Table of Contents

�1���� Scope����������
�2���� References�
�3���� Definitions�
������� 3.1���� Terms defined elsewhere�����������
������� 3.2���� Terms defined in this Recommendation�
�4���� Abbreviations and acronyms
�5���� Conventions�������������
�6���� Types of combined authentication�����
�7���� Authentication models on multiple IdSP environments
������� 7.1���� Basic models with regard to service provider�������
������� 7.2���� Entity authentication life cycle model����
�8���� Operations in multiple IdSP environments�������
������� 8.1���� Credential management operations���������
������� 8.2���� Usage operations of credentials
������� 8.3���� Management operations of trust relationships with service providers����������
�9���� General framework of combined authentication on multiple identity service provider environments����
������� 9.1���� Logical components�����
������� 9.2���� Behaviours�����
Annex A � Considerations for combined authentication����
������� A.1���� Achieving estimated authentication assurance����
������� A.2���� Selection of IdSP(s)�����
������� A.3���� Effective authentication assurance���������
������� A.4���� Security considerations for multifactor authentication�����
������� A.5���� Security considerations for multi-method authentication
������� A.6���� Security considerations for multiple authentication����������
Appendix I � Relationship with related standards����
������� I.1���� Relationship with [ITU-T X.1141]�����������
������� I.2���� Relationship with [ITU-T X.1254]�����������
Bibliography����