8 Index

A

Abstract data model

   client role

   server role

All Messages message

Applicability

C

Capability negotiation

Change tracking

Client role

   abstract data model

   higher-layer triggered events

   initialization

   local events

   message processing

   overview

   sequencing rules

   timer events

   timers

D

Data model - abstract

   client role

   server role

E

Examples

   GetProxyTrustConfiguration request

   GetProxyTrustConfiguration response

   LsRequestSecurityToken request

   LsRequestSecurityToken response

   LsRequestSecurityTokenWithCookie request

   LsRequestSecurityTokenWithCookie response

   RequestSecurityTokenWithToken request

   RequestSecurityTokenWithToken response

   service WSDL

F

Fields - vendor-extensible

G

GetProxyTrustConfiguration request (section 2.2.2, section 4.2)

GetProxyTrustConfiguration Request message

GetProxyTrustConfiguration response (section 2.2.3, section 4.3)

GetProxyTrustConfiguration Response message

Glossary

H

Higher-layer triggered events

   client role

   server role

I

Implementer - security considerations

Index of security parameters

Informative references

Initialization

   client role

   server role

Introduction

L

Local events

   client role

   server role

LsRequestSecurityToken request (section 2.2.4, section 4.4)

LsRequestSecurityToken Request message

LsRequestSecurityToken response (section 2.2.5, section 4.5)

LsRequestSecurityToken Response message

LsRequestSecurityTokenWithCookie request (section 2.2.8, section 4.8)

LsRequestSecurityTokenWithCookie Request message

LsRequestSecurityTokenWithCookie response (section 2.2.9, section 4.9)

LsRequestSecurityTokenWithCookie Response message

M

Message processing

   client role

   server role

Messages

   All Messages

   GetProxyTrustConfiguration Request

   GetProxyTrustConfiguration Response

   LsRequestSecurityToken Request

   LsRequestSecurityToken Response

   LsRequestSecurityTokenWithCookie Request

   LsRequestSecurityTokenWithCookie Response

   RequestSecurityTokenWithToken Request

   RequestSecurityTokenWithToken Response

   syntax

      all messages

      GetProxyTrustConfiguration request

      GetProxyTrustConfiguration response

      LsRequestSecurityToken request

      LsRequestSecurityToken response

      LsRequestSecurityTokenWithCookie request

      LsRequestSecurityTokenWithCookie response

      overview

      RequestSecurityTokenWithToken request

      RequestSecurityTokenWithToken response

   transport

N

Normative references

O

Overview (synopsis)

P

Parameters - security index

Preconditions

Prerequisites

Product behavior

R

References

   informative

   normative

Relationship to other protocols

RequestSecurityTokenWithToken request (section 2.2.6, section 4.6)

RequestSecurityTokenWithToken Request message

RequestSecurityTokenWithToken response (section 2.2.7, section 4.7)

RequestSecurityTokenWithToken Response message

S

Security

   implementer considerations

   parameter index

Sequencing rules

   client role

   server role

Server role

   abstract data model

   higher-layer triggered events

   initialization

   local events

   message processing

   overview

   sequencing rules

   timer events

   timers

Service WSDL

Standards assignments

Syntax

   all messages

   GetProxyTrustConfiguration request

   GetProxyTrustConfiguration response

   LsRequestSecurityToken request

   LsRequestSecurityToken response

   LsRequestSecurityTokenWithCookie request

   LsRequestSecurityTokenWithCookie response

   overview

   RequestSecurityTokenWithToken request

   RequestSecurityTokenWithToken response

T

Timer events

   client role

   server role

Timers

   client role

   server role

Tracking changes

Transport

Triggered events - higher-layer

   client role

   server role

V

Vendor-extensible fields

Versioning