP avoids the overhead of session or presentation layer protocols,
but these savings may be offset by the additional size of data when encoded as a text
string.
244. The original LDAP (RFC 1487) specification was made obsolete by LDAP
version 2 (LDAP v2), covered by RFC 1777. In turn, LDAP v2 has been largely replaced
by LDAP v3 (RFC 2251). All protocol elements of LDAP v2 are supported by LDAP
v3. A large number of implementations of LDAP exist, including versions from all the
major systems providers, particularly the major Internet web browsers. Directory System
Agents (DSAs) implementing LDAP v3 should be able to support access from clients
2-12 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
using LDAP v2; similarly clients using LDAP v3 should be able to access servers using
LDAP v2 provided that the additional features of LDAP v3 are not used.
245. Part of the LDAP protocol is specifications for the X.500 directory data structures
in terms of text strings. These parallel structures significantly simplify the directory
client implementation by minimizing the amount of processing necessary for user input
before it is sent to the directory server. Recognizing these structures is an essential
component of any directory system implementation of this protocol. String
representations are defined in ACP 133 SUPP-1.
247. To be used to access the Allied Directory, LDAP clients must support the
ACP 133 schema for applications such as military messaging. The ACP 133 schema
includes definitions not included in LDAP Request For Comments (RFCs). LDAP
clients may be configurable to recognize new attributes. If the attributes have syntaxes
not defined for LDAP, such as OR-Address, implementations may be affected.
248. The limitations that affect interrogation operations are that LDAP:
b. Does not support the Read and List operations and uses Search as an
alternative, which may result in superfluous chaining; and
249. In addition to the limitations for interrogation operations, others that affect the
administration of the Directory are that LDAP:
250. Because of the limitations in LDAP, ACP 133 recommends that LDAP not be
used for directory modification, especially by Directory administrators, but be used
primarily for interrogation DUAs, where read-only directory access is required.
251. As well as the use of existing protocols to access the directory and to share
information, other mechanisms exist which may be equally appropriate for directory data
exchange and access. Those specifically included in ACP 133 are:
2-13 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
a. LDIF; and
b. DSML.
LDIF
252. LDAP Data Interchange Format (LDIF) describes a file format suitable for
describing directory information or modifications made to directory information. The file
format is typically used to import and export directory information between LDAP-based
directory servers, or to describe a set of changes which are to be applied to a directory.
LDIF is specified in RFC 2849.
253. Certain Allied directory exchange mechanisms, including the Enhanced Griffin
Directory Service, as defined in ACP 137, use LDIF to exchange directory information
between nations, using informal or Military Messaging as the transport mechanism,
including the LDIF as an attachment to the message. This removes the need to hold
information in the central management domain, whilst making copies available in each
National domain.
DSML
254. The Directory Services Markup Language (DSML) provides a means for
representing directory structural information as an XML document. The intent of DSML
is to allow XML-based enterprise applications to obtain information from a directory in
their native environment. DSML allows XML and directories to work together and
provides a common ground for all XML-based applications to make better use of
directories.
255. DSML is intended to be a simple XML schema definition that will enable
directories to publish basic profile information in the form of an XML document so that it
can be easily shared via native Internet protocols (such as HTTP or SMTP), as well as
used by other applications. The principal goal is to ensure that directories are able to
make a growing breed of XML based applications directory aware.
256. It is not an initial goal of DSML to specify the attributes that all directories must
contain, or the method with which the directory information is accessed from the
directory. The expectation is that standard protocols (such as LDAP), proprietary access
protocols (such as Novell's NDAP) and proprietary APIs (such as Microsoft's ADSI)
could produce DSML documents as an optional output.
257. It is anticipated that DSML will become a key enabler for directory access in the
future. However, it is still a fairly immature technology and hence is not discussed
further at this time, but developments should be tracked to monitor progress and stability
in the area.
2-14 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
259. Even within a replicated architecture, there are many different mechanisms which
may be employed to implement a solution. Questions which need to be resolved when
choosing an architecture, include:
a. Which protocols are allowed for replication? Whilst DISP is the obvious
choice, other solutions need to be considered either because DISP is not
supported through the gateway or for operational and management
reasons.
b. Does the architecture require a central “Hub” service, with each nation
representing a “Spoke”, all interconnecting with the centre, or does a
“Mesh” architecture represent a better solution?
c. How are Access Control, Data Separation and other data management
issues handled within the architecture?
PROTOCOLS SUPPORTED
261. ACP 133 no longer constrains the protocols which may be employed to achieve
data replication within an Allied Directory System. Whilst DISP is the obvious choice,
since it is a well defined protocol which is available from many sources as a COTS
product, DISP does suffer from a number of problems which are listed below. Thus
whilst DISP may be the chosen solution, it is important that these potential issues are
understood:
a. Whilst DISP replication from a single vendor can work very well,
interoperability between vendors has been found to be difficult to achieve
in practice. In the event of failure to replicate between DISP systems from
different vendors, diagnosis is extremely complex since the data
transferred can be extremely large. Interoperability analysis is probably
an order of magnitude more complex than for messaging, where Protocol
Data Units (PDUs) are fairly easy to capture and analyze;
2-15 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
d. Many DISP products have not given sufficient thought to the management
of DISP in a complex operational environment. For example, a managed
replay of data under user control when bandwidth is less constrained
should be allowed; and
e. Although DISP provides some limited capability for controlling the data to
be replicated (e.g., CHOP), these have been found in practice to be of
limited use in the military and more importantly deployed environment.
Whilst some products allow the list of attributes which are replicated to be
managed, there is no mechanism for controlling which entries should be
replicated or not.
263. One of the key characteristics of DISP is that replicated data may not be modified.
From a security perspective, this is often considered to be an advantage, by ensuring that
data cannot be modified other than within the local domain, possibly avoiding denial of
service issues. If other solutions than DISP are allowed, the need to secure the incoming
data from inadvertent or malicious changes may need to be considered within the
architectural design. Conversely, the development of international Military Messaging
solutions has indicated that the ability to modify received information (such as addresses
to make them valid locally) may be necessary.
SERVER ARCHITECTURES
264. Two architectures have been identified within the Replicated data model, either
Hub and Spoke, as depicted in figure 2.3 and a Mesh as depicted in figure 2.4. In both
cases, each participating Nation, Organization or CTF interfaces through a Border DSA,
which contains only that information which may be shared, thus ensuring that nationally
private data, which may not be shared, is not accessible. Note that in both figures, other
2-16 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
Security Enforcing components, such as Gateways and Firewalls are not shown. In most
systems, these would be necessary to ensure national data security.
265. The Hub and Spoke architecture is most suitable for a large number of
participating Nations or CTFs, since each Border DSA only needs to connect to a single
Hub server. Only one outgoing replication agreement (to the Hub) is required, plus one
agreement for each other participating Nation/CTF from which it requires data. The Hub
is responsible for replicating each nation’s data to all others. The Hub and Spoke
architecture insulates each nation from the need to test with all other nations; only the
connection to the Hub need be proved before connection.
266. One of the key issues with Hub and Spoke is provision of the Hub service within
the network (although in practice this could be held within one participant’s domain). In
addition, data separation is not possible in the case where different data may be shared
with different nations. Unless the Hub management is cleared to see the superset of all
data, security issues will ensue.
267. The Mesh architecture is preferred only where the number of participants is
limited; otherwise the number of replication agreements can become unmanageable. In
addition, since each nation has to connect to all other nations, the solution is only
2-17 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
recommended where well trusted and proven protocols are employed for data replication.
This architecture is also recommended when nations must send different directory data to
each other nation (such as when different subsets of entries or attributes may be allowed),
since there is no need for all data to be held within a central hub.
268. As has been mentioned earlier, DISP does not provide usable capabilities for the
subsetting of a national DIT and replicating certain entries but not others. Various
solutions have been suggested for this, possibly the most appropriate being to define a
multi-valued attribute within each entry, thus allowing entries to be tagged from which
replication decisions can be made (e.g., “Griffin” Tag for indicating entries which can be
shared over the Griffin network). Some vendors are investigating whether they could
enhance their DISP implementation locally to replicate based on a defined rule set, but
these products are currently immature and use proprietary mechanisms.
269. DISP provides the ability to replicate data incrementally on change, thus
providing a very efficient way of replicating both from a nation to a Hub and from the
Hub into other nations which have copies of the information. It achieves this using
administrative attributes which would be inaccessible to an LDAP application. There is
2-18 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
therefore no standard way of easily identifying changes which have occurred, making
incremental updating more difficult and “On Change” replication impossible, unless
proprietary mechanisms have been defined by the Hub provider. A number of attributes
have been added to ACP 133 to facilitate this process; these include entry creation time
and date, entry last modified time and date.
270. Subsetting the DIT would normally only be performed locally to a nation, before
the Border DSA. Thus either a proprietary extension to DISP is supported to subset the
nation’s Enterprise Directory into the Border DSA, or a Meta-Directory tool is needed to
perform a similar function between to the two. It is highly likely that nations will need to
employ some form of COTS or bespoke Meta-Directory tool, either between the national
DSA and their Border DSA or between their Border DSA and a central Hub. This can
take care both of subsetting of data and where necessary, modifying received data to
convert from external to national-specific format.
271. In the replicated model, user access is normally only allowed within the national
domain, thus all incoming data from other participants is replicated to the national Border
DSA, from where it will be copied to a user accessible DSA. Users would not normally
be allowed to access data beyond the national Border DSA.
2-19 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
272. The Directory protocols include security mechanisms that meet the security
requirements for the Allied Directory System. Therefore, no additional protocols are
employed to protect the Allied Directory System and Services.
2-20 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
273. Figure 2-5 illustrates a model for systems management interfaces for the
Directory. The interfaces that do not indicate a protocol, such as, between a DSA and a
management agent, are not standardized.
275. Those protocols and components outside of the core Allied Directory are privately
managed and beyond the scope of this ACP.
MANAGEMENT PROTOCOLS
277. GeneralizedTime. GeneralizedTime shall be used for all directory related date
and time exchanges between nations. GeneralizedTime values shall be expressed as
Greenwich Mean Time (Zulu) and shall include seconds (i.e., times are
YYYYMMDDHHMMSSZ), even where the number of seconds is zero.
GeneralizedTime values shall not include fractional seconds.
2-21 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
278. Certificate Validity. The certificate validity period is the time interval during
which the CA warrants that it will maintain information about the status of the certificate.
The field is represented as a sequence of two dates as defined above: the date on which
the certificate validity period begins (notBefore) and the date on which the certificate
validity period ends (notAfter). Both notBefore and notAfter may be encoded as
GeneralizedTime.
279. Audit Trails and Engineering Logs. Although it is unlikely that audit trail
information and engineering log information from ACP 133 (interworking) systems will
be exchanged between allies, it is requested that all the support and management facilities
of ACP 133 compliant systems use GeneralizedTime. Each nation should request such
compliance for these management areas when selecting their products/vendors.
2-22 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
CHAPTER 3
301. The schema policy for ACP 133 is to support the Allied Directory schema using
the schema specifications given in ACP 133 SUPP-1. The Allied Directory schema,
which is called the Common Content, includes the specification of user information
stored in the Directory. An additional Allied Directory system schema, which may be
required by X.500 implementations, includes the specification of information that is
required to control and manage the DSAs themselves is beyond the scope of this ACP.
Support for a schema means that a DUA or DSA shall be able to handle the information
types (e.g., entries, object classes, attribute types etc. defined in ACP 133 SUPP-1). This
is a key requirement for successful interoperability between Allied nation’s directory
services.
COMMON CONTENT
302. The Common Content includes object classes, name forms, structure rules,
matching rules and attributes from the X.500 and X.400 standards, from Request for
Comments (RFC) 1274 and 2798, and those defined in this ACP. The types of attributes
that are present in a directory entry are dependent on the object class or classes to which
the entry belongs. ACP 133 specifies the attributes and object classes in the Common
Content that must be supported for military applications.
303. Requirements and guidelines for population of the Common Content for specific
applications are described in this ACP. Nations may need to define additional objects
and attributes for local use. The schema for the Allied Directory does not preclude such
extensions. However, the additional information stored in national extensions may not be
replicated between nations unless specific bi-lateral arrangements are made for their
support on both the supplier and consumer systems.
304. For the interoperation of ACP 127/JANAP 128 systems and ACP 123 systems,
provision is made in the Common Content for including information about PLAs.
305. The Allied Directory System shall enforce the Common Content to ensure that
replication between nations is possible and the structure and contents of the DIB remain
well-formed over time as modifications are made. Action must be taken by nations to
prevent the wrong attributes being added for an object, to ensure that the values are in the
correct form for the attribute type and to ensure that entries are correctly placed in the
DIT.
3-1 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
DIRECTORY ENTRIES
306. Each entry within the Allied Directory DIT is made of an entry type as defined in
Section 6. Each entry is made up of a Structural Object Class (SOC), plus a number of
Auxiliary Object Classes (AOC), which are allowed for that SOC. These Object Classes
define the mandatory and optional attributes which may be contained within them.
Object and Attributes are fully defined in ACP 133 SUPP-1, including their syntax,
matching rules etc. Directory entry type definitions are not shared using DISP or other
replication mechanisms, rather they are “virtual” definitions used to group allowable
Object Classes together.
307. In addition to the SOCs, and the AOCs which may be contained within them,
directory entries also require the structure rules which define which entries may be
present above and below them in the DIT. These rules are listed in Chapter 6.
DIRECTORY NAMES
309. The DIT should be organized to keep the number of levels as few as possible
since fewer levels are preferable for ease of directory browsing.
310. An entity must have a single unique identity. An entity may also be associated
with multiple other entries; for example, one person may have one entry as an individual
and may be associated with one or more roles such as a security officer etc. The person's
distinguishedName would be included in the entry for the role as role occupant.
Alternatively, many individuals may support a single role function. The commonName
would reflect the role name. The seeAlso attribute may be used to cross-reference the
entries holding the other identities.
311. Additional values besides the distinguished value may be included in naming
attributes, although this practice is not advised since some implementations may not
correctly return matching values. An additional name allows for different values to
produce a successful result when searching for an item in the Directory. For example, the
commonName attribute could include the Relative Distinguished Name (RDN) value e.g.:
312. Note that an additional attribute, displayName, has been included in the schema to
allow a different, preferred way of representing the entry in a flat list such as the MS
Exchange Global Address List (GAL).
3-2 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
313. Each entry in the Allied Directory has a unique and globally unambiguous name,
the Distinguished Name (DN), which is composed of the values of the attributes,
indicated for naming in the DIT. For example, a person’s name could be:
314. The values of attributes composing directory names (i.e., DNs) should be kept as
short as possible while remaining meaningful and unique.
315. In order to avoid reassigning users’ directory names each time they are promoted,
a rank indication shall not be included in the commonName distinguished value of the
relative RDN attributes of persons. The rank attribute should be used for this purpose.
316. When creating a directory name, any appropriate combination of upper and lower
case characters may be used in character string values, as directory operations are case
insensitive in matching character strings for selecting an entry.
317. Use of characters from other national language sets than A-Z are for further study,
primarily within NATO, in which there is a more compelling need to handle additional
characters. In the meantime, ACP 133 mandates that naming attributes may ONLY
contain characters from the ASCII range 32 to 127 for international interoperability, to
ensure that they can be rendered and handled correctly in search and browse operations
regardless of character sets actually supported in the receiving nation.
a. In order to ensure that these qualifiers are used in an optimal way, the
following naming policy is recommended:
(2) Since conflict may arise with some object names, provision is
made for the DN Qualifier to be used in addition to the mandatory
naming attributes for ACPOrganization,
ACPOrganizationalPerson, ACPOrganizationalRole and
ACPOrganizationalUnit entry types. This DN Qualifier must be
locally administered, and
3-3 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
320. The RDN shall not include the full stop character (period), even when an
abbreviation is included in the value. Likewise use of comma is allowed but its use
should be minimized since it can cause difficulties for some applications which treat
comma as a delimiter character (c.f. MS CSV files).
322. A directory entry may have one or more alias entries that point to it. For
example, an Electronic Data Interchange (EDI) party name may be an alias that maps to
the Directory name of an organization. Another example is the temporary maintenance
of an alias for an individual at one location when he has been transferred to another
location.
323. When aliases are used, there is a need to keep them synchronized with the DNs
they point to. Standardized management tools will be needed to perform this
alias/distinguished name synchronization.
ORGANIZATIONAL ROLES
324. Provision is made in Common Content for nations to establish directory entries
for functional roles in addition to entries for individuals and organizations. These entries
will tend to be more stable than those for individuals and may be especially useful for
tactical organizations.
3-4 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
325. In the Allied Directory, a CA can be represented in the Allied Directory by use of
the pkiCA Auxiliary Object Class, which can be included in any of the following entry
types: ACPOrganization, ACPOrganizationalPerson, ACPOrganizationalRole and
ACPOrganizationalUnit. The naming conventions associated with each nation’s CA will
be in accordance with each nation’s Certificate Policy and Certification Practice
Statement (CPS).
326. In support of the ACP 127 Interworking application, two different approaches,
illustrated in Figure 3.1, are suggested for representing ACP 127 users (i.e., Plain
Language Addresses (PLAs)) in the Allied Directory System, depending on the national
view concerning integration of ACP 127 information with other information in the DIT.
A nation may choose which method it uses in its own DIT subtree to capture PLA
information. However, a national schema should support the elements of both methods
in order to be able to handle PLA information that may be represented differently in other
nations’ DIT subtrees.
328. The other approach is to have separate subtrees in the DIT for PLA-related
directory entries (e.g., aCPOrgACP127 entries) and for directory entries supporting the
other applications. Using this approach, from the ACP 127 domain, the gateway will
search a PLA subtree for an associated aCPOrganizationalUnit entry where an O/R
address is found. This entry shall have an associatedPLA attribute which points to the
associated aCPOrgACP127 entry. RI information will be contained in a directory in the
ACP 127 domain
329. Note that PLA is called Signal Address (SA) or Signal Message Address (SMA)
by some nations and international or multinational organizations. A registered PLA is
equivalent to SA or SMA. In this ACP, the attribute longTitle is defined for storing the
spelled out (long form) of a PLA, SA, or SMA.
3-5 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
330. The correct use of the seeAlso attribute can benefit Allied Directory System users.
Conversely, poor use of the attribute can have an adverse effect on performance of the
Allied Directory System and create frustration for users and impose an additional burden
for directory administrators. It is the responsibility of the directory administrator to
ensure that the seeAlso attribute values are valid and do not point to non-existent
directory entries.
3-6 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
d. MMHS communication;
332. Table 3-1 indicates typical directory entries which may be required for each type
of directory usage. This list is not intended to be exhaustive, but to give an indication of
the likely entries required.
333. For e-mail communication (non-X.400), the directory entries and attributes shall
normally contain the common name and mail (RFC 2822) address.
334. For S/MIME communication, the directory entries and attributes shall contain the
common name, mail (RFC 2822) address and user certificate.
335. For commercial Message Handling System (i.e., civilian X.400) communication,
the directory entries and attributes shall contain the information necessary for performing
the core functions of a messaging system. These functions include, but are not restricted
to addressing, routing, expanding address lists and directory access.
336. For MMHS and e-mail services with confidentiality and digital signature features,
the directory entries and attributes shall contain the information necessary for performing
the core functions of a secure messaging system. These functions include addressing,
routing, securing a message, translating from one type of messaging protocol into
another, expanding address lists, and directory access.
337. For interworking between the ACP 127 and MMHS systems, the directory entries
and attributes shall contain the information necessary to identify and characterize
ACP 127 users and to utilize the gateway(s) between the two systems.
3-7 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
339. Table 3-1 indicates, for each application, the directory entries that would normally
be required for Allied communication whether specified by the standards or in the
Abstract Syntax Notation One (ASN.1) definitions in this ACP. If the directory entry is
required, then it is indicated by a “•” to highlight that the Allied Directory shall contain
directory entries of that type.
340. In addition, entries for Country, Organization, Organizational Unit, and Locality
may need to be populated in order to provide structure for a nation’s DIT.
3-8 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
341. The following objects need to be registered to ensure that they are globally unique
within the Allied Directory System:
342. Object Identifiers (OIDs) provide a unique reference to the definition of technical
objects. This includes technical objects which are specific to the directory such as object
class and attribute definitions, as well as technical objects which have wider relevance
such as certificate policy identifiers. Other applications such as Open Systems
Interconnection (OSI) management and messaging also make use of Object Identifiers to
reference technical definitions.
343. Object Identifiers for standard technical definitions are allocated in the standard
where they are defined (e.g., X.500 allocates Object Identifiers for directory object
classes and attributes defined in that standard).
344. Object Identifiers for new schema definitions for object classes, attributes, name
forms, etc., for the Allied Directory are defined in this ACP (see ACP 133 SUPP-1) under
the parent Object Identifier.
346. National or other new schema definitions outside the scope of this ACP are
allocated Object Identifiers under the appropriate national or international Object
Identifier registration scheme.
348. The naming attributes which form a DN, are organized in a hierarchy reflecting
the DIT with a name lower in the tree identified relative to its parent entry by adding
RDN attributes to the parent's DN.
3-9 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
349. Before an entry is created for an object in the directory (or a certificate created for
that object) it must be allocated a unique DN. The allocation of a distinguished name in
the Allied Directory is the responsibility of the Registration Authority for the Service,
agency, or command to which the named object belongs. A registration authority may
delegate responsibility of directory distinguished name registration for subtrees within its
domain to Sub-Registration Authorities. A registration authority (or sub-registration
authority) may also take on responsibility for registration of other identifiers including
technical object identifiers and addresses (see below).
350. The registered DNs relevant to the Allied Directory may be disseminated through
the directory.
351. The directory can be used to store addressing and other related information. As
with DNs, these addresses need to be unique within the global context and hence must be
allocated under a registration scheme. Examples of information requiring registration are
X.400 MHS Addresses (including Private Management Domain (PRMD) identifiers),
OSI network addresses and Internet Protocol addresses.
352. The specific registration requirements for the registration of information, such as
addresses, is dependent on the type of communication or application service to which the
information applies, and is hence outside the scope of this ACP. However, objects which
are allocated DNs commonly also require addresses (e.g., X.400 addresses) and hence the
various registration functions should be coordinated using coherent registration
procedures.
3-10 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
354. Directory information that is provided to the Allied Directory System from
national directories may be shadowed and individual entries within this information may
be incomplete. Thus, users may not find what they are looking for and require access to
the master or a complete replicated entry. In a directory system unconstrained by access
controls, users would be able to satisfy the request by chaining from the Border DSA into
the national directory. However, this situation may not be permitted. In order to satisfy
one nation’s directory queries of another nation’s Border DSA, consideration should be
given to the way in which replicated data is marked. The options are that the data may be
marked as a master or copy. If it is a copy, it may be marked as incomplete. If it is
marked as incomplete, it implies that chaining is permitted into the directory that contains
the complete entry. This may be a national DSA or another Border DSA. How data is
marked should be specified within the allied Service Level Agreements (SLAs).
3-11 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
356. Either chaining or referral may be used as long as performance and security
requirements are met.
357. In the service controls, Prefer Chaining shall be the favored option. However, use
of Chaining Prohibited is permitted.
3-12 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
358. The Allied and the supporting national directories, which combine to form an
overall directory service capability for the allied forces, must have realistic performance
characteristics. Performance can be seen in a number of ways namely: ease of use,
robustness, timeliness of service restoration, and speed of access response.
EASE OF USE
359. Ease of use is a factor of the system design and the tools presented to the directory
user such as click and point, icons, windows, scripts, status messages, etc. This aspect of
the system is beyond the scope of this document but will be subject to national system
Concepts of Operations (CONOPS), policies, and procurement procedures.
ROBUSTNESS
360. Robustness deals with product and system reliability and integrity. Again, these
will have to be specified in terms of Integrated Logistics Support (ILS) and Life-Cycle
Costing (LCC) needs and Mean Time Between Failure (MTBF)/Mean Time To
Repair (MTTR) type specifications. This is also beyond the scope of this document.
AVAILABILITY
SERVICE RESTORATION
362. Service Restoration deals with the recovery time for a single DSA to attain an
operational state after switch on or switching the DUAs (and other attached DSAs) to an
alternate DSA. This should not exceed five minutes if the DSA is in a strategic
environment. In a tactical environment, it should be less than one minute.
SPEED OF RESPONSE
363. For defining the speed of response requirements, the directory system can be seen
to provide two types of access characteristics. These are:
b. Specific system functions (such as MTAs and UAs), which need to resolve
for example, names to addresses for message routing. This interface is
considered to be a machine-to-machine interface.
3-13 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
364. Both of the above have performance requirements. However, how these are
characterized and presented can be quite different. Underlying the performance of such a
large scale system is naturally the individual DSA performance and the links used
between them to other DSAs and the accessing DUAs. It is outside the scope of this
document to provide specifics of these, except that some general guidelines are provided
to assess the capability of a DSA platform and determine its accessibility and
performance in a distributed environment.
HUMAN INTERFACES
365. In terms of specifics, the human interface and its response requirements set the
directory performance requirements and thus impose the directory system design.
OTHER APPLICATIONS
367. The Allied Directory System will be accessed for other purposes than supporting
the messaging function. Examples of functions for which the performance criteria for
directory access may be different from the messaging support criteria are:
PERFORMANCE CHARACTERISTICS
368. The following text provides some generalized notes that should be applied in the
procurement, design, and operation of the directory systems for both the national systems
and the shared/combined systems:
3-14 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
c. DAP Service Parameters: The Size Limit and Time Limit Service
Control parameters should be defaulted to catch/inhibit any unexpectedly
large (gigabyte) responses or dead DSAs in the chain. For example, Size
Limit is defaulted to the number of objects that can be contained in
250 kilobytes;
f. DSA Bind Time Limits: It shall take less than ten seconds for a DSA to
perform a Bind or Unbind with strong authentication with a DUA or other
DSA;
g. Bogus Searches: When a search for a bogus entry is instigated (e.g., find
bogus entry), the response shall be returned in less than 30 seconds,
preferably ten;
3-15 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
m. Performance Logs and Reports: DUAs and DSAs shall keep transaction
logs that support performance management and system planning.
369. Employing DUA caching is a matter of national policy. When it is done, the
guidelines in this paragraph may be followed. Store cached information in nonvolatile
memory:
a. Treat cached entries and cached certificates separately for the purpose of
determining the useful life of the cached information. Extend the useful
cache period for the certificate, since it is a relatively static entity with its
own expiration time and revocation procedures;
c. Set the time-to-live for cached entries of individual users to expire within
a 15 day time period. Set the time-to-live for cached entries of
organizational users to have a maximum expiration period of four days;
d. Where an organizational user and individual user share the same DUA, the
expiration for the limit on the time-to-live conforms to that for the
organizational user. The local management center approves time-to-live
values in excess of these recommendations;
e. Capture and record, with the cached entry, the date and time that the entry
was last obtained in order to determine the expiration time of the entry;
3-16 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
h. Purge a cached certificate upon the expiration date contained within the
certificate; and
3-17 Original
UNCLASSIFIED (Reverse Blank)
UNCLASSIFIED
ACP 133(D)
CHAPTER 4
Section I - Security
SECURITY SERVICES
401. The security services defined within this section have been developed as
countermeasures against the perceived vulnerabilities of the X.500 model. This analysis
was based on X.509, Annex A. The security services defined below are considered
against the three general threats of unauthorized disclosure, modification, or
unavailability of information contained in the directory. The information is vulnerable
when held within a DSA or when transiting elements of the directory. The aggregation of
the total information shared within the allied directory may raise the level of security risk,
so although individual elements of information may be of low classification, the total
system may have to be considered at higher classification.
402. Not all security services will be applied to the information within the directory.
For example, confidentiality of information within the directory is only considered viable
when a small amount of information is at a higher classification level than the rest of the
directory and the information is to be shared amongst a small number of users.
403. Many applications and services will have requirements for security. Such
requirements are derived from the need to protect the information from a range of
potential threats. In order to protect against threats, security services shall be provided.
These services are:
a. Authentication;
b. Access Control;
c. Key Management;
d. Confidentiality;
e. Labeling;
f. Availability; and
g. Integrity.
404. These security requirements are only mandated within the international domain
and where X.500 services are being fully used. Within a national domain, they are to be
considered informational and advisory, since security within the national domain is a
national matter. Likewise, if non-X.500 methods (such as use of MetaDirectories or
LDIF) are used for sharing directory information from a national Border DSA to a central
4-1 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
service, they may also not be applicable. It is the responsibility of the organization
operating the central, shared service, or in a peer-to-peer topology, the partner nations to
ensure adequate security is provided.
AUTHENTICATION
405. Peer entity authentication is performed between DUAs and DSAs and between
DSAs to provide corroboration that a user or entity in a certain instance of
communication is the one claimed. ACP 133 shall support mutual authentication through
the use of strong authentication. Strong authentication relies on the use of asymmetric
encryption. Asymmetric encryption uses the combination of a public component and a
private component to sign digitally the credentials of the user or entity authenticating
itself to the system. A digital signature guarantees both the origin and the integrity of the
information that is digitally signed. This binding of the public key and its holder’s
identification information is conveyed through an X.509 certificate that is generated by a
CA. Each individual nation shall implement its own Certificate Management
Infrastructure (CMI) to include CAs in such a manner as to ensure the trusted path for
certificate management. In the case of a CTF, authentication policies and procedures are
under the control of the CTF commander.
406. The CMI is an integrated relationship of CAs and all the components necessary
that operate under the authority of either a superior CA or, in conjunction with bilateral
agreements, with other CAs.
407. The CMI includes the process for developing Certificate Policies. A Certificate
Policy is a named set of rules that indicates the applicability of a certificate to a particular
community and/or class of application with common security requirements. For
example, a particular Certificate Policy might indicate applicability of a type of
certificate to the authentication of electronic data interchange transactions for the trading
of goods within a given price range.
408. Each CA shall have a statement of the practices, the CPS, which it employs in
managing certificates.
409. Each nation’s CPS shall identify the procedure used to create, maintain, and
revoke credentials.
411. Assurance is incumbent on the availability of public keys in a way that guarantees
that the public key really belongs to a particular identity. Validation of signatures is
based on the assumption that the authenticating entity has the correct public key. The
link between an identity and its public key shall be guaranteed. False identities and
substituted keys are serious threats to these mechanisms. Each CMI’s CPS shall ensure
that actions are taken to mitigate these threats.
4-2 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
412. Within the ACP 133 Directory system, all DSAs shall be able to process bind
requests that are simply authenticated and those that are strongly authenticated, utilizing
an agreed upon digital signature algorithm. DSAs shall support access control policy that
prevents unauthorized disclosure or modification of information based on the level of
authentication used. The DSA shall strongly authenticate itself to its communication peer
(i.e., DSAs, DUAs, and management entities) as required. The success or failure of the
steps in the authentication process shall be audited and stored in the DSA audit database
to facilitate compromise recovery and to enhance security of the Directory.
413. In the Allied Directory, the following additional security constraints shall be met:
b. Only approved cryptographic mechanisms for the DSA application and the
associated processes shall be used;
d. If the claimed identity is not validated, the request shall be rejected and the
failure audited. Additional security actions may also be initiated; for
example, the DSA may lock out the user;
g. The DSA shall allow access and privileges to be set only by an authorized
management entity.
414. The X.500 Directory standard defines three access control schemes: Simplified
Access Control (SAC), Basic Access Control (BAC), and RBAC. However, how that
information is stored within a country's directory is a national issue. The ACP 133 shall
4-3 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
mandate that directory systems ensure that the agreed-upon access controls are
maintained.
415. The access control mechanisms shall include both RBAC as well as BAC. RBAC
restricts access to objects within the directory by use of predefined labels to enforce
access rights to information stored within the Directory. User or end-entity authorization
information may be exchanged through extensions to the Version 3 X.509 certificates.
ACI about the target (data within the DIB) shall be conveyed through the use of
sensitivity labels. The format and processes associated with the privilege/authorization
information are defined within each CMI’s CPS. The format and processes associated
with security labels are defined in an Annex of ACP 120.
416. Within the Allied Directory Service there is a requirement to hold information at
different levels of protective marking, and therefore, it is necessary to have a method by
which the confidentiality of the information can be maintained without disclosure to
unauthorized access. In addition, there may be occasions where information will be
stored in a Directory that is of a higher classification than that which the DSA normally
supports, or is of a sensitive nature and requires separation from disclosure to system
administrators and other authorized users. This requirement shall be supported by one of
the following mechanisms, in accordance with security policy:
417. BAC is based on a relatively simple concept that either a list of users and the
permissions to which they are entitled, or a list of protected items and the permissions
necessary to access them, is held within the directory. This information is contained
within ACI items. ACI items can be held within a number of parts of the directory
depending on their intended usage and sphere of influence.
4-4 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
d. Either “Item first permissions” values, which list a set of protected items,
and the set of users, all potentially with varying permissions, or “User first
permissions” values, which list a set of users and the protected items, all
potentially with varying permissions that the users may or may not access.
419. Within ACP 133 and the civil standards arena, a requirement for additional
information to be included in determining whether access can be granted or denied to an
object has been identified. This is defined as RBAC and requires administratively
imposed access control policies to be applied to the contents of the directory.
420. RBAC uses security labels that can be attached (by securely binding the label to
the information using a digital signature) to attribute values stored within the directory.
The security label of an attribute shall be bound to the attribute value using a digital
signature. This label can then be used to determine whether a user may access protected
information. RBAC can be used alone, or in conjunction with BAC. Refer to clause
17.4.3 in ITU-T Rec. X.501 (1997) | ISO/IEC 9594-2: 1997.
421. RBAC adds the following constraints on the access control decision:
422. An error code is returned from an operation or the attribute value, attribute type,
or entry is omitted from the operation result if:
a. The label for the attribute value denies access, then the attribute value is
hidden;
4-5 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
b. The labels for attribute values of a given type deny access; the existence of
the attribute is hidden. (If access is denied to all attribute values of a type,
then access is denied to that type.); and
c. The labels for attribute values of a given entry deny access; the existence
of the entry is hidden. (If access is denied to all attribute values of an
entry, then access is denied to that entry.)
a. The user's clearance can be bound to the user’s DN and the public key
used to authenticate that DN with a public key certificate extension; and
b. The user's clearance can be bound to the user’s DN and to the user’s
X.509 certificate using an attribute certificate.
424. If the first method is chosen and the authority verifying the public key
information of a user may or may not be the same authority that is responsible for issuing
and verifying a user's clearance, the clearance must be supplied to the CA in a trusted
manner.
425. Each CMI’s CPS shall include the procedures required to validate each end-
entity’s identity and privilege/authorizations.
427. In resolving permissions, the DSA shall first obtain the clearance of the user from
a trusted source. This information shall be conveyed during the authentication process.
When obtained, the contents of the security label are checked against the user’s
clearance. RBAC does not define what type of subsequent operations may be performed
e.g., modify, remove etc.
428. In the event that RBAC has been implemented, additional steps in the access
control transforms must occur. First, the hierarchical clearance of the user must dominate
the hierarchical classification of the label. Second, if additional categories have been
applied to the security label, there must be a comparison function between the security
4-6 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
categories component of both the data label and the user clearances. If RBAC succeeds
and there are no additional RBAC restrictions imposed, the user is granted access. The
security policy rules defining the relationship between the end-entity’s
privilege/authorization set and the security label shall be provided by each nation’s
appropriate authority.
429. The Access Control Decision Function (ACDF) specifies how ACI items shall be
processed in order to determine whether access should be granted for a particular
operation.
430. Figures 4-1 and 4-2 are based on the ISO/IEC 10181-3 Security Framework in
Open Systems standard (Part 3 - access controls), but have been adapted to fit the BAC
model described in the X.500 standard. The ACDF makes the decision as to whether to
grant or deny access to the requested object(s) by applying pre-defined access control
policy rules to an access request.
Access Control
Enforcement Function
Initiator access request argument grant/deny
operation (requested
access mode &
object attributes), access decision
requestor, grant/deny Directory
authentication level
access control information
Access Control associated with the entry containing
Decision Function (or which is) the protected item
4-7 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
Access Control
Enforcement Function
Initiator access request argument grant/deny
operation (requested
access mode &
object attributes), access decision
requestor, grant/deny Directory
authentication level
and clearance access control information
Access Control associated with the entry containing
Decision Function (or which is) the protected item,
including the security label attached
to the item
Figure 4-2 – Diagram of ACDF Required for Rule-based and Basic Access Control
431. If RBAC is being used in conjunction with BAC, then RBAC should always take
precedence over the BAC. Therefore, if RBAC scheme rules do not allow access to a
requested operation, then the operation will be denied independently of whether access
would have been granted under the BAC scheme. Only if the RBAC scheme rules allow
access to a requested operation will the ACDF for BAC be executed to determine if
access should be granted.
432. A policy identifier shall be used to identify under which security policy the
clearance and security labeling is being enforced.
433. The security policy is represented by an object identifier that indicates the security
policy the subject supports. Each security policy registered shall have documentation
that indicates the values of classifications and privilege/authorization sets valid within the
context of that security policy.
KEY MANAGEMENT
434. Common cryptographic algorithms and their intended usage need to be supported.
National CPS will define acceptable cryptographic algorithms and required usages.
435. In the event that a DSA’s signature or confidentiality keys are compromised,
immediate notification to the Security Authority shall occur.
CONFIDENTIALITY
436. In some situations, the Allied Directory may not give sufficient assurance that
data is kept confidential in storage, regardless of access controls. Confidentiality of
attributes in storage is provided through use of:
4-8 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
437. Note: Other mechanisms can be used to distribute the keys required to protect
attributes defined using the Encrypted Attribute Value template.
LABELING
GENERAL
438. A common policy on labeling and clearance is the basis for labeling in the Allied
Directory. The format and processes associated with security labels are defined in an
Annex of ACP 120. Labeling and clearance information implemented in the Allied
Directory Services shall support access control in the shared information environments.
• UNCLASSIFIED
• RESTRICTED
• CONFIDENTIAL
• SECRET
• TOP SECRET
b. These classifications are hierarchical and are listed in ascending order, that
is RESTRICTED is a higher classification than UNCLASSIFIED;
4-9 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
• UNCLASSIFIED
• RESTRICTED
• CONFIDENTIAL
• SECRET
• TOP SECRET
440. Categories:
• Restrictive
• Permissive
• User-Defined
b. A Restrictive Category requires that all values present in the security label
shall be present in the authorizations conveyed in the clearance;
c. Permissive Categories require that at least one value present in the security
label shall be present in the authorizations conveyed in the clearance. This
is applicable when indicating the capability to constrain access by
nationality, for example, Release To or Eyes Only;
4-10 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
441. Privacy Markings. Privacy markings are text handling instructions and
warnings. They provide no support for access control decisions.
443. Availability. Availability of the data in the Allied Directory System shall be
ensured through robust replication and disaster recovery practices.
444. Integrity:
4-11 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
Section II - Accountability/Auditing
DATA PROTECTION
445. Any of the information that is stored within a Security Management Information
Base (SMIB) shall be protected against manipulation or destruction by unauthorized
users or end entities. Changing any of the thresholds associated with collection of audit
information shall be made available only to those authorized audit management entities.
When information from one domain is replicated into another domain, the agreement to
shadow shall contain details on how archive of and access to audit data will be supported.
4-12 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
CHAPTER 5
501. The policies defined in this document for management are applicable to the
directory system component level of the Allied Directory System. Additional
requirements such as help desks and operations relating to the higher level system issues
of the Allied Directory System will be covered in related documents.
MANDATED FUNCTIONALITY
503. For the purposes of ensuring a base level of management functionality within the
Allied Directory System components, the following features and functions are mandated:
a. All DSAs and DUAs shall be capable of extending the schema to include
new object classes and attributes and (optionally) new syntaxes, without
recourse to software rework;
b. All DSAs shall be able to have ACI and other subentry information
configurable;
f. All DSAs shall support the generation of events or alarms and log entries
that reflect error conditions such as resource problems, protocol failures,
or system security violations. Sample alarms include:
5-1 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
g. All DSAs shall provide a management console interface that will permit
local and remote management. Remote management facilities shall be
applied with some authorization and protection mechanism.
c. Management logs and log controls should reflect the functionality defined
in ITU-T Rec. X.735 | ISO/IEC 10164-6; and
EVENT LOGS
505. DSAs shall provide for the logging of all operations with various levels of detail.
Log control mechanisms shall provide configuration or functions for:
b. Action taken when a file is full, e.g. overwrite the log or create a new file;
5-2 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
a. Event time;
b. Event type;
d. Originator’s DN;
e. Target object;
508. An SLA is the formal agreement to be used between Allies for the operation of
an ACP 133-compliant directory. Such agreements shall be established on a bilateral
basis between Allies and shall address the quality, quantity, and, where appropriate, the
cost of the directory service to be established. An SLA shall include sufficient
definitions and measures of performance to cover the type of service, the quantity and
quality of the service required, and any time-scale targets.
5-3 Original
UNCLASSIFIED (Reverse Blank)
UNCLASSIFIED
ACP 133(D)
CHAPTER 6
SCHEMA
Section I - Concepts
GENERAL
601. The ACP 133 schema is based as far as possible on civilian standards, in
particular, ITU-T Rec. X.402 (1995), ITU-T Rec. X.509 (2000), ITU-T Rec. X.520
(2000), ITU-T Rec. X.521 (2000) and ITU-T Rec. X.841 (2000 E). In the Allied
Directory System, all of the required object classes, attributes, matching rules, and name
forms defined in X.501, X.509, X.520 and X.521 shall be implemented, as well as
selected elements from X.402 and X.841.
603. This ACP defines a “common content” which is the schema that must be
implemented by the Allied Directory System. The Common Content is split into 3
separate subsets, a Core Schema (Class A), which ALL implementations MUST fully
support, and two optional subsets, one for support of PKI (Class B), the other for support
of legacy ACP 127 messaging (Class C).
604. The primary role of the ACP 133 Schema has been redefined to prioritize
interoperability between national directory systems using one of a number of alternative
mechanisms, including DISP Replication, Meta-Directories or LDIF/XML Text files.
Key to successful interoperability is a common Schema definition, thus ensuring that a
receiving nation knows what to expect from its peer and can validate the received data
against this.
605. Each directory entry in the Allied Directory System is therefore defined by a
Structural Object Class (SOC). Attributes which can be present in the Structural Object
Class and any Auxiliary Object Classes (AOC) which can be associated with it are also
defined. It was decided not to employ the use of Content Rules in the definition of
directory entries since these were found to complicate directory replication since the
contents of exchanged entries could differ. Since Content Rules are internal to a nation
and not part of the replicated information, it is immaterial whether a nation chooses to
implement the Common Content schema internally using Content Rules or not.
606. The ACP 133(D) Schema is given in ACP 133 SUPP-1. Inclusion of auxiliary
object classes and additional attributes depends on the application, as specified in
Chapter 3. For example, an entry for an organizational unit which is used for secure
ACP 123 messaging would include the mhs-user and securePkiUser auxiliary object
classes. An organizational unit which is used for DIT navigational purposes would not
populate those classes. However, regardless of the combinations of Auxiliary Object
Classes and attributes used, the basic Schema rules must NOT be violated.
6-1 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
607. The Allied Common Content includes base structural object classes and structural
object classes defined in this ACP. The Allied Directory System entries defined using
these structural object classes are described in Section V of this chapter. The object
classes and attributes defined in this ACP are further split into functional groups as
follows:
609. The following paragraphs further describe the structural object classes used in this
ACP. ACP 133 SUPP-1 provides a formal definition of them. Even the base object
classes and attributes defined in X.500 are also listed in this document for completeness.
Although great care has been taken to ensure compatibility with the base definitions,
differences will inevitably occur due to mistakes or evolving changes. In this case, the
definitions given within ACP 133 take precedence for Allied interoperability.
610. Superclasses. Each of these base classes is used in the Common Content as a
superclass in the definition of base structural object class, as described below:
6-2 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
a. top; and
b. alias.
611. Base Object Classes. The Common Content uses only the following standard
classes as the structural object classes of Allied Directory Entries:
a. country;
b. cRLDistributionPoint;
c. device;
d. groupOfNames;
e. inetOrgPerson;
f. locality;
g. organization;
h. organizationalPerson;
i. organizationalRole;
j. organizationalUnit; and
k. person.
611. There are other standard structural object classes that are defined within X.500,
but which are not included in the Common Content, and thus may not be used to meet
Allied Directory interoperability requirements. These structural object classes have been
added for further clarification of interoperability requirements and include (but are not
limited to):
• applicationEntity
• applicationProcess
• dSA
• groupOfUniqueNames
• residentialPerson
• strongAuthenticationUser
6-3 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
612. The rest of this paragraph describes the directory standard structural object classes
that are used as base classes in directory entries in the Common Content. Descriptions
are not included for the object classes that are used solely as superclasses (e.g., top) in the
Common Content.
613. country. The country object class is used to define nation directory entries. This
object class is the base class for Country type directory entries.
615. device. The device object class is used to define entries representing devices. A
device is a physical unit which can communicate or hold information, such as a modem,
disk drive, etc. This object class is used as a superclass for the ACP 133 aCPDevice
structural object class as well as the base class for Device type directory entries.
618. locality. The locality object class is used to define directory entries that represent
places. This object class is used as a superclass for the ACP 133 aCPLocality structural
object class as well as the base class for Locality type directory entries.
619. organization. The organization object class is used to define directory entries
that represent organizations.
6-4 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
organizational roles in succession. This object class is used as a superclass for the ACP
133 aCPOrganizationalPerson structural object class as well as the base class for
OrganizationalPerson type directory entries.
623. person. The person object class is used to define directory entries representing a
person. This object class is used as the base class for Person type directory entries.
6-5 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
624. This subsection lists the information required for the Directory to know how to
operate correctly. It specifies the type of information that is required in the Directory
System Schema. The Directory System Schema consists of:
626. It should be noted that this section is only relevant where DISP replication or DSP
chaining and referrals are being performed internationally. If other forms of replication
or directory access are being used, or if the directory system does not span national
boundaries, the information given here is informational and advisory only. Nations do
not have to adhere fully to it.
627. Standard Subentry Object Classes. The following subentry object classes are
defined by X.501 and shall be supported by the ACP 133 Directory:
6-6 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
628. Operational attributes defined by X.500 and cited in this paragraph shall be
supported by the ACP 133 Directory. The definition of an operational attribute includes
a specification of the way in which the Directory uses and manages the attribute in the
course of its operation. There are two varieties of operational attribute:
629. Directory operational attributes occur in the Directory information model and are
used to represent control information or other information provided by the Directory.
DSE operational attributes are further categorized into two:
630. They occur only in the DSA information model and are not visible at all in the
Directory Information model.
631. The subtreeSpecification attribute shall be supported by the ACP 133 Directory.
It supports the administrative and operational information model and is used to specify
the scope of a subentry or area of replication. It is also used to regulate the subentries
permitted to be subordinate to an administrative entry such as access control or collective
attribute subentries.
632. The administrativeRole attribute shall be supported by the ACP 133 Directory. It
supports the administrative model and is used to indicate the role or roles of an
administrative entry. The attribute may be stored in one or more of the following
administrative points:
6-7 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
633. The attributes below, which may be contained in an entry or subentry, support
general administrative and operational requirements. These attributes shall be supported
by the ACP 133 Directory. All DSAs which conform to this ACP shall automatically
provide date/time of creation/modification and creators/modifiers name on directory add
and modify operations:
635. The following attributes are used by the Security Model of the Directory and shall
be supported:
636. Each directory entry in the DSA also contains additional attributes beyond those
that are visible to Directory administrator. The following attributes are operational
attributes contained in DSEs. These attributes are used by the DSA Information Model
and shall be supported by the ACP 133 Directory:
6-8 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
a. dseType. The dseType indicates the role or roles of a DSE, such as entry,
subentry, or administrative point;
637. A DSE may have only user attributes, operational attributes or both depending on
its role within the total DIB. Therefore, to identify an entry with its role and DIB
location and its effect in the scheme of the total (and possibly distributed and replicated)
DIB, a number of DSE entry types have been defined. Table 6-6 defines the standard
DSE types and their purpose. The DSE types shall be supported by this ACP for all
DSAs in accordance with their definition.
638. The following attributes specify the subschema policy and are contained in the
subschema subentry and shall be supported:
a. dITContentRules;
b. dITStructureRules;
c. matchingRules;
d. attributeTypes;
6-9 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
e. objectClasses;
f. nameForms;
g. matchingRuleUse;
h. structuralObjectClass; and
i. governingStructureRule.
6-10 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
6-11 Original
UNCLASSIFIED (Reverse Blank)
UNCLASSIFIED
ACP 133(D)
REFERENCES
REF TITLE
ACP 120: Information Technology - Defense Standardized Profiles AMHxn(D) -
Message Handling Systems - Message Security Protocol - Part 3:
AMHx2(D) - MSP Requirements for Message Transfer (P1).
ACP 133: Common Directory Services and Procedures Edition C.
E.123: ITU-T Rec. E.123 (1988): Notation for national and international
telephone numbers.
ISO 3166: ISO 3166 – 1981: Codes for the representation of names of countries.
JFIF: JPEG File Interchange Format (Version 1.02). September 1992.
SDN.700: MCCB-04.02.013. Registration Procedures for Technical Objects
(INFOSEC Arc). Revision 1. 7 February 1997.
RFC 1274: Internet RFC 1274 (Nov 1991): The COSINE and Internet X.500
Schema.
RFC 1327: Internet RFC 1327 (May 1992): Mapping between X.400 (1988) / ISO
10021 and RFC 822.
RFC 1778: Internet RFC 1778 (Mar 1995): The String Representation of Standard
Attribute Syntaxes.
RFC 1779: Internet RFC 1779 (Mar 1995): A String Representation of
Distinguished Names.
RFC 1960: Internet RFC 1960 (June 1996): A String Representation of LDAP
Search Filters.
RFC 2079: Internet RFC 2079 (Jan 1997): Definition of an X.500 Attribute Type
and an Object Class to Hold Uniform Resource Identifiers (URIs).
RFC 2252: Internet RFC 2252 (Dec 1997): Lightweight Directory Access
Protocol (v3): Attribute Syntax Definitions.
RFC 2253: Internet RFC 2253 (Dec 1997): Lightweight Directory Access
Protocol (v3): UTF-8 String Representation of Distinguished Names.
RFC 2255: Internet RFC 2255 (Dec 1997): The LDAP URL Format.
RFC 2256: Internet RFC 2256 (Dec 1997): A Summary of the X.500 (96) User
Schema for use with LDAP v3.
RFC 2459: Internet RFC 2459 (January 1999): Internet X.509 Public Key
Infrastructure Certificate and CRL Profile.
RFC 2587: Internet RFC 2587 (June 1999): Internet X.509 Public Key
Infrastructure LDAPv2 Schema.
REF-1 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
REF TITLE
RFC 2798: Internet RFC 2798 (Apr 2000): Definition of the iNetOrgPerson
LDAP Object Class.
RFC 2822 Internet RFC 2822 (April2001): Internet Message Format
RFC 2849: Internet RFC 2849 (June 2000): The LDAP Data Interchange Format
(LDIF) – Technical Specification.
RFC 3384: Internet RFC 3384 (October 2002): Lightweight Directory Access
Protocol (version 3) Replication Requirements.
RFC 4122: Internet RFC 4122 (July 2005): A Universally Unique IDentifier
(UUID) URN Namespace.
X.208: ITU Rec. X.208 (1993): Open Systems Interconnection Model and
Notation – Specification of Abstract Syntax Notation One.
X.501 ITU Rec. X.501 (2005): Information Technology – Open systems
interconnection – The directory: Models
X.509: ITU-T Rec. X.509 (2000) | ISO/IEC 9594-8:2000 Information
Technology – Open Systems Interconnection – The Directory: Public-
Key and Attribute Certificate Frameworks.
X.520: ITU-T Rec. X.520 (2000) | ISO/IEC 9594-6:2000, Information
Technology – Open Systems Interconnection – The Directory: Selected
Attribute Types.
X.521: ITU-T Rec. X.521 (2000) | ISO/IEC 9594-7:2000, Information
Technology – Open Systems Interconnection – The Directory: Selected
Object Classes.
X.402: ITU-T Rec. X.402 (1995) | ISO/IEC 10021-2: 1996 Information
technology – Message Handling Systems (MHS): Overall architecture
Annex A: Directory Object Classes and Attributes.
X.841: ITU-T Rec. X.841 (2001 E) | ISO/IEC 15816:2001(E): Information
Technology – Security Techniques – Security Information Objects for
Access Control.
REF-2 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
GLOSSARY
The following Definitions, abbreviations and acronyms are used in this ACP:
Definitions
Glossary-1 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
Population. Population refers to the directory entries and attributes for which
values have been entered in the Allied Directory.
Schema Support. Support for a schema element means that it can be generated,
processed, and displayed in accordance with its definition.
Glossary-2 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
Acronyms
ACRONYM DEFINITION
ACDF Access Control Decision Function
ACI Access Control Information
ACP Allied Communication Publication
ACSE Association Control Service Element
ADUA Administrative Directory User Agent
ADY 1993 Directory Application Profile
AIG Address Indicator Group
AL Address List
AMH Allied Message Handling
APP Allied Publications Procedures
ASCII American Standard Code for Information Interchange
ASN.1 Abstract Syntax Notation One
AU, AUS Australia
AUTODIN Automatic Digital Network
BAC Basic Access Control
C Country
CA Canada; Certification Authority
CAN Canada
CAD Collective Address Designator
CCEB Combined Communications Electronics Board
CCITT The International Telegraph and Telephone Consultative Committee
CMI Certificate Management Infrastructure
CMIP Common Management Information Protocol
CN Common Name
CONOPS Concept of Operations
COSINE Organization for Cooperation for OSI Networking in Europe
COTS Commercial Off-the-Shelf
CPS Certificate Practice Statement
CRL Certificate Revocation List
Glossary-3 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
ACRONYM DEFINITION
CSP Common Security Protocol
CTF Combined Task Force
CULR Common Upper Layer Requirements
DAG DSSCS Address Group
DAP Directory Access Protocol
DFTS Defense Fixed Telecommunications Service
DIB Directory Information Base
DISP Directory Information Shadowing Protocol
DIT Directory Information Tree
DL Distribution List
DMD Directory Management Domain
DN Distinguished Name
DODAAC Department of Defense Activity Accounting Code
DOP Directory Operational Binding Management Protocol
DSA Directory System Agent
DSE DSA-specific entry
DSN Defense Switched Network
DSP Directory System Protocol
DSSCS Defense Special Security Communications System
DUA Directory User Agent
EDI Electronic Data Interchange
EIT Encoded Information Type
E-MAIL Electronic Mail
EOS Elements of Service
FDY 1993 Directory Interchange Format and Representation Profile
FLDSA First-level DSA
G3 Group 3 Facsimile
G4 Group 4 Facsimile
GBR Great Britain
GENSER General Service
Glossary-4 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
ACRONYM DEFINITION
GHP Gateway Handling Policy
HOB Hierarchical Operational Binding
HQ Headquarters
IA5 International Alphabet Number 5
IBAC Identity-based Access Control
IC Intelligence Community
IEC International Electrotechnical Commission
ILS Integrated Logistics Support
ISDN Integrated Services Digital Network
ISME International Subject Matter Experts
ISO International Organization for Standardization
ISP International Standardized Profile
ITU-T International Telecommunication Union-Telecommunication
Standardization Sector
JANAP Joint Army, Navy, Air Force Procedure
L Locality
LCC Local Control Center
LEP List of Effective Pages
LMF Language and Media Format
LOP Letter of Promulgation
MCS Message Conversion System
MHS Message Handling System
MIB Management Information Base
MLA Mail List Agent
MMHS Military Message Handling System
MMUA Military Messaging User Agent
MS Message Store
MTA Message Transfer Agent
MTBF Mean Time Before Failure
MTS Message Transfer System
Glossary-5 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
ACRONYM DEFINITION
MTTR Mean Time to Repair
NASIS NATO Subject Indicator System
NATO North Atlantic Treaty Organization
NAVCOMPARS Naval Communications Processing and Routing System
NZ, NZL New Zealand
O/R, OR Originator/Recipient
O Organization
OSI Open Systems Interconnection
OU Organizational Unit
P2 Interpersonal Messaging - 1984 Content Type
P22 Interpersonal Messaging - 1988 Content Type
P772 Military Messaging Content Type
PACOM Pacific Command
PICS Protocol Implementation Conformance Statement
PKI Public Key Infrastructure
PLA Plain Language Address
PRB Project Review Board
PRMD Private Management Domain
PSTN Public Switched Telephone Network
R GENSER Community
RAN Release Authority Name
RBAC Rule-Based Access Control
RDN Relative Distinguished Name
RFC Request for Comments
RHOB Relevant Hierarchical Operational Binding
RI Routing Indicator
ROSE Remote Operations Service Element
RTSE Reliable Transfer Service Element
S/MIME Secure/Multimedia Internet Mail Extensions
Glossary-6 Original
UNCLASSIFIED
UNCLASSIFIED
ACP 133(D)
ACRONYM DEFINITION
SA Signal Address
SAC Simplified Access Control
SDN Secure Data Network
SHD Special Handling Designator
SI Special Intelligence
SIC Subject Indicator Code
SIGAD SIGINT Address
SIGINT Signal Intelligence
SLA Service Level Agreement
SMIB Security Management Information Base
SMA Signal Message Address
SMTP Simple Mail Transfer Protocol
SNMP Simple Network Management Protocol
STANAG Standardization Agreement
STU Secure Telephone Unit
TARE Telegraph Automatic Relay Equipment
TCC Transmission Control Code
TCCG Transmission Control Code Group
TR Technical Report
TRC Transmission Release Code
TSGCE Tri-Service Group of Communications and Electronics
UA User Agent
UK United Kingdom
UKM User Key Material
US, USA United States of America
USMCEB United States Military Communications-Electronics Board
UTC Universal Coordinated Time
Y SI Community
Glossary-7 Original
UNCLASSIFIED (Reverse Blank)
UNCLASSIFIED
ACP 133(D)
LEP-1 Original
UNCLASSIFIED (Reverse Blank)