6 Index

A

Additional considerations

Applicable protocols

Architecture

Assumptions

Authorization system error handling

Azman rbac model

   overview

AzMan RBAC model use case - overview

C

Capability negotiation

Change tracking

Coherency requirements

Communications

   with other systems

   within the system

Component dependencies

Concepts

Considerations

   additional

   security

D

DAC model defined

DAC model elements

DAC model use case - overview

Dependencies

   with other systems

   within the system

Dependencies on other systems

Design intent

   azman rbac model

   overview

E

Environment

Error handling

Example - reading from a file on remote CBAC aware SMB2 share

Examples - overview

Extensibility

   Microsoft implementations

   overview

Extensibility – Microsoft implementations

External dependencies

F

Functional architecture

Functional requirements - overview

G

Glossary

H

Handling requirements

I

Implementations - Microsoft

Implementer - security considerations

Implementer – security considerations

Informative references

Initial state

Introduction

M

Microsoft implementations

O

Overview

   summary of protocol

   summary of protocols

   synopsis

   system use cases

Overview (synopsis)

P

Preconditions

Product behavior

R

Reading from a file on remote CBAC aware SMB2 share - example

References

Requirements

   coherency

   error handling

   overview

   preconditions

   security

S

Security considerations

System architecture

System dependencies

   with other systems

   within the system

System errors

System overview - introduction

System protocols

System requirements - overview

System use cases

   azman rbac model

   overview

System use cases - overview

T

Table of protocols

Tracking changes

U

Use cases

   azman rbac model

User roles – AzMan RBAC model

V

Versioning

   Microsoft implementations

   overview

Show: