Table of Contents

 1     Scope          
 2     References 
 3     Definitions 
        3.1     Terms defined elsewhere           
        3.2     Terms defined in this Recommendation 
 4     Abbreviations and acronyms
 5     Conventions             
 6     Types of combined authentication     
 7     Authentication models on multiple IdSP environments
        7.1     Basic models with regard to service provider       
        7.2     Entity authentication life cycle model    
 8     Operations in multiple IdSP environments       
        8.1     Credential management operations         
        8.2     Usage operations of credentials
        8.3     Management operations of trust relationships with service providers          
 9     General framework of combined authentication on multiple identity service provider environments    
        9.1     Logical components     
        9.2     Behaviours     
Annex A – Considerations for combined authentication    
        A.1     Achieving estimated authentication assurance    
        A.2     Selection of IdSP(s)     
        A.3     Effective authentication assurance         
        A.4     Security considerations for multifactor authentication     
        A.5     Security considerations for multi-method authentication
        A.6     Security considerations for multiple authentication          
Appendix I – Relationship with related standards    
        I.1     Relationship with [ITU-T X.1141]           
        I.2     Relationship with [ITU-T X.1254]           
Bibliography