LDAP Duplication/Replication/Update Protocols WG (ldup)

Thursday, December 13 at 1530-1730
===================================

CHAIRS: Chris Apple <[email protected]>
       John Strassner <[email protected]>

AGENDA:


0) Agenda Bashing


1) LDUP Update Reconciliation Procedures


   http://www.ietf.org/internet-drafts/draft-ietf-ldup-urp-05.txt


2) LDAPv3 Replication Requirements



http://www.ietf.org/internet-drafts/draft-ietf-ldup-replica-req-10.txt


3) LDAP Replication Architecture


   http://www.ietf.org/internet-drafts/draft-ietf-ldup-model-06.txt


4) LDUP Replication Information Model


   http://www.ietf.org/internet-drafts/draft-ietf-ldup-infomod-04.txt


5) LDAP Subentry Schema


   http://www.ietf.org/internet-drafts/draft-ietf-ldup-subentry-08.txt


6) The LDUP Replication Update Protocol


   http://www.ietf.org/internet-drafts/draft-ietf-ldup-protocol-03.txt


7) General Usage Profile for LDAPv3 Replication



http://www.ietf.org/internet-drafts/draft-ietf-ldup-usage-profile-02.txt


8) LDAP Client Update Protocol


   http://www.ietf.org/internet-drafts/draft-ietf-ldup-lcup-02.txt


9) Profile for Framing LDAPv3 Operations



http://www.ietf.org/internet-drafts/draft-ietf-ldup-framing-profile-00.t
xt


10) Mandatory LDAP Replica Management


     http://www.ietf.org/internet-drafts/draft-ietf-ldup-mrm-00.txt


11) LDAPv3 Access Control - Options to Consider


       a) Adding it to LDUP?
       b) Forming a WG Solely to Address Access Control for LDAPv3?
       c) Handling the Access Control problem by (potentially
competing) individual contributions?
           d) Do nothing and let the work go on outside of the IETF?
       e) Other options?


12) Broader WG Charter Discussion