{"id":425499,"date":"2024-10-20T06:57:11","date_gmt":"2024-10-20T06:57:11","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-23-30429577-dc-2023-2\/"},"modified":"2024-10-26T13:06:40","modified_gmt":"2024-10-26T13:06:40","slug":"bsi-23-30429577-dc-2023-2","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-23-30429577-dc-2023-2\/","title":{"rendered":"BSI 23\/30429577 DC 2023"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
7<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | 4 Symbols and abbreviated terms <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 5 Reference Architecture 5.1 General 5.2 Deployment scenarios <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 5.3 Stakeholders 5.3.1 General 5.3.2 Principal <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 5.3.3 Identity management authority 5.3.4 Identity information authority <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 5.3.5 Relying party 5.3.6 Regulatory body 5.3.7 Consumer\/citizen representative or advocate <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 5.4 Actors 5.4.1 General 5.4.2 Principal <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 5.4.3 Identity management authority <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 5.4.4 Identity registration authority <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 5.4.5 Relying party 5.4.6 Identity information authority <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 5.4.7 Identity information provider <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 5.4.8 Verifier <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 5.4.9 Auditor 5.5 Processes and Services 5.5.1 Documentation <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 5.5.2 Identity information management processes <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 5.5.3 Specific identity information management processes <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 5.5.4 Additional functions <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 5.6 Viewpoints 5.6.1 General 5.6.2 Context viewpoint <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 5.6.3 Functional viewpoint 5.7 Use cases 5.7.1 General <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 5.7.2 Principal use cases <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 5.8 Components 5.8.1 General 5.8.2 Principal 5.8.3 Identity register <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 5.9 Compliance and governance 5.10 Physical model 6 Architecture for managing internal identities 6.1 Deployment scenario 6.2 Context <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 6.3 Stakeholders & Concerns <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | 6.4 Use cases 6.4.1 Employee use cases 6.4.2 Employer use cases <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | 7 Architecture for managing external identities 7.1 Deployment scenarios 7.1.1 Service scenario 7.1.2 Federated scenario 7.1.3 Federated scenario as applied to services 7.2 Context <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 7.3 Stakeholders & Concerns <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | 7.4 Use cases 7.4.1 Device use cases 7.4.2 Sharing use cases <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | 8 Requirements for the management of identity information 8.1 General 8.2 Access policy for identity information 8.3 Functional requirements for management of identity information 8.3.1 Policy for identity information life cycle <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | 8.3.2 Conditions and procedure to maintain identity information 8.3.3 Identity information interface 8.3.4 Reference identifier <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | 8.3.5 Identity information quality and compliance 8.3.6 Archiving information 8.3.7 Terminating and deleting identity information <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | 8.4 Non-functional requirements <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | Annex\u20acA (informative) Legal and regulatory aspects <\/td>\n<\/tr>\n | ||||||
44<\/td>\n | Annex\u20acB (informative) Use case model <\/td>\n<\/tr>\n | ||||||
47<\/td>\n | Annex\u20acC (informative) Component model <\/td>\n<\/tr>\n | ||||||
50<\/td>\n | Annex\u20acD (informative) Business Process model <\/td>\n<\/tr>\n | ||||||
55<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" BS ISO\/IEC 24760-2. IT Security and Privacy. A framework for identity management – Part 2. Reference architecture and requirements<\/b><\/p>\n |