Rec. ITU-T X.1254 (09/2020) Entity authentication assurance framework
Summary
History
FOREWORD
Table of Contents
Introduction
1 Scope
2 References
3 Definitions
     3.1 Terms defined elsewhere
     3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Digital authentication process flow
     6.1 General
     6.2 Digital identity assurance
     6.3 Roles
          6.3.1 General
          6.3.2 Online service providers
          6.3.3 Credential service provider
          6.3.4 Identity service provider
          6.3.5 Verifier
          6.3.6 Relying party
          6.3.7 Entities
     6.4 Authentication processes components
          6.4.1 Authenticators
          6.4.2 Authenticator
7 Apply risk management to the authentication assurance framework
     7.1 General
     7.2 Authentication risk
8 Threat categories, risks and controls
     8.1 Assurance levels
     8.2 Authenticator compromise
          8.2.1 Authenticator compromise risks
          8.2.2 Authenticator compromise controls
     8.3 Transaction compromise
          8.3.1 Transaction compromise risks
          8.3.2 Transaction compromise controls
     8.4 Verifier impersonation
          8.4.1 Verifier impersonation risks
          8.4.2 Verifier impersonations controls
     8.5 Subscriber impersonation
          8.5.1 Subscriber impersonation risks
          8.5.2 Subscriber impersonation controls
     8.6 Authentication service compromise, risks and controls
          8.6.1 Authentication service compromise risks
          8.6.2 Authentication service compromise controls
     8.7 Privacy, risks and controls
          8.7.1 Privacy risks
          8.7.2 Privacy controls
Appendix I  An example of strong authentication using [b-ITU-T X.1278]
     I.1 Introduction
     I.2 Threat categories
     I.3 [b-ITU-T X.1278] enables "high-assurance strong authentication"
     I.4 Old authentication with passwords
     I.5 New authentication with [b-ITU-T X.1278]
     I.6 Interoperability and certification
Bibliography
<\pre>