6 Index

A

Actors

   overview

Actors - overview

Additional considerations

Applicable protocols

   enterprise environment

   internet web environment

   intranet web environment

   overview

Architecture

Assumptions

Auxiliary

   authenticate a client identity to a Kerberos authentication server - overview

   negotiate authentication protocol - overview

   S4U2self Mechanism - get a service ticket for a front-end server - overview

C

Capability negotiation

Change tracking

Coherency requirements

Communications

   overview

   with other systems

   within the system

Component dependencies

Concepts

Conceptual overview

   authentication

      concepts

      GSS-style

      pre-GSS

   introduction

Connecting to an SMB2 share

   details

   Kerberos protocol extensions - using

   NTLM protocol - using

Considerations

   additional

   security

D

Dependencies

   with other systems

   within the system

Design intent

   actors

   auxiliary

      authenticate a client identity to a Kerberos authentication server

      negotiate authentication protocol

      S4U2self Mechanism - get a service ticket for a front-end server

   interactive domain logon - service ticket for client computer

   network logon

      client authentication

      credential delegation

      delegation of authentication

      mutual authentication

      server authentication

   overview

   security services - data

      confidentiality

      origin authentication

   summary of supporting actors and system interests

   supporting actors

   system interests

E

Environment

Environment - overview

Error handling

Examples

   connecting to an SMB2 share

      Kerberos protocol extensions - using

      NTLM protocol - using

      overview

   GSS authentication protocol process - stock quote server

   interactive domain logon - service ticket for client computer

      overview

      passwords - using

      X.509 certificate - using

Extensibility

   Microsoft implementations

   overview

External dependencies

F

Functional

   architecture

   requirements

      interactive logon authentication

         internal architecture

         overview

      network logon authentication

         details

         enterprise environment

         intranet web environment

         mixed web environment

         overview

         protocol interactions

      overview

      relationship between standards and Microsoft extensions

         Digest protocols

         Kerberos protocols

         SSL/TLS protocols

      relevant standards - details

Functional architecture

Functional requirements - overview

G

Glossary

GSS authentication protocol process - stock quote server - details

H

Handling requirements

I

Implementations - Microsoft

Implementer - security considerations

Informative references

Initial state

Interactive domain logon - service ticket for client computer

   details

   overview

   passwords - using

   X.509 certificate - using

Introduction

   authentication

      concepts

      GSS-style

      pre-GSS

   overview

M

Microsoft implementations

N

Network logon

   client authentication - overview

   credential delegation - overview

   delegation of authentication - overview

   mutual authentication - overview

   server authentication - overview

O

Overview

   interactive logon authentication

      internal architecture

      overview

   network logon authentication

      details

      enterprise environment

      intranet web environment

      mixed web environment

      overview

      protocol interactions

   relationship between standards and Microsoft extensions

      Digest protocols

      Kerberos protocols

      SSL/TLS protocols

   relevant standards - details

   summary of protocols

      enterprise environment

      internet web environment

      intranet web environment

      overview

   synopsis

Overview (synopsis)

P

Preconditions

Product behavior

R

References

Requirements

   coherency

   error handling

   interactive logon authentication

      internal architecture

      overview

   network logon authentication

      details

      enterprise environment

      intranet web environment

      mixed web environment

      overview

      protocol interactions

   overview

   preconditions

   relationship between standards and Microsoft extensions

      Digest protocols

      Kerberos protocols

      SSL/TLS protocols

   relevant standards - details

S

Security

   considerations

   services - data

      confidentiality - overview

      origin authentication - overview

Security considerations

Summary of supporting actors and system interests

   overview

Supporting actors - overview

System

   architecture

   dependencies

      overview

      with other systems

      within the system

   errors

   interests - overview

   overview

      authentication

         concepts

         GSS-style

         pre-GSS

      introduction

   protocols

      enterprise environment

      internet web environment

      intranet web environment

      overview

   requirements

      interactive logon authentication

         internal architecture

         overview

      network logon authentication

         details

         enterprise environment

         intranet web environment

         mixed web environment

         overview

         protocol interactions

      overview

      relationship between standards and Microsoft extensions

         Digest protocols

         Kerberos protocols

         SSL/TLS protocols

      relevant standards - details

   use cases

      actors

      auxiliary

         authenticate a client identity to a Kerberos authentication server

         negotiate authentication protocol

         S4U2self Mechanism - get a service ticket for a front-end server

      interactive domain logon - service ticket for client computer

      network logon

         client authentication

         credential delegation

         delegation of authentication

         mutual authentication

         server authentication

      overview

      security services - data

         confidentiality

         origin authentication

      supporting actors

      system interests

System architecture

System dependencies

   with other systems

   within the system

System errors

System protocols

System requirements - overview

System use cases

   actors

   overview

   summary of supporting actors and system interests

T

Table of protocols

   enterprise environment

   internet web environment

   intranet web environment

   overview

Tracking changes

U

Use cases

   actors

   auxiliary

      authenticate a client identity to a Kerberos authentication server

      negotiate authentication protocol

      S4U2self Mechanism - get a service ticket for a front-end server

   interactive domain logon - service ticket for client computer

   network logon

      client authentication

      credential delegation

      delegation of authentication

      mutual authentication

      server authentication

   overview

   security services - data

      confidentiality

      origin authentication

   summary of supporting actors and system interests

   supporting actors

   system interests

V

Versioning

   Microsoft implementations

   overview