�1���� Scope��������
�2���� References�������������
�3���� Definitions
������� 3.1���� Terms defined elsewhere������
������� 3.2���� Terms defined in this Recommendation����������
�4���� Abbreviations and acronyms�����������
�5���� Conventions�����������
�6���� IdM overview���������
������� 6.1���� General��������
������� 6.2���� IdM relationships������
������� 6.3���� Drivers and motivations���������
������� 6.4���� Multiple service provider and federated environment
������� 6.5���� Identity service provider (IdSP)�����������
������� 6.6���� IdM in the context of NGN architectures and reference models������������
�7���� IdM objectives�������
�8���� IdM requirements�
������� 8.1���� General requirements�����������
������� 8.2���� Identity lifecycle management requirements�
������� 8.3���� Identity management OAM&P functions���������
������� 8.4���� Signalling and control functions����������
������� 8.5���� Identity management federated identity functions������
������� 8.6���� User/subscriber functions and protection of PII������������
������� 8.7���� Security��������
Appendix I � General IdM use cases����
������� I.1���� ��������� Introduction������
������� I.2���� ��������� Governments����
������� I.3���� ��������� Business enterprise�������
������� I.4���� ��������� End user/subscribers�����
Appendix II � IdM use cases for NGN applications����
������ II.1���� Introduction��
������ II.2���� Basic use case example����������
������ II.3���� Use of common IdM systems to support multiple application
services (e.g., voice, data, IPTV) within a service provider network����
������ II.4���� Single sign-on/single sign-off to multiple application services
(e.g., voice, data, and IPTV) within a service provider network����
������ II.5���� Correlation of distributed identity information for
multi-factor authentication assurance����
������ II.6���� Enforcement of user control of personally identifiable
information (e.g., preferences) across peer network/service provider domains����
������ II.7���� Bridging/mapping between heterogeneous IdM systems����������
������ II.8���� Support of converged services (e.g., fixed and mobile access)
within a service provider network����
������ II.9���� Example use case � User authentication and authorization of NGN
provider (mutual authentication and authorization)����
����� II.10���� Example use case � Peer user assertion (non-cash transactions)�����������
����� II.11���� IdM use case � Assurance of end user device identity and
integrity������
Appendix III � Emergency telecommunications service (ETS) related IdM use
cases����
����� III.1���� Introduction��
����� III.2���� Authentication assurance using device and user combination���
����� III.3���� Enhanced authentication of ETS users for next generation
priority services (priority multimedia services)����
����� III.4���� Authentication of called party and data communication sources������������
����� III.5���� Trusted identification and authentication of service providers
in a multi-provider environment����
����� III.6���� Single sign-on and single sign-off��������
Appendix IV � Mobile-related use cases����
������ IV.1���� Introduction�
������ IV.2���� Use case examples���
Appendix V � Example IdM transaction models����
������� V.1���� Introduction�
������� V.2���� Examples of possible identity management transaction models������������
Appendix VI � Example illustrative deployment scenario for IdM in NGN����
������ VI.1���� Introduction�
������ VI.2���� IdM architecture deployment�������������
Bibliography����