{"id":349206,"date":"2024-10-20T00:35:26","date_gmt":"2024-10-20T00:35:26","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-14-30230396-dc\/"},"modified":"2024-10-26T00:14:56","modified_gmt":"2024-10-26T00:14:56","slug":"bsi-14-30230396-dc","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-14-30230396-dc\/","title":{"rendered":"BSI 14\/30230396 DC"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
11<\/td>\n1. Scope
2. Normative references
3. Terms and definitions <\/td>\n<\/tr>\n
14<\/td>\n4. Symbols and abbreviated terms <\/td>\n<\/tr>\n
15<\/td>\n5. Reference Architecture
5.1 General
5.2 Architecture elements
5.2.1 Overview
5.2.2 Viewpoints
5.2.2.1 General
5.2.2.2 Context viewpoint <\/td>\n<\/tr>\n
16<\/td>\n5.2.2.3 Functional viewpoint
5.3 Context view
5.3.1 Stakeholders
5.3.1.1 General
5.3.1.2 Principal <\/td>\n<\/tr>\n
17<\/td>\n5.3.1.3 Identity management authority
5.3.1.4 Identity information authority
5.3.1.5 Relying party
5.3.1.6 Regulatory body <\/td>\n<\/tr>\n
18<\/td>\n5.3.1.7 Consumer advocate
5.3.1.8 Consumer (and citizen) representative
5.3.1.9 Auditor
5.3.2 Actors
5.3.2.1 General <\/td>\n<\/tr>\n
19<\/td>\n5.3.2.2 Principal
5.3.2.3 Identity management authority <\/td>\n<\/tr>\n
20<\/td>\n5.3.2.4 Identity registration authority
5.3.2.5 Relying party <\/td>\n<\/tr>\n
21<\/td>\n5.3.2.6 Identity information authority
5.3.2.7 Identity information provider <\/td>\n<\/tr>\n
22<\/td>\n5.3.2.8 Verifier <\/td>\n<\/tr>\n
23<\/td>\n5.3.2.9 Auditor
5.3.3 Context model <\/td>\n<\/tr>\n
24<\/td>\n5.3.4 Use case model
5.3.4.1 General <\/td>\n<\/tr>\n
25<\/td>\n5.3.4.2 Employee use cases
5.3.4.3 Employer use cases
5.3.4.4 Consumer use cases
5.3.4.5 Device use cases
5.3.5 Compliance and governance model <\/td>\n<\/tr>\n
26<\/td>\n5.4 Functional view
5.4.1 Component model
5.4.1.1 General
5.4.1.2 Deployment
5.4.1.3 Principal
5.4.1.4 Identity register <\/td>\n<\/tr>\n
27<\/td>\n5.4.2 Processes and services
5.4.2.1 Diagrams
5.4.2.1 Identity information flow
5.4.2.2 Identity information management processes
5.4.2.2.1 General <\/td>\n<\/tr>\n
28<\/td>\n5.4.2.2.2 Identity information maintenance
5.4.2.2.3 Identity information processing
5.4.2.2.4 Granting identity processing access
5.4.2.3 Specific identity management processes
5.4.2.3.1 General <\/td>\n<\/tr>\n
29<\/td>\n5.4.2.3.2 Auditing
5.4.2.3.3 Generating reference identifiers
5.4.2.3.4 Invalidation <\/td>\n<\/tr>\n
30<\/td>\n5.4.2.4 Additional functions
5.4.2.4.1 General <\/td>\n<\/tr>\n
31<\/td>\n5.4.2.4.2 Identity information profile service
5.4.2.4.3 Privacy consent service
5.4.2.4.4 Identity information authority discovery service
5.4.2.4.5 Publication service <\/td>\n<\/tr>\n
32<\/td>\n5.4.3 Physical model
5.5 Identity management scenarios
5.5.1 General
5.5.2 Enterprise scenario <\/td>\n<\/tr>\n
33<\/td>\n5.5.3 Federated scenario
5.5.4 Service scenario
5.5.5 Heterogeneous scenario
6. Requirements
6.1 General <\/td>\n<\/tr>\n
34<\/td>\n6.2 Access policy for identity information
6.3 Functional requirements for management of identity information
6.3.1 Policy for identity information life cycle
6.3.2 Conditions and procedure to maintain identity information <\/td>\n<\/tr>\n
35<\/td>\n6.3.3 Identity information presentation
6.3.4 Reference identifier <\/td>\n<\/tr>\n
36<\/td>\n6.3.5 Identity information quality and compliance
6.3.6 Archiving information <\/td>\n<\/tr>\n
37<\/td>\n6.3.7 Terminating and deleting identity information
6.4 Non functional requirements <\/td>\n<\/tr>\n
39<\/td>\nLegal and regulatory aspects (Informative) <\/td>\n<\/tr>\n
40<\/td>\nUse case model (Informative) <\/td>\n<\/tr>\n
43<\/td>\nComponent model (Informative)
A.1 Model <\/td>\n<\/tr>\n
44<\/td>\nA.2 UML legend <\/td>\n<\/tr>\n
46<\/td>\nBusiness Process model (Informative)
A.3 General
A.4 Consent management. <\/td>\n<\/tr>\n
48<\/td>\nA.5 Credential lifecycle management <\/td>\n<\/tr>\n
49<\/td>\nA.6 Configuration Data Management <\/td>\n<\/tr>\n
50<\/td>\nA.7 Policy Management <\/td>\n<\/tr>\n
51<\/td>\nA.8 Principal\u2019s Life Cycle Management <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

BS ISO\/IEC 24760-2. Information Technology. Security Techniques. A Framework for Identity Management. Part 2. Reference architecture and requirements<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2014<\/td>\n55<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":349209,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-349206","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/349206","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/349209"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=349206"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=349206"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=349206"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}