IT Security and Privacy — A framework for identity management — Part 1: Terminology and concepts — Amendment 1

Sécurité IT et confidentialité — Cadre pour la gestion de l'identité — Partie 1: Terminologie et concepts — Amendement 1

General Information

Status
Published
Publication Date
08-Jan-2023
Current Stage
9599 - Withdrawal of International Standard
Start Date
16-Sep-2025
Completion Date
20-Sep-2025
Ref Project

Relations

Standard
ISO/IEC 24760-1:2019/Amd 1:2023 - IT Security and Privacy — A framework for identity management — Part 1: Terminology and concepts — Amendment 1 Released:9. 01. 2023
English language
4 pages
sale 15% off
Preview
sale 15% off
Preview

Standards Content (Sample)


INTERNATIONAL ISO/IEC
STANDARD 24760-1
Second edition
2019-05
AMENDMENT 1
2023-01
IT Security and Privacy —
A framework for identity
management —
Part 1:
Terminology and concepts
AMENDMENT 1
Reference number
ISO/IEC 24760-1:2019/Amd. 1:2023(E)
© ISO/IEC 2023
ISO/IEC 24760-1:2019/Amd. 1:2023(E)
© ISO/IEC 2023
All rights reserved. Unless otherwise specified, or required in the context of its implementation, no part of this publication may
be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting on
the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address below
or ISO’s member body in the country of the requester.
ISO copyright office
CP 401 • Ch. de Blandonnet 8
CH-1214 Vernier, Geneva
Phone: +41 22 749 01 11
Email: copyright@iso.org
Website: www.iso.org
Published in Switzerland
ii
© ISO/IEC 2023 – All rights reserved

ISO/IEC 24760-1:2019/Amd. 1:2023(E)
Foreword
ISO (the International Organization for Standardization) and IEC (the International Electrotechnical
Commission) form the specialized system for worldwide standardization. National bodies that are
members of ISO or IEC participate in the development of International Standards through technical
committees established by the respective organization to deal with particular fields of technical
activity. ISO and IEC technical committees collaborate in fields of mutual interest. Other international
organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the
work.
The procedures used to develop this document and those intended for its further maintenance
are described in the ISO/IEC Directives, Part 1. In particular, the different approval criteria
needed for the different types of document should be noted. This document was drafted in
accordance with the editorial rules of the ISO/IEC Directives, Part 2 (see www.iso.org/directives or
www.iec.ch/members_experts/refdocs).
Attention is drawn to the possibility that some of the elements of this document may be the subject
of patent rights. ISO and IEC shall not be held responsible for identifying any or all such patent
rights. Details of any patent rights identified during the development of the document will be in the
Introduction and/or on the ISO list of patent declarations received (see www.iso.org/patents) or the IEC
list of patent declarations received (see https://patents.iec.ch).
Any trade name used in this document is information given for the convenience of users and does not
constitute an endorsement.
For an explanation of the voluntary nature of standards, the meaning of ISO specific terms and
expressions related to conformity assessment, as well as information about ISO's adherence to
the World Trade Organization (WTO) principles in the Technical Barriers to Trade (TBT) see
www.iso.org/iso/foreword.html. In the IEC, see www.iec.ch/understanding-standards.
This document was prepared by Joint Technical Committee ISO/IEC JTC 1, Information technology,
Subcommittee SC 27, Information security, cybersecurity and privacy protection.
A list of all parts in the ISO/IEC 24760 series can be found on the ISO and IEC websites.
Any feedback or questions on this document should be directed to the user’s national standards
body. A complete listing of these bodies can be found at www.iso.org/members.html and
www.iec.ch/national-committees.
iii
© ISO/IEC 2023 – All rights reserved

ISO/IEC 24760-1:2019/Amd. 1:2023(E)
IT Security and Privacy — A framework for identity
management —
Part 1:
Terminology and concepts
AMENDMENT 1
3.1
Add the following two entries:
3.1.8
readily-verifiable identifier
identifier with a value which is constructed to be easily verified as valid and as referring to a known
entity
EXAMPLE The result of solving a cryptographic puzzle with its input can easily be validated as correct,
functioning as digital signature on that input.
Note 1 to entry: A readily verifiable identifier can be used as an authenticator.
3.1.9
authoritative identifier
unique identifier referring to an entity, known in a well-trusted domain of origin
Note 1 to entry: An authoritative identifier is typically managed by a well-known organization, e.g. a government.

3.2
Add the following term:
3.2.5
access token
trusted object encapsulating the authority for a principal to access a resource
Note 1 to entry: An access token can be obtained in the result of an authentication.
Note 2 to entry: An access token may contain access permission information for a subject to access the resource
and identifying information for the authority of the authorization decision.
Note 3 to entry: An access token may contain information that enables its integrity to be validated.
Note 4 to entry: An access token may take a physical or a virtual form.
[SOURCE: ISO/IEC 29146:2016, 3.3, modified —replaced the word 'subject' by 'principal', and replaced
Note 1 to entry.]
© ISO/IEC 2023 – All rights reserved

ISO/IEC 24760-1:2019/Amd. 1:2023(E)
3.3
Add the following entries:
3.3.9
authentication factor
distinguishing feature of an authenticator to characterise its use in authentication
Note 1 to entry: Four different authentication factors can be recognized:
— cognition factor, any credential that is formed by something that the principal knows and can reproduce
(exclusively): a personal secret;
— possession factor, any credential that is formed by something that the principal possesses, e.g. an authenticator;
— inherent factor, any credential that is formed by a description of something that is inherent to the physical
existence of the principal, e.g. a biometric characteristic such as fingerprint, facial image, or 1, iris pattern;
— behaviour factor, any credential that is formed by a description of something that the principal typically
does, e.g. a behaviour pattern.
3.3.10
multi-factor authentication
authentication in which multiple authenticators are used of two or more authentication factors
Note 1 to entry: If two or more authenticators are being used in authentication that have the same authentication
factor, they should have been issued by different credential issuers.
Note 2 to entry: Using multiple authenticators (that differ in authentication factor can enhance the security of the
authentication as that could prompt the principal to act differently with each of them.
[SOURCE: ISO/IEC 19790:2012, 3.74, modified — definition and notes revised to match terminology
context.]
3.3.11
authenticator
repr
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.