LDAP Duplication/Replication/Update Protocols WG (ldup)
Thursday, December 13 at 1530-1730
===================================
CHAIRS: Chris Apple <
[email protected]>
John Strassner <
[email protected]>
AGENDA:
0) Agenda Bashing
1) LDUP Update Reconciliation Procedures
http://www.ietf.org/internet-drafts/draft-ietf-ldup-urp-05.txt
2) LDAPv3 Replication Requirements
http://www.ietf.org/internet-drafts/draft-ietf-ldup-replica-req-10.txt
3) LDAP Replication Architecture
http://www.ietf.org/internet-drafts/draft-ietf-ldup-model-06.txt
4) LDUP Replication Information Model
http://www.ietf.org/internet-drafts/draft-ietf-ldup-infomod-04.txt
5) LDAP Subentry Schema
http://www.ietf.org/internet-drafts/draft-ietf-ldup-subentry-08.txt
6) The LDUP Replication Update Protocol
http://www.ietf.org/internet-drafts/draft-ietf-ldup-protocol-03.txt
7) General Usage Profile for LDAPv3 Replication
http://www.ietf.org/internet-drafts/draft-ietf-ldup-usage-profile-02.txt
8) LDAP Client Update Protocol
http://www.ietf.org/internet-drafts/draft-ietf-ldup-lcup-02.txt
9) Profile for Framing LDAPv3 Operations
http://www.ietf.org/internet-drafts/draft-ietf-ldup-framing-profile-00.t
xt
10) Mandatory LDAP Replica Management
http://www.ietf.org/internet-drafts/draft-ietf-ldup-mrm-00.txt
11) LDAPv3 Access Control - Options to Consider
a) Adding it to LDUP?
b) Forming a WG Solely to Address Access Control for LDAPv3?
c) Handling the Access Control problem by (potentially
competing) individual contributions?
d) Do nothing and let the work go on outside of the IETF?
e) Other options?
12) Broader WG Charter Discussion