Was this page helpful?
Your feedback about this content is important. Let us know what you think.
Additional feedback?
1500 characters remaining
Export (0) Print
Expand All

8 Index

A

Abstract data model

   relying party (section 3.1.1, section 3.3.1)

   requestor IP/STS (section 3.1.1, section 3.2.1)

   web browser requestor

Applicability

Assertion statements

Attribute element example

Attribute statements

Authentication

Authentication statements

C

Capability negotiation (section 1.7, section 1.7.2)

Certificate validation

Change tracking

Claim

   IP/STS

   relying party

Claim mapping (section 3.1.5.4.5, section 3.3.5.2.5)

Cleanup processing (section 3.2.5.2.2, section 3.2.5.3.3, section 3.3.5.4.2)

Common Syntax for Request Messages message

Common Syntax for Response Messages message

Confidentiality

Cookies

D

Data model - abstract

   relying party (section 3.1.1, section 3.3.1)

   requestor IP/STS (section 3.1.1, section 3.2.1)

   web browser requestor

Directory service schema elements

E

Elements - directory service schema

Error handling

Examples

   final HTTP 200 OK response from WS resource example

   HTTP Get to Requestor IP/STS example

   HTTP Get To Resource IP/STS example

   HTTP post security token to resource IP/STS example

   HTTP post security token to WS resource example

   HTTP Redirect to Requestor IP/STS example

   HTTP Redirect to Resource IP/STS example

   message flows

   original get to WS resource example

   overview

   raw messages examples

   receive security token from requestor IP/STS in HTML form example

   receive security token from resource IP/STS in HTML form example

   RSTR

   SAML attribute element example

   X509Certificate element example

   X509SKI element example

   XML examples

F

Federation partner

   IP/STS

   relying party

   web browser requestor

Fields - vendor-extensible

Final HTTP 200 OK response from WS resource example

G

Glossary

H

Higher-layer triggered events

   relying party (section 3.1.4, section 3.3.4)

   requestor IP/STS (section 3.1.4, section 3.2.4)

   web browser requestor

High-level result - wresult

HTTP Get to Requestor IP/STS example

HTTP Get To Resource IP/STS example

HTTP post security token to resource IP/STS example

HTTP post security token to WS resource example

HTTP Redirect to Requestor IP/STS example

HTTP Redirect to Resource IP/STS example

I

Identification

Identifiers

Implementer - security considerations

Inbound wsignout1.0 request message processing

Inbound wsignoutcleanup1.0 request message processing

Index of security parameters

Informative references

Initialization

   relying party (section 3.1.3, section 3.3.3)

   requestor IP/STS (section 3.1.3, section 3.2.3)

   web browser requestor

Introduction

IP/STS

   claim

   federation partner

   user authentication context

   web browser requestor sessions list

L

Local events

   relying party (section 3.1.7, section 3.3.7)

   requestor IP/STS (section 3.1.7, section 3.2.7)

   web browser requestor

M

Message flow example

Message processing

   relying party (section 3.1.5, section 3.3.5)

   requestor IP/STS (section 3.1.5, section 3.2.5)

   web browser requestor (section 3.1.5, section 3.4.5)

Message transmission (section 3.2.5.3.4, section 3.3.5.3.4, section 3.3.5.4.4)

Message type - determining

Message validation (section 3.1.5.4.2, section 3.3.5.2.2)

Messages

   Common Syntax for Request Messages

   Common Syntax for Response Messages

   determining type

   overview

   syntax

   transmission

   transport

   wsignin1.0 Request Message

   wsignin1.0 Response Message

   wsignout1.0 Request Message

   wsignoutcleanup1.0 Request Message

N

Normative references

O

Original get to WS resource example

Outbound wsignout1.0 request message processing

Outbound wsignoutcleanup1.0 request message processing

Overview

Overview (synopsis)

P

Parameter marshaling (section 3.1.5.3.2, section 3.3.5.1.2, section 3.3.5.3.2)

Parameters - security

Parameters - security index

Preconditions

Prerequisites

Privacy

Product behavior

Protocol activation (section 3.1.5.3.1, section 3.1.5.4.1, section 3.2.5.2.1, section 3.2.5.3.1, section 3.3.5.1.1, section 3.3.5.2.1, section 3.3.5.3.1, section 3.3.5.4.1)

Protocol Details

   overview

R

Raw messages examples

Receive security token from requestor IP/STS in HTML form example

Receive security token from resource IP/STS in HTML form example

References

   informative

   normative

Relationship to other protocols

Relying Party

   abstract data model

   claim

   federation partner

   higher-layer triggered events (section 3.1.4, section 3.3.4)

   initialization (section 3.1.3, section 3.3.3)

   local events (section 3.1.7, section 3.3.7)

   message processing (section 3.1.5, section 3.3.5)

   overview (section 3.1, section 3.3, section 3.3.1)

   security token (section 3.1.1.1, section 3.1.5.3, section 3.1.5.4, section 3.3.5.1, section 3.3.5.2)

   sequencing rules (section 3.1.5, section 3.3.5)

   timer events (section 3.1.6, section 3.3.6)

   timers (section 3.1.2, section 3.3.2)

   user authentication context

   web browser requestor sessions list

Relying party security realm (section 3.2.5.3.2, section 3.3.5.4.3)

Replay attack

Request messages

   syntax

   wsignin1.0

   wsignout1.0

   wsignoutcleanup1.0

Requestor IP/STS

   abstract data model (section 3.1.1, section 3.2.1)

   higher-layer triggered events (section 3.1.4, section 3.2.4)

   initialization (section 3.1.3, section 3.2.3)

   local events (section 3.1.7, section 3.2.7)

   message processing (section 3.1.5, section 3.2.5)

   overview (section 3.1, section 3.2)

   security token (section 3.1.1.1, section 3.1.5.3, section 3.1.5.4, section 3.2.5.1)

   sequencing rules (section 3.1.5, section 3.2.5)

   timer events (section 3.1.6, section 3.2.6)

   timers (section 3.1.2, section 3.2.2)

Requestor IP/STS security realm (section 3.1.5.3.3, section 3.3.5.3.3)

Resource access control

Resource IP/STS abstract data model extensions

Response message (section 3.1.5.4.7, section 3.2.5.2.3, section 3.3.5.4.5)

Response messages

   syntax

   wsignin1.0

RSTR example

S

SAML assertion

SAML attribute element example

Schema elements - directory service

Security

   certificate validation

   confidentiality

   cookies

   identifiers

   implementer considerations

   parameter index

   privacy

   replay attack

   token integrity

Security token

   relying party (section 3.1.1.1, section 3.1.5.3, section 3.1.5.4, section 3.3.5.1, section 3.3.5.2)

   requestor IP/STS (section 3.1.1.1, section 3.1.5.3, section 3.1.5.4, section 3.2.5.1)

Security token format

Security token integrity

Security token signature

Sequencing rules

   relying party (section 3.1.5, section 3.3.5)

   requestor IP/STS (section 3.1.5, section 3.2.5)

   web browser requestor (section 3.1.5, section 3.4.5)

Signature - security token

Standards assignments

Statements

   Assertion

   Attribute

   Authentication

Subject element

Syntax

   overview

   request messages

   response messages

T

Timer events

   relying party (section 3.1.6, section 3.3.6)

   requestor IP/STS (section 3.1.6, section 3.2.6)

   web browser requestor

Timers

   relying party (section 3.1.2, section 3.3.2)

   requestor IP/STS (section 3.1.2, section 3.2.2)

   web browser requestor

Tracking changes

Transmitting messages

Transport

Triggered events - higher-layer

   relying party (section 3.1.4, section 3.3.4)

   requestor IP/STS (section 3.1.4, section 3.2.4)

   web browser requestor

U

User attributes (section 3.1.5.4.4, section 3.3.5.2.4)

User authentication context

   IP/STS

   relying party

User identification and authentication (section 3.1.5.4.3, section 3.3.5.2.3)

V

Vendor-extensible fields

Versioning (section 1.7, section 1.7.1)

W

Web browser requestor

   abstract data model

   federation partner

   higher-layer triggered events

   initialization

   IP/STS - sessions list

   local events

   message processing (section 3.1.5, section 3.4.5)

   overview

   relying party - sessions list

   sequencing rules (section 3.1.5, section 3.4.5)

   timer events

   timers

wresult

WS resource abstract data model extensions

wsignin1.0 (section 2.2.3, section 2.2.4)

wsignin1.0 Request Message message

wsignin1.0 Response Message message

wsignout1.0

wsignout1.0 Request Message message

wsignoutcleanup1.0

wsignoutcleanup1.0 Request Message message

X

X509Certificate element example

X509SKI element example

XML examples

Show:
© 2015 Microsoft