Skip to main content

This browser is no longer supported.

Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.

Download Microsoft Edge More info
  • Read in English
  • Edit
    • Twitter
    • LinkedIn
    • Facebook
    • Email
Read in English
Read in English
Twitter LinkedIn Facebook Email

6 Index

  • Article
  • 02/14/2019
  • 2 minutes to read

Please rate your experience

Feedback will be sent to Microsoft: By pressing the submit button, your feedback will be used to improve Microsoft products and services. Privacy policy.

Thank you.

In this article

A

Additional considerations

Applicable protocols

Architecture

Assumptions

C

Capability negotiation

Change tracking

Coherency requirements

Component dependencies

Concepts

D

Dependencies

   with other systems

   within the system

E

Environment

Error handling

Examples

   directory

   domain-join

Examples - overview

Extensibility

   Microsoft implementations

Extensibility - Microsoft implementations

Extensibility - overview

External dependencies

F

Functional requirements – overview

G

Glossary

I

Implementations - Microsoft

Implementer - security considerations

Informative references

Initial state

Introduction

M

Microsoft implementations

O

Overview

   summary of protocols

Overview - synopsis

P

Product behavior

R

References

Requirements

   coherency

   error handling

   preconditions

S

Security considerations

System dependencies

   with other systems

   within the system

System errors

System protocols

System use cases - overview

T

Table of protocols

Tracking changes

U

Use cases

V

Versioning

   Microsoft implementations

   overview

Versioning - Microsoft implementations

  • Previous Version Docs
  • Blog
  • Contribute
  • Privacy & Cookies
  • Terms of Use
  • Trademarks
  • © Microsoft 2022

In this article

  • Previous Version Docs
  • Blog
  • Contribute
  • Privacy & Cookies
  • Terms of Use
  • Trademarks
  • © Microsoft 2022