Export (0) Print
Expand All

6 Index

A

Actors - overview

Additional considerations

Applicable protocols

enterprise environment

internet web environment

intranet web environment

overview

Architecture

Assumptions

Auxiliary

authenticate a user identity to a Kerberos authentication server - overview

negotiate authentication protocol - overview

S4U2self Mechanism - get a service ticket for a front-end server - overview

C

Capability negotiation

Change tracking

Coherency requirements

Communications

overview

with other systems

within the system

Component dependencies

Concepts

Conceptual overview

authentication

concepts

GSS-style

pre-GSS

introduction

Connecting to an SMB2 share

details

Kerberos protocol extensions - using

NTLM protocol - using

Considerations

additional

security

D

Dependencies

with other systems

within the system

Design intent

actors

auxiliary

authenticate a user identity to a Kerberos authentication server

negotiate authentication protocol

S4U2self Mechanism - get a service ticket for a front-end server

interactive domain logon - service ticket for client computer

network logon

client authentication

credential delegation

delegation of authentication

mutual authentication

server authentication

overview

security services - data

confidentiality

origin authentication

supporting actors

system interests

E

Environment - overview

Error handling

Examples

connecting to an SMB2 share

Kerberos protocol extensions - using

NTLM protocol - using

overview

GSS authentication protocol process - stock quote server

interactive domain logon - service ticket for client computer

overview

passwords - using

X.509 certificate - using

Extensibility

Microsoft implementations

overview

External dependencies

F

Functional

architecture

requirements

interactive logon authentication

details

internal architecture

overview

network logon authentication

details

enterprise environment

intranet web environment

mixed web environment

overview

protocol interactions

overview

relationship between standards and Microsoft extensions

Digest protocols

Kerberos protocols

SSL/TLS protocols

relevant standards - details

G

Glossary

GSS authentication protocol process - stock quote server - details

H

Handling requirements

I

Implementations - Microsoft

Implementer - security considerations

Informative references

Initial state

Interactive domain logon - service ticket for client computer

details

overview

passwords - using

X.509 certificate - using

Introduction

authentication

concepts

GSS-style

pre-GSS

overview

M

Microsoft implementations

N

Network logon

client authentication - overview

credential delegation - overview

delegation of authentication - overview

mutual authentication - overview

server authentication - overview

O

Overview

interactive logon authentication

details

internal architecture

overview

network logon authentication

details

enterprise environment

intranet web environment

mixed web environment

overview

protocol interactions

relationship between standards and Microsoft extensions

Digest protocols

Kerberos protocols

SSL/TLS protocols

relevant standards - details

summary of protocols

enterprise environment

internet web environment

intranet web environment

overview

synopsis

P

Preconditions

Product behavior

R

References

Requirements

coherency

error handling

interactive logon authentication

details

internal architecture

overview

network logon authentication

details

enterprise environment

intranet web environment

mixed web environment

overview

protocol interactions

overview

preconditions

relationship between standards and Microsoft extensions

Digest protocols

Kerberos protocols

SSL/TLS protocols

relevant standards - details

S

Security

considerations

services - data

confidentiality - overview

origin authentication - overview

Supporting actors - overview

System

architecture

dependencies

overview

with other systems

within the system

errors

interests - overview

overview

authentication

concepts

GSS-style

pre-GSS

introduction

protocols

enterprise environment

internet web environment

intranet web environment

overview

requirements

interactive logon authentication

details

internal architecture

overview

network logon authentication

details

enterprise environment

intranet web environment

mixed web environment

overview

protocol interactions

overview

relationship between standards and Microsoft extensions

Digest protocols

Kerberos protocols

SSL/TLS protocols

relevant standards - details

use cases

actors

auxiliary

authenticate a user identity to a Kerberos authentication server

negotiate authentication protocol

S4U2self Mechanism - get a service ticket for a front-end server

interactive domain logon - service ticket for client computer

network logon

client authentication

credential delegation

delegation of authentication

mutual authentication

server authentication

overview

security services - data

confidentiality

origin authentication

supporting actors

system interests

T

Table of protocols

enterprise environment

internet web environment

intranet web environment

overview

Tracking changes

U

Use cases

actors

auxiliary

authenticate a user identity to a Kerberos authentication server

negotiate authentication protocol

S4U2self Mechanism - get a service ticket for a front-end server

interactive domain logon - service ticket for client computer

network logon

client authentication

credential delegation

delegation of authentication

mutual authentication

server authentication

overview

security services - data

confidentiality

origin authentication

supporting actors

system interests

V

Versioning

Microsoft implementations

overview

 
Show:
© 2014 Microsoft