{"id":349206,"date":"2024-10-20T00:35:26","date_gmt":"2024-10-20T00:35:26","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-14-30230396-dc\/"},"modified":"2024-10-26T00:14:56","modified_gmt":"2024-10-26T00:14:56","slug":"bsi-14-30230396-dc","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-14-30230396-dc\/","title":{"rendered":"BSI 14\/30230396 DC"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
11<\/td>\n | 1. Scope 2. Normative references 3. Terms and definitions <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 4. Symbols and abbreviated terms <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 5. Reference Architecture 5.1 General 5.2 Architecture elements 5.2.1 Overview 5.2.2 Viewpoints 5.2.2.1 General 5.2.2.2 Context viewpoint <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 5.2.2.3 Functional viewpoint 5.3 Context view 5.3.1 Stakeholders 5.3.1.1 General 5.3.1.2 Principal <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 5.3.1.3 Identity management authority 5.3.1.4 Identity information authority 5.3.1.5 Relying party 5.3.1.6 Regulatory body <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 5.3.1.7 Consumer advocate 5.3.1.8 Consumer (and citizen) representative 5.3.1.9 Auditor 5.3.2 Actors 5.3.2.1 General <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 5.3.2.2 Principal 5.3.2.3 Identity management authority <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 5.3.2.4 Identity registration authority 5.3.2.5 Relying party <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 5.3.2.6 Identity information authority 5.3.2.7 Identity information provider <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 5.3.2.8 Verifier <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 5.3.2.9 Auditor 5.3.3 Context model <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 5.3.4 Use case model 5.3.4.1 General <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 5.3.4.2 Employee use cases 5.3.4.3 Employer use cases 5.3.4.4 Consumer use cases 5.3.4.5 Device use cases 5.3.5 Compliance and governance model <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 5.4 Functional view 5.4.1 Component model 5.4.1.1 General 5.4.1.2 Deployment 5.4.1.3 Principal 5.4.1.4 Identity register <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 5.4.2 Processes and services 5.4.2.1 Diagrams 5.4.2.1 Identity information flow 5.4.2.2 Identity information management processes 5.4.2.2.1 General <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 5.4.2.2.2 Identity information maintenance 5.4.2.2.3 Identity information processing 5.4.2.2.4 Granting identity processing access 5.4.2.3 Specific identity management processes 5.4.2.3.1 General <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 5.4.2.3.2 Auditing 5.4.2.3.3 Generating reference identifiers 5.4.2.3.4 Invalidation <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 5.4.2.4 Additional functions 5.4.2.4.1 General <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 5.4.2.4.2 Identity information profile service 5.4.2.4.3 Privacy consent service 5.4.2.4.4 Identity information authority discovery service 5.4.2.4.5 Publication service <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 5.4.3 Physical model 5.5 Identity management scenarios 5.5.1 General 5.5.2 Enterprise scenario <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 5.5.3 Federated scenario 5.5.4 Service scenario 5.5.5 Heterogeneous scenario 6. Requirements 6.1 General <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | 6.2 Access policy for identity information 6.3 Functional requirements for management of identity information 6.3.1 Policy for identity information life cycle 6.3.2 Conditions and procedure to maintain identity information <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | 6.3.3 Identity information presentation 6.3.4 Reference identifier <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 6.3.5 Identity information quality and compliance 6.3.6 Archiving information <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | 6.3.7 Terminating and deleting identity information 6.4 Non functional requirements <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | Legal and regulatory aspects (Informative) <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | Use case model (Informative) <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | Component model (Informative) A.1 Model <\/td>\n<\/tr>\n | ||||||
44<\/td>\n | A.2 UML legend <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | Business Process model (Informative) A.3 General A.4 Consent management. <\/td>\n<\/tr>\n | ||||||
48<\/td>\n | A.5 Credential lifecycle management <\/td>\n<\/tr>\n | ||||||
49<\/td>\n | A.6 Configuration Data Management <\/td>\n<\/tr>\n | ||||||
50<\/td>\n | A.7 Policy Management <\/td>\n<\/tr>\n | ||||||
51<\/td>\n | A.8 Principal\u2019s Life Cycle Management <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" BS ISO\/IEC 24760-2. Information Technology. Security Techniques. A Framework for Identity Management. Part 2. Reference architecture and requirements<\/b><\/p>\n |