Network Working Group                                       J. Strassner
Request for Comments: 3703                        Intelliden Corporation
Category: Standards Track                                       B. Moore
                                                        IBM Corporation
                                                               R. Moats
                                                   Lemur Networks, Inc.
                                                            E. Ellesson
                                                          February 2004


   Policy Core Lightweight Directory Access Protocol (LDAP) Schema

Status of this Memo

  This document specifies an Internet standards track protocol for the
  Internet community, and requests discussion and suggestions for
  improvements.  Please refer to the current edition of the "Internet
  Official Protocol Standards" (STD 1) for the standardization state
  and status of this protocol.  Distribution of this memo is unlimited.

Copyright Notice

  Copyright (C) The Internet Society (2004).  All Rights Reserved.

Abstract

  This document defines a mapping of the Policy Core Information Model
  to a form that can be implemented in a directory that uses
  Lightweight Directory Access Protocol (LDAP) as its access protocol.
  This model defines two hierarchies of object classes: structural
  classes representing information for representing and controlling
  policy data as specified in RFC 3060, and relationship classes that
  indicate how instances of the structural classes are related to each
  other.  Classes are also added to the LDAP schema to improve the
  performance of a client's interactions with an LDAP server when the
  client is retrieving large amounts of policy-related information.
  These classes exist only to optimize LDAP retrievals: there are no
  classes in the information model that correspond to them.

Table of Contents

  1.  Introduction .................................................  2
  2.  The Policy Core Information Model ............................  4
  3.  Inheritance Hierarchy for the PCLS ...........................  5
  4.  General Discussion of Mapping the Information Model to LDAP ..  6
      4.1.  Summary of Class and Association Mappings ..............  7
      4.2.  Usage of DIT Content and Structure Rules and Name Forms.  9
      4.3.  Naming Attributes in the PCLS .......................... 10



Strassner, et al.           Standards Track                     [Page 1]

RFC 3703                Policy Core LDAP Schema            February 2004


      4.4.  Rule-Specific and Reusable Conditions and Actions ...... 11
      4.5.  Location and Retrieval of Policy Objects in the
            Directory .............................................. 16
            4.5.1.  Aliases and Other DIT-Optimization Techniques .. 19
  5.  Class Definitions ............................................ 19
      5.1.  The Abstract Class "pcimPolicy" ........................ 21
      5.2.  The Three Policy Group Classes ......................... 22
      5.3.  The Three Policy Rule Classes .......................... 23
      5.4.  The Class pcimRuleConditionAssociation ................. 30
      5.5.  The Class pcimRuleValidityAssociation .................. 32
      5.6.  The Class pcimRuleActionAssociation .................... 34
      5.7.  The Auxiliary Class pcimConditionAuxClass .............. 36
      5.8.  The Auxiliary Class pcimTPCAuxClass .................... 36
      5.9.  The Auxiliary Class pcimConditionVendorAuxClass ........ 40
      5.10. The Auxiliary Class pcimActionAuxClass ................. 41
      5.11. The Auxiliary Class pcimActionVendorAuxClass ........... 42
      5.12. The Class pcimPolicyInstance ........................... 43
      5.13. The Auxiliary Class pcimElementAuxClass ................ 44
      5.14. The Three Policy Repository Classes .................... 45
      5.15. The Auxiliary Class pcimSubtreesPtrAuxClass ............ 46
      5.16. The Auxiliary Class pcimGroupContainmentAuxClass ....... 48
      5.17. The Auxiliary Class pcimRuleContainmentAuxClass ........ 49
  6.  Extending the Classes Defined in This Document ............... 50
      6.1.  Subclassing pcimConditionAuxClass and pcimActionAuxClass 50
      6.2.  Using the Vendor Policy Attributes ..................... 50
      6.3.  Using Time Validity Periods ............................ 51
  7.  Security Considerations ...................................... 51
  8.  IANA Considerations .......................................... 53
      8.1.  Object Identifiers ..................................... 53
      8.2.  Object Identifier Descriptors .......................... 53
  9.  Acknowledgments .............................................. 56
  10. Appendix:  Constructing the Value of orderedCIMKeys .......... 57
  11. References ................................................... 58
      11.1. Normative References ................................... 58
      11.2. Informative References ................................. 59
  12. Authors' Addresses ........................................... 60
  13. Full Copyright Statement ..................................... 61

1.  Introduction

  This document takes as its starting point the object-oriented
  information model for representing information for representing and
  controlling policy data as specified in [1].  Lightweight Directory
  Access Protocol (LDAP) [2] implementers, please note that the use of
  the term "policy" in this document does not refer to the use of the
  term "policy" as defined in X.501 [4].  Rather, the use of the term
  "policy" throughout this document is defined as follows:




Strassner, et al.           Standards Track                     [Page 2]

RFC 3703                Policy Core LDAP Schema            February 2004


     Policy is defined as a set of rules to administer, manage, and
     control access to network resources.

  This work is currently under joint development in the IETF's Policy
  Framework working group and in the Policy working group of the
  Distributed Management Task Force (DMTF).  This model defines two
  hierarchies of object classes: structural classes representing policy
  information and control of policies, and relationship classes that
  indicate how instances of the structural classes are related to each
  other.  In general, both of these class hierarchies will need to be
  mapped to a particular data store.

  This document defines the mapping of these information model classes
  to a directory that uses LDAP as its access protocol.  Two types of
  mappings are involved:

     -  For the structural classes in the information model, the
        mapping is basically one-for-one: information model classes map
        to LDAP classes, information model properties map to LDAP
        attributes.

     -  For the relationship classes in the information model,
        different mappings are possible.  In this document, the Policy
        Core Information Model's (PCIM's) relationship classes and
        their properties are mapped in three ways: to LDAP auxiliary
        classes, to attributes representing distinguished name (DN)
        references, and to superior-subordinate relationships in the
        Directory Information Tree (DIT).

  Implementations that use an LDAP directory as their policy repository
  and want to implement policy information according to RFC 3060 [1]
  SHALL use the LDAP schema defined in this document, or a schema that
  subclasses from the schema defined in this document.  The use of the
  information model defined in reference [1] as the starting point
  enables the inheritance and the relationship class hierarchies to be
  extensible, such that other types of policy repositories, such as
  relational databases, can also use this information.

  This document fits into the overall framework for representing,
  deploying, and managing policies being developed by the Policy
  Framework Working Group.

  The LDAP schema described in this document uses the prefix "pcim" to
  identify its classes and attributes.  It consists of ten very general
  classes: pcimPolicy (an abstract class), three policy group classes
  (pcimGroup, pcimGroupAuxClass, and pcimGroupInstance), three policy
  rule classes (pcimRule, pcimRuleAuxClass, and pcimRuleInstance), and
  three special auxiliary classes (pcimConditionAuxClass,



Strassner, et al.           Standards Track                     [Page 3]

RFC 3703                Policy Core LDAP Schema            February 2004


  pcimTPCAuxClass, and pcimActionAuxClass).  (Note that the
  PolicyTimePeriodCondition auxiliary class defined in [1] would
  normally have been named pcimTimePeriodConditionAuxClass, but this
  name is too long for some directories.  Therefore, we have
  abbreviated this name to be pcimTPCAuxClass).

  The mapping for the PCIM classes pcimGroup and pcimRule is designed
  to be as flexible as possible.  Three classes are defined for these
  two PCIM classes.  First, an abstract superclass is defined that
  contains all required properties of each PCIM class.  Then, both an
  auxiliary class as well as a structural class are derived from the
  abstract superclass.  This provides maximum flexibility for the
  developer.

  The schema also contains two less general classes:
  pcimConditionVendorAuxClass and pcimActionVendorAuxClass.  To achieve
  the mapping of the information model's relationships, the schema also
  contains two auxiliary classes: pcimGroupContainmentAuxClass and
  pcimRuleContainmentAuxClass.  Capturing the distinction between
  rule-specific and reusable policy conditions and policy actions
  introduces seven other classes: pcimRuleConditionAssociation,
  pcimRuleValidityAssociation, pcimRuleActionAssociation,
  pcimPolicyInstance, and three policy repository classes
  (pcimRepository, pcimRepositoryAuxClass, and pcimRepositoryInstance).
  Finally, the schema includes two classes (pcimSubtreesPtrAuxClass and
  pcimElementAuxClass) for optimizing LDAP retrievals.  In all, the
  schema contains 23 classes.

  Within the context of this document, the term "PCLS" (Policy Core
  LDAP Schema) is used to refer to the LDAP class definitions that this
  document contains.  The term "PCIM" refers to classes defined in [1].

  The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
  "SHOULD", "SHOULD NOT", "RECOMMENDED",  "MAY", and "OPTIONAL" in this
  document are to be interpreted as described in RFC 2119 [10].

2.  The Policy Core Information Model

  This document contains an LDAP schema representing the classes
  defined in the companion document "Policy Core Information
  Model -- Version 1 Specification" [1].  Other documents may
  subsequently be produced, with mappings of this same PCIM to other
  storage technologies.  Since the detailed semantics of the PCIM
  classes appear only in [1], that document is a prerequisite for
  reading and understanding this document.






Strassner, et al.           Standards Track                     [Page 4]

RFC 3703                Policy Core LDAP Schema            February 2004


3.  Inheritance Hierarchy for the PCLS

  The following diagram illustrates the class hierarchy for the LDAP
  Classes defined in this document:

       top
        |
        +--dlm1ManagedElement (abstract)
        |   |
        |   +--pcimPolicy (abstract)
        |   |   |
        |   |   +--pcimGroup (abstract)
        |   |   |  |
        |   |   |  +--pcimGroupAuxClass (auxiliary)
        |   |   |  |
        |   |   |  +--pcimGroupInstance (structural)
        |   |   |
        |   |   +--pcimRule (abstract)
        |   |   |  |
        |   |   |  +--pcimRuleAuxClass (auxiliary)
        |   |   |  |
        |   |   |  +--pcimRuleInstance (structural)
        |   |   |
        |   |   +--pcimRuleConditionAssociation (structural)
        |   |   |
        |   |   +--pcimRuleValidityAssociation (structural)
        |   |   |
        |   |   +--pcimRuleActionAssociation (structural)
        |   |   |
        |   |   +--pcimPolicyInstance (structural)
        |   |   |
        |   |   +--pcimElementAuxClass (auxiliary)
        |   |
        |   +--dlm1ManagedSystemElement (abstract)
        |       |
        |       +--dlm1LogicalElement (abstract)
        |           |
        |           +--dlm1System (abstract)
        |               |
        |               +--dlm1AdminDomain (abstract)
        |                   |
        |                   +--pcimRepository (abstract)
        |                      |
        |                      +--pcimRepositoryAuxClass (auxiliary)







Strassner, et al.           Standards Track                     [Page 5]

RFC 3703                Policy Core LDAP Schema            February 2004


       top
        |                      |
        |                      +--pcimRepositoryInstance
        |                         (structural)
        |
        +--pcimConditionAuxClass (auxiliary)
        |   |
        |   +---pcimTPCAuxClass (auxiliary)
        |   |
        |   +---pcimConditionVendorAuxClass (auxiliary)
        |
        +--pcimActionAuxClass (auxiliary)
        |   |
        |   +---pcimActionVendorAuxClass (auxiliary)
        |
        +--pcimSubtreesPtrAuxClass (auxiliary)
        |
        +--pcimGroupContainmentAuxClass (auxiliary)
        |
        +--pcimRuleContainmentAuxClass (auxiliary)

        Figure 1.  LDAP Class Inheritance Hierarchy for the PCLS

4.  General Discussion of Mapping the Information Model to LDAP

  The classes described in Section 5 below contain certain
  optimizations for a directory that uses LDAP as its access protocol.
  One example of this is the use of auxiliary classes to represent some
  of the associations defined in the information model.  Other data
  stores might need to implement these associations differently.  A
  second example is the introduction of classes specifically designed
  to optimize retrieval of large amounts of policy-related data from a
  directory.  This section discusses some general topics related to the
  mapping from the information model to LDAP.

  The remainder of this section will discuss the following topics.
  Section 4.1 will discuss the strategy used in mapping the classes and
  associations defined in [1] to a form that can be represented in a
  directory that uses LDAP as its access protocol.  Section 4.2
  discusses DIT content and structure rules, as well as name forms.
  Section 4.3 describes the strategy used in defining naming attributes
  for the schema described in Section 5 of this document.  Section 4.4
  defines the strategy recommended for locating and retrieving
  PCIM-derived objects in the directory.







Strassner, et al.           Standards Track                     [Page 6]

RFC 3703                Policy Core LDAP Schema            February 2004


4.1.  Summary of Class and Association Mappings

  Fifteen of the classes in the PCLS come directly from the nine
  corresponding classes in the information model.  Note that names of
  classes begin with an upper case character in the information model
  (although for CIM in particular, case is not significant in class and
  property names), but with a lower case character in LDAP.  This is
  because although LDAP doesn't care, X.500 doesn't allow class names
  to begin with an uppercase character.  Note also that the prefix
  "pcim" is used to identify these LDAP classes.

     +---------------------------+-------------------------------+
     | Information Model         | LDAP Class(es)                |
     +---------------------------+-------------------------------+
     +---------------------------+-------------------------------+
     | Policy                    | pcimPolicy                    |
     +---------------------------+-------------------------------+
     | PolicyGroup               | pcimGroup                     |
     |                           |   pcimGroupAuxClass           |
     |                           |   pcimGroupInstance           |
     +---------------------------+-------------------------------+
     | PolicyRule                | pcimRule                      |
     |                           |   pcimRuleAuxClass            |
     |                           |   pcimRuleInstance            |
     +---------------------------+-------------------------------+
     | PolicyCondition           | pcimConditionAuxClass         |
     +---------------------------+-------------------------------+
     | PolicyAction              | pcimActionAuxClass            |
     +---------------------------+-------------------------------+
     | VendorPolicyCondition     | pcimConditionVendorAuxClass   |
     +---------------------------+-------------------------------+
     | VendorPolicyAction        | pcimActionVendorAuxClass      |
     +---------------------------+-------------------------------+
     | PolicyTimePeriodCondition | pcimTPCAuxClass               |
     +---------------------------+-------------------------------+
     | PolicyRepository          | pcimRepository                |
     |                           |   pcimRepositoryAuxClass      |
     |                           |   pcimRepositoryInstance      |
     +---------------------------+-------------------------------+

         Figure 2.  Mapping of Information Model Classes to LDAP

  The associations in the information model map to attributes that
  reference DNs (Distinguished Names) or to Directory Information Tree
  (DIT) containment (i.e., superior-subordinate relationships) in LDAP.
  Two of the attributes that reference DNs appear in auxiliary classes,
  which allow each of them to represent several relationships from the
  information model.



Strassner, et al.           Standards Track                     [Page 7]

RFC 3703                Policy Core LDAP Schema            February 2004


+----------------------------------+----------------------------------+
| Information Model Association     | LDAP Attribute / Class          |
+-----------------------------------+---------------------------------+
+-----------------------------------+---------------------------------+
| PolicyGroupInPolicyGroup          | pcimGroupsAuxContainedSet in    |
|                                   |  pcimGroupContainmentAuxClass   |
+-----------------------------------+---------------------------------+
| PolicyRuleInPolicyGroup           | pcimRulesAuxContainedSet in     |
|                                   |  pcimRuleContainmentAuxClass    |
+-----------------------------------+---------------------------------+
| PolicyConditionInPolicyRule       | DIT containment or              |
|                                   | pcimRuleConditionList in        |
|                                   |  pcimRule or                    |
|                                   | pcimConditionDN in              |
|                                   |  pcimRuleConditionAssociation   |
+-----------------------------------+---------------------------------+
| PolicyActionInPolicyRule          | DIT containment or              |
|                                   | pcimRuleActionList in           |
|                                   |  pcimRule or                    |
|                                   | pcimActionDN in                 |
|                                   |  pcimRuleActionAssociation      |
+-----------------------------------+---------------------------------+
| PolicyRuleValidityPeriod          | pcimRuleValidityPeriodList      |
|                                   |  in pcimRule or (if reusable)   |
|                                   |  referenced through the         |
|                                   | pcimTimePeriodConditionDN in    |
|                                   |  pcimRuleValidityAssociation    |
+-----------------------------------+---------------------------------+
| PolicyConditionInPolicyRepository | DIT containment                 |
+-----------------------------------+---------------------------------+
| PolicyActionInPolicyRepository    | DIT containment                 |
+-----------------------------------+---------------------------------+
| PolicyRepositoryInPolicyRepository| DIT containment                 |
+-----------------------------------+---------------------------------+

     Figure 3.  Mapping of Information Model Associations to LDAP

  Of the remaining classes in the PCLS, two (pcimElementAuxClass and
  pcimSubtreesPtrAuxClass) are included to make navigation through the
  DIT and retrieval of the entries found there more efficient.  This
  topic is discussed below in Section 4.5.

  The remaining four classes in the PCLS, pcimRuleConditionAssociation,
  pcimRuleValidityAssociation, pcimRuleActionAssociation, and
  pcimPolicyInstance, are all involved with the representation of
  policy conditions and policy actions in an LDAP directory.  This
  topic is discussed below in Section 4.4.




Strassner, et al.           Standards Track                     [Page 8]

RFC 3703                Policy Core LDAP Schema            February 2004


4.2.  Usage of DIT Content and Structure Rules and Name Forms

  There are three powerful tools that can be used to help define
  schemata. The first, DIT content rules, is a way of defining the
  content of an entry for a structural object class.  It can be used to
  specify the following characteristics of the entry:

     -  additional mandatory attributes that the entries are required
        to contain
     -  additional optional attributes the entries are allowed to
        contain
     -  the set of additional auxiliary object classes that these
        entries are allowed to be members of
     -  any optional attributes from the structural and auxiliary
        object class definitions that the entries are required to
        preclude

  DIT content rules are NOT mandatory for any structural object class.

  A DIT structure rule, together with a name form, controls the
  placement and naming of an entry within the scope of a subschema.
  Name forms define which attribute type(s) are required and are
  allowed to be used in forming the Relative Distinguished Names (RDNs)
  of entries.  DIT structure rules specify which entries are allowed to
  be superior to other entries, and hence control the way that RDNs are
  added together to make DNs.

  A name form specifies the following:

     -  the structural object class of the entries named by this name
        form
     -  attributes that are required to be used in forming the RDNs of
        these entries
     -  attributes that are allowed to be used in forming the RDNs of
        these entries
     -  an object identifier to uniquely identify this name form

  Note that name forms can only be specified for structural object
  classes.  However, every entry in the DIT must have a name form
  controlling it.

  Unfortunately, current LDAP servers vary quite a lot in their support
  of these features.  There are also three crucial implementation
  points that must be followed.  First, X.500 use of structure rules
  requires that a structural object class with no superior structure
  rule be a subschema administrative point.  This is exactly NOT what
  we want for policy information.  Second, when an auxiliary class is
  subclassed, if a content rule exists for the structural class that



Strassner, et al.           Standards Track                     [Page 9]

RFC 3703                Policy Core LDAP Schema            February 2004


  the auxiliary class refers to, then that content rule needs to be
  augmented.  Finally, most LDAP servers unfortunately do not support
  inheritance of structure and content rules.

  Given these concerns, DIT structure and content rules have been
  removed from the PCLS.  This is because, if included, they would be
  normative references and would require OIDs.  However, we don't want
  to lose the insight gained in building the structure and content
  rules of the previous version of the schema.  Therefore, we describe
  where such rules could be used in this schema, what they would
  control, and what their effect would be.

4.3.  Naming Attributes in the PCLS

  Instances in a directory are identified by distinguished names (DNs),
  which provide the same type of hierarchical organization that a file
  system provides in a computer system.  A distinguished name is a
  sequence of RDNs.  An RDN provides a unique identifier for an
  instance within the context of its immediate superior, in the same
  way that a filename provides a unique identifier for a file within
  the context of the folder in which it resides.

  To preserve maximum naming flexibility for policy administrators,
  three optional (i.e., "MAY") naming attributes have been defined.
  They are:

     -  Each of the structural classes defined in this schema has its
        own unique ("MAY") naming attribute.  Since the naming
        attributes are different, a policy administrator can, by using
        these attributes, guarantee that there will be no name
        collisions between instances of different classes, even if the
        same value is assigned to the instances' respective naming
        attributes.

     -  The LDAP attribute cn (corresponding to X.500's commonName) is
        included as a MAY attribute in the abstract class pcimPolicy,
        and thus by inheritance in all of its subclasses.  In X.500,
        commonName typically functions as an RDN attribute, for naming
        instances of many classes (e.g., X.500's person class).

     -  A special attribute is provided for implementations that expect
        to map between native CIM and LDAP representations of policy
        information.  This attribute, called orderedCimKeys, is defined
        in the class dlm1ManagedElement [6].  The value of this
        attribute is derived algorithmically from values that are
        already present in a CIM policy instance.  The normative
        reference for this algorithm is contained in [6].  See the
        appendix of this document for a description of the algorithm.



Strassner, et al.           Standards Track                    [Page 10]

RFC 3703                Policy Core LDAP Schema            February 2004


  Since any of these naming attributes MAY be used for naming an
  instance of a PCLS class, implementations MUST be able to accommodate
  instances named in any of these ways.

  Note that it is recommended that two or more of these attributes
  SHOULD NOT be used together to form a multi-part RDN, since support
  for multi-part RDNs is limited among existing directory
  implementations.

4.4.  Rule-Specific and Reusable Conditions and Actions

  The PCIM [1] distinguishes between two types of policy conditions and
  policy actions:  those associated with a single policy rule, and
  those that are reusable, in the sense that they may be associated
  with more than one policy rule.  While there is no inherent
  functional difference between a rule-specific condition or action and
  a reusable one, there is both a usage, as well as, an implementation
  difference between them.

  Defining a condition or action as reusable vs. rule-specific reflects
  a conscious decision on the part of the administrator in defining how
  they are used.  In addition, there are variations that reflect
  implementing rule-specific vs. reusable policy conditions and actions
  and how they are treated in a policy repository.  The major
  implementation differences between a rule-specific and a reusable
  condition or action are delineated below:

  1.  It is natural for a rule-specific condition or action to be
      removed from the policy repository at the same time the rule is.
      It is just the opposite for reusable conditions and actions.
      This is because the condition or action is conceptually attached
      to the rule in the rule-specific case, whereas it is referenced
      (e.g., pointed at) in the reusable case.  The persistence of a
      pcimRepository instance is independent of the persistence of a
      pcimRule instance.
  2.  Access permissions for a rule-specific condition or action are
      usually identical to those for the rule itself.  On the other
      hand, access permissions of reusable conditions and actions must
      be expressible without reference to a policy rule.
  3.  Rule-specific conditions and actions require fewer accesses,
      because the conditions and actions are "attached" to the rule.
      In contrast, reusable conditions and actions require more
      accesses, because each condition or action that is reusable
      requires a separate access.
  4.  Rule-specific conditions and actions are designed for use by a
      single rule.  As the number of rules that use the same
      rule-specific condition increase, subtle problems are created
      (the most obvious being how to keep the rule-specific conditions



Strassner, et al.           Standards Track                    [Page 11]

RFC 3703                Policy Core LDAP Schema            February 2004


      and actions updated to reflect the same value).  Reusable
      conditions and actions lend themselves for use by multiple
      independent rules.
  5.  Reusable conditions and actions offer an optimization when
      multiple rules are using the same condition or action.  This is
      because the reusable condition or action only needs be updated
      once, and by virtue of DN reference, the policy rules will be
      automatically updated.

  The preceding paragraph does not contain an exhaustive list of the
  ways in which reusable and rule-specific conditions should be treated
  differently.  Its purpose is merely to justify making a semantic
  distinction between rule-specific and reusable, and then reflecting
  this distinction in the policy repository itself.

  When the policy repository is realized in an LDAP-accessible
  directory, the distinction between rule-specific and reusable
  conditions and actions is realized via placement of auxiliary classes
  and via DIT containment.  Figure 4 illustrates a policy rule Rule1
  with one rule-specific condition CA and one rule-specific action AB.

                   +-----+
                   |Rule1|
                   |     |
             +-----|-   -|-----+
             |     +-----+     |
             |       * *       |
             |       * *       |
             |    **** ****    |
             |    *       *    |
             v    *       *    v
           +--------+   +--------+
           | CA+ca  |   | AB+ab  |
           +--------+   +--------+


                         +------------------------------+
                         |LEGEND:                       |
                         |  ***** DIT containment       |
                         |    +   auxiliary attachment  |
                         |  ----> DN reference          |
                         +------------------------------+

          Figure 4  Rule-Specific Policy Conditions and Actions







Strassner, et al.           Standards Track                    [Page 12]

RFC 3703                Policy Core LDAP Schema            February 2004


  Because the condition and action are specific to Rule1, the auxiliary
  classes ca and ab that represent them are attached, respectively, to
  the structural classes CA and AB.  These structural classes represent
  not the condition ca and action ab themselves, but rather the
  associations between Rule1 and ca, and between Rule1 and ab.

  As Figure 4 illustrates, Rule1 contains DN references to the
  structural classes CA and AB that appear below it in the DIT.  At
  first glance it might appear that these DN references are
  unnecessary, since a subtree search below Rule1 would find all of the
  structural classes representing the associations between Rule1 and
  its conditions and actions.  Relying only on a subtree search,
  though, runs the risk of missing conditions or actions that should
  have appeared in the subtree, but for some reason did not, or of
  finding conditions or actions that were inadvertently placed in the
  subtree, or that should have been removed from the subtree, but for
  some reason were not.  Implementation experience has suggested that
  many (but not all) of these risks are eliminated.

  However, it must be noted that this comes at a price.  The use of DN
  references, as shown in Figure 4 above, thwarts inheritance of access
  control information as well as existence dependency information.  It
  also is subject to referential integrity considerations.  Therefore,
  it is being included as an option for the designer.

  Figure 5 illustrates a second way of representing rule-specific
  conditions and actions in an LDAP-accessible directory: attachment of
  the auxiliary classes directly to the instance representing the
  policy rule.  When all of the conditions and actions are attached to
  a policy rule in this way, the rule is termed a "simple" policy rule.
  When conditions and actions are not attached directly to a policy
  rule, the rule is termed a "complex" policy rule.

                   +-----------+
                   |Rule1+ca+ab|
                   |           |
                   +-----------+

                         +------------------------------+
                         |LEGEND:                       |
                         |    +   auxiliary attachment  |
                         +------------------------------+

                     Figure 5.  A Simple Policy Rule







Strassner, et al.           Standards Track                    [Page 13]

RFC 3703                Policy Core LDAP Schema            February 2004


  The simple/complex distinction for a policy rule is not all or
  nothing.  A policy rule may have its conditions attached to itself
  and its actions attached to other entries, or it may have its actions
  attached to itself and its conditions attached to other entries.
  However, it SHALL NOT have either its conditions or its actions
  attached both to itself and to other entries, with one exception:  a
  policy rule may reference its validity periods with the
  pcimRuleValidityPeriodList attribute, but have its other conditions
  attached to itself.

  The tradeoffs between simple and complex policy rules are between the
  efficiency of simple rules and the flexibility and greater potential
  for reuse of complex rules.  With a simple policy rule, the semantic
  options are limited:

  -   All conditions are ANDed together.  This combination can be
      represented in two ways in the Disjunctive Normal Form (DNF)/
      Conjunctive Normal Form (CNF) (please see [1] for definitions of
      these terms) expressions characteristic of policy conditions:  as
      a DNF expression with a single AND group, or as a CNF expression
      with multiple single-condition OR groups.  The first of these is
      arbitrarily chosen as the representation for the ANDed conditions
      in a simple policy rule.

  -   If multiple actions are included, no order can be specified for
      them.

  If a policy administrator needs to combine conditions in some other
  way, or if there is a set of actions that must be ordered, then the
  only option is to use a complex policy rule.

  Finally, Figure 6 illustrates the same policy rule Rule1, but this
  time its condition and action are reusable.  The association classes
  CA and AB are still present, and they are still DIT contained under
  Rule1.  But rather than having the auxiliary classes ca and ab
  attached directly to the association classes CA and AB, each now
  contains DN references to other entries to which these auxiliary
  classes are attached.  These other entries, CIA and AIB, are DIT
  contained under RepositoryX, which is an instance of the class
  pcimRepository.  Because they are named under an instance of
  pcimRepository, ca and ab are clearly identified as reusable.










Strassner, et al.           Standards Track                    [Page 14]

RFC 3703                Policy Core LDAP Schema            February 2004


                  +-----+             +-------------+
                  |Rule1|             | RepositoryX |
                +-|-   -|--+          |             |
                | +-----+  |          +-------------+
                |   * *    |             *       *
                |   * *    |             *       *
                | *** **** |             *       *
                | *      * v             *       *
                | *     +---+            *       *
                | *     |AB |         +------+   *
                v *     |  -|-------->|AIB+ab|   *
               +---+    +---+         +------+   *
               |CA |                         +------+
               |  -|------------------------>|CIA+ca|
               +---+                         +------+

                         +------------------------------+
                         |LEGEND:                       |
                         |  ***** DIT containment       |
                         |    +   auxiliary attachment  |
                         |  ----> DN reference          |
                         +------------------------------+

            Figure 6.  Reusable Policy Conditions and Actions

  The classes pcimConditionAuxClass and pcimActionAuxClass do not
  themselves represent actual conditions and actions:  these are
  introduced in their subclasses.  What pcimConditionAuxClass and
  pcimActionAuxClass do introduce are the semantics of being a policy
  condition or a policy action.  These are the semantics that all the
  subclasses of pcimConditionAuxClass and pcimActionAuxClass inherit.
  Among these semantics are those of representing either a
  rule-specific or a reusable policy condition or policy action.

  In order to preserve the ability to represent a rule-specific or a
  reusable condition or action, as well as a simple policy rule, all
  the subclasses of pcimConditionAuxClass and pcimActionAuxClass MUST
  also be auxiliary classes.













Strassner, et al.           Standards Track                    [Page 15]

RFC 3703                Policy Core LDAP Schema            February 2004


4.5.  Location and Retrieval of Policy Objects in the Directory

  When a Policy Decision Point (PDP) goes to an LDAP directory to
  retrieve the policy object instances relevant to the Policy
  Enforcement Points (PEPs) it serves, it is faced with two related
  problems:

  -   How does it locate and retrieve the directory entries that apply
      to its PEPs?  These entries may include instances of the PCLS
      classes, instances of domain-specific subclasses of these
      classes, and instances of other classes modeling such resources
      as user groups, interfaces, and address ranges.

  -   How does it retrieve the directory entries it needs in an
      efficient manner, so that retrieval of policy information from
      the directory does not become a roadblock to scalability?  There
      are two facets to this efficiency:  retrieving only the relevant
      directory entries, and retrieving these entries using as few LDAP
      calls as possible.

  The placement of objects in the Directory Information Tree (DIT)
  involves considerations other than how the policy-related objects
  will be retrieved by a PDP.  Consequently, all that the PCLS can do
  is to provide a "toolkit" of classes to assist the policy
  administrator as the DIT is being designed and built.  A PDP SHOULD
  be able to take advantage of any tools that the policy administrator
  is able to build into the DIT, but it MUST be able to use a less
  efficient means of retrieval if that is all it has available to it.

  The basic idea behind the LDAP optimization classes is a simple one:
  make it possible for a PDP to retrieve all the policy-related objects
  it needs, and only those objects, using as few LDAP calls as
  possible.  An important assumption underlying this approach is that
  the policy administrator has sufficient control over the underlying
  DIT structure to define subtrees for storing policy information.  If
  the policy administrator does not have this level of control over DIT
  structure, a PDP can still retrieve the policy-related objects it
  needs individually.  But it will require more LDAP access operations
  to do the retrieval in this way.  Figure 7 illustrates how LDAP
  optimization is accomplished.











Strassner, et al.           Standards Track                    [Page 16]

RFC 3703                Policy Core LDAP Schema            February 2004


                      +-----+
     ---------------->|  A  |
     DN reference to  |     |    DN references to subtrees   +---+
     starting object  +-----+    +-------------------------->| C |
                      |  o--+----+         +---+             +---+
                      |  o--+------------->| B |            /     \
                      +-----+              +---+           /       \
                     /       \            /     \         /   ...   \
                    /         \          /       \
                   /           \        /   ...   \

     Figure 7.  Using the pcimSubtreesPtrAuxClass to Locate Policies

  The PDP is configured initially with a DN reference to some entry in
  the DIT.  The structural class of this entry is not important; the
  PDP is interested only in the pcimSubtreesPtrAuxClass attached to it.
  This auxiliary class contains a multi-valued attribute with DN
  references to objects that anchor subtrees containing policy-related
  objects of interest to the PDP.  Since pcimSubtreesPtrAuxClass is an
  auxiliary class, it can be attached to an entry that the PDP would
  need to access anyway - perhaps an entry containing initial
  configuration settings for the PDP, or for a PEP that uses the PDP.

  Once it has retrieved the DN references, the PDP will direct to each
  of the objects identified by them an LDAP request that all entries in
  its subtree be evaluated against the selection criteria specified in
  the request.  The LDAP-enabled directory then returns all entries in
  that subtree that satisfy the specified criteria.

  The selection criteria always specify that object class="pcimPolicy".
  Since all classes representing policy rules, policy conditions, and
  policy actions, both in the PCLS and in any domain-specific schema
  derived from it, are subclasses of the abstract class policy, this
  criterion evaluates to TRUE for all instances of these classes.  To
  accommodate special cases where a PDP needs to retrieve objects that
  are not inherently policy-related (for example, an IP address range
  object referenced by a subclass of pcimActionAuxClass representing
  the DHCP action "assign from this address range"), the auxiliary
  class pcimElementAuxClass can be used to "tag" an entry, so that it
  will be found by the selection criterion "object class=pcimPolicy".

  The approach described in the preceding paragraph will not work for
  certain directory implementations, because these implementations do
  not support matching of auxiliary classes in the objectClass
  attribute.  For environments where these implementations are expected
  to be present, the "tagging" of entries as relevant to policy can be





Strassner, et al.           Standards Track                    [Page 17]

RFC 3703                Policy Core LDAP Schema            February 2004


  accomplished by inserting the special value "POLICY" into the list of
  values contained in the pcimKeywords attribute (provided by the
  pcimPolicy class).

  If a PDP needs only a subset of the policy-related objects in the
  indicated subtrees, then it can be configured with additional
  selection criteria based on the pcimKeywords attribute defined in the
  pcimPolicy class.  This attribute supports both standardized and
  administrator- defined values.  For example, a PDP could be
  configured to request only those policy-related objects containing
  the keywords "DHCP" and "Eastern US".

  To optimize what is expected to be a typical case, the initial
  request from the client includes not only the object to which its
  "seed" DN references, but also the subtree contained under this
  object.  The filter for searching this subtree is whatever the client
  is going to use later to search the other subtrees:  object
  class="pcimPolicy" or the presence of the keyword "POLICY", and/or
  presence of a more specific value of pcimKeywords (e.g., "QoS Edge
  Policy").

  Returning to the example in Figure 7, we see that in the best case, a
  PDP can get all the policy-related objects it needs, and only those
  objects, with exactly three LDAP requests:  one to its starting
  object A to get the references to B and C, as well as the
  policy-related objects it needs from the subtree under A, and then
  one each to B and C to get all the policy-related objects that pass
  the selection criteria with which it was configured.  Once it has
  retrieved all of these objects, the PDP can then traverse their
  various DN references locally to understand the semantic
  relationships among them.  The PDP should also be prepared to find a
  reference to another subtree attached to any of the objects it
  retrieves, and to follow this reference first, before it follows any
  of the semantically significant references it has received.  This
  recursion permits a structured approach to identifying related
  policies.  In Figure 7, for example, if the subtree under B includes
  departmental policies and the one under C includes divisional
  policies, then there might be a reference from the subtree under C to
  an object D that roots the subtree of corporate-level policies.

  A PDP SHOULD understand the pcimSubtreesPtrAuxClass class, SHOULD be
  capable of retrieving and processing the entries in the subtrees it
  references, and SHOULD be capable of doing all of this recursively.
  The same requirements apply to any other entity needing to retrieve
  policy information from the directory.  Thus, a Policy Management
  Tool that retrieves policy entries from the directory in order to
  perform validation and conflict detection SHOULD also understand and
  be capable of using the pcimSubtreesPtrAuxClass.  All of these



Strassner, et al.           Standards Track                    [Page 18]

RFC 3703                Policy Core LDAP Schema            February 2004


  requirements are "SHOULD"s rather than "MUST"s because an LDAP client
  that doesn't implement them can still access and retrieve the
  directory entries it needs.  The process of doing so will just be
  less efficient than it would have been if the client had implemented
  these optimizations.

  When it is serving as a tool for creating policy entries in the
  directory, a Policy Management Tool SHOULD support creation of
  pcimSubtreesPtrAuxClass entries and their references to object
  instances.

4.5.1.  Aliases and Other DIT-Optimization Techniques

  Additional flexibility in DIT structure is available to the policy
  administrator via LDAP aliasing and other techniques.  Previous
  versions of this document have used aliases.  However, because
  aliases are experimental, the use of aliases has been removed from
  this version of this document.  This is because the IETF has yet to
  produce a specification on how aliases are represented in the
  directory or how server implementations are to process aliases.

5.  Class Definitions

  The semantics for the policy information classes that are to be
  mapped directly from the information model to an LDAP representation
  are detailed in [1].  Consequently, all that this document presents
  for these classes is the specification for how to do the mapping from
  the information model (which is independent of repository type and
  access protocol) to a form that can be accessed using LDAP.  Remember
  that some new classes needed to be created (that were not part of
  [1]) to implement the LDAP mapping.  These new LDAP-only classes are
  fully documented in this document.

  The formal language for specifying the classes, attributes, and DIT
  structure and content rules is that defined in reference [3].  If
  your implementation does not support auxiliary class inheritance, you
  will have to list auxiliary classes in content rules explicitly or
  define them in another (implementation-specific) way.

  The following notes apply to this section in its entirety.

  Note 1: in the following definitions, the class and attribute
  definitions follow RFC 2252 [3] but they are line-wrapped to enhance
  human readability.

  Note 2: where applicable, the possibilities for specifying DIT
  structure and content rules are noted.  However, care must be taken
  in specifying DIT structure rules.  This is because X.501 [4] states



Strassner, et al.           Standards Track                    [Page 19]

RFC 3703                Policy Core LDAP Schema            February 2004


  that an entry may only exist in the DIT as a subordinate to another
  superior entry (the superior) if a DIT structure rule exists in the
  governing subschema which:

  1)  indicates a name form for the structural object class of the
      subordinate entry, and
  2)  either includes the entry's superior structure rule as a possible
      superior structure rule, or
  3)  does not specify a superior structure rule.

  If this last case (3) applies, then the entry is defined to be a
  subschema administrative point.  This is not what is desired.
  Therefore, care must be taken in defining structure rules, and in
  particular, they must be locally augmented.

  Note 3: Wherever possible, both an equality and a substring matching
  rule are defined for a particular attribute (as well as an ordering
  match rule to enable sorting of matching results).  This provides two
  different choices for the developer for maximum flexibility.

  For example, consider the pcimRoles attribute (section 5.3).  Suppose
  that a PEP has reported that it is interested in pcimRules for three
  roles R1, R2, and R3.  If the goal is to minimize queries, then the
  PDP can supply three substring filters containing the three role
  names.

  These queries will return all of the pcimRules that apply to the PEP,
  but they may also get some that do not apply (e.g., ones that contain
  one of the roles R1, R2, or R3 and one or more other roles present in
  a role-combination [1]).

  Another strategy would be for the PDP to use only equality filters.
  This approach eliminates the extraneous replies, but it requires the
  PDP to explicitly build the desired role-combinations itself.  It
  also requires extra queries.  Note that this approach is practical
  only because the role names in a role combination are required to
  appear in alphabetical order.

  Note 4: in the following definitions, note that all LDAP matching
  rules are defined in [3] and in [9].  The corresponding X.500
  matching rules are defined in [8].

  Note 5: some of the following attribute definitions specify
  additional constraints on various data types (e.g., this integer has
  values that are valid  from 1..10).  Text has been added to instruct
  servers and applications what to do if a value outside of this range





Strassner, et al.           Standards Track                    [Page 20]

RFC 3703                Policy Core LDAP Schema            February 2004


  is encountered.  In all cases, if a constraint is violated, then the
  policy rule SHOULD be treated as being disabled, meaning that
  execution of the policy rule SHOULD be stopped.

5.1.  The Abstract Class pcimPolicy

  The abstract class pcimPolicy is a direct mapping of the abstract
  class Policy from the PCIM.  The class value "pcimPolicy" is also
  used as the mechanism for identifying policy-related instances in the
  Directory Information Tree.  An instance of any class may be "tagged"
  with this class value by attaching to it the auxiliary class
  pcimElementAuxClass.  Since pcimPolicy is derived from the class
  dlm1ManagedElement defined in reference [6], this specification has a
  normative dependency on that element of reference [6].

  The class definition is as follows:

      ( 1.3.6.1.1.6.1.1 NAME 'pcimPolicy'
        DESC 'An abstract class that is the base class for all classes
              that describe policy-related instances.'
        SUP dlm1ManagedElement
        ABSTRACT
        MAY ( cn $ dlmCaption $ dlmDescription $ orderedCimKeys $
              pcimKeywords )
      )

  The attribute cn is defined in RFC 2256 [7].  The dlmCaption,
  dlmDescription, and orderedCimKeys attributes are defined in [6].

  The pcimKeywords attribute is a multi-valued attribute that contains
  a set of keywords to assist directory clients in locating the policy
  objects identified by these keywords.  It is defined as follows:

      ( 1.3.6.1.1.6.2.3 NAME 'pcimKeywords'
             DESC 'A set of keywords to assist directory clients in
                   locating the policy objects applicable to them.'
             EQUALITY caseIgnoreMatch
             ORDERING caseIgnoreOrderingMatch
             SUBSTR caseIgnoreSubstringsMatch
             SYNTAX 1.3.6.1.4.1.1466.115.121.1.15
      )










Strassner, et al.           Standards Track                    [Page 21]

RFC 3703                Policy Core LDAP Schema            February 2004


5.2.  The Three Policy Group Classes

  PCIM [1] defines the PolicyGroup class to serve as a generalized
  aggregation mechanism, enabling PolicyRules and/or PolicyGroups to be
  aggregated together.  PCLS maps this class into three LDAP classes,
  called pcimGroup, pcimGroupAuxClass, and pcimGroupInstance.  This is
  done in order to provide maximum flexibility for the DIT designer.

  The class definitions for the three policy group classes are listed
  below.  These class definitions do not include attributes to realize
  the PolicyRuleInPolicyGroup and PolicyGroupInPolicyGroup associations
  from the PCIM.  This is because a pcimGroup object refers to
  instances of pcimGroup and pcimRule via, respectively, the attribute
  pcimGroupsAuxContainedSet in the pcimGroupContainmentAuxClass object
  class and the attribute pcimRulesAuxContainedSet in the
  pcimRuleContainmentAuxClass object class.

  To maximize flexibility, the pcimGroup class is defined as abstract.
  The subclass pcimGroupAuxClass provides for auxiliary attachment to
  another entry, while the structural subclass pcimGroupInstance is
  available to represent a policy group as a standalone entry.

  The class definitions are as follows.  First, the definition of the
  abstract class pcimGroup:

      ( 1.3.6.1.1.6.1.2 NAME 'pcimGroup'
             DESC 'A container for a set of related pcimRules and/or
                   a set of related pcimGroups.'
             SUP pcimPolicy
             ABSTRACT
             MAY ( pcimGroupName )
      )

  The one attribute of pcimGroup is pcimGroupName.  This attribute is
  used to define a user-friendly name of this policy group, and may be
  used as a naming attribute if desired.  It is defined as follows:

      ( 1.3.6.1.1.6.2.4 NAME 'pcimGroupName'
             DESC 'The user-friendly name of this policy group.'
             EQUALITY caseIgnoreMatch
             ORDERING caseIgnoreOrderingMatch
             SUBSTR caseIgnoreSubstringsMatch
             SYNTAX 1.3.6.1.4.1.1466.115.121.1.15
             SINGLE-VALUE
      )






Strassner, et al.           Standards Track                    [Page 22]

RFC 3703                Policy Core LDAP Schema            February 2004


  The two subclasses of pcimGroup are defined as follows.  The class
  pcimGroupAuxClass is an auxiliary class that can be used to collect a
  set of related pcimRule and/or pcimGroup classes.  It is defined as
  follows:

      ( 1.3.6.1.1.6.1.3 NAME 'pcimGroupAuxClass'
             DESC 'An auxiliary class that collects a set of related
                   pcimRule and/or pcimGroup entries.'
             SUP pcimGroup
             AUXILIARY
      )

  The class pcimGroupInstance is a structural class that can be used to
  collect a set of related pcimRule and/or pcimGroup classes.  It is
  defined as follows:

      ( 1.3.6.1.1.6.1.4 NAME 'pcimGroupInstance'
             DESC 'A structural class that collects a set of related
                   pcimRule and/or pcimGroup entries.'
             SUP pcimGroup
             STRUCTURAL
      )

  A DIT content rule could be written to enable an instance of
  pcimGroupInstance to have attached to it either references to one or
  more policy groups (using pcimGroupContainmentAuxClass) or references
  to one or more policy rules (using pcimRuleContainmentAuxClass).
  This would be used to formalize the semantics of the PolicyGroup
  class [1].  Since these semantics do not include specifying any
  properties of the PolicyGroup class, the content rule would not need
  to specify any attributes.

  Similarly, three separate DIT structure rules could be written, each
  of which would refer to a specific name form that identified one of
  the three possible naming attributes (i.e., pcimGroupName, cn, and
  orderedCIMKeys) for the pcimGroup object class.  This structure rule
  SHOULD include a superiorStructureRule (see Note 2 at the beginning
  of section 5).  The three name forms referenced by the three
  structure rules would each define one of the three naming attributes.

5.3.  The Three Policy Rule Classes

  The information model defines a PolicyRule class to represent the "If
  Condition then Action" semantics associated with processing policy
  information.  For maximum flexibility, the PCLS maps this class into
  three LDAP classes.





Strassner, et al.           Standards Track                    [Page 23]

RFC 3703                Policy Core LDAP Schema            February 2004


  To maximize flexibility, the pcimRule class is defined as abstract.
  The subclass pcimRuleAuxClass provides for auxiliary attachment to
  another entry, while the structural subclass pcimRuleInstance is
  available to represent a policy rule as a standalone entry.

  The conditions and actions associated with a policy rule are modeled,
  respectively, with auxiliary subclasses of the auxiliary classes
  pcimConditionAuxClass and pcimActionAuxClass.  Each of these
  auxiliary subclasses is attached to an instance of one of three
  structural classes.  A subclass of pcimConditionAuxClass is attached
  to an instance of pcimRuleInstance, to an instance of
  pcimRuleConditionAssociation, or to an instance of
  pcimPolicyInstance.  Similarly, a subclass of pcimActionAuxClass is
  attached to an instance of pcimRuleInstance, to an instance of
  pcimRuleActionAssociation, or to an instance of pcimPolicyInstance.

  The pcimRuleValidityPeriodList attribute (defined below) realizes the
  PolicyRuleValidityPeriod association defined in the PCIM.  Since this
  association has no additional properties besides those that tie the
  association to its associated objects, this association can be
  realized by simply using an attribute.  Thus, the
  pcimRuleValidityPeriodList attribute is simply a multi-valued
  attribute that provides an unordered set of DN references to one or
  more instances of the pcimTPCAuxClass, indicating when the policy
  rule is scheduled to be active and when it is scheduled to be
  inactive.  A policy rule is scheduled to be active if it is active
  according to AT LEAST ONE of the pcimTPCAuxClass instances referenced
  by this attribute.

  The PolicyConditionInPolicyRule and PolicyActionInPolicyRule
  associations, however, do have additional attributes.  The
  association PolicyActionInPolicyRule defines an integer attribute to
  sequence the actions, and the association PolicyConditionInPolicyRule
  has both an integer attribute to group the condition terms as well as
  a Boolean property to specify whether a condition is to be negated.

  In the PCLS, these additional association attributes are represented
  as attributes of two classes introduced specifically to model these
  associations.  These classes are the pcimRuleConditionAssociation
  class and the pcimRuleActionAssociation class, which are defined in
  Sections 5.4 and 5.5, respectively.  Thus, they do not appear as
  attributes of the class pcimRule.  Instead, the pcimRuleConditionList
  and pcimRuleActionList attributes can be used to reference these
  classes.







Strassner, et al.           Standards Track                    [Page 24]

RFC 3703                Policy Core LDAP Schema            February 2004


  The class definitions for the three pcimRule classes are as follows.

  The abstract class pcimRule is a base class for representing the "If
  Condition then Action" semantics associated with a policy rule.  It
  is defined as follows:

    ( 1.3.6.1.1.6.1.5 NAME 'pcimRule'
           DESC 'The base class for representing the "If Condition
                 then Action" semantics associated with a policy rule.'
           SUP pcimPolicy
           ABSTRACT
           MAY ( pcimRuleName $ pcimRuleEnabled $
                 pcimRuleConditionListType $ pcimRuleConditionList $
                 pcimRuleActionList $ pcimRuleValidityPeriodList $
                 pcimRuleUsage $ pcimRulePriority $
                 pcimRuleMandatory $ pcimRuleSequencedActions $
                 pcimRoles )
    )

  The PCIM [1] defines seven properties for the PolicyRule class.  The
  PCLS defines eleven attributes for the pcimRule class, which is the
  LDAP equivalent of the PolicyRule class.  Of these eleven attributes,
  seven are mapped directly from corresponding properties in PCIM's
  PolicyRule class.  The remaining four attributes are a class-specific
  optional naming attribute, and three attributes used to realize the
  three associations that the pcimRule class participates in.

  The pcimRuleName attribute is used as a user-friendly name of this
  policy rule, and can also serve as the class-specific optional naming
  attribute.  It is defined as follows:

       ( 1.3.6.1.1.6.2.5 NAME 'pcimRuleName'
              DESC 'The user-friendly name of this policy rule.'
              EQUALITY caseIgnoreMatch
              ORDERING caseIgnoreOrderingMatch
              SUBSTR caseIgnoreSubstringsMatch
              SYNTAX 1.3.6.1.4.1.1466.115.121.1.15
              SINGLE-VALUE
       )

  The pcimRuleEnabled attribute is an integer enumeration indicating
  whether a policy rule is administratively enabled (value=1),
  administratively disabled (value=2), or enabled for debug (value=3).
  It is defined as follows:

       ( 1.3.6.1.1.6.2.6 NAME 'pcimRuleEnabled'
              DESC 'An integer indicating whether a policy rule is
                    administratively enabled (value=1), disabled



Strassner, et al.           Standards Track                    [Page 25]

RFC 3703                Policy Core LDAP Schema            February 2004


                    (value=2), or enabled for debug (value=3).'
              EQUALITY integerMatch
              ORDERING integerOrderingMatch
              SYNTAX 1.3.6.1.4.1.1466.115.121.1.27
              SINGLE-VALUE
       )

  Note: All other values for the pcimRuleEnabled attribute are
  considered errors, and the administrator SHOULD treat this rule as
  being disabled if an invalid value is found.

  The pcimRuleConditionListType attribute is used to indicate whether
  the list of policy conditions associated with this policy rule is in
  disjunctive normal form (DNF, value=1) or conjunctive normal form
  (CNF, value=2).  It is defined as follows:

    ( 1.3.6.1.1.6.2.7 NAME 'pcimRuleConditionListType'
           DESC 'A value of 1 means that this policy rule is in
                 disjunctive normal form; a value of 2 means that this
                 policy rule is in conjunctive normal form.'
           EQUALITY integerMatch
           ORDERING integerOrderingMatch
           SYNTAX 1.3.6.1.4.1.1466.115.121.1.27
           SINGLE-VALUE
    )

  Note: any value other than 1 or 2 for the pcimRuleConditionListType
  attribute is considered an error.  Administrators SHOULD treat this
  rule as being disabled if an invalid value is found, since it is
  unclear how to structure the condition list.

  The pcimRuleConditionList attribute is a multi-valued attribute that
  is used to realize the policyRuleInPolicyCondition association
  defined in [1].  It contains a set of DNs of
  pcimRuleConditionAssociation entries representing associations
  between this policy rule and its conditions.  No order is implied.
  It is defined as follows:

    ( 1.3.6.1.1.6.2.8 NAME 'pcimRuleConditionList'
           DESC 'Unordered set of DNs of pcimRuleConditionAssociation
                 entries representing associations between this policy
                 rule and its conditions.'
           EQUALITY distinguishedNameMatch
           SYNTAX 1.3.6.1.4.1.1466.115.121.1.12
    )






Strassner, et al.           Standards Track                    [Page 26]

RFC 3703                Policy Core LDAP Schema            February 2004


  The pcimRuleActionList attribute is a multi-valued attribute that is
  used to realize the policyRuleInPolicyAction association defined in
  [1].  It contains a set of DNs of pcimRuleActionAssociation entries
  representing associations between this policy rule and its actions.
  No order is implied.  It is defined as follows:

    ( 1.3.6.1.1.6.2.9 NAME 'pcimRuleActionList'
           DESC 'Unordered set of DNs of pcimRuleActionAssociation
                 entries representing associations between this policy
                 rule and its actions.'
          EQUALITY distinguishedNameMatch
          SYNTAX 1.3.6.1.4.1.1466.115.121.1.12
    )

  The pcimRuleValidityPeriodList attribute is a multi-valued attribute
  that is used to realize the pcimRuleValidityPeriod association that
  is defined in [1].  It contains a set of DNs of
  pcimRuleValidityAssociation entries that determine when the pcimRule
  is scheduled to be active or inactive.  No order is implied.  It is
  defined as follows:

    ( 1.3.6.1.1.6.2.10 NAME 'pcimRuleValidityPeriodList'
           DESC 'Unordered set of DNs of pcimRuleValidityAssociation
                 entries that determine when the pcimRule is scheduled
                 to be active or inactive.'
           EQUALITY distinguishedNameMatch
           SYNTAX 1.3.6.1.4.1.1466.115.121.1.12
    )

  The pcimRuleUsage attribute is a free-form string providing
  guidelines on how this policy should be used.  It is defined as
  follows:

    ( 1.3.6.1.1.6.2.11 NAME 'pcimRuleUsage'
           DESC 'This attribute is a free-form sting providing
                 guidelines on how this policy should be used.'
           EQUALITY caseIgnoreMatch
           ORDERING caseIgnoreOrderingMatch
           SUBSTR caseIgnoreSubstringsMatch
           SYNTAX 1.3.6.1.4.1.1466.115.121.1.15
           SINGLE-VALUE
    )









Strassner, et al.           Standards Track                    [Page 27]

RFC 3703                Policy Core LDAP Schema            February 2004


  The pcimRulePriority attribute is a non-negative integer that is used
  to prioritize this pcimRule relative to other pcimRules.  A larger
  value indicates a higher priority.  It is defined as follows:

    ( 1.3.6.1.1.6.2.12 NAME 'pcimRulePriority'
           DESC 'A non-negative integer for prioritizing this
                 pcimRule relative to other pcimRules.  A larger
                 value indicates a higher priority.'
           EQUALITY integerMatch
           ORDERING integerOrderingMatch
           SYNTAX 1.3.6.1.4.1.1466.115.121.1.27
           SINGLE-VALUE
    )

  Note: if the value of the pcimRulePriority field is 0, then it SHOULD
  be treated as "don't care".  On the other hand, if the value is
  negative, then it SHOULD be treated as an error and Administrators
  SHOULD treat this rule as being disabled.

  The pcimRuleMandatory attribute is a Boolean attribute that, if TRUE,
  indicates that for this policy rule, the evaluation of its conditions
  and execution of its actions (if the condition is satisfied) is
  required.  If it is FALSE, then the evaluation of its conditions and
  execution of its actions (if the condition is satisfied) is not
  required.  This attribute is defined as follows:

    ( 1.3.6.1.1.6.2.13 NAME 'pcimRuleMandatory'
           DESC 'If TRUE, indicates that for this policy rule, the
                 evaluation of its conditions and execution of its
                 actions (if the condition is satisfied) is required.'
           EQUALITY booleanMatch
           SYNTAX 1.3.6.1.4.1.1466.115.121.1.7
           SINGLE-VALUE
    )

  The pcimRuleSequencedActions attribute is an integer enumeration that
  is used to indicate that the ordering of actions defined by the
  pcimActionOrder attribute is either  mandatory(value=1),
  recommended(value=2), or dontCare(value=3).  It is defined as
  follows:

    ( 1.3.6.1.1.6.2.14 NAME 'pcimRuleSequencedActions'
           DESC 'An integer enumeration indicating that the ordering of
                 actions defined by the pcimActionOrder attribute is
                 mandatory(1), recommended(2), or dontCare(3).'
           EQUALITY integerMatch
           ORDERING integerOrderingMatch




Strassner, et al.           Standards Track                    [Page 28]

RFC 3703                Policy Core LDAP Schema            February 2004


           SYNTAX 1.3.6.1.4.1.1466.115.121.1.27
           SINGLE-VALUE
    )

  Note: if the value of pcimRulesSequencedActions field is not one of
  these three values, then Administrators SHOULD treat this rule as
  being disabled.

  The pcimRoles attribute represents the policyRoles property of [1].
  Each value of this attribute represents a role-combination, which is
  a string of the form:
      <RoleName>[&&<RoleName>]* where the individual role names appear
  in alphabetical order according to the collating sequence for UCS-2.
  This attribute is defined as follows:

    ( 1.3.6.1.1.6.2.15 NAME 'pcimRoles'
           DESC 'Each value of this attribute represents a role-
                 combination.'
           EQUALITY caseIgnoreMatch
           ORDERING caseIgnoreOrderingMatch
           SUBSTR caseIgnoreSubstringsMatch
           SYNTAX 1.3.6.1.4.1.1466.115.121.1.15
    )

  Note: if the value of the pcimRoles attribute does not conform to the
  format "<RoleName>[&&<RoleName>]*" (see Section 6.3.7 of [1]), then
  this attribute is malformed and its policy rule SHOULD be treated as
  being disabled.

  The two subclasses of the pcimRule class are defined as follows.
  First, the pcimRuleAuxClass is an auxiliary class for representing
  the "If Condition then Action" semantics associated with a policy
  rule.  Its class definition is as follows:

    ( 1.3.6.1.1.6.1.6 NAME 'pcimRuleAuxClass'
           DESC 'An auxiliary class for representing the "If Condition
                then Action" semantics associated with a policy rule.'
           SUP pcimRule
           AUXILIARY
    )

  The pcimRuleInstance is a structural class for representing the "If
  Condition then Action" semantics associated with a policy rule.  Its
  class definition is as follows:

    ( 1.3.6.1.1.6.1.7 NAME 'pcimRuleInstance'
           DESC 'A structural class for representing the "If Condition
                then Action" semantics associated with a policy rule.'



Strassner, et al.           Standards Track                    [Page 29]

RFC 3703                Policy Core LDAP Schema            February 2004


           SUP pcimRule
           STRUCTURAL
    )

  A DIT content rule could be written to enable an instance of
  pcimRuleInstance to have attached to it either references to one or
  more policy conditions (using pcimConditionAuxClass) or references to
  one or more policy actions (using pcimActionAuxClass).  This would be
  used to formalize the semantics of the PolicyRule class [1].  Since
  these semantics do not include specifying any properties of the
  PolicyRule class, the content rule would not need to specify any
  attributes.

  Similarly, three separate DIT structure rules could be written, each
  of which would refer to a specific name form that identified one of
  its three possible naming attributes (i.e., pcimRuleName, cn, and
  orderedCIMKeys).  This structure rule SHOULD include a
  superiorStructureRule (see Note 2 at the beginning of section 5).
  The three name forms referenced by the three structure rules would
  each define one of the three naming attributes.

5.4.  The Class pcimRuleConditionAssociation

  This class contains attributes to represent the properties of the
  PCIM's PolicyConditionInPolicyRule association.  Instances of this
  class are related to an instance of pcimRule via DIT containment.
  The policy conditions themselves are represented by auxiliary
  subclasses of the auxiliary class pcimConditionAuxClass.  These
  auxiliary classes are attached directly to instances of
  pcimRuleConditionAssociation for rule-specific policy conditions.
  For a reusable policy condition, the policyCondition auxiliary
  subclass is attached to an instance of the class pcimPolicyInstance
  (which is presumably associated with a pcimRepository by DIT
  containment), and the policyConditionDN attribute (of this class) is
  used to reference the reusable policyCondition instance.

  The class definition is as follows:

    ( 1.3.6.1.1.6.1.8 NAME 'pcimRuleConditionAssociation'
           DESC 'This class contains attributes characterizing the
                 relationship between a policy rule and one of its
                 policy conditions.'
           SUP pcimPolicy
           MUST ( pcimConditionGroupNumber $ pcimConditionNegated )
           MAY ( pcimConditionName $ pcimConditionDN )
    )





Strassner, et al.           Standards Track                    [Page 30]

RFC 3703                Policy Core LDAP Schema            February 2004


  The attributes of this class are defined as follows.

  The pcimConditionGroupNumber attribute is a non-negative integer.  It
  is used to identify the group to which the condition referenced by
  this association is assigned.  This attribute is defined as follows:

    ( 1.3.6.1.1.6.2.16
           NAME 'pcimConditionGroupNumber'
           DESC 'The number of the group to which a policy condition
                 belongs.  This is used to form the DNF or CNF
                 expression associated with a policy rule.'
           EQUALITY integerMatch
           ORDERING integerOrderingMatch
           SYNTAX 1.3.6.1.4.1.1466.115.121.1.27
           SINGLE-VALUE
    )

  Note that this number is non-negative.  A negative value for this
  attribute is invalid, and any policy rule that refers to an invalid
  entry SHOULD be treated as being disabled.

  The pcimConditionNegated attribute is a Boolean attribute that
  indicates whether this policy condition is to be negated or not.  If
  it is TRUE (FALSE), it indicates that a policy condition IS (IS NOT)
  negated in the DNF or CNF expression associated with a policy rule.
  This attribute is defined as follows:

    ( 1.3.6.1.1.6.2.17
           NAME 'pcimConditionNegated'
           DESC 'If TRUE (FALSE), it indicates that a policy condition
                 IS (IS NOT) negated in the DNF or CNF expression
                 associated with a policy rule.'
           EQUALITY booleanMatch
           SYNTAX 1.3.6.1.4.1.1466.115.121.1.7
           SINGLE-VALUE
    )

  The pcimConditionName is a user-friendly name for identifying this
  policy condition, and may be used as a naming attribute if desired.
  This attribute is defined as follows:

    ( 1.3.6.1.1.6.2.18
           NAME 'pcimConditionName'
           DESC 'A user-friendly name for a policy condition.'
           EQUALITY caseIgnoreMatch
           ORDERING caseIgnoreOrderingMatch
           SUBSTR caseIgnoreSubstringsMatch




Strassner, et al.           Standards Track                    [Page 31]

RFC 3703                Policy Core LDAP Schema            February 2004


           SYNTAX 1.3.6.1.4.1.1466.115.121.1.15
           SINGLE-VALUE
    )

  The pcimConditionDN attribute is a DN that references an instance of
  a reusable policy condition.  This attribute is defined as follows:

    ( 1.3.6.1.1.6.2.19
           NAME 'pcimConditionDN'
           DESC 'A DN that references an instance of a reusable policy
                 condition.'
           EQUALITY distinguishedNameMatch
           SYNTAX 1.3.6.1.4.1.1466.115.121.1.12
           SINGLE-VALUE
    )

  A DIT content rule could be written to enable an instance of
  pcimRuleConditionAssociation to have attached to it an instance of
  the auxiliary class pcimConditionAuxClass, or one of its subclasses.
  This would be used to formalize the semantics of the
  PolicyConditionInPolicyRule association.  Specifically, this would be
  used to represent a rule-specific policy condition [1].
  Similarly, three separate DIT structure rules could be written.  Each
  of these DIT structure rules would refer to a specific name form that
  defined two important semantics.  First, each name form would
  identify one of the three possible naming attributes (i.e.,
  pcimConditionName, cn, and orderedCIMKeys) for the
  pcimRuleConditionAssociation object class.  Second, each name form
  would require that an instance of the pcimRuleConditionAssociation
  class have as its superior an instance of the pcimRule class.  This
  structure rule SHOULD also include a superiorStructureRule (see Note
  2 at the beginning of section 5).

5.5.  The Class pcimRuleValidityAssociation

  The policyRuleValidityPeriod aggregation is mapped to the PCLS
  pcimRuleValidityAssociation class.  This class represents the
  scheduled activation and deactivation of a policy rule by binding the
  definition of times that the policy is active to the policy rule
  itself.  The "scheduled" times are either identified through an
  attached auxiliary class pcimTPCAuxClass, or are referenced through
  its pcimTimePeriodConditionDN attribute.

  This class is defined as follows:

    ( 1.3.6.1.1.6.1.9 NAME 'pcimRuleValidityAssociation'
          DESC 'This defines the scheduled activation or deactivation
                of a policy rule.'



Strassner, et al.           Standards Track                    [Page 32]

RFC 3703                Policy Core LDAP Schema            February 2004


          SUP pcimPolicy
          STRUCTURAL
          MAY ( pcimValidityConditionName $ pcimTimePeriodConditionDN )
    )

  The attributes of this class are defined as follows:

  The pcimValidityConditionName attribute is used to define a
  user-friendly name of this condition, and may be used as a naming
  attribute if desired.  This attribute is defined as follows:

    ( 1.3.6.1.1.6.2.20
           NAME 'pcimValidityConditionName'
           DESC 'A user-friendly name for identifying an instance of
                 a pcimRuleValidityAssociation entry.'
           EQUALITY caseIgnoreMatch
           ORDERING caseIgnoreOrderingMatch
           SUBSTR caseIgnoreSubstringsMatch
           SYNTAX 1.3.6.1.4.1.1466.115.121.1.15
           SINGLE-VALUE
    )

  The pcimTimePeriodConditionDN attribute is a DN that references a
  reusable time period condition.  It is defined as follows:

    ( 1.3.6.1.1.6.2.21
           NAME 'pcimTimePeriodConditionDN'
            DESC 'A reference to a reusable policy time period
                  condition.'
           EQUALITY distinguishedNameMatch
           SYNTAX 1.3.6.1.4.1.1466.115.121.1.12
           SINGLE-VALUE
    )

  A DIT content rule could be written to enable an instance of
  pcimRuleValidityAssociation to have attached to it an instance of the
  auxiliary class pcimTPCAuxClass, or one of its subclasses.  This
  would be used to formalize the semantics of the
  PolicyRuleValidityPeriod aggregation [1].

  Similarly, three separate DIT structure rules could be written.  Each
  of these DIT structure rules would refer to a specific name form that
  defined two important semantics.  First, each name form would
  identify one of the three possible naming attributes (i.e.,
  pcimValidityConditionName, cn, and orderedCIMKeys) for the
  pcimRuleValidityAssociation object class.  Second, each name form
  would require that an instance of the pcimRuleValidityAssociation
  class have as its superior an instance of the pcimRule class.  This



Strassner, et al.           Standards Track                    [Page 33]

RFC 3703                Policy Core LDAP Schema            February 2004


  structure rule SHOULD also include a superiorStructureRule (see Note
  2 at the beginning of section 5).

5.6.  The Class pcimRuleActionAssociation

  This class contains an attribute to represent the one property of the
  PCIM PolicyActionInPolicyRule association, ActionOrder.  This
  property is used to specify an order for executing the actions
  associated with a policy rule.  Instances of this class are related
  to an instance of pcimRule via DIT containment.  The actions
  themselves are represented by auxiliary subclasses of the auxiliary
  class pcimActionAuxClass.

  These auxiliary classes are attached directly to instances of
  pcimRuleActionAssociation for rule-specific policy actions.  For a
  reusable policy action, the pcimAction auxiliary subclass is attached
  to an instance of the class pcimPolicyInstance (which is presumably
  associated with a pcimRepository by DIT containment), and the
  pcimActionDN attribute (of this class) is used to reference the
  reusable pcimCondition instance.

  The class definition is as follows:

    ( 1.3.6.1.1.6.1.10 NAME 'pcimRuleActionAssociation'
           DESC 'This class contains attributes characterizing the
                 relationship between a policy rule and one of its
                 policy actions.'
           SUP pcimPolicy
           MUST ( pcimActionOrder )
           MAY ( pcimActionName $ pcimActionDN )
    )

  The pcimActionName attribute is used to define a user-friendly name
  of this action, and may be used as a naming attribute if desired.
  This attribute is defined as follows:

    ( 1.3.6.1.1.6.2.22
           NAME 'pcimActionName'
           DESC 'A user-friendly name for a policy action.'
           EQUALITY caseIgnoreMatch
           ORDERING caseIgnoreOrderingMatch
           SUBSTR caseIgnoreSubstringsMatch
           SYNTAX 1.3.6.1.4.1.1466.115.121.1.15
           SINGLE-VALUE
    )






Strassner, et al.           Standards Track                    [Page 34]

RFC 3703                Policy Core LDAP Schema            February 2004


  The pcimActionOrder attribute is an unsigned integer that is used to
  indicate the relative position of an action in a sequence of actions
  that are associated with a given policy rule.  When this number is
  positive, it indicates a place in the sequence of actions to be
  performed, with smaller values indicating earlier positions in the
  sequence.  If the value is zero, then this indicates that the order
  is irrelevant.  Note that if two or more actions have the same
  non-zero value, they may be performed in any order as long as they
  are each performed in the correct place in the overall sequence of
  actions.  This attribute is defined as follows:

    ( 1.3.6.1.1.6.2.23
           NAME 'pcimActionOrder'
           DESC 'An integer indicating the relative order of an action
                 in the context of a policy rule.'
           EQUALITY integerMatch
           ORDERING integerOrderingMatch
           SYNTAX 1.3.6.1.4.1.1466.115.121.1.27
           SINGLE-VALUE
    )

  Note: if the value of the pcimActionOrder field is negative, then it
  SHOULD be treated as an error and any policy rule that refers to such
  an entry SHOULD be treated as being disabled.

  The pcimActionDN attribute is a DN that references a reusable policy
  action.  It is defined as follows:

    ( 1.3.6.1.1.6.2.24
           NAME 'pcimActionDN'
           DESC 'A DN that references a reusable policy action.'
           EQUALITY distinguishedNameMatch
           SYNTAX 1.3.6.1.4.1.1466.115.121.1.12
           SINGLE-VALUE
    )

  A DIT content rule could be written to enable an instance of
  pcimRuleActionAssociation to have attached to it an instance of the
  auxiliary class pcimActionAuxClass, or one of its subclasses.  This
  would be used to formalize the semantics of the
  PolicyActionInPolicyRule association.  Specifically, this would be
  used to represent a rule-specific policy action [1].

  Similarly, three separate DIT structure rules could be written.  Each
  of these DIT structure rules would refer to a specific name form that
  defined two important semantics.  First, each name form would
  identify one of the three possible naming attributes (i.e.,
  pcimActionName, cn, and orderedCIMKeys) for the



Strassner, et al.           Standards Track                    [Page 35]

RFC 3703                Policy Core LDAP Schema            February 2004


  pcimRuleActionAssociation object class.  Second, each name form would
  require that an instance of the pcimRuleActionAssociation class have
  as its superior an instance of the pcimRule class.  This structure
  rule should also include a superiorStructureRule (see Note 2 at the
  beginning of section 5).

5.7.  The Auxiliary Class pcimConditionAuxClass

  The purpose of a policy condition is to determine whether or not the
  set of actions (contained in the pcimRule that the condition applies
  to) should be executed or not.  This class defines the basic
  organizational semantics of a policy condition, as specified in [1].
  Subclasses of this auxiliary class can be attached to instances of
  three other classes in the PCLS.  When a subclass of this class is
  attached to an instance of pcimRuleConditionAssociation, or to an
  instance of pcimRule, it represents a rule-specific policy condition.
  When a subclass of this class is attached to an instance of
  pcimPolicyInstance, it represents a reusable policy condition.

  Since all of the classes to which subclasses of this auxiliary class
  may be attached are derived from the pcimPolicy class, the attributes
  of pcimPolicy will already be defined for the entries to which these
  subclasses attach.  Thus, this class is derived directly from "top".

  The class definition is as follows:

    ( 1.3.6.1.1.6.1.11 NAME 'pcimConditionAuxClass'
           DESC 'A class representing a condition to be evaluated in
                 conjunction with a policy rule.'
           SUP top
           AUXILIARY
    )

5.8.  The Auxiliary Class pcimTPCAuxClass

  The PCIM defines a time period class, PolicyTimePeriodCondition, to
  provide a means of representing the time periods during which a
  policy rule is valid, i.e., active.  It also defines an aggregation,
  PolicyRuleValidityPeriod, so that time periods can be associated with
  a PolicyRule.  The LDAP mapping also provides two classes, one for
  the time condition itself, and one for the aggregation.

  In the PCIM, the time period class is named
  PolicyTimePeriodCondition. However, the resulting name of the
  auxiliary class in this mapping (pcimTimePeriodConditionAuxClass)
  exceeds the length of a name that some directories can store.
  Therefore, the name has been shortened to pcimTPCAuxClass.




Strassner, et al.           Standards Track                    [Page 36]

RFC 3703                Policy Core LDAP Schema            February 2004


  The class definition is as follows:

    ( 1.3.6.1.1.6.1.12 NAME 'pcimTPCAuxClass'
           DESC 'This provides the capability of enabling or disabling
                 a policy rule according to a predetermined schedule.'
           SUP pcimConditionAuxClass
           AUXILIARY
           MAY ( pcimTPCTime $ pcimTPCMonthOfYearMask $
                 pcimTPCDayOfMonthMask $ pcimTPCDayOfWeekMask $
                 pcimTPCTimeOfDayMask $ pcimTPCLocalOrUtcTime )
    )

  The attributes of the pcimTPCAuxClass are defined as follows.

  The pcimTPCTime attribute represents the time period that a policy
  rule is enabled for.  This attribute is defined as a string in [1]
  with a special format which defines a time period with a starting
  date and an ending date separated by a forward slash ("/"), as
  follows:

      yyyymmddThhmmss/yyyymmddThhmmss

  where the first date and time may be replaced with the string
  "THISANDPRIOR" or the second date and time may be replaced with the
  string "THISANDFUTURE".  This attribute is defined as follows:

       ( 1.3.6.1.1.6.2.25
              NAME 'pcimTPCTime'
              DESC 'The start and end times on which a policy rule is
                    valid.'
              EQUALITY caseIgnoreMatch
              ORDERING caseIgnoreOrderingMatch
              SUBSTR caseIgnoreSubstringsMatch
              SYNTAX 1.3.6.1.4.1.1466.115.121.1.44
              SINGLE-VALUE
       )

  The value of this attribute SHOULD be checked against its defined
  format ("yyyymmddThhmmss/yyyymmddThhmmss", where the first and second
  date strings may be replaced with the strings "THISANDPRIOR" and
  "THISANDFUTURE").  If the value of this attribute does not conform to
  this syntax, then this SHOULD be considered an error and the policy
  rule SHOULD be treated as being disabled.

  The next four attributes (pcimTPCMonthOfYearMask,
  pcimTPCDayOfMonthMask, pcimTPCDayOfWeekMask, and
  pcimTPCTimeOfDayMask) are all defined as octet strings in [1].
  However, the semantics of each of these attributes are contained in



Strassner, et al.           Standards Track                    [Page 37]

RFC 3703                Policy Core LDAP Schema            February 2004


  bit strings of various fixed lengths.  Therefore, the PCLS uses a
  syntax of Bit String to represent each of them.  The definition of
  these four attributes are as follows.

  The pcimTPCMonthOfYearMask attribute defines a 12-bit mask
  identifying the months of the year in which a policy rule is valid.
  The format is a bit string of length 12, representing the months of
  the year from January through December.  The definition of this
  attribute is as follows:

    ( 1.3.6.1.1.6.2.26
           NAME 'pcimTPCMonthOfYearMask'
           DESC 'This identifies the valid months of the year for a
                 policy rule using a 12-bit string that represents the
                 months of the year from January through December.'
           EQUALITY bitStringMatch
           SYNTAX 1.3.6.1.4.1.1466.115.121.1.6
           SINGLE-VALUE
    )

  The value of this attribute SHOULD be checked against its defined
  format.  If the value of this attribute does not conform to this
  syntax, then this SHOULD be considered an error and the policy rule
  SHOULD be treated as being disabled.

  The pcimTPCMonthOfDayMask attribute defines a mask identifying the
  days of the month on which a policy rule is valid.  The format is a
  bit string of length 62.  The first 31 positions represent the days
  of the month in ascending order, from day 1 to day 31.  The next 31
  positions represent the days of the month in descending order, from
  the last day to the day 31 days from the end.  The definition of this
  attribute is as follows:

    ( 1.3.6.1.1.6.2.27
           NAME 'pcimTPCDayOfMonthMask'
           DESC 'This identifies the valid days of the month for a
                 policy rule using a 62-bit string. The first 31
                 positions represent the days of the month in ascending
                 order, and the next 31 positions represent the days of
                 the month in descending order.'
           EQUALITY bitStringMatch
           SYNTAX 1.3.6.1.4.1.1466.115.121.1.6
           SINGLE-VALUE
    )







Strassner, et al.           Standards Track                    [Page 38]

RFC 3703                Policy Core LDAP Schema            February 2004


  The value of this attribute SHOULD be checked against its defined
  format.  If the value of this attribute does not conform to this
  syntax, then this SHOULD be considered an error and the policy rule
  SHOULD be treated as being disabled.

  The pcimTPCDayOfWeekMask attribute defines a mask identifying the
  days of the week on which a policy rule is valid.  The format is a
  bit string of length 7, representing the days of the week from Sunday
  through Saturday.  The definition of this attribute is as follows:

    ( 1.3.6.1.1.6.2.28
           NAME 'pcimTPCDayOfWeekMask'
           DESC 'This identifies the valid days of the week for a
                 policy rule using a 7-bit string. This represents
                 the days of the week from Sunday through Saturday.'
           EQUALITY bitStringMatch
           SYNTAX 1.3.6.1.4.1.1466.115.121.1.6
           SINGLE-VALUE
    )

  The value of this attribute SHOULD be checked against its defined
  format.  If the value of this attribute does not conform to this
  syntax, then this SHOULD be considered an error and the policy rule
  SHOULD be treated as being disabled.

  The pcimTPCTimeOfDayMask attribute defines the range of times at
  which a policy rule is valid.  If the second time is earlier than the
  first, then the interval spans midnight.  The format of the string is
  Thhmmss/Thhmmss.  The definition of this attribute is as follows:

    ( 1.3.6.1.1.6.2.29
           NAME 'pcimTPCTimeOfDayMask'
           DESC 'This identifies the valid range of times for a policy
                 using the format Thhmmss/Thhmmss.'
           EQUALITY caseIgnoreMatch
           ORDERING caseIgnoreOrderingMatch
           SUBSTR caseIgnoreSubstringsMatch
           SYNTAX 1.3.6.1.4.1.1466.115.121.1.44
           SINGLE-VALUE
    )

  The value of this attribute SHOULD be checked against its defined
  format.  If the value of this attribute does not conform to this
  syntax, then this SHOULD be considered an error and the policy rule
  SHOULD be treated as being disabled.






Strassner, et al.           Standards Track                    [Page 39]

RFC 3703                Policy Core LDAP Schema            February 2004


  Finally, the pcimTPCLocalOrUtcTime attribute is used to choose
  between local or UTC time representation.  This is mapped as a simple
  integer syntax, with the value of 1 representing local time and the
  value of 2 representing UTC time.  The definition of this attribute
  is as follows:

    ( 1.3.6.1.1.6.2.30
           NAME 'pcimTPCLocalOrUtcTime'
           DESC 'This defines whether the times in this instance
                 represent local (value=1) times or UTC (value=2)
                 times.'
           EQUALITY integerMatch
           ORDERING integerOrderingMatch
           SYNTAX 1.3.6.1.4.1.1466.115.121.1.27
           SINGLE-VALUE
    )

  Note: if the value of the pcimTPCLocalOrUtcTime is not 1 or 2, then
  this SHOULD be considered an error and the policy rule SHOULD be
  disabled. If the attribute is not present at all, then all times are
  interpreted as if it were present with the value 2, that is, UTC
  time.

5.9.  The Auxiliary Class pcimConditionVendorAuxClass

  This class provides a general extension mechanism for representing
  policy conditions that have not been modeled with specific
  properties. Instead, its two properties are used to define the
  content and format of the condition, as explained below.  This class
  is intended for vendor-specific extensions that are not amenable to
  using pcimCondition; standardized extensions SHOULD NOT use this
  class.

  The class definition is as follows:

    ( 1.3.6.1.1.6.1.13 NAME 'pcimConditionVendorAuxClass'
           DESC 'A class that defines a registered means to describe a
                 policy condition.'
           SUP pcimConditionAuxClass
           AUXILIARY
           MAY ( pcimVendorConstraintData $
                pcimVendorConstraintEncoding )
    )

  The pcimVendorConstraintData attribute is a multi-valued attribute.
  It provides a general mechanism for representing policy conditions
  that have not been modeled as specific attributes.  This information
  is encoded in a set of octet strings.  The format of the octet



Strassner, et al.           Standards Track                    [Page 40]

RFC 3703                Policy Core LDAP Schema            February 2004


  strings is identified by the OID stored in the
  pcimVendorConstraintEncoding attribute.  This attribute is defined as
  follows:

    ( 1.3.6.1.1.6.2.31
           NAME 'pcimVendorConstraintData'
           DESC 'Mechanism for representing constraints that have not
                 been modeled as specific attributes.  Their format is
                 identified by the OID stored in the attribute
                 pcimVendorConstraintEncoding.'
           EQUALITY octetStringMatch
           ORDERING octetStringOrderingMatch
           SYNTAX 1.3.6.1.4.1.1466.115.121.1.40
    )

  The pcimVendorConstraintEncoding attribute is used to identify the
  format and semantics for the pcimVendorConstraintData attribute.
  This attribute is defined as follows:

    ( 1.3.6.1.1.6.2.32
           NAME 'pcimVendorConstraintEncoding'
           DESC 'An OID identifying the format and semantics for the
                 pcimVendorConstraintData for this instance.'
           EQUALITY objectIdentifierMatch
           SYNTAX 1.3.6.1.4.1.1466.115.121.1.38
           SINGLE-VALUE
    )

5.10.  The Auxiliary Class pcimActionAuxClass

  The purpose of a policy action is to execute one or more operations
  that will affect network traffic and/or systems, devices, etc. in
  order to achieve a desired policy state.  This class is used to
  represent an action to be performed as a result of a policy rule
  whose condition clause was satisfied.

  Subclasses of this auxiliary class can be attached to instances of
  three other classes in the PCLS.  When a subclass of this class is
  attached to an instance of pcimRuleActionAssociation, or to an
  instance of pcimRule, it represents a rule-specific policy action.
  When a subclass of this class is attached to an instance of
  pcimPolicyInstance, it represents a reusable policy action.

  Since all of the classes to which subclasses of this auxiliary class
  may be attached are derived from the pcimPolicy class, the attributes
  of the pcimPolicy class will already be defined for the entries to
  which these subclasses attach.  Thus, this class is derived directly
  from "top".



Strassner, et al.           Standards Track                    [Page 41]

RFC 3703                Policy Core LDAP Schema            February 2004


  The class definition is as follows:

    ( 1.3.6.1.1.6.1.14 NAME 'pcimActionAuxClass'
           DESC 'A class representing an action to be performed as a
                 result of a policy rule.'
           SUP top
           AUXILIARY
    )

5.11.  The Auxiliary Class pcimActionVendorAuxClass

  The purpose of this class is to provide a general extension mechanism
  for representing policy actions that have not been modeled with
  specific properties.  Instead, its two properties are used to define
  the content and format of the action, as explained below.

  As its name suggests, this class is intended for vendor-specific
  extensions that are not amenable to using the standard pcimAction
  class.  Standardized extensions SHOULD NOT use this class.

  The class definition is as follows:

    ( 1.3.6.1.1.6.1.15 NAME 'pcimActionVendorAuxClass'
           DESC 'A class that defines a registered means to describe a
                 policy action.'
           SUP pcimActionAuxClass
           AUXILIARY
           MAY ( pcimVendorActionData $ pcimVendorActionEncoding )
    )

  The pcimVendorActionData attribute is a multi-valued attribute.  It
  provides a general mechanism for representing policy actions that
  have not been modeled as specific attributes.  This information is
  encoded in a set of octet strings.  The format of the octet strings
  is identified by the OID stored in the pcimVendorActionEncoding
  attribute.  This attribute is defined as follows:

    ( 1.3.6.1.1.6.2.33
           NAME 'pcimVendorActionData'
           DESC ' Mechanism for representing policy actions that have
                  not been modeled as specific attributes.  Their
                  format is identified by the OID stored in the
                  attribute pcimVendorActionEncoding.'
           EQUALITY octetStringMatch
           ORDERING octetStringOrderingMatch
           SYNTAX 1.3.6.1.4.1.1466.115.121.1.40
    )




Strassner, et al.           Standards Track                    [Page 42]

RFC 3703                Policy Core LDAP Schema            February 2004


  The pcimVendorActionEncoding attribute is used to identify the format
  and semantics for the pcimVendorActionData attribute.  This attribute
  is defined as follows:

    ( 1.3.6.1.1.6.2.34
           NAME 'pcimVendorActionEncoding'
           DESC 'An OID identifying the format and semantics for the
                 pcimVendorActionData attribute of this instance.'
           EQUALITY objectIdentifierMatch
           SYNTAX 1.3.6.1.4.1.1466.115.121.1.38
           SINGLE-VALUE
    )

5.12.  The Class pcimPolicyInstance

  This class is not defined in the PCIM.  Its role is to serve as a
  structural class to which auxiliary classes representing policy
  information are attached when the information is reusable.  For
  auxiliary classes representing policy conditions and policy actions,
  there are alternative structural classes that may be used.  See
  Section 4.4 for a complete discussion of reusable policy conditions
  and actions, and of the role that this class plays in how they are
  represented.

  The class definition is as follows:

    ( 1.3.6.1.1.6.1.16 NAME 'pcimPolicyInstance'
           DESC 'A structural class to which aux classes containing
                 reusable policy information can be attached.'
           SUP pcimPolicy
           MAY ( pcimPolicyInstanceName )
    )

  The pcimPolicyInstanceName attribute is used to define a
  user-friendly name of this class, and may be used as a naming
  attribute if desired.  It is defined as follows:

    ( 1.3.6.1.1.6.2.35 NAME 'pcimPolicyInstanceName'
           DESC 'The user-friendly name of this policy instance.'
           EQUALITY caseIgnoreMatch
           ORDERING caseIgnoreOrderingMatch
           SUBSTR caseIgnoreSubstringsMatch
           SYNTAX 1.3.6.1.4.1.1466.115.121.1.15
           SINGLE-VALUE
    )






Strassner, et al.           Standards Track                    [Page 43]

RFC 3703                Policy Core LDAP Schema            February 2004


  A DIT content rule could be written to enable an instance of
  pcimPolicyInstance to have attached to it either instances of one or
  more of the auxiliary object classes pcimConditionAuxClass and
  pcimActionAuxClass.  Since these semantics do not include specifying
  any properties, the content rule would not need to specify any
  attributes.  Note that other content rules could be defined to enable
  other policy-related auxiliary classes to be attached to
  pcimPolicyInstance.

  Similarly, three separate DIT structure rules could be written.  Each
  of these DIT structure rules would refer to a specific name form that
  defined two important semantics.  First, each name form would
  identify one of the three possible naming attributes (i.e.,
  pcimPolicyInstanceName, cn, and orderedCIMKeys) for this object
  class.  Second, each name form would require that an instance of the
  pcimPolicyInstance class have as its superior an instance of the
  pcimRepository class.  This structure rule SHOULD also include a
  superiorStructureRule (see Note 2 at the beginning of section 5).

5.13.  The Auxiliary Class pcimElementAuxClass

  This class introduces no additional attributes, beyond those defined
  in the class pcimPolicy from which it is derived.  Its role is to
  "tag" an instance of a class defined outside the realm of policy
  information as represented by PCIM as being nevertheless relevant to
  a policy specification.  This tagging can potentially take place at
  two levels:

  -   Every instance to which pcimElementAuxClass is attached becomes
      an instance of the class pcimPolicy, since pcimElementAuxClass is
      a subclass of pcimPolicy.  Searching for object
      class="pcimPolicy" will return the instance.  (As noted earlier,
      this approach does NOT work for some directory implementations.
      To accommodate these implementations, policy-related entries
      SHOULD be tagged with the pcimKeyword "POLICY".)

  -   With the pcimKeywords attribute that it inherits from pcimPolicy,
      an instance to which pcimElementAuxClass is attached can be
      tagged as being relevant to a particular type or category of
      policy information, using standard keywords,
      administrator-defined keywords, or both.

  The class definition is as follows:

    ( 1.3.6.1.1.6.1.17 NAME 'pcimElementAuxClass'
           DESC 'An auxiliary class used to tag instances of classes
                 defined outside the realm of policy as relevant to a
                 particular policy specification.'



Strassner, et al.           Standards Track                    [Page 44]

RFC 3703                Policy Core LDAP Schema            February 2004


           SUP pcimPolicy
           AUXILIARY
    )

5.14.  The Three Policy Repository Classes

  These classes provide a container for reusable policy information,
  such as reusable policy conditions and/or reusable policy actions.
  This document is concerned with mapping just the properties that
  appear in these classes.  Conceptually, this may be thought of as a
  special location in the DIT where policy information may reside.
  Since pcimRepository is derived from the class dlm1AdminDomain
  defined in reference [6], this specification has a normative
  dependency on that element of reference [6] (as well as on its entire
  derivation hierarchy, which also appears in reference [6]).  To
  maximize flexibility, the pcimRepository class is defined as
  abstract.  A subclass pcimRepositoryAuxClass provides for auxiliary
  attachment to another entry, while a structural subclass
  pcimRepositoryInstance is available to represent a policy repository
  as a standalone entry.

  The definition for the pcimRepository class is as follows:

    ( 1.3.6.1.1.6.1.18 NAME 'pcimRepository'
           DESC 'A container for reusable policy information.'
           SUP dlm1AdminDomain
           ABSTRACT
           MAY ( pcimRepositoryName )
    )

  The pcimRepositoryName attribute is used to define a user-friendly
  name of this class, and may be used as a naming attribute if desired.
  It is defined as follows:

    ( 1.3.6.1.1.6.2.36 NAME 'pcimRepositoryName'
           DESC 'The user-friendly name of this policy repository.'
           EQUALITY caseIgnoreMatch
           ORDERING caseIgnoreOrderingMatch
           SUBSTR caseIgnoreSubstringsMatch
           SYNTAX 1.3.6.1.4.1.1466.115.121.1.15
           SINGLE-VALUE
    )









Strassner, et al.           Standards Track                    [Page 45]

RFC 3703                Policy Core LDAP Schema            February 2004


  The two subclasses of pcimRepository are defined as follows.  First,
  the pcimRepositoryAuxClass is an auxiliary class that can be used to
  aggregate reusable policy information.  It is defined as follows:

    ( 1.3.6.1.1.6.1.19 NAME 'pcimRepositoryAuxClass'
           DESC 'An auxiliary class that can be used to aggregate
                 reusable policy information.'
           SUP pcimRepository
           AUXILIARY
    )

  In cases where structural classes are needed instead of an auxiliary
  class, the pcimRepositoryInstance class is a structural class that
  can be used to aggregate reusable policy information.  It is defined
  as follows:

    ( 1.3.6.1.1.6.1.20 NAME 'pcimRepositoryInstance'
           DESC 'A structural class that can be used to aggregate
                 reusable policy information.'
           SUP pcimRepository
           STRUCTURAL
    )

  Three separate DIT structure rules could be written for this class.
  Each of these DIT structure rules would refer to a specific name form
  that enabled an instance of the pcimRepository class to be named
  under any superior using one of the three possible naming attributes
  (i.e., pcimRepositoryName, cn, and orderedCIMKeys).  This structure
  rule SHOULD also include a superiorStructureRule (see Note 2 at the
  beginning of section 5).

5.15.  The Auxiliary Class pcimSubtreesPtrAuxClass

  This auxiliary class provides a single, multi-valued attribute that
  references a set of objects that are at the root of DIT subtrees
  containing policy-related information.  By attaching this attribute
  to instances of various other classes, a policy administrator has a
  flexible way of providing an entry point into the directory that
  allows a client to locate and retrieve the policy information
  relevant to it.

  It is intended that these entries are placed in the DIT such that
  well-known DNs can be used to reference a well-known structural entry
  that has the pcimSubtreesPtrAuxClass attached to it.  In effect, this
  defines a set of entry points.  Each of these entry points can
  contain and/or reference all related policy entries for





Strassner, et al.           Standards Track                    [Page 46]

RFC 3703                Policy Core LDAP Schema            February 2004


  any well-known policy domains.  The pcimSubtreesPtrAuxClass functions
  as a tag to identify portions of the DIT that contain policy
  information.

  This object does not provide the semantic linkages between individual
  policy objects, such as those between a policy group and the policy
  rules that belong to it.  Its only role is to enable efficient bulk
  retrieval of policy-related objects, as described in Section 4.5.

  Once the objects have been retrieved, a directory client can
  determine the semantic linkages by following references contained in
  multi-valued attributes, such as pcimRulesAuxContainedSet.

  Since policy-related objects will often be included in the DIT
  subtree beneath an object to which this auxiliary class is attached,
  a client SHOULD request the policy-related objects from the subtree
  under the object with these references at the same time that it
  requests the references themselves.

  Since clients are expected to behave in this way, the policy
  administrator SHOULD make sure that this subtree does not contain so
  many objects unrelated to policy that an initial search done in this
  way results in a performance problem.  The pcimSubtreesPtrAuxClass
  SHOULD NOT be attached to the partition root for a large directory
  partition containing a relatively few number of policy-related
  objects along with a large number of objects unrelated to policy
  (again, "policy" here refers to the PCIM, not the X.501, definition
  and use of "policy").  A better approach would be to introduce a
  container object immediately below the partition root, attach
  pcimSubtreesPtrAuxClass to this container object, and then place all
  of the policy-related objects in that subtree.

  The class definition is as follows:

    ( 1.3.6.1.1.6.1.21 NAME 'pcimSubtreesPtrAuxClass'
           DESC 'An auxiliary class providing DN references to roots of
                 DIT subtrees containing policy-related objects.'
           SUP top
           AUXILIARY
           MAY ( pcimSubtreesAuxContainedSet )
    )










Strassner, et al.           Standards Track                    [Page 47]

RFC 3703                Policy Core LDAP Schema            February 2004


  The attribute pcimSubtreesAuxContainedSet provides an unordered set
  of DN references to instances of one or more objects under which
  policy-related information is present.  The objects referenced may or
  may not themselves contain policy-related information.  The attribute
  definition is as follows:

    ( 1.3.6.1.1.6.2.37
           NAME 'pcimSubtreesAuxContainedSet'
           DESC 'DNs of objects that serve as roots for DIT subtrees
                 containing policy-related objects.'
           EQUALITY distinguishedNameMatch
           SYNTAX 1.3.6.1.4.1.1466.115.121.1.12
    )

  Note that the cn attribute does NOT need to be defined for this
  class. This is because an auxiliary class is used as a means to
  collect common attributes and treat them as properties of an object.
  A good analogy is a #include file, except that since an auxiliary
  class is a class, all the benefits of a class (e.g., inheritance) can
  be applied to an auxiliary class.

5.16.  The Auxiliary Class pcimGroupContainmentAuxClass

  This auxiliary class provides a single, multi-valued attribute that
  references a set of pcimGroups.  By attaching this attribute to
  instances of various other classes, a policy administrator has a
  flexible way of providing an entry point into the directory that
  allows a client to locate and retrieve the pcimGroups relevant to it.

  As is the case with pcimRules, a policy administrator might have
  several different references to a pcimGroup in the overall directory
  structure. The pcimGroupContainmentAuxClass is the mechanism that
  makes it possible for the policy administrator to define all these
  different references.

  The class definition is as follows:

    ( 1.3.6.1.1.6.1.22 NAME 'pcimGroupContainmentAuxClass'
           DESC 'An auxiliary class used to bind pcimGroups to an
                 appropriate container object.'
           SUP top
           AUXILIARY
           MAY ( pcimGroupsAuxContainedSet )
    )







Strassner, et al.           Standards Track                    [Page 48]

RFC 3703                Policy Core LDAP Schema            February 2004


  The attribute pcimGroupsAuxContainedSet provides an unordered set of
  references to instances of one or more pcimGroups associated with the
  instance of a structural class to which this attribute has been
  appended.

  The attribute definition is as follows:

    ( 1.3.6.1.1.6.2.38
           NAME 'pcimGroupsAuxContainedSet'
           DESC 'DNs of pcimGroups associated in some way with the
                 instance to which this attribute has been appended.'
           EQUALITY distinguishedNameMatch
           SYNTAX 1.3.6.1.4.1.1466.115.121.1.12
    )

  Note that the cn attribute does NOT have to be defined for this class
  for the same reasons as those given for the pcimSubtreesPtrAuxClass
  in section 5.15.

5.17.  The Auxiliary Class pcimRuleContainmentAuxClass

  This auxiliary class provides a single, multi-valued attribute that
  references a set of pcimRules.  By attaching this attribute to
  instances of various other classes, a policy administrator has a
  flexible way of providing an entry point into the directory that
  allows a client to locate and retrieve the pcimRules relevant to it.

  A policy administrator might have several different references to a
  pcimRule in the overall directory structure.  For example, there
  might be references to all pcimRules for traffic originating in a
  particular subnet from a directory entry that represents that subnet.
  At the same time, there might be references to all pcimRules related
  to a particular DiffServ setting from an instance of a pcimGroup
  explicitly introduced as a container for DiffServ-related pcimRules.
  The pcimRuleContainmentAuxClass is the mechanism that makes it
  possible for the policy administrator to define all these separate
  references.

  The class definition is as follows:

    ( 1.3.6.1.1.6.1.23 NAME 'pcimRuleContainmentAuxClass'
           DESC 'An auxiliary class used to bind pcimRules to an
                 appropriate container object.'
           SUP top
           AUXILIARY
           MAY ( pcimRulesAuxContainedSet )
    )




Strassner, et al.           Standards Track                    [Page 49]

RFC 3703                Policy Core LDAP Schema            February 2004


  The attribute pcimRulesAuxContainedSet provides an unordered set of
  references to one or more instances of pcimRules associated with the
  instance of a structural class to which this attribute has been
  appended.  The attribute definition is as follows:

    ( 1.3.6.1.1.6.2.39
           NAME 'pcimRulesAuxContainedSet'
           DESC 'DNs of pcimRules associated in some way with the
                 instance to which this attribute has been appended.'
           EQUALITY distinguishedNameMatch
           SYNTAX 1.3.6.1.4.1.1466.115.121.1.12
    )

  The cn attribute does NOT have to be defined for this class for the
  same reasons as those given for the pcimSubtreesPtrAuxClass in
  section 5.15.

6.  Extending the Classes Defined in This Document

  The following subsections provide general guidance on how to create a
  domain-specific schema derived from this document, discuss how the
  vendor classes in the PCLS should be used, and explain how
  policyTimePeriodConditions are related to other policy conditions.

6.1.  Subclassing pcimConditionAuxClass and pcimActionAuxClass

  In Section 4.4, there is a discussion of how, by representing policy
  conditions and policy actions as auxiliary classes in a schema, the
  flexibility is retained to instantiate a particular condition or
  action as either rule-specific or reusable.  This flexibility is lost
  if a condition or action class is defined as structural rather than
  auxiliary.  For standardized schemata, this document specifies that
  domain-specific information MUST be expressed in auxiliary subclasses
  of pcimConditionAuxClass and pcimActionAuxClass.  It is RECOMMENDED
  that non-standardized schemata follow this practice as well.

6.2.  Using the Vendor Policy Attributes

  As discussed Section 5.9, the attributes pcimVendorConstraintData and
  pcimVendorConstraintEncoding are included in the
  pcimConditionVendorAuxClass to provide a mechanism for representing
  vendor-specific policy conditions that are not amenable to being
  represented with the pcimCondition class (or its subclasses).  The
  attributes pcimVendorActionData and pcimVendorActionEncoding in the
  pcimActionVendorAuxClass class play the same role with respect to
  actions.  This enables interoperability between different vendors who
  could not otherwise interoperate.




Strassner, et al.           Standards Track                    [Page 50]

RFC 3703                Policy Core LDAP Schema            February 2004


  For example, imagine a network composed of access devices from vendor
  A, edge and core devices from vendor B, and a policy server from
  vendor C. It is desirable for this policy server to be able to
  configure and manage all of the devices from vendors A and B.
  Unfortunately, these devices will in general have little in common
  (e.g., different mechanisms, different ways for controlling those
  mechanisms, different operating systems, different commands, and so
  forth).  The extension conditions provide a way for vendor-specific
  commands to be encoded as octet strings, so that a single policy
  server can commonly manage devices from different vendors.

6.3.  Using Time Validity Periods

  Time validity periods are defined as an auxiliary subclass of
  pcimConditionAuxClass, called pcimTPCAuxClass.  This is to allow
  their inclusion in the AND/OR condition definitions for a pcimRule.
  Care should be taken not to subclass pcimTPCAuxClass to add
  domain-specific condition properties.

  For example, it would be incorrect to add IPsec- or QoS-specific
  condition properties to the pcimTPCAuxClass class, just because IPsec
  or QoS includes time in its condition definition.  The correct
  subclassing would be to create IPsec or QoS-specific subclasses of
  pcimConditionAuxClass and then combine instances of these
  domain-specific condition classes with the appropriate validity
  period criteria.  This is accomplished using the AND/OR association
  capabilities for policy conditions in pcimRules.

7.  Security Considerations

  The PCLS, presented in this document, provides a mapping of the
  object-oriented model for describing policy information (PCIM) into a
  data model that forms the basic framework for describing the
  structure of policy data, in the case where the policy repository
  takes the form of an LDAP-accessible directory.

  PCLS is not intended to represent any particular system design or
  implementation.  PCLS is not directly useable in a real world system,
  without the discipline-specific mappings that are works in progress
  in the Policy Framework Working Group of the IETF.

  These other derivative documents, which use PCIM and its
  discipline-specific extensions as a base, will need to convey more
  specific security considerations (refer to RFC 3060 for more
  information.)






Strassner, et al.           Standards Track                    [Page 51]

RFC 3703                Policy Core LDAP Schema            February 2004


  The reason that PCLS, as defined here, is not representative of any
  real-world system, is that its object classes were designed to be
  independent of any specific discipline, or policy domain.  For
  example, DiffServ and IPsec represent two different policy domains.
  Each document that extends PCIM to one of these domains will derive
  subclasses from the classes and relationships defined in PCIM, in
  order to represent extensions of a generic model to cover specific
  technical domains.

  PCIM-derived documents will thus subclass the PCIM classes into
  classes specific to each technical policy domain (QOS, IPsec, etc.),
  which will, in turn, be mapped, to directory-specific schemata
  consistent with the PCLS documented here.

  Even though discipline-specific security requirements are not
  appropriate for PCLS, specific security requirements MUST be defined
  for each operational real-world application of PCIM.  Just as there
  will be a wide range of operational, real-world systems using PCIM,
  there will also be a wide range of security requirements for these
  systems.  Some operational, real-world systems that are deployed
  using PCLS may have extensive security requirements that impact
  nearly all object classes utilized by such a system, while other
  systems' security requirements might have very little impact.

  The derivative documents, discussed above, will create the context
  for applying operational, real-world, system-level security
  requirements against the various models that derive from PCIM,
  consistent with PCLS.

  In some real-world scenarios, the values associated with certain
  properties, within certain instantiated object classes, may represent
  information associated with scarce, and/or costly (and therefore
  valuable) resources.  It may be the case that these values must not
  be disclosed to, or manipulated by, unauthorized parties.

  Since this document forms the basis for the representation of a
  policy data model in a specific format (an LDAP-accessible
  directory), it is herein appropriate to reference the data
  model-specific tools and mechanisms that are available for achieving
  the authentication and authorization implicit in a requirement that
  restricts read and/or read- write access to these values stored in a
  directory.









Strassner, et al.           Standards Track                    [Page 52]

RFC 3703                Policy Core LDAP Schema            February 2004


  General LDAP security considerations apply, as documented in RFC 3377
  [2]. LDAP-specific authentication and authorization tools and
  mechanisms are found in the following standards track documents,
  which are appropriate for application to the management of security
  applied to policy data models stored in an LDAP-accessible directory:

    -   RFC 2829 (Authentication Methods for LDAP)
    -   RFC 2830 (Lightweight Directory Access Protocol (v3): Extension
        for Transport Layer Security)

  Any identified security requirements that are not dealt with in the
  appropriate discipline-specific information model documents, or in
  this document, MUST be dealt with in the derivative data model
  documents which are specific to each discipline.

8.  IANA Considerations

  Refer to RFC 3383, "Internet Assigned Numbers Authority (IANA)
  Considerations for the Lightweight Directory Access Protocol (LDAP)"
  [16].

8.1.  Object Identifiers

  The IANA has registered an LDAP Object Identifier for use in this
  technical specification according to the following template:

  Subject: Request for LDAP OID Registration
  Person & email address to contact for further information:
     Bob Moore ([email protected])
  Specification: RFC 3703
  Author/Change Controller: IESG
  Comments:
     The assigned OID will be used as a base for identifying
     a number of schema elements defined in this document.

  IANA has assigned an OID of 1.3.6.1.1.6 with the name of pcimSchema
  to this registration as recorded in the following registry:

     http://www.iana.org/assignments/smi-numbers

8.2.  Object Identifier Descriptors

  The IANA has registered the LDAP Descriptors used in this technical
  specification as detailed in the following template:

  Subject: Request for LDAP Descriptor Registration Update
  Descriptor (short name): see comment
  Object Identifier: see comment



Strassner, et al.           Standards Track                    [Page 53]

RFC 3703                Policy Core LDAP Schema            February 2004


  Person & email address to contact for further information:
     Bob Moore ([email protected])
  Usage: see comment
  Specification: RFC 3703
  Author/Change Controller: IESG
  Comments:

  The following descriptors have been added:

  NAME                            Type    OID
  --------------                  ----    ------------
  pcimPolicy                      O       1.3.6.1.1.6.1.1
  pcimGroup                       O       1.3.6.1.1.6.1.2
  pcimGroupAuxClass               O       1.3.6.1.1.6.1.3
  pcimGroupInstance               O       1.3.6.1.1.6.1.4
  pcimRule                        O       1.3.6.1.1.6.1.5
  pcimRuleAuxClass                O       1.3.6.1.1.6.1.6
  pcimRuleInstance                O       1.3.6.1.1.6.1.7
  pcimRuleConditionAssociation    O       1.3.6.1.1.6.1.8
  pcimRuleValidityAssociation     O       1.3.6.1.1.6.1.9
  pcimRuleActionAssociation       O       1.3.6.1.1.6.1.10
  pcimConditionAuxClass           O       1.3.6.1.1.6.1.11
  pcimTPCAuxClass                 O       1.3.6.1.1.6.1.12
  pcimConditionVendorAuxClass     O       1.3.6.1.1.6.1.13
  pcimActionAuxClass              O       1.3.6.1.1.6.1.14
  pcimActionVendorAuxClass        O       1.3.6.1.1.6.1.15
  pcimPolicyInstance              O       1.3.6.1.1.6.1.16
  pcimElementAuxClass             O       1.3.6.1.1.6.1.17
  pcimRepository                  O       1.3.6.1.1.6.1.18
  pcimRepositoryAuxClass          O       1.3.6.1.1.6.1.19
  pcimRepositoryInstance          O       1.3.6.1.1.6.1.20
  pcimSubtreesPtrAuxClass         O       1.3.6.1.1.6.1.21
  pcimGroupContainmentAuxClass    O       1.3.6.1.1.6.1.22
  pcimRuleContainmentAuxClass     O       1.3.6.1.1.6.1.23
  pcimKeywords                    A       1.3.6.1.1.6.2.3
  pcimGroupName                   A       1.3.6.1.1.6.2.4
  pcimRuleName                    A       1.3.6.1.1.6.2.5
  pcimRuleEnabled                 A       1.3.6.1.1.6.2.6
  pcimRuleConditionListType       A       1.3.6.1.1.6.2.7
  pcimRuleConditionList           A       1.3.6.1.1.6.2.8
  pcimRuleActionList              A       1.3.6.1.1.6.2.9
  pcimRuleValidityPeriodList      A       1.3.6.1.1.6.2.10
  pcimRuleUsage                   A       1.3.6.1.1.6.2.11
  pcimRulePriority                A       1.3.6.1.1.6.2.12
  pcimRuleMandatory               A       1.3.6.1.1.6.2.13
  pcimRuleSequencedActions        A       1.3.6.1.1.6.2.14
  pcimRoles                       A       1.3.6.1.1.6.2.15
  pcimConditionGroupNumber        A       1.3.6.1.1.6.2.16



Strassner, et al.           Standards Track                    [Page 54]

RFC 3703                Policy Core LDAP Schema            February 2004


  NAME                            Type    OID
  --------------                  ----    ------------
  pcimConditionNegated            A       1.3.6.1.1.6.2.17
  pcimConditionName               A       1.3.6.1.1.6.2.18
  pcimConditionDN                 A       1.3.6.1.1.6.2.19
  pcimValidityConditionName       A       1.3.6.1.1.6.2.20
  pcimTimePeriodConditionDN       A       1.3.6.1.1.6.2.21
  pcimActionName                  A       1.3.6.1.1.6.2.22
  pcimActionOrder                 A       1.3.6.1.1.6.2.23
  pcimActionDN                    A       1.3.6.1.1.6.2.24
  pcimTPCTime                     A       1.3.6.1.1.6.2.25
  pcimTPCMonthOfYearMask          A       1.3.6.1.1.6.2.26
  pcimTPCDayOfMonthMask           A       1.3.6.1.1.6.2.27
  pcimTPCDayOfWeekMask            A       1.3.6.1.1.6.2.28
  pcimTPCTimeOfDayMask            A       1.3.6.1.1.6.2.29
  pcimTPCLocalOrUtcTime           A       1.3.6.1.1.6.2.30
  pcimVendorConstraintData        A       1.3.6.1.1.6.2.31
  pcimVendorConstraintEncoding    A       1.3.6.1.1.6.2.32
  pcimVendorActionData            A       1.3.6.1.1.6.2.33
  pcimVendorActionEncoding        A       1.3.6.1.1.6.2.34
  pcimPolicyInstanceName          A       1.3.6.1.1.6.2.35
  pcimRepositoryName              A       1.3.6.1.1.6.2.36
  pcimSubtreesAuxContainedSet     A       1.3.6.1.1.6.2.37
  pcimGroupsAuxContainedSet       A       1.3.6.1.1.6.2.38
  pcimRulesAuxContainedSet        A       1.3.6.1.1.6.2.39

  where Type A is Attribute, Type O is ObjectClass

  These assignments are recorded in the following registry:

     http://www.iana.org/assignments/ldap-parameters




















Strassner, et al.           Standards Track                    [Page 55]

RFC 3703                Policy Core LDAP Schema            February 2004


9.  Acknowledgments

  We would like to thank Kurt Zeilenga, Roland Hedburg, and Steven Legg
  for doing a review of this document and making many helpful
  suggestions and corrections.

  Several of the policy classes in this model first appeared in early
  IETF drafts on IPsec policy and QoS policy.  The authors of these
  drafts were Partha Bhattacharya, Rob Adams, William Dixon, Roy
  Pereira, Raju Rajan, Jean-Christophe Martin, Sanjay Kamat, Michael
  See, Rajiv Chaudhury, Dinesh Verma, George Powers, and Raj Yavatkar.

  This document is closely aligned with the work being done in the
  Distributed Management Task Force (DMTF) Policy and Networks working
  groups.  We would especially like to thank Lee Rafalow, Glenn Waters,
  David Black, Michael Richardson, Mark Stevens, David Jones, Hugh
  Mahon, Yoram Snir, and Yoram Ramberg for their helpful comments.


































Strassner, et al.           Standards Track                    [Page 56]

RFC 3703                Policy Core LDAP Schema            February 2004


10.  Appendix:  Constructing the Value of orderedCIMKeys

  This appendix is non-normative, and is included in this document as a
  guide to implementers that wish to exchange information between CIM
  schemata and LDAP schemata.

  Within a CIM name space, the naming is basically flat; all instances
  are identified by the values of their key properties, and each
  combination of key values must be unique.  A limited form of
  hierarchical naming is available in CIM, however, by using weak
  associations: since a weak association involves propagation of key
  properties and their values from the superior object to the
  subordinate one, the subordinate object can be thought of as being
  named "under" the superior object.  Once they have been propagated,
  however, propagated key properties and their values function in
  exactly the same way that native key properties and their values do
  in identifying a CIM instance.

  The CIM mapping document [6] introduces a special attribute,
  orderedCIMKeys, to help map from the CIM_ManagedElement class to the
  LDAP class dlm1ManagedElement.  This attribute SHOULD only be used in
  an environment where it is necessary to map between an
  LDAP-accessible directory and a CIM repository.  For an LDAP
  environment, other LDAP naming attributes are defined (i.e., cn and a
  class-specific naming attribute) that SHOULD be used instead.

  The role of orderedCIMKeys is to represent the information necessary
  to correlate an entry in an LDAP-accessible directory with an
  instance in a CIM name space.  Depending on how naming of CIM-related
  entries is handled in an LDAP directory, the value of orderedCIMKeys
  represents one of two things:

    - If the DIT hierarchy does not mirror the "weakness hierarchy" of
      the CIM name space, then orderedCIMKeys represents all the
      keys of the CIM instance, both native and propagated.
    - If the DIT hierarchy does mirror the "weakness hierarchy" of the
      CIM name space, then orderedCIMKeys may represent either all the
      keys of the instance, or only the native keys.

  Regardless of which of these alternatives is taken, the syntax of
  orderedCIMKeys is the same - a DirectoryString of the form

      <className>.<key>=<value>[,<key>=<value>]*

  where the <key>=<value> elements are ordered by the names of the key
  properties, according to the collating sequence for US ASCII.  The
  only spaces allowed in the DirectoryString are those that fall within
  a <value> element.  As with alphabetizing the key properties, the



Strassner, et al.           Standards Track                    [Page 57]

RFC 3703                Policy Core LDAP Schema            February 2004


  goal of suppressing the spaces is once again to make the results of
  string operations predictable.

  The values of the <value> elements are derived from the various CIM
  syntaxes according to a grammar specified in [5].

11.  References

11.1.  Normative References

  [1]   Moore, B., Ellesson,E., Strassner, J. and A. Westerinen "Policy
        Core Information Model -- Version 1 Specification", RFC 3060,
        February 2001.

  [2]   Hodges, J. and R. Morgan, "Lightweight Directory Access
        Protocol (v3): Technical Specification", RFC 3377, September
        2002.

  [3]   Wahl, M., Coulbeck, A., Howes,T. and S. Kille, "Lightweight
        Directory Access Protocol (v3): Attribute Syntax Definitions",
        RFC 2252, December 1997.

  [4]   The Directory: Models.  ITU-T Recommendation X.501, 2001.

  [5]   Distributed Management Task Force, Inc., "Common Information
        Model (CIM) Specification", Version 2.2, June 14, 1999.  This
        document is available on the following DMTF web page:
        http://www.dmtf.org/standards/documents/CIM/DSP0004.pdf

  [6]   Distributed Management Task Force, Inc., "DMTF LDAP Schema for
        the CIM v2.5 Core Information Model", April 15, 2002.  This
        document is available on the following DMTF web page:
        http://www.dmtf.org/standards/documents/DEN/DSP0123.pdf

  [7]   Wahl, M., "A Summary of the X.500(96) User Schema for use with
        LDAPv3", RFC 2256, December 1997.

  [8]   The Directory: Selected Attribute Types.  ITU-T Recommendation
        X.520, 2001.

  [9]   Zeilenga, K., Ed., "Lightweight Directory Access Protocol
        (LDAP): Additional Matching Rules", RFC 3698, February 2004.

  [10]  Bradner, S., "Key words for use in RFCs to Indicate Requirement
        Levels", BCP 14, RFC 2119, March 1997.






Strassner, et al.           Standards Track                    [Page 58]

RFC 3703                Policy Core LDAP Schema            February 2004


11.2.  Informative References

  [11]  Hovey, R. and S. Bradner, "The Organizations Involved in the
        IETF Standards Process", BCP 11, RFC 2028, October 1996.

  [12]  Strassner, J., policy architecture BOF presentation, 42nd IETF
        Meeting, Chicago, Illinois, October 1998.  Minutes of this BOF
        are available at the following location:
        http://www.ietf.org/proceedings/98aug/index.html.

  [13]  Yavatkar, R., Guerin, R. and D. Pendarakis, "A Framework for
        Policy-based Admission Control", RFC 2753, January 2000.

  [14]  Wahl, M., Alvestrand, H., Hodges, J. and R. Morgan,
        "Authentication Methods for LDAP", RFC 2829, May 2000

  [15]  Hodges, J., Morgan, R. and M. Wahl, "Lightweight Directory
        Access Protocol (v3): Extension for Transport Layer Security",
        RFC 2830, May 2000.

  [16]  Zeilenga, K., "Internet Assigned Numbers Authority (IANA)
        Considerations for the Lightweight Directory Access Protocol
        (LDAP)", BCP 64, RFC 3383, September 2002.




























Strassner, et al.           Standards Track                    [Page 59]

RFC 3703                Policy Core LDAP Schema            February 2004


12.  Authors' Addresses

  John Strassner
  Intelliden Corporation
  90 South Cascade Avenue
  Colorado Springs, CO  80903

  Phone: +1.719.785.0648
  Fax:   +1.719.785.0644
  EMail: [email protected]


  Bob Moore
  IBM Corporation
  P. O. Box 12195, BRQA/B501/G206
  3039 Cornwallis Rd.
  Research Triangle Park, NC  27709-2195

  Phone: +1 919-254-4436
  Fax:   +1 919-254-6243
  EMail: [email protected]


  Ryan Moats
  Lemur Networks, Inc.
  15621 Drexel Circle
  Omaha, NE 68135

  Phone: +1-402-894-9456
  EMail: [email protected]


  Ed Ellesson
  3026 Carriage Trail
  Hillsborough, NC 27278

  Phone: +1 919-644-3977
  EMail: [email protected]













Strassner, et al.           Standards Track                    [Page 60]

RFC 3703                Policy Core LDAP Schema            February 2004


13.  Full Copyright Statement

  Copyright (C) The Internet Society (2004).  This document is subject
  to the rights, licenses and restrictions contained in BCP 78 and
  except as set forth therein, the authors retain all their rights.

  This document and the information contained herein are provided on an
  "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE
  REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE
  INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR
  IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
  THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
  WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.

Intellectual Property

  The IETF takes no position regarding the validity or scope of any
  Intellectual Property Rights or other rights that might be claimed
  to pertain to the implementation or use of the technology
  described in this document or the extent to which any license
  under such rights might or might not be available; nor does it
  represent that it has made any independent effort to identify any
  such rights.  Information on the procedures with respect to
  rights in RFC documents can be found in BCP 78 and BCP 79.

  Copies of IPR disclosures made to the IETF Secretariat and any
  assurances of licenses to be made available, or the result of an
  attempt made to obtain a general license or permission for the use
  of such proprietary rights by implementers or users of this
  specification can be obtained from the IETF on-line IPR repository
  at http://www.ietf.org/ipr.

  The IETF invites any interested party to bring to its attention
  any copyrights, patents or patent applications, or other
  proprietary rights that may cover technology that may be required
  to implement this standard.  Please address the information to the
  IETF at [email protected].

Acknowledgement

  Funding for the RFC Editor function is currently provided by the
  Internet Society.









Strassner, et al.           Standards Track                    [Page 61]