�1����
Scope����������
�2����
References�
�3����
Definitions�
������� 3.1����
Terms defined elsewhere�����������
������� 3.2����
Terms defined in this Recommendation�
�4����
Abbreviations and acronyms
�5����
Conventions�������������
�6����
Types of combined authentication�����
�7����
Authentication models on multiple IdSP environments
������� 7.1����
Basic models with regard to service provider�������
������� 7.2����
Entity authentication life cycle model����
�8����
Operations in multiple IdSP environments�������
������� 8.1����
Credential management operations���������
������� 8.2����
Usage operations of credentials
������� 8.3����
Management operations of trust relationships with service providers����������
�9����
General framework of combined authentication on multiple identity
service provider environments����
������� 9.1����
Logical components�����
������� 9.2����
Behaviours�����
Annex A � Considerations for combined authentication����
������� A.1����
Achieving estimated authentication assurance����
������� A.2����
Selection of IdSP(s)�����
������� A.3����
Effective authentication assurance���������
������� A.4����
Security considerations for multifactor authentication�����
������� A.5����
Security considerations for multi-method authentication
������� A.6����
Security considerations for multiple authentication����������
Appendix I � Relationship with related standards����
������� I.1����
Relationship with [ITU-T X.1141]�����������
������� I.2����
Relationship with [ITU-T X.1254]�����������
Bibliography����