Was this page helpful?
Your feedback about this content is important. Let us know what you think.
Additional feedback?
1500 characters remaining
8 Index

8 Index

A

Abstract data model

   client (section 3.1.1, section 3.2.1)

   server (section 3.1.1, section 3.3.1)

Applicability

Applicability statement

Authentication

AuthenticationInfo

C

Capability negotiation

Change tracking

Client

   abstract data model (section 3.1.1, section 3.2.1)

   higher-layer trigger events (section 3.1.4, section 3.2.4)

   initialization (section 3.1.3, section 3.2.3)

   local events (section 3.1.7, section 3.2.7)

   message processing (section 3.1.5, section 3.2.5)

   message sequencing (section 3.1.5, section 3.2.5)

   opaque directive

   other local events

   timer events (section 3.1.6, section 3.2.6)

   timers (section 3.1.2, section 3.2.2)

D

Data model - abstract

   client

   server

Data model – abstract

   client (section 3.1.1, section 3.2.1)

   server (section 3.1.1, section 3.3.1)

E

Examples

F

Fields - vendor-extensible

Fields – vendor-extensible

G

Glossary

H

Higher-layer trigger events

   client (section 3.1.4, section 3.2.4)

   server (section 3.1.4, section 3.3.4)

Host name

I

Implementer - security considerations

Implementers – security considerations

Index of security parameters

Informative references

Initialization

   client (section 3.1.3, section 3.2.3)

   server (section 3.1.3, section 3.3.3)

Introduction

L

Local events

   client (section 3.1.7, section 3.2.7)

   server (section 3.1.7, section 3.3.7)

M

Message processing

   client (section 3.1.5, section 3.2.5)

   server (section 3.1.5, section 3.3.5)

Message sequencing

   client (section 3.1.5, section 3.2.5)

   server (section 3.1.5, section 3.3.5)

Messages

   syntax (section 2, section 2.2)

   transport (section 2, section 2.1)

N

Name

   host

   validation - principal

Nonce

   client

   server

Normative references

O

Opaque directive

   client

   server

Other local events

   client

   server

Overview

Overview (synopsis)

P

Parameters - security

Parameters - security index

Preconditions

Prerequisites

Principal name validation

Product behavior

Protocol Details

   overview

Q

Qop directive

Qop-options directive

R

Realm directive (section 3.1.5.2, section 3.3.5.3)

References

   informative

   normative

Relationship to other protocols

S

Security

   implementer considerations

   parameter index

Sequencing – message

   client (section 3.1.5, section 3.2.5)

   server (section 3.1.5, section 3.3.5)

Server

   abstract data model (section 3.1.1, section 3.3.1)

   higher-layer trigger events (section 3.1.4, section 3.3.4)

   initialization (section 3.1.3, section 3.3.3)

   local events (section 3.1.7, section 3.3.7)

   message processing (section 3.1.5, section 3.3.5)

   message sequencing (section 3.1.5, section 3.3.5)

   opaque directive

   other local events

   timer events (section 3.1.6, section 3.3.6)

   timers (section 3.1.2, section 3.3.2)

Standards assignments

Syntax - message (section 2, section 2.2)

T

Timer events

   client (section 3.1.6, section 3.2.6)

   server (section 3.1.6, section 3.3.6)

Timers

   client (section 3.1.2, section 3.2.2)

   server (section 3.1.2, section 3.3.2)

Tracking changes

Transport

Transport – message (section 2, section 2.1)

Trigger events – higher layer

   client (section 3.1.4, section 3.2.4)

   server (section 3.1.4, section 3.3.4)

V

Validation - principal name

Vendor-extensible fields

Versioning

Show:
© 2015 Microsoft