Skip to main content

This browser is no longer supported.

Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.

Download Microsoft Edge More info
  • Read in English
  • Edit
    • Twitter
    • LinkedIn
    • Facebook
    • Email
Read in English
Read in English
Twitter LinkedIn Facebook Email

6 Index

  • Article
  • 02/14/2019
  • 2 minutes to read

Please rate your experience

Feedback will be sent to Microsoft: By pressing the submit button, your feedback will be used to improve Microsoft products and services. Privacy policy.

Thank you.

In this article

A

Additional considerations

Applicable protocols

C

Change tracking

Coherency requirements

Component dependencies (section 2.2, section 2.3)

F

Functional architecture

G

Glossary

I

Implementer - security considerations

Informative references

Introduction

O

OAuth

Overview

   summary of protocols

Overview (synopsis)

P

Preconditions

Prerequisites

Product behavior

R

References

Relationship to other protocols

Requirements - coherency

S

Security considerations

Security token service (STS)

   deployment on the edge

   OAuth

   overview

   WS-Federation

   WS-Trust

STS token generation - overview

System dependencies

System overview - introduction

T

Table of protocols

Tracking changes

U

Use cases

   example of user and relying party in different realms

   example of user and relying party in the same realm

   single sign-on using a security token service and WS-Federation

W

WS-Federation

WS-Trust

  • Previous Version Docs
  • Blog
  • Contribute
  • Privacy & Cookies
  • Terms of Use
  • Trademarks
  • © Microsoft 2022

In this article

  • Previous Version Docs
  • Blog
  • Contribute
  • Privacy & Cookies
  • Terms of Use
  • Trademarks
  • © Microsoft 2022