BSI 14/30230396 DC:2014 Edition
$13.70
BS ISO/IEC 24760-2. Information Technology. Security Techniques. A Framework for Identity Management. Part 2. Reference architecture and requirements
Published By | Publication Date | Number of Pages |
BSI | 2014 | 55 |
PDF Catalog
PDF Pages | PDF Title |
---|---|
11 | 1. Scope 2. Normative references 3. Terms and definitions |
14 | 4. Symbols and abbreviated terms |
15 | 5. Reference Architecture 5.1 General 5.2 Architecture elements 5.2.1 Overview 5.2.2 Viewpoints 5.2.2.1 General 5.2.2.2 Context viewpoint |
16 | 5.2.2.3 Functional viewpoint 5.3 Context view 5.3.1 Stakeholders 5.3.1.1 General 5.3.1.2 Principal |
17 | 5.3.1.3 Identity management authority 5.3.1.4 Identity information authority 5.3.1.5 Relying party 5.3.1.6 Regulatory body |
18 | 5.3.1.7 Consumer advocate 5.3.1.8 Consumer (and citizen) representative 5.3.1.9 Auditor 5.3.2 Actors 5.3.2.1 General |
19 | 5.3.2.2 Principal 5.3.2.3 Identity management authority |
20 | 5.3.2.4 Identity registration authority 5.3.2.5 Relying party |
21 | 5.3.2.6 Identity information authority 5.3.2.7 Identity information provider |
22 | 5.3.2.8 Verifier |
23 | 5.3.2.9 Auditor 5.3.3 Context model |
24 | 5.3.4 Use case model 5.3.4.1 General |
25 | 5.3.4.2 Employee use cases 5.3.4.3 Employer use cases 5.3.4.4 Consumer use cases 5.3.4.5 Device use cases 5.3.5 Compliance and governance model |
26 | 5.4 Functional view 5.4.1 Component model 5.4.1.1 General 5.4.1.2 Deployment 5.4.1.3 Principal 5.4.1.4 Identity register |
27 | 5.4.2 Processes and services 5.4.2.1 Diagrams 5.4.2.1 Identity information flow 5.4.2.2 Identity information management processes 5.4.2.2.1 General |
28 | 5.4.2.2.2 Identity information maintenance 5.4.2.2.3 Identity information processing 5.4.2.2.4 Granting identity processing access 5.4.2.3 Specific identity management processes 5.4.2.3.1 General |
29 | 5.4.2.3.2 Auditing 5.4.2.3.3 Generating reference identifiers 5.4.2.3.4 Invalidation |
30 | 5.4.2.4 Additional functions 5.4.2.4.1 General |
31 | 5.4.2.4.2 Identity information profile service 5.4.2.4.3 Privacy consent service 5.4.2.4.4 Identity information authority discovery service 5.4.2.4.5 Publication service |
32 | 5.4.3 Physical model 5.5 Identity management scenarios 5.5.1 General 5.5.2 Enterprise scenario |
33 | 5.5.3 Federated scenario 5.5.4 Service scenario 5.5.5 Heterogeneous scenario 6. Requirements 6.1 General |
34 | 6.2 Access policy for identity information 6.3 Functional requirements for management of identity information 6.3.1 Policy for identity information life cycle 6.3.2 Conditions and procedure to maintain identity information |
35 | 6.3.3 Identity information presentation 6.3.4 Reference identifier |
36 | 6.3.5 Identity information quality and compliance 6.3.6 Archiving information |
37 | 6.3.7 Terminating and deleting identity information 6.4 Non functional requirements |
39 | Legal and regulatory aspects (Informative) |
40 | Use case model (Informative) |
43 | Component model (Informative) A.1 Model |
44 | A.2 UML legend |
46 | Business Process model (Informative) A.3 General A.4 Consent management. |
48 | A.5 Credential lifecycle management |
49 | A.6 Configuration Data Management |
50 | A.7 Policy Management |
51 | A.8 Principal’s Life Cycle Management |