IT Security and Privacy — A framework for identity management — Part 1: Terminology and concepts — Amendment 1

Sécurité IT et confidentialité — Cadre pour la gestion de l'identité — Partie 1: Terminologie et concepts — Amendement 1

General Information

Status
Published
Publication Date
08-Jan-2023
Current Stage
6060 - International Standard published
Start Date
09-Jan-2023
Due Date
24-May-2023
Completion Date
09-Jan-2023
Ref Project

Relations

Buy Standard

Standard
ISO/IEC 24760-1:2019/Amd 1:2023 - IT Security and Privacy — A framework for identity management — Part 1: Terminology and concepts — Amendment 1 Released:9. 01. 2023
English language
4 pages
sale 15% off
Preview
sale 15% off
Preview
Draft
REDLINE ISO/IEC 24760-1:2019/PRF Amd 1 - IT Security and Privacy — A framework for identity management — Part 1: Terminology and concepts — Amendment 1 Released:10. 11. 2022
English language
4 pages
sale 15% off
Preview
sale 15% off
Preview
Draft
ISO/IEC 24760-1:2019/PRF Amd 1 - IT Security and Privacy — A framework for identity management — Part 1: Terminology and concepts — Amendment 1 Released:10. 11. 2022
English language
4 pages
sale 15% off
Preview
sale 15% off
Preview

Standards Content (Sample)

INTERNATIONAL ISO/IEC
STANDARD 24760-1
Second edition
2019-05
AMENDMENT 1
2023-01
IT Security and Privacy —
A framework for identity
management —
Part 1:
Terminology and concepts
AMENDMENT 1
Reference number
ISO/IEC 24760-1:2019/Amd. 1:2023(E)
© ISO/IEC 2023

---------------------- Page: 1 ----------------------
ISO/IEC 24760-1:2019/Amd. 1:2023(E)
COPYRIGHT PROTECTED DOCUMENT
© ISO/IEC 2023
All rights reserved. Unless otherwise specified, or required in the context of its implementation, no part of this publication may
be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting on
the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address below
or ISO’s member body in the country of the requester.
ISO copyright office
CP 401 • Ch. de Blandonnet 8
CH-1214 Vernier, Geneva
Phone: +41 22 749 01 11
Email: copyright@iso.org
Website: www.iso.org
Published in Switzerland
ii
  © ISO/IEC 2023 – All rights reserved

---------------------- Page: 2 ----------------------
ISO/IEC 24760-1:2019/Amd. 1:2023(E)
Foreword
ISO (the International Organization for Standardization) and IEC (the International Electrotechnical
Commission) form the specialized system for worldwide standardization. National bodies that are
members of ISO or IEC participate in the development of International Standards through technical
committees established by the respective organization to deal with particular fields of technical
activity. ISO and IEC technical committees collaborate in fields of mutual interest. Other international
organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the
work.
The procedures used to develop this document and those intended for its further maintenance
are described in the ISO/IEC Directives, Part 1. In particular, the different approval criteria
needed for the different types of document should be noted. This document was drafted in
accordance with the editorial rules of the ISO/IEC Directives, Part 2 (see www.iso.org/directives or
www.iec.ch/members_experts/refdocs).
Attention is drawn to the possibility that some of the elements of this document may be the subject
of patent rights. ISO and IEC shall not be held responsible for identifying any or all such patent
rights. Details of any patent rights identified during the development of the document will be in the
Introduction and/or on the ISO list of patent declarations received (see www.iso.org/patents) or the IEC
list of patent declarations received (see https://patents.iec.ch).
Any trade name used in this document is information given for the convenience of users and does not
constitute an endorsement.
For an explanation of the voluntary nature of standards, the meaning of ISO specific terms and
expressions related to conformity assessment, as well as information about ISO's adherence to
the World Trade Organization (WTO) principles in the Technical Barriers to Trade (TBT) see
www.iso.org/iso/foreword.html. In the IEC, see www.iec.ch/understanding-standards.
This document was prepared by Joint Technical Committee ISO/IEC JTC 1, Information technology,
Subcommittee SC 27, Information security, cybersecurity and privacy protection.
A list of all parts in the ISO/IEC 24760 series can be found on the ISO and IEC websites.
Any feedback or questions on this document should be directed to the user’s national standards
body. A complete listing of these bodies can be found at www.iso.org/members.html and
www.iec.ch/national-committees.
iii
© ISO/IEC 2023 – All rights reserved

---------------------- Page: 3 ----------------------
ISO/IEC 24760-1:2019/Amd. 1:2023(E)
IT Security and Privacy — A framework for identity
management —
Part 1:
Terminology and concepts
AMENDMENT 1

3.1
Add the following two entries:
3.1.8
readily-verifiable identifier
identifier with a value which is constructed to be easily verified as valid and as referring to a known
entity
EXAMPLE The result of solving a cryptographic puzzle with its input can easily be validated as correct,
functioning as digital signature on that input.
Note 1 to entry: A readily verifiable identifier can be used as an authenticator.
3.1.9
authoritative identifier
unique identifier referring to an entity, known in a well-trusted domain of origin
Note 1 to entry: An authoritative identifier is typically managed by a well-known organization, e.g. a government.

3.2
Add the following term:
3.2.5
access token
trusted object encapsulating the authority for a principal to access a resource
Note 1 to entry: An access token can be obtained in the result of an authentication.
Note 2 to entry: An access token may contain access permission information for a subject to access the resource
and identifying information for the authority of the authorization decision.
Note 3 to entry: An access token may contain information that enables its integrity to be validated.
Note 4 to entry: An access token may take a physical or a virtual form.
[SOURCE: ISO/IEC 29146:2016, 3.3, modified —replaced the word 'subject' by 'principal', and replaced
Note 1 to entry.]

1
© ISO/IEC 2023 – All rights reserved

---------------------- Page: 4 ----------------------
ISO/IEC 24760-1:2019/Amd. 1:2023(E)
3.3
Add the following entries:
3.3.9
authentication factor
distinguishing feature of an authenticator to characterise its use in authentication
Note 1 to entry: Four different authentication factors can be recognized:
— cognition factor, any credential that is formed by something that the principal knows and can reproduce
(exclusively): a personal secret;
— possession factor, any credential that is formed by something that the principal possesses, e.g. an authenticator;
— inherent factor, any credential that is formed by a description of something that is inherent to the physical
existence of the principal, e.g. a biometric characteristic such as fingerprint, facial image, or 1, iris pattern;
— behaviour factor, any credential that is formed by a description of something that the principal typically
does, e.g. a behaviour pattern.
3.3.10
multi-factor authentication
authentication in which multiple authenticators are used of two or more authentication factors
Note 1 to entry: If two or more authenticators are being used in authentication that have the same authentication
factor, they should have been issued by different credential issuers.
Note 2 to entry: Using multiple authenticators (that differ in authentication factor can enhance the security of the
authentication as that could prompt the principal to act differently with each of them.
[SOURCE: ISO/IEC 19790:2012, 3.74, modified — definition and notes revised to match terminology
context.]
3.3.11
authenticator
repr
...

Date: 2022-08-2511-04 Style Definition: IneraTableMultiPar: Font: Bold, Font color:
Black, French (Switzerland), Tab stops: Not at 19.85 pt +
39.7 pt + 59.55 pt + 79.4 pt + 99.25 pt + 119.05 pt +
ISO/IEC 24760-1:2019/DAM Amd. 1:2022(E)
138.9 pt + 158.75 pt + 178.6 pt + 198.45 pt
Formatted: English (United States)
ISO/IEC JTC 1/SC 27/WG 5
Formatted: English (United States)
Formatted: English (United States)
Secretariat: DIN
Formatted: English (United States)
IT Security and Privacy —A framework for identity management—Part 1: Terminology
Formatted: English (United Kingdom)
and concepts — Amendment 1
Sécurité de l'information, Sécurité cyberIT et protection de données personellesconfidentialité —
Cadre pour la gestion de l’identité,l'identité — Partie 1: Terminologie et concepts, —
Amendement 1: Eléments de terminologie

Copyright notice
This

---------------------- Page: 1 ----------------------
ISO/IEC 24760-1:2019/DAM 1:2022(E)
© ISO document is a working draft2022
All rights reserved. Unless otherwise specified, or committee draft and is copyright-protected by Formatted: Line spacing: At least 12 pt, Adjust space
between Latin and Asian text, Adjust space between Asian
ISO. While required in the reproductioncontext of working drafts or committee drafts in any form
text and numbers
for use by participants in the ISO standards development process is permitted without prior
permission from ISO, neither its implementation, no part of this document nor any extract from
itpublication may be reproduced, stored or utilized otherwise in any form or transmitted in any
form for any other purposeby any means, electronic or mechanical, including photocopying, or
posting on the internet or an intranet, without prior written permission from ISO. Permission can
be requested from either ISO at the address below or ISO's member body in the country of the
requester.
Requests for permission to reproduce this document for the purpose of selling it should be
addressed as shown below or to ISO's member body in the country of the requester:
ISO copyright officeCopyright Office Formatted: Line spacing: At least 12 pt, Adjust space
between Latin and Asian text, Adjust space between Asian
text and numbers
Case postale 56 • CP 401 • CH-12111214 Vernier, Geneva 20
Tel.Phone: + 41 22 749 01 11
Fax + 41 22 749 09 47
E-mail copyright@iso.org
Web www.iso.org
Reproduction for sales purposes may be subject to royalty payments or a licensing agreement.
Violators may be prosecuted.
ii © ISO/IEC 2022 – All rights reserved

---------------------- Page: 2 ----------------------
ISO/IEC 24760-1 :2019/Amd.1:2022(E)
Email: copyright@iso.org
Website: www.iso.org
Published in Switzerland.
© ISO/IEC 2022 – All rights reserved iii

---------------------- Page: 3 ----------------------
ISO/IEC 24760-1:2019/Amd. 1:2022(E)
Formatted: Don't adjust space between Latin and Asian text,
Foreword
Don't adjust space between Asian text and numbers
ISO (the International Organization for Standardization) and IEC (the International Electrotechnical
Commission) form the specialized system for worldwide standardization. National bodies that are
members of ISO or IEC participate in the development of International Standards through technical
committees established by the respective organization to deal with particular fields of technical activity.
ISO and IEC technical committees collaborate in fields of mutual interest. Other international
organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the
work.
The procedures used to develop this document and those intended for its further maintenance are
described in the ISO/IEC Directives, Part 1. In particular, the different approval criteria needed for the
different types of document should be noted. This document was drafted in accordance with the editorial
rules of the ISO/IEC Directives, Part 2 (see www.iso.org/directives or
www.iec.ch/members_experts/refdocs).
Attention is drawn to the possibility that some of the elements of this document may be the subject of
patent rights. ISO and IEC shall not be held responsible for identifying any or all such patent rights. Details
of any patent rights identified during the development of the document will be in the Introduction and/or
on the ISO list of patent declarations received (see www.iso.org/patents) or the IEC list of patent
declarations received (see https://patents.iec.ch).
Any trade name used in this document is information given for the convenience of users and does not
constitute an endorsement.
For an explanation of the voluntary nature of standards, the meaning of ISO specific terms and
expressions related to conformity assessment, as well as information about ISO's adherence to the World
Trade Organization (WTO) principles in the Technical Barriers to Trade (TBT) see
www.iso.org/iso/foreword.html. In the IEC, see www.iec.ch/understanding-standards.
This document was prepared by Joint Technical Committee ISO/IEC JTC 1, Information technology, Formatted: English (United Kingdom)
Subcommittee SC 27, Information security, cybersecurity and privacy protection.
Formatted: Don't adjust space between Latin and Asian text,
Don't adjust space between Asian text and numbers
A list of all parts in the ISO/IEC 24760 series can be found on the ISO and IEC websites.
Formatted: std_publisher, English (United Kingdom)
Formatted: English (United Kingdom)
Any feedback or questions on this document should be directed to the user’s national standards body. A
Formatted: std_docNumber, English (United Kingdom)
complete listing of these bodies can be found at www.iso.org/members.html and www.iec.ch/national-
Formatted: English (United Kingdom)
committees.
Formatted: std_docPartNumber, English (United Kingdom)

Formatted: English (United Kingdom)
Formatted: Don't adjust space between Latin and Asian text,

Don't adjust space between Asian text and numbers
iv © ISO/IEC 2022 – All rights reserved

---------------------- Page: 4 ----------------------
ISO/IEC 24760-1:2019/DAM Amd.1:2022(E)
IT Security and Privacy — A framework for identity management
— Part 1: Terminology and concepts — Amendment 1

3.1
Add the following two entries:
 Formatted: Don't adjust space between Latin and Asian text,
Don't adjust space between Asian text and numbers
3.1.8
readily-verifiable identifier
identifier (3.1.4) with a value which is constructed to be easily verified as valid and as referring to a Formatted: Font: Not Italic
known entity (3.1.1)
Formatted: Font: Not Italic
EXAMPLE The result of solving a cryptographic puzzle with its input can easily be validated as correct,
functioning as digital signature on that input.
Note 1 to entry: A readily verifiable identifier can be used as an authenticator.
3.1.9
authoritative identifier
unique identifier (3.1.4) referring to an entity (3.1.1),, known in a well-trusted domain of origin Formatted: Font: Not Italic
Formatted: Font: Not Italic
Note 1 to entry: An authoritative identifier is typically managed by a well-known organization, e.g. a government.
 Formatted: Don't adjust space between Latin and Asian text,
Don't adjust space between Asian text and numbers

3.2
Add the following term:
 Formatted: Don't adjust space between Latin and Asian text,
Don't adjust space between Asian text and numbers
3.2.5
access token
trusted object encapsulating the authority for a principal (3.1.7) to access a resource Formatted: Font: Not Italic
Note 1 to entry: An access token can be obtained in the result of an authentication.
Note 2 to entry: An access token may contain access permission information for a subject to access the resource and
identifying information for the authority of the authorization decision.
Note 3 to entry: An access token may contain information that enables its integrity to be validated.
Note 4 to entry: An access token may take a physical or a virtual form.
© ISO/IEC 2022 – All rights reserved 1

---------------------- Page: 5 ----------------------
ISO/IEC 24760-1:2019/Amd.1:2022(E)
[SOURCE: ISO/IEC 29146:2016, 3.3, modified —replaced the word 'subject' by 'principal', and replaced Formatted: Default Paragraph Font
Note 1 to entry].]
Formatted: Don't adjust space between Latin and Asian text,
Don't adjust space between Asian text and numbers
 Formatted: std_section
3.3
Add the following entries:
 Formatted: Don't adjust space between Latin and Asian text,
Don't adjust space between Asian text and numbers
3.3.9
authentication factor
distinguishing feature of an authenticator (3.3.11) to characterise its use in authentication (3.3.1) Formatted: Font: Not Italic
Formatted: Font: Not Italic
Note 1 to entry: Four different authentication factors can be recognized:
— cognition factor, any credential (3.3.5) that is formed by something that the principal knows and can reproduce Formatted: Font: Not Italic
(exclusively): a personal secret (3.3.13);;
Formatted: Font: Not Italic
Formatted: Font: Not Italic
— possession factor, any credential that is formed by something that the principal possesses, e.g. an authenticator;
Formatted: Font: Not Italic
— inherent factor, any credential that is formed by a description of something that is inherent to the physical
Formatted: Font: Not Italic
existence of the principal, e.g. a biometric characteristic such as fingerprint, facial image, or 1, iris pattern;
— behaviour factor, any credential that is formed by a description of something that the principal typically does,
Formatted: Font: Not Italic
e.g. a behaviour pattern.
Formatted: Font: Not Italic
3.3.10
Formatted: Font: Not Italic
multi-factor authentication
Formatted: Font: Not Italic
authentication (3.3.1) in which multiple authenticators (3.3.11) are used of two or more auth
...

INTERNATIONAL ISO/IEC
STANDARD 24760-1
Second edition
2019-05
AMENDMENT 1
IT Security and Privacy —
A framework for identity
management —
Part 1:
Terminology and concepts
AMENDMENT 1
PROOF/ÉPREUVE
Reference number
ISO/IEC 24760-1:2019/Amd 1:2022(E)
© ISO/IEC 2022

---------------------- Page: 1 ----------------------
ISO/IEC 24760-1:2019/Amd 1:2022(E)
COPYRIGHT PROTECTED DOCUMENT
© ISO/IEC 2022
All rights reserved. Unless otherwise specified, or required in the context of its implementation, no part of this publication may
be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting on
the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address below
or ISO’s member body in the country of the requester.
ISO copyright office
CP 401 • Ch. de Blandonnet 8
CH-1214 Vernier, Geneva
Phone: +41 22 749 01 11
Email: copyright@iso.org
Website: www.iso.org
Published in Switzerland
ii
PROOF/ÉPREUVE © ISO/IEC 2022 – All rights reserved

---------------------- Page: 2 ----------------------
ISO/IEC 24760-1:2019/Amd 1:2022(E)
Foreword
ISO (the International Organization for Standardization) and IEC (the International Electrotechnical
Commission) form the specialized system for worldwide standardization. National bodies that are
members of ISO or IEC participate in the development of International Standards through technical
committees established by the respective organization to deal with particular fields of technical
activity. ISO and IEC technical committees collaborate in fields of mutual interest. Other international
organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the
work.
The procedures used to develop this document and those intended for its further maintenance
are described in the ISO/IEC Directives, Part 1. In particular, the different approval criteria
needed for the different types of document should be noted. This document was drafted in
accordance with the editorial rules of the ISO/IEC Directives, Part 2 (see www.iso.org/directives or
www.iec.ch/members_experts/refdocs).
Attention is drawn to the possibility that some of the elements of this document may be the subject
of patent rights. ISO and IEC shall not be held responsible for identifying any or all such patent
rights. Details of any patent rights identified during the development of the document will be in the
Introduction and/or on the ISO list of patent declarations received (see www.iso.org/patents) or the IEC
list of patent declarations received (see https://patents.iec.ch).
Any trade name used in this document is information given for the convenience of users and does not
constitute an endorsement.
For an explanation of the voluntary nature of standards, the meaning of ISO specific terms and
expressions related to conformity assessment, as well as information about ISO's adherence to
the World Trade Organization (WTO) principles in the Technical Barriers to Trade (TBT) see
www.iso.org/iso/foreword.html. In the IEC, see www.iec.ch/understanding-standards.
This document was prepared by Joint Technical Committee ISO/IEC JTC 1, Information technology,
Subcommittee SC 27, Information security, cybersecurity and privacy protection.
A list of all parts in the ISO/IEC 24760 series can be found on the ISO and IEC websites.
Any feedback or questions on this document should be directed to the user’s national standards
body. A complete listing of these bodies can be found at www.iso.org/members.html and
www.iec.ch/national-committees.
iii
© ISO/IEC 2022 – All rights reserved PROOF/ÉPREUVE

---------------------- Page: 3 ----------------------
ISO/IEC 24760-1:2019/Amd 1:2022(E)
IT Security and Privacy — A framework for identity
management —
Part 1:
Terminology and concepts
AMENDMENT 1

3.1
Add the following two entries:
3.1.8
readily-verifiable identifier
identifier with a value which is constructed to be easily verified as valid and as referring to a known
entity
EXAMPLE The result of solving a cryptographic puzzle with its input can easily be validated as correct,
functioning as digital signature on that input.
Note 1 to entry: A readily verifiable identifier can be used as an authenticator.
3.1.9
authoritative identifier
unique identifier referring to an entity, known in a well-trusted domain of origin
Note 1 to entry: An authoritative identifier is typically managed by a well-known organization, e.g. a government.

3.2
Add the following term:
3.2.5
access token
trusted object encapsulating the authority for a principal to access a resource
Note 1 to entry: An access token can be obtained in the result of an authentication.
Note 2 to entry: An access token may contain access permission information for a subject to access the resource
and identifying information for the authority of the authorization decision.
Note 3 to entry: An access token may contain information that enables its integrity to be validated.
Note 4 to entry: An access token may take a physical or a virtual form.
[SOURCE: ISO/IEC 29146:2016, 3.3, modified —replaced the word 'subject' by 'principal', and replaced
Note 1 to entry.]

1
© ISO/IEC 2022 – All rights reserved PROOF/ÉPREUVE

---------------------- Page: 4 ----------------------
ISO/IEC 24760-1:2019/Amd 1:2022(E)
3.3
Add the following entries:
3.3.9
authentication factor
distinguishing feature of an authenticator to characterise its use in authentication
Note 1 to entry: Four different authentication factors can be recognized:
— cognition factor, any credential that is formed by something that the principal knows and can reproduce
(exclusively): a personal secret;
— possession factor, any credential that is formed by something that the principal possesses, e.g. an authenticator;
— inherent factor, any credential that is formed by a description of something that is inherent to the physical
existence of the principal, e.g. a biometric characteristic such as fingerprint, facial image, or 1, iris pattern;
— behaviour factor, any credential that is formed by a description of something that the principal typically
does, e.g. a behaviour pattern.
3.3.10
multi-factor authentication
authentication in which multiple authenticators are used of two or more authentication factors
Note 1 to entry: If two or more authenticators are being used in authentication that have the same authentication
factor, they should have been issued by different credential issuers.
Note 2 to entry: Using multiple authenticators (that differ in authentication factor can enhance the security of the
authentication as that could prompt the principal to act differently with each of them.
[SOURCE: ISO/IEC 19790:2012, 3.74, modified — definition and notes revised to match terminology
context.]
3.3.11
authenticator
rep
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.