Export (0) Print
Expand All

8 Index

A

Abstract data model

relying party (section 3.1.1, section 3.3.1)

requestor IP/STS (section 3.1.1, section 3.2.1)

web browser requestor

Applicability

Assertion statements

Attribute element example

Attribute statements

Authentication

Authentication statements

C

Capability negotiation (section 1.7, section 1.7.2)

Certificate validation

Change tracking

Claim

IP/STS

relying party

Claim mapping (section 3.1.5.4.5, section 3.3.5.2.5)

Cleanup processing (section 3.2.5.2.2, section 3.2.5.3.3, section 3.3.5.4.2)

Confidentiality

Cookies

D

Data model - abstract

relying party (section 3.1.1, section 3.3.1)

requestor IP/STS (section 3.1.1, section 3.2.1)

web browser requestor

E

Error handling

Examples

final HTTP 200 OK response from WS resource example

HTTP Get to Requestor IP/STS example

HTTP Get To Resource IP/STS example

HTTP post security token to resource IP/STS example

HTTP post security token to WS resource example

HTTP Redirect to Requestor IP/STS example

HTTP Redirect to Resource IP/STS example

message flows

original get to WS resource example

overview

raw messages examples

receive security token from requestor IP/STS in HTML form example

receive security token from resource IP/STS in HTML form example

RSTR

SAML attribute element example

X509Certificate element example

X509SKI element example

XML examples

F

Federation partner

IP/STS

relying party

web browser requestor

Fields - vendor-extensible

Final HTTP 200 OK response from WS resource example

G

Glossary

H

Higher-layer triggered events

relying party (section 3.1.4, section 3.3.4)

requestor IP/STS (section 3.1.4, section 3.2.4)

web browser requestor

High-level result - wresult

HTTP Get to Requestor IP/STS example

HTTP Get To Resource IP/STS example

HTTP post security token to resource IP/STS example

HTTP post security token to WS resource example

HTTP Redirect to Requestor IP/STS example

HTTP Redirect to Resource IP/STS example

I

Identification

Identifiers

Implementer - security considerations

Inbound wsignout1.0 request message processing

Inbound wsignoutcleanup1.0 request message processing

Index of security parameters

Informative references

Initialization

relying party (section 3.1.3, section 3.3.3)

requestor IP/STS (section 3.1.3, section 3.2.3)

web browser requestor

Introduction

IP/STS

claim

federation partner

user authentication context

web browser requestor sessions list

L

Local events

relying party (section 3.1.7, section 3.3.7)

requestor IP/STS (section 3.1.7, section 3.2.7)

web browser requestor

M

Message flow example

Message processing

relying party (section 3.1.5, section 3.3.5)

requestor IP/STS (section 3.1.5, section 3.2.5)

web browser requestor (section 3.1.5, section 3.4.5)

Message transmission (section 3.2.5.3.4, section 3.3.5.3.4, section 3.3.5.4.4)

Message type - determining

Message validation (section 3.1.5.4.2, section 3.3.5.2.2)

Messages

determining type

overview

syntax

transmission

transport

N

Normative references

O

Original get to WS resource example

Outbound wsignout1.0 request message processing

Outbound wsignoutcleanup1.0 request message processing

Overview

Overview (synopsis)

P

Parameter marshaling (section 3.1.5.3.2, section 3.3.5.1.2, section 3.3.5.3.2)

Parameters - security

Preconditions

Prerequisites

Privacy

Product behavior

Protocol activation (section 3.1.5.3.1, section 3.1.5.4.1, section 3.2.5.2.1, section 3.2.5.3.1, section 3.3.5.1.1, section 3.3.5.2.1, section 3.3.5.3.1, section 3.3.5.4.1)

Protocol details

R

Raw messages examples

Receive security token from requestor IP/STS in HTML form example

Receive security token from resource IP/STS in HTML form example

References

informative

normative

Relationship to other protocols

Relying Party

abstract data model

claim

federation partner

higher-layer triggered events (section 3.1.4, section 3.3.4)

initialization (section 3.1.3, section 3.3.3)

local events (section 3.1.7, section 3.3.7)

message processing (section 3.1.5, section 3.3.5)

overview (section 3.1, section 3.3, section 3.3.1)

security token (section 3.1.1.1, section 3.1.5.3, section 3.1.5.4, section 3.3.5.1, section 3.3.5.2)

sequencing rules (section 3.1.5, section 3.3.5)

timer events (section 3.1.6, section 3.3.6)

timers (section 3.1.2, section 3.3.2)

user authentication context

web browser requestor sessions list

Relying party security realm (section 3.2.5.3.2, section 3.3.5.4.3)

Replay attack

Request messages

syntax

wsignin1.0

wsignout1.0

wsignoutcleanup1.0

Requestor IP/STS

abstract data model (section 3.1.1, section 3.2.1)

higher-layer triggered events (section 3.1.4, section 3.2.4)

initialization (section 3.1.3, section 3.2.3)

local events (section 3.1.7, section 3.2.7)

message processing (section 3.1.5, section 3.2.5)

overview (section 3.1, section 3.2)

security token (section 3.1.1.1, section 3.1.5.3, section 3.1.5.4, section 3.2.5.1)

sequencing rules (section 3.1.5, section 3.2.5)

timer events (section 3.1.6, section 3.2.6)

timers (section 3.1.2, section 3.2.2)

Requestor IP/STS security realm (section 3.1.5.3.3, section 3.3.5.3.3)

Resource access control

Resource IP/STS abstract data model extensions

Response message (section 3.1.5.4.7, section 3.2.5.2.3, section 3.3.5.4.5)

Response messages

syntax

wsignin1.0

RSTR example

S

SAML assertion

SAML attribute element example

Security

certificate validation

confidentiality

cookies

identifiers

implementer considerations

parameter index

privacy

replay attack

token integrity

Security token

relying party (section 3.1.1.1, section 3.1.5.3, section 3.1.5.4, section 3.3.5.1, section 3.3.5.2)

requestor IP/STS (section 3.1.1.1, section 3.1.5.3, section 3.1.5.4, section 3.2.5.1)

Security token format

Security token integrity

Security token signature

Sequencing rules

relying party (section 3.1.5, section 3.3.5)

requestor IP/STS (section 3.1.5, section 3.2.5)

web browser requestor (section 3.1.5, section 3.4.5)

Signature - security token

Standards assignments

Statements

Assertion

Attribute

Authentication

Subject element

Syntax

overview

request messages

response messages

T

Timer events

relying party (section 3.1.6, section 3.3.6)

requestor IP/STS (section 3.1.6, section 3.2.6)

web browser requestor

Timers

relying party (section 3.1.2, section 3.3.2)

requestor IP/STS (section 3.1.2, section 3.2.2)

web browser requestor

Tracking changes

Transmitting messages

Transport

Triggered events - higher-layer

relying party (section 3.1.4, section 3.3.4)

requestor IP/STS (section 3.1.4, section 3.2.4)

web browser requestor

U

User attributes (section 3.1.5.4.4, section 3.3.5.2.4)

User authentication context

IP/STS

relying party

User identification and authentication (section 3.1.5.4.3, section 3.3.5.2.3)

V

Vendor-extensible fields

Versioning (section 1.7, section 1.7.1)

W

Web browser requestor

abstract data model

federation partner

higher-layer triggered events

initialization

IP/STS - sessions list

local events

message processing (section 3.1.5, section 3.4.5)

overview

relying party - sessions list

sequencing rules (section 3.1.5, section 3.4.5)

timer events

timers

wresult

WS resource abstract data model extensions

wsignin1.0 (section 2.2.3, section 2.2.4)

wsignout1.0

wsignoutcleanup1.0

X

X509Certificate element example

X509SKI element example

XML examples

 
Show:
© 2014 Microsoft