Baseline identity management terms and definitions |
 |
Recommendation ITU-T X.1252 provides definitions of key terms used in identity management (IdM). The terms are drawn from many sources but all are believed to be in common use in IdM work. This Recommendation is not intended to be a huge compendium of IdM-related terms. Instead, the terms defined here are limited to those considered to constitute a baseline list of the most important and commonly-used IdM-specific terms. This Recommendation includes Annex A that explains the rationale for some of these key terms.One of the main objectives of this Recommendation is to promote a common understanding of these terms among the groups currently developing (or planning to develop) IdM-related standards. The definitions are constructed so that, as far as possible, they are independent of implementations or specific context and, therefore, should be suitable as baseline definitions for any IdM work. It is acknowledged that, in some instances and contexts, greater detail may be required for a particular term, in which case, elaboration of the baseline definition may be considered. |
|
Citation: |
https://handle.itu.int/11.1002/1000/10440 |
Series title: |
X series: Data networks, open system communications and security X.1200-X.1299: Cyberspace security X.1250-X.1299: Identity management (IdM) and Authentication |
Approval date: |
2010-04-16 |
Provisional name: | X.idmdef |
Approval process: | TAP |
Status: |
Superseded |
Maintenance responsibility: |
ITU-T Study Group 17 |
Further details: |
Patent statement(s)
Development history
|
|
|
|
ITU-T Supplement
|
Title
|
Status
|
Summary
|
Table of contents
|
Download
|
X Suppl. 7 (02/2009)
|
ITU-T X.1250 series – Supplement on overview of identity management in the context of cybersecurity
|
In force
|
here
|
here
|
here
|
Title |
Approved on |
Download |
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Unified Security Model (USM) – A neutral integrated system approach to cybersecurity
|
2020
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
|