CONTENTS

 1     Scope        
 2     References             
 3     Definitions
        3.1     Terms defined elsewhere      
        3.2     Terms defined in this Recommendation          
 4     Abbreviations and acronyms           
 5     Conventions           
 6     IdM overview         
        6.1     General        
        6.2     IdM relationships      
        6.3     Drivers and motivations         
        6.4     Multiple service provider and federated environment
        6.5     Identity service provider (IdSP)           
        6.6     IdM in the context of NGN architectures and reference models            
 7     IdM objectives       
 8     IdM requirements 
        8.1     General requirements           
        8.2     Identity lifecycle management requirements 
        8.3     Identity management OAM&P functions         
        8.4     Signalling and control functions          
        8.5     Identity management federated identity functions      
        8.6     User/subscriber functions and protection of PII            
        8.7     Security        
Appendix I – General IdM use cases    
        I.1               Introduction      
        I.2               Governments    
        I.3               Business enterprise       
        I.4               End user/subscribers     
Appendix II – IdM use cases for NGN applications    
       II.1     Introduction  
       II.2     Basic use case example          
       II.3     Use of common IdM systems to support multiple application services (e.g., voice, data, IPTV) within a service provider network    
       II.4     Single sign-on/single sign-off to multiple application services (e.g., voice, data, and IPTV) within a service provider network    
       II.5     Correlation of distributed identity information for multi-factor authentication assurance    
       II.6     Enforcement of user control of personally identifiable information (e.g., preferences) across peer network/service provider domains    
       II.7     Bridging/mapping between heterogeneous IdM systems          
       II.8     Support of converged services (e.g., fixed and mobile access) within a service provider network    
       II.9     Example use case – User authentication and authorization of NGN provider (mutual authentication and authorization)    
      II.10     Example use case – Peer user assertion (non-cash transactions)           
      II.11     IdM use case – Assurance of end user device identity and integrity      
Appendix III – Emergency telecommunications service (ETS) related IdM use cases    
      III.1     Introduction  
      III.2     Authentication assurance using device and user combination   
      III.3     Enhanced authentication of ETS users for next generation priority services (priority multimedia services)    
      III.4     Authentication of called party and data communication sources            
      III.5     Trusted identification and authentication of service providers in a multi-provider environment    
      III.6     Single sign-on and single sign-off        
Appendix IV – Mobile-related use cases    
       IV.1     Introduction 
       IV.2     Use case examples   
Appendix V – Example IdM transaction models    
        V.1     Introduction 
        V.2     Examples of possible identity management transaction models            
Appendix VI – Example illustrative deployment scenario for IdM in NGN    
       VI.1     Introduction 
       VI.2     IdM architecture deployment             
Bibliography