Table of Contents

 1     Scope          
 2     References
 3     Definitions 
        3.1     Terms defined elsewhere        
        3.2     Terms defined in this Recommendation            
 4     Abbreviations and acronyms             
 5     Conventions             
 6     General      
 7     Architectures and flows for attribute aggregation methods
        7.1     Identity service provider-mediated methods  
        7.2     Service provider-mediated methods  
        7.3     Entity-mediated method          
 8     Comparison of the aggregated authentication methods       
Bibliography