Guidelines and framework for sharing network authentication results with service applications |
|
With the surge of mobile devices and applications accessing the Internet, the network and the service environment are becoming increasingly complicated. As a result, there is a pressing need to simplify the user authentication mechanism to improve user experience and service quality.
Many standardization organizations including ITU-T have conducted a lot of research work on the unified authentication mechanism (i.e., single sign-on). However, all the current work is basically focused on unified authentication among the service applications, without considering the relationship with the network authentication.
From the network operator's perspective, users undergo some forms of network authentication when they access the network, however, when they log in again to request access to a service their initial network authentication is not reused anymore. When adopting an authentication results sharing mechanism between the service and the network, the service applications can identify a user by using the authentication results from the network. Such mechanism allows a user to be authenticated only once by the network and directly gain access to the service.
Recommendation ITU-T X.1256 develops guidelines for network operators and service providers to share network authentication results, and provides a framework for sharing minimum attributes across multiple services within an established trust relationship. |
|
Citation: |
https://handle.itu.int/11.1002/1000/12605 |
Series title: |
X series: Data networks, open system communications and security X.1200-X.1299: Cyberspace security X.1250-X.1299: Identity management (IdM) and Authentication |
Approval date: |
2016-03-23 |
Provisional name: | X.authi |
Approval process: | TAP |
Status: |
In force |
Maintenance responsibility: |
ITU-T Study Group 17 |
Further details: |
Patent statement(s)
Development history
|
|
|
Ed. |
ITU-T Recommendation |
Status |
Summary |
Table of Contents |
Download |
1
|
X.1256 (03/2016)
|
In force
|
here
|
here
|
here
|
|
ITU-T Supplement
|
Title
|
Status
|
Summary
|
Table of contents
|
Download
|
X Suppl. 7 (02/2009)
|
ITU-T X.1250 series – Supplement on overview of identity management in the context of cybersecurity
|
In force
|
here
|
here
|
here
|
Title |
Approved on |
Download |
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Unified Security Model (USM) – A neutral integrated system approach to cybersecurity
|
2020
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
|