Export (0) Print
Expand All

8 Index

Office

A

Abstract data model

   client (section 3.1.1, section 3.2.1)

   server (section 3.1.1, section 3.3.1)

Alternate identities

   client

      communicating identities to server

   server

      processing messages from client

Anonymous client

   example

   higher-layer triggered events

   message processing

      client

         continuing session

         responding to challenge

      server

         establish session

         process authorized messages

Applicability

Authentication-Info and Proxy-Authentication-Info Header Fields message

Authorization and Proxy-Authorization Header Fields message

C

Capability negotiation

Change tracking

Client

   abstract data model (section 3.1.1, section 3.2.1)

   higher-layer triggered events

      communicate alternate identities

      establish session as anonymous

      send messages to SIP server

      specify p-session-on-behalf-of header

      specify referee identity

   initialization (section 3.1.3, section 3.2.3)

   message processing

      address-of-record messages signed by server

      authenticated messages from server

      challenges from server

      continuing session as anonymous client

      p-session-on-behalf-of header

      responding as anonymous client

   other local events (section 3.1.7, section 3.2.7)

   overview

   sequencing rules

      address-of-record messages signed by server

      authenticated messages from server

      challenges from server

      continuing session as anonymous client

      p-session-on-behalf-of header

      responding as anonymous client

   timer events (section 3.1.6, section 3.2.6)

   timers (section 3.1.2, section 3.2.2)

D

Data model - abstract

   client (section 3.1.1, section 3.2.1)

   server (section 3.1.1, section 3.3.1)

digest authentication

   example

E

Endpoint Identification Extensions message

Examples

   digest authentication

   Kerberos authentication

      protocol version 4

   NTLM authentication

   TLS-DSK authentication

F

Fields - vendor-extensible

G

Glossary

H

Higher-layer triggered events

   client

      communicate alternate identities

      establish session as anonymous

      send messages to SIP server

      specify p-session-on-behalf-of header

      specify referee identity

   server

      send messages to client

I

Implementer - security considerations

Index of security parameters

Informative references

Initialization

   client (section 3.1.3, section 3.2.3)

   server (section 3.1.3, section 3.3.3)

Introduction

K

Kerberos authentication

   example

      protocol version 4

M

Message processing

   client

      address-of-record messages signed by server

      authenticated messages from server

      challenges from server

      continuing session as anonymous client

      p-session-on-behalf-of header

      responding as anonymous client

   server

      alternate identities from client

      authentication response from client

      authorized message from client

      establish session with anonymous client

      process authorized messages from anonymous client

      p-session-on-behalf-of header from client

      unauthenticated message from client

Messages

   Authentication-Info and Proxy-Authentication-Info Header Fields

   Authorization and Proxy-Authorization Header Fields

   Endpoint Identification Extensions

   p-session-on-behalf-of Header Field Syntax

   Referred-By Header Field Extensions

   syntax

   transport

   WWW-Authenticate and Proxy-Authenticate Response Header Fields

N

Normative references

NTLM authentication

   example

O

Other local events

   client (section 3.1.7, section 3.2.7)

   server (section 3.1.7, section 3.3.7)

Overview (synopsis)

P

Parameters - security index

Preconditions

Prerequisites

Product behavior

p-session-on-behalf-of header

   client

      higher-layer triggered events

      message processing

   server

      message processing

p-session-on-behalf-of Header Field Syntax message

R

References

   informative

   normative

Referred-By Header Field Extensions message

Relationship to other protocols

S

Security

   implementer considerations

   parameter index

Sequencing rules

   client

      address-of-record messages signed by server

      authenticated messages from server

      challenges from server

      continuing session as anonymous client

      p-session-on-behalf-of header

      responding as anonymous client

   server

      alternate identities from client

      authentication response from client

      authorized message from client

      establish session with anonymous client

      process authorized messages from anonymous client

      p-session-on-behalf-of header from client

      unauthenticated message from client

Server

   abstract data model (section 3.1.1, section 3.3.1)

   higher-layer triggered events

      send messages to client

   initialization (section 3.1.3, section 3.3.3)

   message processing

      alternate identities from client

      authentication response from client

      authorized message from client

      establish session with anonymous client

      process authorized messages from anonymous client

      p-session-on-behalf-of header from client

      unauthenticated message from client

   other local events (section 3.1.7, section 3.3.7)

   overview

   sequencing rules

      alternate identities from client

      authentication response from client

      authorized message from client

      establish session with anonymous client

      process authorized messages from anonymous client

      p-session-on-behalf-of header from client

      unauthenticated message from client

   timer events (section 3.1.6, section 3.3.6)

   timers (section 3.1.2, section 3.3.2)

Standards assignments

Syntax

T

Timer events

   client (section 3.1.6, section 3.2.6)

   server (section 3.1.6, section 3.3.6)

Timers

   client (section 3.1.2, section 3.2.2)

   server (section 3.1.2, section 3.3.2)

TLS-DSK authentication

   example

Tracking changes

Transport

Triggered events

   client

      communicate alternate identities

      establish session as anonymous

      send messages to SIP server

      specify p-session-on-behalf-of header

      specify referee identity

   server

      send messages to client

V

Vendor-extensible fields

Versioning

W

WWW-Authenticate and Proxy-Authenticate Response Header Fields message

Show:
© 2015 Microsoft