1 Scope
2 References
3 Definitions
3.1 Terms defined elsewhere
3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 IdM overview
6.1 General
6.2 IdM relationships
6.3 Drivers and motivations
6.4 Multiple service provider and federated environment
6.5 Identity service provider (IdSP)
6.6 IdM in the context of NGN architectures and reference models
7 IdM objectives
8 IdM requirements
8.1 General requirements
8.2 Identity lifecycle management requirements
8.3 Identity management OAM&P functions
8.4 Signalling and control functions
8.5 Identity management federated identity functions
8.6 User/subscriber functions and protection of PII
8.7 Security
Appendix I – General IdM use cases
I.1 Introduction
I.2 Governments
I.3 Business enterprise
I.4 End user/subscribers
Appendix II – IdM use cases for NGN applications
II.1 Introduction
II.2 Basic use case example
II.3 Use of common IdM systems to support multiple application
services (e.g., voice, data, IPTV) within a service provider network
II.4 Single sign-on/single sign-off to multiple application services
(e.g., voice, data, and IPTV) within a service provider network
II.5 Correlation of distributed identity information for
multi-factor authentication assurance
II.6 Enforcement of user control of personally identifiable
information (e.g., preferences) across peer network/service provider domains
II.7 Bridging/mapping between heterogeneous IdM systems
II.8 Support of converged services (e.g., fixed and mobile access)
within a service provider network
II.9 Example use case – User authentication and authorization of NGN
provider (mutual authentication and authorization)
II.10 Example use case – Peer user assertion (non-cash transactions)
II.11 IdM use case – Assurance of end user device identity and
integrity
Appendix III – Emergency telecommunications service (ETS) related IdM use
cases
III.1 Introduction
III.2 Authentication assurance using device and user combination
III.3 Enhanced authentication of ETS users for next generation
priority services (priority multimedia services)
III.4 Authentication of called party and data communication sources
III.5 Trusted identification and authentication of service providers
in a multi-provider environment
III.6 Single sign-on and single sign-off
Appendix IV – Mobile-related use cases
IV.1 Introduction
IV.2 Use case examples
Appendix V – Example IdM transaction models
V.1 Introduction
V.2 Examples of possible identity management transaction models
Appendix VI – Example illustrative deployment scenario for IdM in NGN
VI.1 Introduction
VI.2 IdM architecture deployment
Bibliography