1
Scope
2
References
3
Definitions
3.1 Terms
defined elsewhere
3.2 Terms
defined in this Recommendation
4
Abbreviations and acronyms
5
Conventions
6
Conceptual Models
6.1 Trust
Elevation Core Model
6.2 Trust
Elevation Concepts
6.3 Use of
Authorization Architectures and Models
7
Architecture & Design
7.1 Trust
Elevation System Context
7.2 Assumptions
for Trust Elevation Systems
7.3 Architecture
& Design Factors
7.4 Trust
Elevation Architecture Components
7.5 Other
Architecture Components
8
Implementation Considerations
8.1 Orchestration
8.2 Enumeration
of Authentication Methods
8.3 User
Enrolment
9
Trust Elevation Sequence, Metadata and Assertions and Conformance
Appendix I – Trust Elevation Sequence (Example)
I.1 Use
Case: Online banking transactions
Appendix II – Metadata and Assertions
II.1 Component-Component
Communications
II.2 PDP to
TE Method Determiner Request
II.3 TE
Method Determiner to PDP Response
Appendix III – Conformance
Appendix IV – State Models for Assurance Level Evaluation
IV.1 Evaluation
of Assurance Requirements at Transaction Time