{"id":424431,"date":"2024-10-20T06:51:42","date_gmt":"2024-10-20T06:51:42","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-iso-iec-24760-12022-tc\/"},"modified":"2024-10-26T12:53:55","modified_gmt":"2024-10-26T12:53:55","slug":"bs-en-iso-iec-24760-12022-tc","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-iso-iec-24760-12022-tc\/","title":{"rendered":"BS EN ISO\/IEC 24760-1:2022 – TC"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
1<\/td>\n | 30469331 <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | A-30448062 <\/td>\n<\/tr>\n | ||||||
44<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | European foreword Endorsement notice <\/td>\n<\/tr>\n | ||||||
48<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
49<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
51<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions 3.1 General terms <\/td>\n<\/tr>\n | ||||||
53<\/td>\n | 3.2 Identification 3.3 Authenticating identity information <\/td>\n<\/tr>\n | ||||||
55<\/td>\n | 3.4 Management of identity <\/td>\n<\/tr>\n | ||||||
57<\/td>\n | 3.5 Federation 3.6 Privacy protection <\/td>\n<\/tr>\n | ||||||
58<\/td>\n | 4 Symbols and abbreviated terms 5 Identity 5.1 General <\/td>\n<\/tr>\n | ||||||
59<\/td>\n | 5.2 Identity information <\/td>\n<\/tr>\n | ||||||
60<\/td>\n | 5.3 Identifier 5.4 Credential 5.4.1 General <\/td>\n<\/tr>\n | ||||||
61<\/td>\n | 5.4.2 Credential management 6 Attributes 6.1 General <\/td>\n<\/tr>\n | ||||||
62<\/td>\n | 6.2 Types of attribute <\/td>\n<\/tr>\n | ||||||
63<\/td>\n | 6.3 Domain of origin 7 Managing identity information 7.1 General <\/td>\n<\/tr>\n | ||||||
64<\/td>\n | 7.2 Identity lifecycle <\/td>\n<\/tr>\n | ||||||
65<\/td>\n | 8 Identification 8.1 General <\/td>\n<\/tr>\n | ||||||
66<\/td>\n | 8.2 Verification <\/td>\n<\/tr>\n | ||||||
67<\/td>\n | 8.3 Enrolment 8.4 Registration 8.5 Identity proofing 8.5.1 General <\/td>\n<\/tr>\n | ||||||
68<\/td>\n | 8.5.2 Identity evidence 9 Authentication <\/td>\n<\/tr>\n | ||||||
69<\/td>\n | 10 Maintenance 11 Implementation aspects 12 Privacy <\/td>\n<\/tr>\n | ||||||
71<\/td>\n | Bibliography <\/td>\n<\/tr>\n | ||||||
73<\/td>\n | Index of terms <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Tracked Changes. IT Security and Privacy. A framework for identity management – Terminology and concepts<\/b><\/p>\n |