Export (0) Print
Expand All

8 Index

A

Abstract data model

client role

server role

Applicability

C

Capability negotiation

Change tracking

Client role

abstract data model

higher-layer triggered events

initialization

local events

message processing

overview

sequencing rules

timer events

timers

D

Data model - abstract

client role

server role

E

Examples

GetProxyTrustConfiguration request

GetProxyTrustConfiguration response

LsRequestSecurityToken request

LsRequestSecurityToken response

LsRequestSecurityTokenWithCookie request

LsRequestSecurityTokenWithCookie response

RequestSecurityTokenWithToken request

RequestSecurityTokenWithToken response

service WSDL

F

Fields - vendor-extensible

G

GetProxyTrustConfiguration request (section 2.2.2, section 4.2)

GetProxyTrustConfiguration response (section 2.2.3, section 4.3)

Glossary

H

Higher-layer triggered events

client role

server role

I

Implementer - security considerations

Index of security parameters

Informative references

Initialization

client role

server role

Introduction

L

Local events

client role

server role

LsRequestSecurityToken request (section 2.2.4, section 4.4)

LsRequestSecurityToken response (section 2.2.5, section 4.5)

LsRequestSecurityTokenWithCookie request (section 2.2.8, section 4.8)

LsRequestSecurityTokenWithCookie response (section 2.2.9, section 4.9)

M

Message processing

client role

server role

Messages

syntax

all messages

GetProxyTrustConfiguration request

GetProxyTrustConfiguration response

LsRequestSecurityToken request

LsRequestSecurityToken response

LsRequestSecurityTokenWithCookie request

LsRequestSecurityTokenWithCookie response

overview

RequestSecurityTokenWithToken request

RequestSecurityTokenWithToken response

transport

N

Normative references

O

Overview (synopsis)

P

Parameters - security index

Preconditions

Prerequisites

Product behavior

R

References

informative

normative

Relationship to other protocols

RequestSecurityTokenWithToken request (section 2.2.6, section 4.6)

RequestSecurityTokenWithToken response (section 2.2.7, section 4.7)

S

Security

implementer considerations

parameter index

Sequencing rules

client role

server role

Server role

abstract data model

higher-layer triggered events

initialization

local events

message processing

overview

sequencing rules

timer events

timers

Service WSDL

Standards assignments

Syntax

all messages

GetProxyTrustConfiguration request

GetProxyTrustConfiguration response

LsRequestSecurityToken request

LsRequestSecurityToken response

LsRequestSecurityTokenWithCookie request

LsRequestSecurityTokenWithCookie response

overview

RequestSecurityTokenWithToken request

RequestSecurityTokenWithToken response

T

Timer events

client role

server role

Timers

client role

server role

Tracking changes

Transport

Triggered events - higher-layer

client role

server role

V

Vendor-extensible fields

Versioning

 
Show:
© 2014 Microsoft