Export (0) Print
Expand All
This topic has not yet been rated - Rate this topic

9 Index

A

Abstract data model

IMSAdminBase2W client

IMSAdminBase2W server

IMSAdminBase3W client

IMSAdminBase3W server

IMSAdminBaseW client

IMSAdminBaseW server

AddKey method

AppCreate method

AppCreate2 method

AppDelete method

AppDeleteRecoverable method

AppGetStatus method

Applicability

AppRecover method

AppUnload method

B

Backup method

BackupWithPasswd Call example

BackupWithPasswd method

C

Capability negotiation

Change tracking

ChangePermissions method

CLEARTEXT_DATA_BLOB packet

CLEARTEXT_WITH_PREFIX_BLOB packet

CloseKey method

Common data types

Constants page

CopyData method

CopyKey method

CreateApplication method

CreateApplicationPool method

D

Data model - abstract

IMSAdminBase2W client

IMSAdminBase2W server

IMSAdminBase3W client

IMSAdminBase3W server

IMSAdminBaseW client

IMSAdminBaseW server

Data types

DeleteAllData method

DeleteApplication method

DeleteApplicationPool method

DeleteBackup method

DeleteChildKeys method

DeleteData method

DeleteKey method

E

ENCRYPTED_DATA_BLOB packet

ENCRYPTED_SESSION_KEY_BLOB packet

EnumBackups method

EnumerateApplicationsInPool method

EnumHistory Call example

EnumHistory method

EnumKeys method

Examples

BackupWithPasswd Call

EnumHistory Call

Export Call

General Hookup

GetChildPaths Call

Import Call

Reading Sensitive Data from the Server

RestoreHistory Call

RestoreWithPasswd Call

Export Call example

Export method

ExportToBlob method

F

Fields - vendor-extensible

Full IDL

G

General Hookup example

GetCertInfoRemote method

GetChildPaths Call example

GetChildPaths method

GetDataPaths method

GetDataSetNumber method

GetHandleInfo method

GetLastChangeTime method

GetProcessMode method

GetSystemChangeNumber method

Glossary

H

HASH_BLOB packet

HASH_TEXT_STRING_1

HASH_TEXT_STRING_2

I

IDL

IIS_CRYPTO_BLOB structure

Implementer - security considerations

Import Call example

Import method

ImportFromBlob method

ImportFromBlobGetHash method

IMSAdminBase2W client

abstract data model

initialization

local events

message processing

sequencing rules

timer events

timers

IMSAdminBase2W server

abstract data model

initialization

local events

message processing

sequencing rules

timer events

timers

IMSAdminBase3W client

abstract data model

initialization

local events

message processing

sequencing rules

timer events

timers

IMSAdminBase3W server

abstract data model

initialization

local events

message processing

sequencing rules

timer events

timers

IMSAdminBaseW client

abstract data model

initialization

local events

message processing

sequencing rules

timer events

timers

IMSAdminBaseW server

abstract data model

initialization

local events

message processing

sequencing rules

timer events

timers

Index of security parameters

Informative references

Initialization

IMSAdminBase2W client

IMSAdminBase2W server

IMSAdminBase3W client

IMSAdminBase3W server

IMSAdminBaseW client

IMSAdminBaseW server

InstanceName method

Introduction

IsExportableRemote method

IsInstalledRemote method

L

Local events

IMSAdminBase2W client

IMSAdminBase2W server

IMSAdminBase3W client

IMSAdminBase3W server

IMSAdminBaseW client

IMSAdminBaseW server

M

Message processing

IMSAdminBase2W client

IMSAdminBase2W server

IMSAdminBase3W client

IMSAdminBase3W server

IMSAdminBaseW client

IMSAdminBaseW server

Messages

data types

transport

METADATA_GETALL_RECORD structure

METADATA_HANDLE_INFO structure

METADATA_RECORD structure

N

Normative references

O

OpenKey method

Overview (synopsis)

P

Parameters - security index

PMETADATA_GETALL_RECORD

Preconditions

Prerequisites

Product behavior

PUBLIC_KEY_BLOB packet

R

R_EnumData method

R_GetAllData method

R_GetData method

R_GetServerGuid method

R_KeyExchangePhase1 method

R_KeyExchangePhase2 method

R_SetData method

Reading Sensitive Data from the Server example

RecycleApplicationPool method

References

informative

normative

Relationship to other protocols

RenameKey method

Restore method

RestoreHistory Call example

RestoreHistory method

RestoreWithPasswd Call example

RestoreWithPasswd method

S

SaveData method

Security

implementer considerations

parameter index

transferring sensitive data

Sensitive data

Sequencing rules

IMSAdminBase2W client

IMSAdminBase2W server

IMSAdminBase3W client

IMSAdminBase3W server

IMSAdminBaseW client

IMSAdminBaseW server

SESSION_KEY_BLOB packet

SetLastChangeTime method

Standards assignments

T

Timer events

IMSAdminBase2W client

IMSAdminBase2W server

IMSAdminBase3W client

IMSAdminBase3W server

IMSAdminBaseW client

IMSAdminBaseW server

Timers

IMSAdminBase2W client

IMSAdminBase2W server

IMSAdminBase3W client

IMSAdminBase3W server

IMSAdminBaseW client

IMSAdminBaseW server

Tracking changes

Transport

U

UnmarshalInterface method

V

Vendor-extensible fields

Versioning

 
Did you find this helpful?
(1500 characters remaining)
Thank you for your feedback
Show:
© 2014 Microsoft. All rights reserved.