7 Network Working Group A. Sciberras, Ed.
8 Request for Comments: 4519 eB2Bcom
9 Obsoletes: 2256 June 2006
10 Updates: 2247, 2798, 2377
11 Category: Standards Track
14 Lightweight Directory Access Protocol (LDAP):
15 Schema for User Applications
19 This document specifies an Internet standards track protocol for the
20 Internet community, and requests discussion and suggestions for
21 improvements. Please refer to the current edition of the "Internet
22 Official Protocol Standards" (STD 1) for the standardization state
23 and status of this protocol. Distribution of this memo is unlimited.
27 Copyright (C) The Internet Society (2006).
31 This document is an integral part of the Lightweight Directory Access
32 Protocol (LDAP) technical specification. It provides a technical
33 specification of attribute types and object classes intended for use
34 by LDAP directory clients for many directory services, such as White
35 Pages. These objects are widely used as a basis for the schema in
36 many LDAP directories. This document does not cover attributes used
37 for the administration of directory servers, nor does it include
38 directory objects defined for specific uses in other documents.
58 Sciberras Standards Track [Page 1]
60 RFC 4519 LDAP: Schema for User Applications June 2006
65 1. Introduction ....................................................3
66 1.1. Relationship with Other Specifications .....................3
67 1.2. Conventions ................................................4
68 1.3. General Issues .............................................4
69 2. Attribute Types .................................................4
70 2.1. 'businessCategory' .........................................5
71 2.2. 'c' ........................................................5
72 2.3. 'cn' .......................................................5
73 2.4. 'dc' .......................................................6
74 2.5. 'description' ..............................................6
75 2.6. 'destinationIndicator' .....................................7
76 2.7. 'distinguishedName' ........................................7
77 2.8. 'dnQualifier' ..............................................8
78 2.9. 'enhancedSearchGuide' ......................................8
79 2.10. 'facsimileTelephoneNumber' ................................9
80 2.11. 'generationQualifier' .....................................9
81 2.12. 'givenName' ...............................................9
82 2.13. 'houseIdentifier' .........................................9
83 2.14. 'initials' ...............................................10
84 2.15. 'internationalISDNNumber' ................................10
85 2.16. 'l' ......................................................10
86 2.17. 'member' .................................................11
87 2.18. 'name' ...................................................11
88 2.19. 'o' ......................................................11
89 2.20. 'ou' .....................................................12
90 2.21. 'owner' ..................................................12
91 2.22. 'physicalDeliveryOfficeName' .............................12
92 2.23. 'postalAddress' ..........................................13
93 2.24. 'postalCode' .............................................13
94 2.25. 'postOfficeBox' ..........................................14
95 2.26. 'preferredDeliveryMethod' ................................14
96 2.27. 'registeredAddress' ......................................14
97 2.28. 'roleOccupant' ...........................................15
98 2.29. 'searchGuide' ............................................15
99 2.30. 'seeAlso' ................................................15
100 2.31. 'serialNumber' ...........................................16
101 2.32. 'sn' .....................................................16
102 2.33. 'st' .....................................................16
103 2.34. 'street' .................................................17
104 2.35. 'telephoneNumber' ........................................17
105 2.36. 'teletexTerminalIdentifier' ..............................17
106 2.37. 'telexNumber' ............................................18
107 2.38. 'title' ..................................................18
108 2.39. 'uid' ....................................................18
109 2.40. 'uniqueMember' ...........................................19
110 2.41. 'userPassword' ...........................................19
114 Sciberras Standards Track [Page 2]
116 RFC 4519 LDAP: Schema for User Applications June 2006
119 2.42. 'x121Address' ............................................20
120 2.43. 'x500UniqueIdentifier' ...................................20
121 3. Object Classes .................................................20
122 3.1. 'applicationProcess' ......................................21
123 3.2. 'country' .................................................21
124 3.3. 'dcObject' ................................................21
125 3.4. 'device' ..................................................21
126 3.5. 'groupOfNames' ............................................22
127 3.6. 'groupOfUniqueNames' ......................................22
128 3.7. 'locality' ................................................23
129 3.8. 'organization' ............................................23
130 3.9. 'organizationalPerson' ....................................24
131 3.10. 'organizationalRole' .....................................24
132 3.11. 'organizationalUnit' .....................................24
133 3.12. 'person' .................................................25
134 3.13. 'residentialPerson' ......................................25
135 3.14. 'uidObject' ..............................................26
136 4. IANA Considerations ............................................26
137 5. Security Considerations ........................................28
138 6. Acknowledgements ...............................................28
139 7. References .....................................................29
140 7.1. Normative References ......................................29
141 7.2. Informative References ....................................30
142 Appendix A Changes Made Since RFC 2256 ...........................32
146 This document provides an overview of attribute types and object
147 classes intended for use by Lightweight Directory Access Protocol
148 (LDAP) directory clients for many directory services, such as White
149 Pages. Originally specified in the X.500 [X.500] documents, these
150 objects are widely used as a basis for the schema in many LDAP
151 directories. This document does not cover attributes used for the
152 administration of directory servers, nor does it include directory
153 objects defined for specific uses in other documents.
155 1.1. Relationship with Other Specifications
157 This document is an integral part of the LDAP technical specification
158 [RFC4510], which obsoletes the previously defined LDAP technical
159 specification, RFC 3377, in its entirety. In terms of RFC 2256,
160 Sections 6 and 8 of RFC 2256 are obsoleted by [RFC4517]. Sections
161 5.1, 5.2, 7.1, and 7.2 of RFC 2256 are obsoleted by [RFC4512]. The
162 remainder of RFC 2256 is obsoleted by this document. The technical
163 specification for the 'dc' attribute type and 'dcObject' object class
164 found in RFC 2247 are superseded by sections 2.4 and 3.3 of this
165 document. The remainder of RFC 2247 remains in force.
170 Sciberras Standards Track [Page 3]
172 RFC 4519 LDAP: Schema for User Applications June 2006
175 This document updates RFC 2798 by replacing the informative
176 description of the 'uid' attribute type with the definitive
177 description provided in Section 2.39 of this document.
179 This document updates RFC 2377 by replacing the informative
180 description of the 'uidObject' object class with the definitive
181 description provided in Section 3.14 of this document.
183 A number of schema elements that were included in the previous
184 revision of the LDAP Technical Specification are not included in this
185 revision of LDAP. PKI-related schema elements are now specified in
186 [RFC4523]. Unless reintroduced in future technical specifications,
187 the remainder are to be considered Historic.
189 The descriptions in this document SHALL be considered definitive for
194 The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
195 "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
196 document are to be interpreted as described in RFC 2119 [RFC2119].
200 This document references Syntaxes defined in Section 3 of [RFC4517]
201 and Matching Rules defined in Section 4 of [RFC4517].
203 The definitions of Attribute Types and Object Classes are written
204 using the Augmented Backus-Naur Form (ABNF) [RFC4234] of
205 AttributeTypeDescription and ObjectClassDescription given in
206 [RFC4512]. Lines have been folded for readability. When such values
207 are transferred as attribute values in the LDAP Protocol, the values
208 will not contain line breaks.
212 The attribute types contained in this section hold user information.
214 There is no requirement that servers implement the 'searchGuide' and
215 'teletexTerminalIdentifier' attribute types. In fact, their use is
218 An LDAP server implementation SHOULD recognize the rest of the
219 attribute types described in this section.
226 Sciberras Standards Track [Page 4]
228 RFC 4519 LDAP: Schema for User Applications June 2006
231 2.1. 'businessCategory'
233 The 'businessCategory' attribute type describes the kinds of business
234 performed by an organization. Each kind is one value of this
235 multi-valued attribute.
236 (Source: X.520 [X.520])
238 ( 2.5.4.15 NAME 'businessCategory'
239 EQUALITY caseIgnoreMatch
240 SUBSTR caseIgnoreSubstringsMatch
241 SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
243 1.3.6.1.4.1.1466.115.121.1.15 refers to the Directory String syntax
246 Examples: "banking", "transportation", and "real estate".
250 The 'c' ('countryName' in X.500) attribute type contains a two-letter
251 ISO 3166 [ISO3166] country code.
252 (Source: X.520 [X.520])
256 SYNTAX 1.3.6.1.4.1.1466.115.121.1.11
259 1.3.6.1.4.1.1466.115.121.1.11 refers to the Country String syntax
262 Examples: "DE", "AU" and "FR".
266 The 'cn' ('commonName' in X.500) attribute type contains names of an
267 object. Each name is one value of this multi-valued attribute. If
268 the object corresponds to a person, it is typically the person's full
270 (Source: X.520 [X.520])
275 Examples: "Martin K Smith", "Marty Smith" and "printer12".
282 Sciberras Standards Track [Page 5]
284 RFC 4519 LDAP: Schema for User Applications June 2006
289 The 'dc' ('domainComponent' in RFC 1274) attribute type is a string
290 holding one component, a label, of a DNS domain name
291 [RFC1034][RFC2181] naming a host [RFC1123]. That is, a value of this
292 attribute is a string of ASCII characters adhering to the following
295 label = (ALPHA / DIGIT) [*61(ALPHA / DIGIT / HYPHEN) (ALPHA / DIGIT)]
296 ALPHA = %x41-5A / %x61-7A ; "A"-"Z" / "a"-"z"
297 DIGIT = %x30-39 ; "0"-"9"
298 HYPHEN = %x2D ; hyphen ("-")
300 The encoding of IA5String for use in LDAP is simply the characters of
301 the ASCII label. The equality matching rule is case insensitive, as
302 is today's DNS. (Source: RFC 2247 [RFC2247] and RFC 1274 [RFC 1274])
304 ( 0.9.2342.19200300.100.1.25 NAME 'dc'
305 EQUALITY caseIgnoreIA5Match
306 SUBSTR caseIgnoreIA5SubstringsMatch
307 SYNTAX 1.3.6.1.4.1.1466.115.121.1.26
310 1.3.6.1.4.1.1466.115.121.1.26 refers to the IA5 String syntax
313 Examples: Valid values include "example" and "com" but not
314 "example.com". The latter is invalid as it contains multiple domain
317 It is noted that the directory service will not ensure that values of
318 this attribute conform to the host label restrictions [RFC1123]
319 illustrated by the <label> production provided above. It is the
320 directory client's responsibility to ensure that the labels it stores
321 in this attribute are appropriately restricted.
323 Directory applications supporting International Domain Names SHALL
324 use the ToASCII method [RFC3490] to produce the domain component
325 label. The special considerations discussed in Section 4 of RFC 3490
326 [RFC3490] should be taken, depending on whether the domain component
327 is used for "stored" or "query" purposes.
331 The 'description' attribute type contains human-readable descriptive
332 phrases about the object. Each description is one value of this
333 multi-valued attribute.
334 (Source: X.520 [X.520])
338 Sciberras Standards Track [Page 6]
340 RFC 4519 LDAP: Schema for User Applications June 2006
343 ( 2.5.4.13 NAME 'description'
344 EQUALITY caseIgnoreMatch
345 SUBSTR caseIgnoreSubstringsMatch
346 SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
348 1.3.6.1.4.1.1466.115.121.1.15 refers to the Directory String syntax
351 Examples: "a color printer", "Maintenance is done every Monday, at
352 1pm.", and "distribution list for all technical staff".
354 2.6. 'destinationIndicator'
356 The 'destinationIndicator' attribute type contains country and city
357 strings associated with the object (the addressee) needed to provide
358 the Public Telegram Service. The strings are composed in accordance
359 with CCITT Recommendations F.1 [F.1] and F.31 [F.31]. Each string is
360 one value of this multi-valued attribute.
361 (Source: X.520 [X.520])
363 ( 2.5.4.27 NAME 'destinationIndicator'
364 EQUALITY caseIgnoreMatch
365 SUBSTR caseIgnoreSubstringsMatch
366 SYNTAX 1.3.6.1.4.1.1466.115.121.1.44 )
368 1.3.6.1.4.1.1466.115.121.1.44 refers to the Printable String syntax
371 Examples: "AASD" as a destination indicator for Sydney, Australia.
372 "GBLD" as a destination indicator for London, United
375 It is noted that the directory will not ensure that values of this
376 attribute conform to the F.1 and F.31 CCITT Recommendations. It is
377 the application's responsibility to ensure destination indicators
378 that it stores in this attribute are appropriately constructed.
380 2.7. 'distinguishedName'
382 The 'distinguishedName' attribute type is not used as the name of the
383 object itself, but it is instead a base type from which some user
384 attribute types with a DN syntax can inherit.
386 It is unlikely that values of this type itself will occur in an
387 entry. LDAP server implementations that do not support attribute
388 subtyping need not recognize this attribute in requests. Client
389 implementations MUST NOT assume that LDAP servers are capable of
390 performing attribute subtyping.
394 Sciberras Standards Track [Page 7]
396 RFC 4519 LDAP: Schema for User Applications June 2006
399 (Source: X.520 [X.520])
401 ( 2.5.4.49 NAME 'distinguishedName'
402 EQUALITY distinguishedNameMatch
403 SYNTAX 1.3.6.1.4.1.1466.115.121.1.12 )
405 1.3.6.1.4.1.1466.115.121.1.12 refers to the DN syntax [RFC4517].
409 The 'dnQualifier' attribute type contains disambiguating information
410 strings to add to the relative distinguished name of an entry. The
411 information is intended for use when merging data from multiple
412 sources in order to prevent conflicts between entries that would
413 otherwise have the same name. Each string is one value of this
414 multi-valued attribute. It is recommended that a value of the
415 'dnQualifier' attribute be the same for all entries from a particular
417 (Source: X.520 [X.520])
419 ( 2.5.4.46 NAME 'dnQualifier'
420 EQUALITY caseIgnoreMatch
421 ORDERING caseIgnoreOrderingMatch
422 SUBSTR caseIgnoreSubstringsMatch
423 SYNTAX 1.3.6.1.4.1.1466.115.121.1.44 )
425 1.3.6.1.4.1.1466.115.121.1.44 refers to the Printable String syntax
428 Examples: "20050322123345Z" - timestamps can be used to disambiguate
430 "123456A" - serial numbers can be used to disambiguate
433 2.9. 'enhancedSearchGuide'
435 The 'enhancedSearchGuide' attribute type contains sets of information
436 for use by directory clients in constructing search filters. Each
437 set is one value of this multi-valued attribute.
438 (Source: X.520 [X.520])
440 ( 2.5.4.47 NAME 'enhancedSearchGuide'
441 SYNTAX 1.3.6.1.4.1.1466.115.121.1.21 )
443 1.3.6.1.4.1.1466.115.121.1.21 refers to the Enhanced Guide syntax
450 Sciberras Standards Track [Page 8]
452 RFC 4519 LDAP: Schema for User Applications June 2006
455 Examples: "person#(sn$APPROX)#wholeSubtree" and
456 "organizationalUnit#(ou$SUBSTR)#oneLevel".
458 2.10. 'facsimileTelephoneNumber'
460 The 'facsimileTelephoneNumber' attribute type contains telephone
461 numbers (and, optionally, the parameters) for facsimile terminals.
462 Each telephone number is one value of this multi-valued attribute.
463 (Source: X.520 [X.520])
465 ( 2.5.4.23 NAME 'facsimileTelephoneNumber'
466 SYNTAX 1.3.6.1.4.1.1466.115.121.1.22 )
468 1.3.6.1.4.1.1466.115.121.1.22 refers to the Facsimile Telephone
469 Number syntax [RFC4517].
471 Examples: "+61 3 9896 7801" and "+81 3 347 7418$fineResolution".
473 2.11. 'generationQualifier'
475 The 'generationQualifier' attribute type contains name strings that
476 are typically the suffix part of a person's name. Each string is one
477 value of this multi-valued attribute.
478 (Source: X.520 [X.520])
480 ( 2.5.4.44 NAME 'generationQualifier'
483 Examples: "III", "3rd", and "Jr.".
487 The 'givenName' attribute type contains name strings that are the
488 part of a person's name that is not their surname. Each string is
489 one value of this multi-valued attribute.
490 (Source: X.520 [X.520])
492 ( 2.5.4.42 NAME 'givenName'
495 Examples: "Andrew", "Charles", and "Joanne".
497 2.13. 'houseIdentifier'
499 The 'houseIdentifier' attribute type contains identifiers for a
500 building within a location. Each identifier is one value of this
501 multi-valued attribute.
502 (Source: X.520 [X.520])
506 Sciberras Standards Track [Page 9]
508 RFC 4519 LDAP: Schema for User Applications June 2006
511 ( 2.5.4.51 NAME 'houseIdentifier'
512 EQUALITY caseIgnoreMatch
513 SUBSTR caseIgnoreSubstringsMatch
514 SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
516 1.3.6.1.4.1.1466.115.121.1.15 refers to the Directory String syntax
519 Example: "20" to represent the house number 20.
523 The 'initials' attribute type contains strings of initials of some or
524 all of an individual's names, except the surname(s). Each string is
525 one value of this multi-valued attribute.
526 (Source: X.520 [X.520])
528 ( 2.5.4.43 NAME 'initials'
531 Examples: "K. A." and "K".
533 2.15. 'internationalISDNNumber'
535 The 'internationalISDNNumber' attribute type contains Integrated
536 Services Digital Network (ISDN) addresses, as defined in the
537 International Telecommunication Union (ITU) Recommendation E.164
538 [E.164]. Each address is one value of this multi-valued attribute.
539 (Source: X.520 [X.520])
541 ( 2.5.4.25 NAME 'internationalISDNNumber'
542 EQUALITY numericStringMatch
543 SUBSTR numericStringSubstringsMatch
544 SYNTAX 1.3.6.1.4.1.1466.115.121.1.36 )
546 1.3.6.1.4.1.1466.115.121.1.36 refers to the Numeric String syntax
549 Example: "0198 333 333".
553 The 'l' ('localityName' in X.500) attribute type contains names of a
554 locality or place, such as a city, county, or other geographic
555 region. Each name is one value of this multi-valued attribute.
556 (Source: X.520 [X.520])
562 Sciberras Standards Track [Page 10]
564 RFC 4519 LDAP: Schema for User Applications June 2006
570 Examples: "Geneva", "Paris", and "Edinburgh".
574 The 'member' attribute type contains the distinguished names of
575 objects that are on a list or in a group. Each name is one value of
576 this multi-valued attribute.
577 (Source: X.520 [X.520])
579 ( 2.5.4.31 NAME 'member'
580 SUP distinguishedName )
582 Examples: "cn=James Clarke,ou=Finance,o=Widget\, Inc." and
583 "cn=John Xerri,ou=Finance,o=Widget\, Inc." may
584 be two members of the financial team (group) at Widget,
585 Inc., in which case, both of these distinguished names
586 would be present as individual values of the member
591 The 'name' attribute type is the attribute supertype from which user
592 attribute types with the name syntax inherit. Such attribute types
593 are typically used for naming. The attribute type is multi-valued.
595 It is unlikely that values of this type itself will occur in an
596 entry. LDAP server implementations that do not support attribute
597 subtyping need not recognize this attribute in requests. Client
598 implementations MUST NOT assume that LDAP servers are capable of
599 performing attribute subtyping.
600 (Source: X.520 [X.520])
602 ( 2.5.4.41 NAME 'name'
603 EQUALITY caseIgnoreMatch
604 SUBSTR caseIgnoreSubstringsMatch
605 SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
607 1.3.6.1.4.1.1466.115.121.1.15 refers to the Directory String syntax
612 The 'o' ('organizationName' in X.500) attribute type contains the
613 names of an organization. Each name is one value of this
614 multi-valued attribute.
618 Sciberras Standards Track [Page 11]
620 RFC 4519 LDAP: Schema for User Applications June 2006
623 (Source: X.520 [X.520])
628 Examples: "Widget", "Widget, Inc.", and "Widget, Incorporated.".
632 The 'ou' ('organizationalUnitName' in X.500) attribute type contains
633 the names of an organizational unit. Each name is one value of this
634 multi-valued attribute.
635 (Source: X.520 [X.520])
640 Examples: "Finance", "Human Resources", and "Research and
645 The 'owner' attribute type contains the distinguished names of
646 objects that have an ownership responsibility for the object that is
647 owned. Each owner's name is one value of this multi-valued
649 (Source: X.520 [X.520])
651 ( 2.5.4.32 NAME 'owner'
652 SUP distinguishedName )
654 Example: The mailing list object, whose DN is "cn=All Employees,
655 ou=Mailing List,o=Widget\, Inc.", is owned by the Human
658 Therefore, the value of the 'owner' attribute within the
659 mailing list object, would be the DN of the director (role):
660 "cn=Human Resources Director,ou=employee,o=Widget\, Inc.".
662 2.22. 'physicalDeliveryOfficeName'
664 The 'physicalDeliveryOfficeName' attribute type contains names that a
665 Postal Service uses to identify a post office.
666 (Source: X.520 [X.520])
674 Sciberras Standards Track [Page 12]
676 RFC 4519 LDAP: Schema for User Applications June 2006
679 ( 2.5.4.19 NAME 'physicalDeliveryOfficeName'
680 EQUALITY caseIgnoreMatch
681 SUBSTR caseIgnoreSubstringsMatch
682 SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
684 1.3.6.1.4.1.1466.115.121.1.15 refers to the Directory String syntax
687 Examples: "Bremerhaven, Main" and "Bremerhaven, Bonnstrasse".
689 2.23. 'postalAddress'
691 The 'postalAddress' attribute type contains addresses used by a
692 Postal Service to perform services for the object. Each address is
693 one value of this multi-valued attribute.
694 (Source: X.520 [X.520])
696 ( 2.5.4.16 NAME 'postalAddress'
697 EQUALITY caseIgnoreListMatch
698 SUBSTR caseIgnoreListSubstringsMatch
699 SYNTAX 1.3.6.1.4.1.1466.115.121.1.41 )
701 1.3.6.1.4.1.1466.115.121.1.41 refers to the Postal Address syntax
704 Example: "15 Main St.$Ottawa$Canada".
708 The 'postalCode' attribute type contains codes used by a Postal
709 Service to identify postal service zones. Each code is one value of
710 this multi-valued attribute.
711 (Source: X.520 [X.520])
713 ( 2.5.4.17 NAME 'postalCode'
714 EQUALITY caseIgnoreMatch
715 SUBSTR caseIgnoreSubstringsMatch
716 SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
718 1.3.6.1.4.1.1466.115.121.1.15 refers to the Directory String syntax
721 Example: "22180", to identify Vienna, VA, in the USA.
730 Sciberras Standards Track [Page 13]
732 RFC 4519 LDAP: Schema for User Applications June 2006
735 2.25. 'postOfficeBox'
737 The 'postOfficeBox' attribute type contains postal box identifiers
738 that a Postal Service uses when a customer arranges to receive mail
739 at a box on the premises of the Postal Service. Each postal box
740 identifier is a single value of this multi-valued attribute.
741 (Source: X.520 [X.520])
743 ( 2.5.4.18 NAME 'postOfficeBox'
744 EQUALITY caseIgnoreMatch
745 SUBSTR caseIgnoreSubstringsMatch
746 SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
748 1.3.6.1.4.1.1466.115.121.1.15 refers to the Directory String syntax
753 2.26. 'preferredDeliveryMethod'
755 The 'preferredDeliveryMethod' attribute type contains an indication
756 of the preferred method of getting a message to the object.
757 (Source: X.520 [X.520])
759 ( 2.5.4.28 NAME 'preferredDeliveryMethod'
760 SYNTAX 1.3.6.1.4.1.1466.115.121.1.14
763 1.3.6.1.4.1.1466.115.121.1.14 refers to the Delivery Method syntax
766 Example: If the mhs-delivery Delivery Method is preferred over
767 telephone-delivery, which is preferred over all other
768 methods, the value would be: "mhs $ telephone".
770 2.27. 'registeredAddress'
772 The 'registeredAddress' attribute type contains postal addresses
773 suitable for reception of telegrams or expedited documents, where it
774 is necessary to have the recipient accept delivery. Each address is
775 one value of this multi-valued attribute.
776 (Source: X.520 [X.520])
778 ( 2.5.4.26 NAME 'registeredAddress'
780 SYNTAX 1.3.6.1.4.1.1466.115.121.1.41 )
786 Sciberras Standards Track [Page 14]
788 RFC 4519 LDAP: Schema for User Applications June 2006
791 1.3.6.1.4.1.1466.115.121.1.41 refers to the Postal Address syntax
794 Example: "Receptionist$Widget, Inc.$15 Main St.$Ottawa$Canada".
798 The 'roleOccupant' attribute type contains the distinguished names of
799 objects (normally people) that fulfill the responsibilities of a role
800 object. Each distinguished name is one value of this multi-valued
802 (Source: X.520 [X.520])
804 ( 2.5.4.33 NAME 'roleOccupant'
805 SUP distinguishedName )
807 Example: The role object, "cn=Human Resources
808 Director,ou=Position,o=Widget\, Inc.", is fulfilled by two
809 people whose object names are "cn=Mary
810 Smith,ou=employee,o=Widget\, Inc." and "cn=James
811 Brown,ou=employee,o=Widget\, Inc.". The 'roleOccupant'
812 attribute will contain both of these distinguished names,
813 since they are the occupants of this role.
817 The 'searchGuide' attribute type contains sets of information for use
818 by clients in constructing search filters. It is superseded by
819 'enhancedSearchGuide', described above in Section 2.9. Each set is
820 one value of this multi-valued attribute.
821 (Source: X.520 [X.520])
823 ( 2.5.4.14 NAME 'searchGuide'
824 SYNTAX 1.3.6.1.4.1.1466.115.121.1.25 )
826 1.3.6.1.4.1.1466.115.121.1.25 refers to the Guide syntax [RFC4517].
828 Example: "person#sn$EQ".
832 The 'seeAlso' attribute type contains the distinguished names of
833 objects that are related to the subject object. Each related object
834 name is one value of this multi-valued attribute.
835 (Source: X.520 [X.520])
837 ( 2.5.4.34 NAME 'seeAlso'
838 SUP distinguishedName )
842 Sciberras Standards Track [Page 15]
844 RFC 4519 LDAP: Schema for User Applications June 2006
847 Example: The person object "cn=James Brown,ou=employee,o=Widget\,
848 Inc." is related to the role objects "cn=Football Team
849 Captain,ou=sponsored activities,o=Widget\, Inc." and
850 "cn=Chess Team,ou=sponsored activities,o=Widget\, Inc.".
851 Since the role objects are related to the person object, the
852 'seeAlso' attribute will contain the distinguished name of
853 each role object as separate values.
857 The 'serialNumber' attribute type contains the serial numbers of
858 devices. Each serial number is one value of this multi-valued
860 (Source: X.520 [X.520])
862 ( 2.5.4.5 NAME 'serialNumber'
863 EQUALITY caseIgnoreMatch
864 SUBSTR caseIgnoreSubstringsMatch
865 SYNTAX 1.3.6.1.4.1.1466.115.121.1.44 )
867 1.3.6.1.4.1.1466.115.121.1.44 refers to the Printable String syntax
870 Examples: "WI-3005" and "XF551426".
874 The 'sn' ('surname' in X.500) attribute type contains name strings
875 for the family names of a person. Each string is one value of this
876 multi-valued attribute.
877 (Source: X.520 [X.520])
886 The 'st' ('stateOrProvinceName' in X.500) attribute type contains the
887 full names of states or provinces. Each name is one value of this
888 multi-valued attribute.
889 (Source: X.520 [X.520])
894 Example: "California".
898 Sciberras Standards Track [Page 16]
900 RFC 4519 LDAP: Schema for User Applications June 2006
905 The 'street' ('streetAddress' in X.500) attribute type contains site
906 information from a postal address (i.e., the street name, place,
907 avenue, and the house number). Each street is one value of this
908 multi-valued attribute.
909 (Source: X.520 [X.520])
911 ( 2.5.4.9 NAME 'street'
912 EQUALITY caseIgnoreMatch
913 SUBSTR caseIgnoreSubstringsMatch
914 SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
916 1.3.6.1.4.1.1466.115.121.1.15 refers to the Directory String syntax
919 Example: "15 Main St.".
921 2.35. 'telephoneNumber'
923 The 'telephoneNumber' attribute type contains telephone numbers that
924 comply with the ITU Recommendation E.123 [E.123]. Each number is one
925 value of this multi-valued attribute.
926 (Source: X.520 [X.520])
928 ( 2.5.4.20 NAME 'telephoneNumber'
929 EQUALITY telephoneNumberMatch
930 SUBSTR telephoneNumberSubstringsMatch
931 SYNTAX 1.3.6.1.4.1.1466.115.121.1.50 )
933 1.3.6.1.4.1.1466.115.121.1.50 refers to the Telephone Number syntax
936 Example: "+1 234 567 8901".
938 2.36. 'teletexTerminalIdentifier'
940 The withdrawal of Recommendation F.200 has resulted in the withdrawal
942 (Source: X.520 [X.520])
944 ( 2.5.4.22 NAME 'teletexTerminalIdentifier'
945 SYNTAX 1.3.6.1.4.1.1466.115.121.1.51 )
947 1.3.6.1.4.1.1466.115.121.1.51 refers to the Teletex Terminal
948 Identifier syntax [RFC4517].
954 Sciberras Standards Track [Page 17]
956 RFC 4519 LDAP: Schema for User Applications June 2006
961 The 'telexNumber' attribute type contains sets of strings that are a
962 telex number, country code, and answerback code of a telex terminal.
963 Each set is one value of this multi-valued attribute.
964 (Source: X.520 [X.520])
966 ( 2.5.4.21 NAME 'telexNumber'
967 SYNTAX 1.3.6.1.4.1.1466.115.121.1.52 )
969 1.3.6.1.4.1.1466.115.121.1.52 refers to the Telex Number syntax
972 Example: "12345$023$ABCDE".
976 The 'title' attribute type contains the title of a person in their
977 organizational context. Each title is one value of this multi-valued
979 (Source: X.520 [X.520])
981 ( 2.5.4.12 NAME 'title'
983 Examples: "Vice President", "Software Engineer", and "CEO".
987 The 'uid' ('userid' in RFC 1274) attribute type contains computer
988 system login names associated with the object. Each name is one
989 value of this multi-valued attribute.
990 (Source: RFC 2798 [RFC2798] and RFC 1274 [RFC1274])
992 ( 0.9.2342.19200300.100.1.1 NAME 'uid'
993 EQUALITY caseIgnoreMatch
994 SUBSTR caseIgnoreSubstringsMatch
995 SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
997 1.3.6.1.4.1.1466.115.121.1.15 refers to the Directory String syntax
1000 Examples: "s9709015", "admin", and "Administrator".
1010 Sciberras Standards Track [Page 18]
1012 RFC 4519 LDAP: Schema for User Applications June 2006
1015 2.40. 'uniqueMember'
1017 The 'uniqueMember' attribute type contains the distinguished names of
1018 an object that is on a list or in a group, where the relative
1019 distinguished names of the object include a value that distinguishes
1020 between objects when a distinguished name has been reused. Each
1021 distinguished name is one value of this multi-valued attribute.
1022 (Source: X.520 [X.520])
1024 ( 2.5.4.50 NAME 'uniqueMember'
1025 EQUALITY uniqueMemberMatch
1026 SYNTAX 1.3.6.1.4.1.1466.115.121.1.34 )
1028 1.3.6.1.4.1.1466.115.121.1.34 refers to the Name and Optional UID
1031 Example: If "ou=1st Battalion,o=Defense,c=US" is a battalion that was
1032 disbanded, establishing a new battalion with the "same" name
1033 would have a unique identifier value added, resulting in
1034 "ou=1st Battalion, o=Defense,c=US#'010101'B".
1036 2.41. 'userPassword'
1038 The 'userPassword' attribute contains octet strings that are known
1039 only to the user and the system to which the user has access. Each
1040 string is one value of this multi-valued attribute.
1042 The application SHOULD prepare textual strings used as passwords by
1043 transcoding them to Unicode, applying SASLprep [RFC4013], and
1044 encoding as UTF-8. The determination of whether a password is
1045 textual is a local client matter.
1046 (Source: X.509 [X.509])
1048 ( 2.5.4.35 NAME 'userPassword'
1049 EQUALITY octetStringMatch
1050 SYNTAX 1.3.6.1.4.1.1466.115.121.1.40 )
1052 1.3.6.1.4.1.1466.115.121.1.40 refers to the Octet String syntax
1055 Passwords are stored using an Octet String syntax and are not
1056 encrypted. Transfer of cleartext passwords is strongly discouraged
1057 where the underlying transport service cannot guarantee
1058 confidentiality and may result in disclosure of the password to
1059 unauthorized parties.
1061 An example of a need for multiple values in the 'userPassword'
1062 attribute is an environment where every month the user is expected to
1066 Sciberras Standards Track [Page 19]
1068 RFC 4519 LDAP: Schema for User Applications June 2006
1071 use a different password generated by some automated system. During
1072 transitional periods, like the last and first day of the periods, it
1073 may be necessary to allow two passwords for the two consecutive
1074 periods to be valid in the system.
1078 The 'x121Address' attribute type contains data network addresses as
1079 defined by ITU Recommendation X.121 [X.121]. Each address is one
1080 value of this multi-valued attribute.
1081 (Source: X.520 [X.520])
1083 ( 2.5.4.24 NAME 'x121Address'
1084 EQUALITY numericStringMatch
1085 SUBSTR numericStringSubstringsMatch
1086 SYNTAX 1.3.6.1.4.1.1466.115.121.1.36 )
1088 1.3.6.1.4.1.1466.115.121.1.36 refers to the Numeric String syntax
1091 Example: "36111222333444555".
1093 2.43. 'x500UniqueIdentifier'
1095 The 'x500UniqueIdentifier' attribute type contains binary strings
1096 that are used to distinguish between objects when a distinguished
1097 name has been reused. Each string is one value of this multi-valued
1100 In X.520 [X.520], this attribute type is called 'uniqueIdentifier'.
1101 This is a different attribute type from both the 'uid' and
1102 'uniqueIdentifier' LDAP attribute types. The 'uniqueIdentifier'
1103 attribute type is defined in [RFC4524].
1104 (Source: X.520 [X.520])
1106 ( 2.5.4.45 NAME 'x500UniqueIdentifier'
1107 EQUALITY bitStringMatch
1108 SYNTAX 1.3.6.1.4.1.1466.115.121.1.6 )
1110 1.3.6.1.4.1.1466.115.121.1.6 refers to the Bit String syntax
1115 LDAP servers SHOULD recognize all the Object Classes listed here as
1116 values of the 'objectClass' attribute (see [RFC4512]).
1122 Sciberras Standards Track [Page 20]
1124 RFC 4519 LDAP: Schema for User Applications June 2006
1127 3.1. 'applicationProcess'
1129 The 'applicationProcess' object class definition is the basis of an
1130 entry that represents an application executing in a computer system.
1131 (Source: X.521 [X.521])
1133 ( 2.5.6.11 NAME 'applicationProcess'
1144 The 'country' object class definition is the basis of an entry that
1145 represents a country.
1146 (Source: X.521 [X.521])
1148 ( 2.5.6.2 NAME 'country'
1157 The 'dcObject' object class permits an entry to contains domain
1158 component information. This object class is defined as auxiliary,
1159 because it will be used in conjunction with an existing structural
1161 (Source: RFC 2247 [RFC2247])
1163 ( 1.3.6.1.4.1.1466.344 NAME 'dcObject'
1170 The 'device' object class is the basis of an entry that represents an
1171 appliance, computer, or network element.
1172 (Source: X.521 [X.521])
1178 Sciberras Standards Track [Page 21]
1180 RFC 4519 LDAP: Schema for User Applications June 2006
1183 ( 2.5.6.14 NAME 'device'
1187 MAY ( serialNumber $
1197 The 'groupOfNames' object class is the basis of an entry that
1198 represents a set of named objects including information related to
1199 the purpose or maintenance of the set.
1200 (Source: X.521 [X.521])
1202 ( 2.5.6.9 NAME 'groupOfNames'
1207 MAY ( businessCategory $
1214 3.6. 'groupOfUniqueNames'
1216 The 'groupOfUniqueNames' object class is the same as the
1217 'groupOfNames' object class except that the object names are not
1218 repeated or reassigned within a set scope.
1219 (Source: X.521 [X.521])
1234 Sciberras Standards Track [Page 22]
1236 RFC 4519 LDAP: Schema for User Applications June 2006
1239 ( 2.5.6.17 NAME 'groupOfUniqueNames'
1242 MUST ( uniqueMember $
1244 MAY ( businessCategory $
1253 The 'locality' object class is the basis of an entry that represents
1254 a place in the physical world.
1255 (Source: X.521 [X.521])
1257 ( 2.5.6.3 NAME 'locality'
1269 The 'organization' object class is the basis of an entry that
1270 represents a structured group of people.
1271 (Source: X.521 [X.521])
1273 ( 2.5.6.4 NAME 'organization'
1277 MAY ( userPassword $ searchGuide $ seeAlso $
1278 businessCategory $ x121Address $ registeredAddress $
1279 destinationIndicator $ preferredDeliveryMethod $
1280 telexNumber $ teletexTerminalIdentifier $
1281 telephoneNumber $ internationalISDNNumber $
1282 facsimileTelephoneNumber $ street $ postOfficeBox $
1283 postalCode $ postalAddress $ physicalDeliveryOfficeName $
1284 st $ l $ description ) )
1290 Sciberras Standards Track [Page 23]
1292 RFC 4519 LDAP: Schema for User Applications June 2006
1295 3.9. 'organizationalPerson'
1297 The 'organizationalPerson' object class is the basis of an entry that
1298 represents a person in relation to an organization.
1299 (Source: X.521 [X.521])
1301 ( 2.5.6.7 NAME 'organizationalPerson'
1304 MAY ( title $ x121Address $ registeredAddress $
1305 destinationIndicator $ preferredDeliveryMethod $
1306 telexNumber $ teletexTerminalIdentifier $
1307 telephoneNumber $ internationalISDNNumber $
1308 facsimileTelephoneNumber $ street $ postOfficeBox $
1309 postalCode $ postalAddress $ physicalDeliveryOfficeName $
1312 3.10. 'organizationalRole'
1314 The 'organizationalRole' object class is the basis of an entry that
1315 represents a job, function, or position in an organization.
1316 (Source: X.521 [X.521])
1318 ( 2.5.6.8 NAME 'organizationalRole'
1322 MAY ( x121Address $ registeredAddress $ destinationIndicator $
1323 preferredDeliveryMethod $ telexNumber $
1324 teletexTerminalIdentifier $ telephoneNumber $
1325 internationalISDNNumber $ facsimileTelephoneNumber $
1326 seeAlso $ roleOccupant $ preferredDeliveryMethod $
1327 street $ postOfficeBox $ postalCode $ postalAddress $
1328 physicalDeliveryOfficeName $ ou $ st $ l $
1331 3.11. 'organizationalUnit'
1333 The 'organizationalUnit' object class is the basis of an entry that
1334 represents a piece of an organization.
1335 (Source: X.521 [X.521])
1346 Sciberras Standards Track [Page 24]
1348 RFC 4519 LDAP: Schema for User Applications June 2006
1351 ( 2.5.6.5 NAME 'organizationalUnit'
1355 MAY ( businessCategory $ description $ destinationIndicator $
1356 facsimileTelephoneNumber $ internationalISDNNumber $ l $
1357 physicalDeliveryOfficeName $ postalAddress $ postalCode $
1358 postOfficeBox $ preferredDeliveryMethod $
1359 registeredAddress $ searchGuide $ seeAlso $ st $ street $
1360 telephoneNumber $ teletexTerminalIdentifier $
1361 telexNumber $ userPassword $ x121Address ) )
1365 The 'person' object class is the basis of an entry that represents a
1367 (Source: X.521 [X.521])
1369 ( 2.5.6.6 NAME 'person'
1374 MAY ( userPassword $
1376 seeAlso $ description ) )
1378 3.13. 'residentialPerson'
1380 The 'residentialPerson' object class is the basis of an entry that
1381 includes a person's residence in the representation of the person.
1382 (Source: X.521 [X.521])
1384 ( 2.5.6.10 NAME 'residentialPerson'
1388 MAY ( businessCategory $ x121Address $ registeredAddress $
1389 destinationIndicator $ preferredDeliveryMethod $
1390 telexNumber $ teletexTerminalIdentifier $
1391 telephoneNumber $ internationalISDNNumber $
1392 facsimileTelephoneNumber $ preferredDeliveryMethod $
1393 street $ postOfficeBox $ postalCode $ postalAddress $
1394 physicalDeliveryOfficeName $ st $ l ) )
1402 Sciberras Standards Track [Page 25]
1404 RFC 4519 LDAP: Schema for User Applications June 2006
1409 The 'uidObject' object class permits an entry to contains user
1410 identification information. This object class is defined as
1411 auxiliary, because it will be used in conjunction with an existing
1412 structural object class.
1413 (Source: RFC 2377 [RFC2377])
1415 ( 1.3.6.1.1.3.1 NAME 'uidObject'
1420 4. IANA Considerations
1422 The Internet Assigned Numbers Authority (IANA) has updated the LDAP
1423 descriptors registry as indicated in the following template:
1425 Subject: Request for LDAP Descriptor Registration Update
1426 Descriptor (short name): see comments
1427 Object Identifier: see comments
1428 Person & email address to contact for further information:
1429 Andrew Sciberras <andrew.sciberras@eb2bcom.com>
1430 Usage: (A = attribute type, O = Object Class) see comment
1431 Specification: RFC 4519
1432 Author/Change Controller: IESG
1436 In the LDAP descriptors registry, the following descriptors (short
1437 names) have been updated to refer to RFC 4519. Names that need to
1438 be reserved, rather than assigned to an Object Identifier, will
1439 contain an Object Identifier value of RESERVED.
1442 ------------------------ ---- ----------------------------
1443 applicationProcess O 2.5.6.11
1444 businessCategory A 2.5.4.15
1447 commonName A 2.5.4.3
1449 countryName A 2.5.4.6
1450 dc A 0.9.2342.19200300.100.1.25
1451 dcObject O 1.3.6.1.4.1.1466.344
1452 description A 2.5.4.13
1453 destinationIndicator A 2.5.4.27
1458 Sciberras Standards Track [Page 26]
1460 RFC 4519 LDAP: Schema for User Applications June 2006
1464 ------------------------ ---- ----------------------------
1465 distinguishedName A 2.5.4.49
1466 dnQualifier A 2.5.4.46
1467 domainComponent A 0.9.2342.19200300.100.1.25
1468 enhancedSearchGuide A 2.5.4.47
1469 facsimileTelephoneNumber A 2.5.4.23
1470 generationQualifier A 2.5.4.44
1471 givenName A 2.5.4.42
1473 groupOfNames O 2.5.6.9
1474 groupOfUniqueNames O 2.5.6.17
1475 houseIdentifier A 2.5.4.51
1477 internationalISDNNumber A 2.5.4.25
1480 localityName A 2.5.4.7
1484 organization O 2.5.6.4
1485 organizationName A 2.5.4.10
1486 organizationalPerson O 2.5.6.7
1487 organizationalRole O 2.5.6.8
1488 organizationalUnit O 2.5.6.5
1489 organizationalUnitName A 2.5.4.11
1493 physicalDeliveryOfficeName A 2.5.4.19
1494 postalAddress A 2.5.4.16
1495 postalCode A 2.5.4.17
1496 postOfficeBox A 2.5.4.18
1497 preferredDeliveryMethod A 2.5.4.28
1498 registeredAddress A 2.5.4.26
1499 residentialPerson O 2.5.6.10
1500 roleOccupant A 2.5.4.33
1501 searchGuide A 2.5.4.14
1503 serialNumber A 2.5.4.5
1508 telephoneNumber A 2.5.4.20
1509 teletexTerminalIdentifier A 2.5.4.22
1510 telexNumber A 2.5.4.21
1514 Sciberras Standards Track [Page 27]
1516 RFC 4519 LDAP: Schema for User Applications June 2006
1520 ------------------------ ---- ----------------------------
1522 uid A 0.9.2342.19200300.100.1.1
1523 uidObject O 1.3.6.1.1.3.1
1524 uniqueMember A 2.5.4.50
1525 userid A 0.9.2342.19200300.100.1.1
1526 userPassword A 2.5.4.35
1527 x121Address A 2.5.4.24
1528 x500UniqueIdentifier A 2.5.4.45
1530 5. Security Considerations
1532 Attributes of directory entries are used to provide descriptive
1533 information about the real-world objects they represent, which can be
1534 people, organizations, or devices. Most countries have privacy laws
1535 regarding the publication of information about people.
1537 Transfer of cleartext passwords is strongly discouraged where the
1538 underlying transport service cannot guarantee confidentiality and
1539 integrity, since this may result in disclosure of the password to
1540 unauthorized parties.
1542 Multiple attribute values for the 'userPassword' attribute need to be
1543 used with care. Especially reset/deletion of a password by an
1544 administrator without knowing the old user password gets tricky or
1545 impossible if multiple values for different applications are present.
1547 Certainly, applications that intend to replace the 'userPassword'
1548 value(s) with new value(s) should use modify/replaceValues (or
1549 modify/deleteAttribute+addAttribute). In addition, server
1550 implementations are encouraged to provide administrative controls
1551 that, if enabled, restrict the 'userPassword' attribute to one value.
1553 Note that when used for authentication purposes [RFC4513], the user
1554 need only prove knowledge of one of the values, not all of the
1559 The definitions, on which this document is based, have been developed
1560 by committees for telecommunications and international standards.
1562 This document is an update of RFC 2256 by Mark Wahl. RFC 2256 was a
1563 product of the IETF ASID Working Group.
1570 Sciberras Standards Track [Page 28]
1572 RFC 4519 LDAP: Schema for User Applications June 2006
1575 The 'dc' attribute type definition and the 'dcObject' object class
1576 definition in this document supersede the specification in RFC 2247
1577 by S. Kille, M. Wahl, A. Grimstad, R. Huber, and S. Sataluri.
1579 The 'uid' attribute type definition in this document supersedes the
1580 specification of the 'userid' in RFC 1274 by P. Barker and S. Kille
1581 and of the uid in RFC 2798 by M. Smith.
1583 The 'uidObject' object class definition in this document supersedes
1584 the specification of the 'uidObject' in RFC 2377 by A. Grimstad, R.
1585 Huber, S. Sataluri, and M. Wahl.
1587 This document is based upon input of the IETF LDAPBIS working group.
1588 The author wishes to thank S. Legg and K. Zeilenga for their
1589 significant contribution to this update. The author would also like
1590 to thank Kathy Dally, who edited early versions of this document.
1594 7.1. Normative References
1596 [E.123] Notation for national and international telephone numbers,
1597 ITU-T Recommendation E.123, 1988
1599 [E.164] The international public telecommunication numbering plan,
1600 ITU-T Recommendation E.164, 1997
1602 [F.1] Operational Provisions For The International Public
1603 Telegram Service Transmission System, CCITT Recommendation
1606 [F.31] Telegram Retransmission System, CCITT Recommendation F.31,
1609 [ISO3166] ISO 3166, "Codes for the representation of names of
1612 [RFC1034] Mockapetris, P., "Domain names - concepts and facilities",
1613 STD 13, RFC 1034, November 1987.
1615 [RFC1123] Braden, R., "Requirements for Internet Hosts - Application
1616 and Support", STD 3, RFC 1123, October 1989.
1618 [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
1619 Requirement Levels", BCP 14, RFC 2119, March 1997.
1621 [RFC2181] Elz, R. and R. Bush, "Clarifications to the DNS
1622 Specification", RFC 2181, July 1997.
1626 Sciberras Standards Track [Page 29]
1628 RFC 4519 LDAP: Schema for User Applications June 2006
1631 [RFC3490] Faltstrom, P., Hoffman, P., and A. Costello,
1632 "Internationalizing Domain Names in Applications (IDNA)",
1633 RFC 3490, March 2003.
1635 [RFC4013] Zeilenga, K., "SASLprep: Stringprep Profile for User Names
1636 and Passwords", RFC 4013, February 2005.
1638 [RFC4234] Crocker, D. and P. Overell, "Augmented BNF for Syntax
1639 Specifications: ABNF", RFC 4234, October 2005.
1641 [RFC4510] Zeilenga, K., Ed., "Lightweight Directory Access Protocol
1642 (LDAP): Technical Specification Road Map", RFC 4510, June
1645 [RFC4512] Zeilenga, K., "Lightweight Directory Access Protocol
1646 (LDAP): Directory Information Models", RFC 4512, June
1649 [RFC4517] Legg, S., Ed., "Lightweight Directory Access Protocol
1650 (LDAP): Syntaxes and Matching Rules", RFC 4517, June 2006.
1652 [X.121] International numbering plan for public data networks,
1653 ITU-T Recommendation X.121, 1996
1655 [X.509] The Directory: Authentication Framework, ITU-T
1656 Recommendation X.509, 1993
1658 [X.520] The Directory: Selected Attribute Types, ITU-T
1659 Recommendation X.520, 1993
1661 [X.521] The Directory: Selected Object Classes. ITU-T
1662 Recommendation X.521, 1993
1664 7.2. Informative References
1666 [RFC1274] Barker, P. and S. Kille, "The COSINE and Internet X.500
1667 Schema", RFC 1274, November 1991.
1669 [RFC2247] Kille, S., Wahl, M., Grimstad, A., Huber, R., and S.
1670 Sataluri, "Using Domains in LDAP/X.500 Distinguished
1671 Names", RFC 2247, January 1998.
1673 [RFC2377] Grimstad, A., Huber, R., Sataluri, S., and M. Wahl,
1674 "Naming Plan for Internet Directory-Enabled Applications",
1675 RFC 2377, September 1998.
1677 [RFC2798] Smith, M., "Definition of the inetOrgPerson LDAP Object
1678 Class", RFC 2798, April 2000.
1682 Sciberras Standards Track [Page 30]
1684 RFC 4519 LDAP: Schema for User Applications June 2006
1687 [RFC4513] Harrison R., Ed., "Lightweight Directory Access Protocol
1688 (LDAP): Authentication Methods and Security Mechanisms",
1689 RFC 4513, June 2006.
1691 [RFC4523] Zeilenga, K., "Lightweight Directory Access Protocol
1692 (LDAP) Schema Definitions for X.509 Certificates", RFC
1695 [RFC4524] Zeilenga, E., Ed., "COSINE LDAP/X.500 Schema", RFC 4524,
1698 [X.500] ITU-T Recommendations X.500 (1993) | ISO/IEC 9594-1:1994,
1699 Information Technology - Open Systems Interconnection -
1700 The Directory: Overview of concepts, models and services.
1738 Sciberras Standards Track [Page 31]
1740 RFC 4519 LDAP: Schema for User Applications June 2006
1743 Appendix A. Changes Made Since RFC 2256
1745 This appendix lists the changes that have been made from RFC 2256 to
1748 This appendix is not a normative part of this specification, which
1749 has been provided for informational purposes only.
1751 1. Replaced the document title.
1753 2. Removed the IESG Note.
1755 3. Dependencies on RFC 1274 have been eliminated.
1757 4. Added a Security Considerations section and an IANA
1758 Considerations section.
1760 5. Deleted the conformance requirement for subschema object
1761 classes in favor of a statement in [RFC4517].
1763 6. Added explanation to attribute types and to each object class.
1765 7. Removed Section 4, Syntaxes, and Section 6, Matching Rules,
1766 (moved to [RFC4517]).
1768 8. Removed the certificate-related attribute types:
1769 authorityRevocationList, cACertificate,
1770 certificateRevocationList, crossCertificatePair,
1771 deltaRevocationList, supportedAlgorithms, and userCertificate.
1773 Removed the certificate-related Object Classes:
1774 certificationAuthority, certificationAuthority-V2,
1775 cRLDistributionPoint, strongAuthenticationUser, and
1776 userSecurityInformation
1778 LDAP PKI is now discussed in [RFC4523].
1780 9. Removed the dmdName, knowledgeInformation,
1781 presentationAddress, protocolInformation, and
1782 supportedApplicationContext attribute types and the dmd,
1783 applicationEntity, and dSA object classes.
1785 10. Deleted the aliasedObjectName and objectClass attribute type
1786 definitions. Deleted the alias and top object class
1787 definitions. They are included in [RFC4512].
1794 Sciberras Standards Track [Page 32]
1796 RFC 4519 LDAP: Schema for User Applications June 2006
1799 11. Added the 'dc' attribute type from RFC 2247, making the
1800 distinction between 'stored' and 'query' values when preparing
1803 12. Numerous editorial changes.
1805 13. Removed upper bound after the SYNTAX oid in all attribute
1806 definitions where it appeared.
1808 14. Added text about Unicode, SASLprep [RFC4013], and UTF-8 for
1811 15. Included definitions, comments and references for 'dcObject'
1814 16. Replaced PKI schema references to use RFC 4523.
1816 17. Spelt out and referenced ABNF on first usage.
1818 18. Removed Section 2.4 (Source). Replaced the source table with
1819 explicit references for each definition.
1821 19. All references to an attribute type or object class are
1822 enclosed in single quotes.
1824 20. The layout of attribute type definitions has been changed to
1825 provide consistency throughout the document:
1827 > Description of Attribute type
1828 > Multivalued description
1829 > Source Information
1832 > Additional Comments
1834 Adding this consistent output included the addition of
1835 examples to some definitions.
1837 21. References to alternate names for attributes types are
1838 provided with a reference to where they were originally
1841 22. Clarification of the description of 'distinguishedName' and
1842 'name', in regards to these attribute types being supertypes.
1844 23. Spelt out ISDN on first usage.
1850 Sciberras Standards Track [Page 33]
1852 RFC 4519 LDAP: Schema for User Applications June 2006
1855 24. Inserted a reference to [RFC4517] for the
1856 'teletexTerminalIdentifier' definition's SYNTAX OID.
1858 25. Additional names were added to the IANA Considerations. Names
1859 include 'commonName', 'dcObject', 'domainComponent', 'GN',
1860 'localityName', 'organizationName', 'organizationUnitName',
1861 'surname', 'uidObject' and 'userid'.
1863 26. Renamed all instances of supercede to supersede.
1865 27. Moved [F.1], [F.31] and [RFC4013] from informative to
1866 normative references.
1868 28. Changed the 'c' definition to be consistent with X.500.
1874 Suite 3, Woodhouse Corporate Centre,
1876 Box Hill North, Victoria 3129
1879 Phone: +61 3 9896 7833
1880 EMail: andrew.sciberras@eb2bcom.com
1906 Sciberras Standards Track [Page 34]
1908 RFC 4519 LDAP: Schema for User Applications June 2006
1911 Full Copyright Statement
1913 Copyright (C) The Internet Society (2006).
1915 This document is subject to the rights, licenses and restrictions
1916 contained in BCP 78, and except as set forth therein, the authors
1917 retain all their rights.
1919 This document and the information contained herein are provided on an
1920 "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
1921 OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
1922 ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
1923 INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
1924 INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
1925 WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
1927 Intellectual Property
1929 The IETF takes no position regarding the validity or scope of any
1930 Intellectual Property Rights or other rights that might be claimed to
1931 pertain to the implementation or use of the technology described in
1932 this document or the extent to which any license under such rights
1933 might or might not be available; nor does it represent that it has
1934 made any independent effort to identify any such rights. Information
1935 on the procedures with respect to rights in RFC documents can be
1936 found in BCP 78 and BCP 79.
1938 Copies of IPR disclosures made to the IETF Secretariat and any
1939 assurances of licenses to be made available, or the result of an
1940 attempt made to obtain a general license or permission for the use of
1941 such proprietary rights by implementers or users of this
1942 specification can be obtained from the IETF on-line IPR repository at
1943 http://www.ietf.org/ipr.
1945 The IETF invites any interested party to bring to its attention any
1946 copyrights, patents or patent applications, or other proprietary
1947 rights that may cover technology that may be required to implement
1948 this standard. Please address the information to the IETF at
1953 Funding for the RFC Editor function is provided by the IETF
1954 Administrative Support Activity (IASA).
1962 Sciberras Standards Track [Page 35]