1     Scope         
 2     References              
 3     Definitions 
        3.1     Terms defined elsewhere       
        3.2     Terms defined in this Recommendation           
 4     Abbreviations and acronyms            
 5     Conventions            
 6     IdM overview          
        6.1     General         
        6.2     IdM relationships       
        6.3     Drivers and motivations          
        6.4     Multiple service provider and federated environment 
        6.5     Identity service provider (IdSP)            
        6.6     IdM in the context of NGN architectures and reference models             
 7     IdM objectives        
 8     IdM requirements  
        8.1     General requirements            
        8.2     Identity lifecycle management requirements  
        8.3     Identity management OAM&P functions          
        8.4     Signalling and control functions           
        8.5     Identity management federated identity functions       
        8.6     User/subscriber functions and protection of PII             
        8.7     Security         
Appendix I – General IdM use cases     
        I.1               Introduction       
        I.2               Governments     
        I.3               Business enterprise        
        I.4               End user/subscribers      
Appendix II – IdM use cases for NGN applications     
       II.1     Introduction   
       II.2     Basic use case example           
       II.3     Use of common IdM systems to support multiple application
services (e.g., voice, data, IPTV) within a service provider network     
       II.4     Single sign-on/single sign-off to multiple application services
(e.g., voice, data, and IPTV) within a service provider network     
       II.5     Correlation of distributed identity information for
multi-factor authentication assurance     
       II.6     Enforcement of user control of personally identifiable
information (e.g., preferences) across peer network/service provider domains    
       II.7     Bridging/mapping between heterogeneous IdM systems           
       II.8     Support of converged services (e.g., fixed and mobile access)
within a service provider network     
       II.9     Example use case – User authentication and authorization of NGN
provider (mutual authentication and authorization)     
      II.10     Example use case – Peer user assertion (non-cash transactions)            
      II.11     IdM use case – Assurance of end user device identity and
integrity       
Appendix III – Emergency telecommunications service (ETS) related IdM use
cases     
      III.1     Introduction   
      III.2     Authentication assurance using device and user combination    
      III.3     Enhanced authentication of ETS users for next generation
priority services (priority multimedia services)     
      III.4     Authentication of called party and data communication sources             
      III.5     Trusted identification and authentication of service providers
in a multi-provider environment     
      III.6     Single sign-on and single sign-off         
Appendix IV – Mobile-related use cases     
       IV.1     Introduction  
       IV.2     Use case examples    
Appendix V – Example IdM transaction models     
        V.1     Introduction  
        V.2     Examples of possible identity management transaction models             
Appendix VI – Example illustrative deployment scenario for IdM in NGN     
       VI.1     Introduction  
       VI.2     IdM architecture deployment              
Bibliography