1
Scope
2
References
3
Definitions
3.1
Terms defined elsewhere
3.2
Terms defined in this Recommendation
4
Abbreviations and acronyms
5
Conventions
6
Types of combined authentication
7
Authentication models on multiple IdSP environments
7.1
Basic models with regard to service provider
7.2
Entity authentication life cycle model
8
Operations in multiple IdSP environments
8.1
Credential management operations
8.2
Usage operations of credentials
8.3
Management operations of trust relationships with service providers
9
General framework of combined authentication on multiple identity
service provider environments
9.1
Logical components
9.2
Behaviours
Annex A – Considerations for combined authentication
A.1
Achieving estimated authentication assurance
A.2
Selection of IdSP(s)
A.3
Effective authentication assurance
A.4
Security considerations for multifactor authentication
A.5
Security considerations for multi-method authentication
A.6
Security considerations for multiple authentication
Appendix I – Relationship with related standards
I.1
Relationship with [ITU-T X.1141]
I.2
Relationship with [ITU-T X.1254]
Bibliography