BSI 23/30429577 DC 2023
$13.70
BS ISO/IEC 24760-2. IT Security and Privacy. A framework for identity management – Part 2. Reference architecture and requirements
Published By | Publication Date | Number of Pages |
BSI | 2023 | 55 |
PDF Catalog
PDF Pages | PDF Title |
---|---|
7 | Foreword |
8 | Introduction |
9 | 1 Scope 2 Normative references 3 Terms and definitions |
10 | 4 Symbols and abbreviated terms |
11 | 5 Reference Architecture 5.1 General 5.2 Deployment scenarios |
12 | 5.3 Stakeholders 5.3.1 General 5.3.2 Principal |
13 | 5.3.3 Identity management authority 5.3.4 Identity information authority |
14 | 5.3.5 Relying party 5.3.6 Regulatory body 5.3.7 Consumer/citizen representative or advocate |
15 | 5.4 Actors 5.4.1 General 5.4.2 Principal |
16 | 5.4.3 Identity management authority |
17 | 5.4.4 Identity registration authority |
18 | 5.4.5 Relying party 5.4.6 Identity information authority |
19 | 5.4.7 Identity information provider |
20 | 5.4.8 Verifier |
21 | 5.4.9 Auditor 5.5 Processes and Services 5.5.1 Documentation |
22 | 5.5.2 Identity information management processes |
23 | 5.5.3 Specific identity information management processes |
26 | 5.5.4 Additional functions |
28 | 5.6 Viewpoints 5.6.1 General 5.6.2 Context viewpoint |
29 | 5.6.3 Functional viewpoint 5.7 Use cases 5.7.1 General |
30 | 5.7.2 Principal use cases |
31 | 5.8 Components 5.8.1 General 5.8.2 Principal 5.8.3 Identity register |
32 | 5.9 Compliance and governance 5.10 Physical model 6 Architecture for managing internal identities 6.1 Deployment scenario 6.2 Context |
33 | 6.3 Stakeholders & Concerns |
34 | 6.4 Use cases 6.4.1 Employee use cases 6.4.2 Employer use cases |
35 | 7 Architecture for managing external identities 7.1 Deployment scenarios 7.1.1 Service scenario 7.1.2 Federated scenario 7.1.3 Federated scenario as applied to services 7.2 Context |
36 | 7.3 Stakeholders & Concerns |
37 | 7.4 Use cases 7.4.1 Device use cases 7.4.2 Sharing use cases |
38 | 8 Requirements for the management of identity information 8.1 General 8.2 Access policy for identity information 8.3 Functional requirements for management of identity information 8.3.1 Policy for identity information life cycle |
39 | 8.3.2 Conditions and procedure to maintain identity information 8.3.3 Identity information interface 8.3.4 Reference identifier |
41 | 8.3.5 Identity information quality and compliance 8.3.6 Archiving information 8.3.7 Terminating and deleting identity information |
42 | 8.4 Non-functional requirements |
43 | Annex€A (informative) Legal and regulatory aspects |
44 | Annex€B (informative) Use case model |
47 | Annex€C (informative) Component model |
50 | Annex€D (informative) Business Process model |
55 | Bibliography |