Information technology — Security techniques — Entity authentication assurance framework

ISO/IEC 29115:2013 provides a framework for managing entity authentication assurance in a given context. In particular, it: - specifies four levels of entity authentication assurance; - specifies criteria and guidelines for achieving each of the four levels of entity authentication assurance; - provides guidance for mapping other authentication assurance schemes to the four LoAs; - provides guidance for exchanging the results of authentication that are based on the four LoAs; and - provides guidance concerning controls that should be used to mitigate authentication threats.

Technologies de l'information — Techniques de sécurité — Cadre d'assurance de l'authentification d'entité

General Information

Status
Published
Publication Date
26-Mar-2013
Current Stage
9093 - International Standard confirmed
Completion Date
21-Sep-2020
Ref Project

Buy Standard

Standard
ISO/IEC 29115:2013 - Information technology -- Security techniques -- Entity authentication assurance framework
English language
36 pages
sale 15% off
Preview
sale 15% off
Preview
Standard
ISO/IEC 29115:2013 - Information technology -- Security techniques -- Entity authentication assurance framework
English language
36 pages
sale 15% off
Preview
sale 15% off
Preview
Standard
ISO/IEC 29115:2013 - Information technology -- Security techniques -- Entity authentication assurance framework
English language
36 pages
sale 15% off
Preview
sale 15% off
Preview

Standards Content (Sample)

INTERNATIONAL ISO/IEC
STANDARD 29115
First edition
2013-04-01


Information technology — Security
techniques — Entity authentication
assurance framework
Technologies de l'information — Techniques de sécurité — Cadre
d'assurance de l'authentification d'entité




Reference number
ISO/IEC 29115:2013(E)
©
ISO/IEC 2013

---------------------- Page: 1 ----------------------
ISO/IEC 29115:2013(E)

COPYRIGHT PROTECTED DOCUMENT


©  ISO/IEC 2013
All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or by any means,
electronic or mechanical, including photocopying and microfilm, without permission in writing from either ISO at the address below or
ISO's member body in the country of the requester.
ISO copyright office
Case postale 56  CH-1211 Geneva 20
Tel. + 41 22 749 01 11
Fax + 41 22 749 09 47
E-mail copyright@iso.org
Web www.iso.org
Published in Switzerland

ii © ISO/IEC 2013 – All rights reserved

---------------------- Page: 2 ----------------------
ISO/IEC 29115:2013(E)
Contents Page
Foreword . iv
Introduction . v
1  Scope . 1
2  Normative references . 1
2.1  Identical Recommendations | International Standards . 1
2.2  Paired Recommendations | International Standards . 1
2.3  Additional references . 1
3  Terms and definitions . 1
4  Abbreviations . 5
5  Conventions . 6
6  Levels of assurance . 6
6.1  Level of assurance 1 (LoA1) . 7
6.2  Level of assurance 2 (LoA2) . 7
6.3  Level of assurance 3 (LoA3) . 7
6.4  Level of assurance 4 (LoA4) . 8
6.5  Selecting the appropriate level of assurance . 8
6.6  LoA mapping and interoperability . 9
6.7  Exchanging authentication results based on the 4 LoAs . 10
7  Actors . 10
7.1  Entity . 10
7.2  Credential service provider . 10
7.3  Registration authority . 11
7.4  Relying party . 11
7.5  Verifier . 11
7.6  Trusted third party . 11
8  Entity authentication assurance framework phases . 11
8.1  Enrolment phase . 12
8.2  Credential management phase . 14
8.3  Entity authentication phase . 16
9  Management and organizational considerations . 16
9.1  Service establishment. 17
9.2  Legal and contractual compliance . 17
9.3  Financial provisions . 17
9.4  Information security management and audit . 17
9.5  External service components . 17
9.6  Operational infrastructure . 18
9.7  Measuring operational capabilities . 18
10  Threats and controls . 18
10.1  Threats to, and controls for, the enrolment phase . 18
10.2  Threats to, and controls for, the credential management phase . 21
10.3  Threats to, and controls for, the authentication phase . 26
11  Service assurance criteria . 30
Annex A (informative) Privacy and protection of PII . 31
Annex B (informative) Characteristics of a credential . 33
Bibliography . 35
© ISO/IEC 2013 – All rights reserved iii

---------------------- Page: 3 ----------------------
ISO/IEC 29115:2013(E)
Foreword
ISO (the International Organization for Standardization) and IEC (the International Electrotechnical
Commission) form the specialized system for worldwide standardization. National bodies that are members of
ISO or IEC participate in the development of International Standards through technical committees
established by the respective organization to deal with particular fields of technical activity. ISO and IEC
technical committees collaborate in fields of mutual interest. Other international organizations, governmental
and non-governmental, in liaison with ISO and IEC, also take part in the work. In the field of information
technology, ISO and IEC have established a joint technical committee, ISO/IEC JTC 1.
International Standards are drafted in accordance with the rules given in the ISO/IEC Directives, Part 2.
The main task of the joint technical committee is to prepare International Standards. Draft International
Standards adopted by the joint technical committee are circulated to national bodies for voting. Publication as
an International Standard requires approval by at least 75 % of the national bodies casting a vote.
Attention is drawn to the possibility that some of the elements of this document may be the subject of patent
rights. ISO and IEC shall not be held responsible for identifying any or all such patent rights.
ISO/IEC 29115 was prepared by Joint Technical Committee ISO/IEC JTC 1, Information technology,
Subcommittee SC 27, IT Security techniques.
A similar text is published as ITU-T Recommendation X.1254. It differs from this text in three instances: 1) 3.8:
the ISO/IEC definition includes asserted identities; 2) Table 10-1: ISO/IEC includes an example for
impersonation that includes use of an identity for an entity that does not exist; 3) 10.2.2.1: ISO/IEC describes
SSL as an example of a protected channel.

iv © ISO/IEC 2013 – All rights reserved

---------------------- Page: 4 ----------------------
ISO/IEC 29115:2013(E)
Introduction
Many electronic transactions within or between ICT systems have security requirements which depend upon
an understood or specified level of confidence in the identities of the entities involved. Such requirements may
include the protection of assets and resources against unauthorized access, for which an access control
mechanism might be used, and/or the enforcement of accountability by the maintenance of audit logs of
relevant events, as well as for accounting and charging purposes.
This International Standard provides a framework for entity authentication assurance. Assurance within this
International Standard refers to the confidence placed in all of the processes, management activities, and
technologies used to establish and manage the identity of an entity for use in authentication transactions.
Technical Management
&

Organizational

• Application and initiation • Record-keeping/ • Service establishment

Enrolment

• Identity proofing and identity recording • Legal and contractual
phase
information verification • Registration compliance
• Financial provisions
• Information security
management and audit
• Credential suspension,
• Credential creation


• External service
revocation, and/or
•Credential pre-processing
components
destruction
Credential • Credential issuance
• Credential renewal • Operational
• Credential activation
management
infrastructure
and/or replacement
• Credential storage
phase
• Measuring operational
• Record-keeping
capabilities
Entity

• Authentication

authentication
• Record-keeping
phase

Figure 1 — Overview of the Entity Authentication Assurance Framework

Using four specified Levels of Assurance (LoAs), this International Standard provides guidance concerning
control technologies, processes, and management activities, as well as assurance criteria that should be used
to mitigate authentication threats in order to implement the four LoAs. It also provides guidance for the
mapping of other authentication assurance schemes to the specified four levels, as well as guidance for
exchanging the results of an authentication transaction. Finally, this International Standard provides
informative guidance concerning the protection of personally identifiable information (PII) associated with the
authentication process.
© ISO/IEC 2013 – All rights reserved v

---------------------- Page: 5 ----------------------
ISO/IEC 29115:2013(E)
This International Standard is intended to be used principally by credential service providers (CSPs) and by
others having an interest in their services (e.g., relying parties, assessors and auditors of those services). This
Entity Authentication Assurance Framework (EAAF) specifies the minimum technical, management, and
process requirements for four LoAs to ensure equivalence among credentials issued by various CSPs. It also
provides some additional management and organizational considerations that affect entity authentication
assurance, but it does not set forth specific criteria for those considerations. Relying Parties (RPs) and others
may find this International Standard helpful to gain an understanding of what each LoA provides. Additionally,
it may be adopted for use within a trust framework to define technical requirements for LoAs. The EAAF is
intended for, but not limited to, session-based and document-centric use cases using various authentication
technologies. Both direct and brokered trust scenarios are possible, within either bilateral or federated legal
constellations.
vi © ISO/IEC 2013 – All rights reserved

---------------------- Page: 6 ----------------------
INTERNATIONAL STANDARD ISO/IEC 29115:2013(E)

Information technology — Security techniques — Entity
authentication assurance framework
1 Scope
This International Standard provides a framework for managing entity authentication assurance in a given
context. In particular, it:
 specifies four levels of entity authentication assurance;
 specifies criteria and guidelines for achieving each of the four levels of entity authentication
assurance;
 provides guidance for mapping other authentication assurance schemes to the four LoAs;
 provides guidance for exchanging the results of authentication that are based on the four LoAs; and
 provides guidance concerning controls that should be used to mitigate authentication threats.
2 Normative references
The following documents, in whole or in part, are normatively referenced in this document and are
indispensable for its application. For dated references, only the edition cited applies. For undated references,
the latest edition of the referenced document (including any amendments) applies.
2.1 Identical Recommendations | International Standards
None.
2.2 Paired Recommendations | International Standards
None.
2.3 Additional references
None.
3 Terms and definitions
For the purposes of this document, the following terms and definitions apply.
3.1
assertion
statement made by an entity without accompanying evidence of its validity
[ITU-T X.1252]
NOTE The meaning of the terms claim and assertion are generally agreed to be somewhat similar but with slightly
different meanings. For the purposes of this International Standard, an assertion is considered to be a stronger statement
than a claim.
© ISO/IEC 2013 – All rights reserved 1

---------------------- Page: 7 ----------------------
ISO/IEC 29115:2013(E)
3.2
authentication
provision of assurance in the identity of an entity
[ISO/IEC 18014-2]
3.3
authentication factor
piece of information and/or process used to authenticate or verify the identity of an entity
[ISO/IEC 19790]
NOTE Authentication factors are divided into four categories:
 something an entity has (e.g., device signature, passport, hardware device containing a credential, private key);
 something an entity knows (e.g., password, PIN);
 something an entity is (e.g., biometric characteristic); or
 something an entity typically does (e.g., behaviour pattern).
3.4
authentication protocol
defined sequence of messages between an entity and a verifier that enables the verifier to perform
authentication of an entity
3.5
authoritative source
repository which is recognized as being an accurate and up-to-date source of information
3.6
claim
statement that something is the case, without being able to give proof
[ITU-T X.1252]
NOTE The meaning of the terms claim and assertion are generally agreed to be somewhat similar but with slightly
different meanings. For the purposes of this International Standard, an assertion is considered to be a stronger statement
than a claim.
3.7
context
environment with defined boundary conditions in which entities exist and interact
[ITU-T X.1252]
3.8
credential
set of data presented as evidence of a claimed or asserted identity and/or entitlements
NOTE See Annex B for additional characteristics of a credential.
3.9
credential service provider
trusted actor that issues and/or manages credentials
2 © ISO/IEC 2013 – All rights reserved

---------------------- Page: 8 ----------------------
ISO/IEC 29115:2013(E)
3.10
entity
something that has separate and distinct existence and that can be identified in a context
[ITU-T X.1252]
NOTE For the purposes of this International Standard, entity is also used in the specific case for something that is
claiming an identity.
3.11
entity authentication assurance
degree of confidence reached in the authentication process that the entity is what it is, or is expected to be
[ITU-T X.1252]
NOTE The confidence is based on the degree of confidence in the binding between the entity and the identity that is
presented.
3.12
identifier
one or more attributes that uniquely characterize an entity in a specific context
3.13
identity
set of attributes related to an entity
[ISO/IEC 24760]
NOTE Within a particular context, an identity can have one or more identifiers to allow an entity to be uniquely
recognized within that context.
3.14
identity information verification
process of checking identity information and credentials against issuers, data sources, or other internal or
external resources with respect to authenticity, validity, correctness, and binding to the entity
3.15
identity proofing
process by which the Registration Authority (RA) captures and verifies sufficient information to identify an
entity to a specified or understood level of assurance
3.16
man-in-the-middle attack
attack in which an attacker is able to read, insert, and modify messages between two parties without their
knowledge
3.17
multifactor authentication
authentication with at least two independent authentication factors
[ISO/IEC 19790]
3.18
mutual authentication
authentication of identities of entities which provides both entities with assurance of each other's identity
© ISO/IEC 2013 – All rights reserved 3

---------------------- Page: 9 ----------------------
ISO/IEC 29115:2013(E)
3.19
non-repudiation
ability to protect against denial by one of the entities involved in an action of having participated in all or part of
the action
[ITU-T X.1252]
3.20
phishing
scam by which an email user is duped into revealing personal or confidential information which the scammer
can then use illicitly
3.21
registration authority
trusted actor that establishes and/or vouches for the identity of an entity to a CSP
3.22
relying party
actor that relies on an identity assertion or claim
3.23
repudiation
denial in having participated in all or part of an action by one of the entities involved
[ITU-T X.1252]
3.24
salt
non-secret, often random, value that is used in a hashing process
NOTE It is also referred to as sand.
3.25
shared secret
secret used in authentication that is known only to the entity and the verifier
3.26
time stamp
reliable time variant parameter which denotes a point in time with respect to a common reference
3.27
transaction
discrete event between an entity and service provider that supports a business or programmatic purpose
3.28
trust framework
set of requirements and enforcement mechanisms for parties exchanging identity information
3.29
trusted third party
authority or its agent, trusted by other actors with respect to specified activities (e.g., security-related activities)
NOTE A trusted third party is trusted by an entity and/or a verifier for the purposes of authentication.
3.30
validity period
time period during which an identity or credential may be used in one or more transactions
4 © ISO/IEC 2013 – All rights reserved

---------------------- Page: 10 ----------------------
ISO/IEC 29115:2013(E)
3.31
verification
process of checking information by comparing the provided information with previously corroborated
information
3.32
verifier
actor that corroborates identity information
NOTE The verifier can participate in multiple phases of the EAAF and can perform credential verification and/or
identity information verification.
4 Abbreviations
For the purposes of this International Standard, the following abbreviations apply:
CAs Certificate Authorities
CSP Credential Service Provider
CV  Card Verifier
EAA Entity Authentication Assurance
EAAF Entity Authentication Assurance Framework
IdM  Identity Management
ICT  Information and Communications Technology
IP  Internet Protocol
LoA  Level of Assurance
LoAs Levels of Assurance
MAC  Media Access Control
NPE Non-Person Entity
PII  Personally Identifiable Information
PIN  Personal Identification Number
RA  Registration Authority
RP  Relying Party
SAML Security Assertion Markup Language
SSL Secure Sockets Layer
TCP/IP Transmission Control Protocol/Internet Protocol
TLS Transport Layer Security
TPM Trusted Platform Module
TTP Trusted Third Party
URL Uniform Resource Locator
© ISO/IEC 2013 – All rights reserved 5

---------------------- Page: 11 ----------------------
ISO/IEC 29115:2013(E)
5 Conventions
This International Standard follows the ISO Directive, Part 2, Annex H regarding verbal forms for the
expression of provisions.
a) “Shall” indicates a requirement;
b) “Should” indicates a recommendation;
c) “May” indicates a permission; and
d) “Can” indicates a possibility and capability.
6 Levels of assurance
This Entity Authentication Assurance Framework (EAAF) defines four levels of assurance (LoAs) for entity
authentication. Each LoA describes the degree of confidence in the processes leading up to and including the
authentication process itself, thus providing assurance that the entity that uses a particular identity is in fact
the entity to which that identity was assigned. For the purposes of this International Standard, LoA is a
function of the processes, management activities, and technical controls that have been implemented by a
CSP for each of the EAAF phases based on the criteria set forth in Clause 10. Entity Authentication
Assurance (EAA) is affected by management and organizational considerations, but this International
Standard does not provide explicit normative criteria for those considerations. An entity can be a human or a
non-person entity (NPE).
For example, a network’s LoA could be a function of the LoAs of all components that make up the network
and includes NPEs or endpoint devices (e.g., mobile phones, PDAs, set-top boxes, laptops). In some
instances, endpoint devices may impersonate legitimate entities. Consequently, the ability to distinguish a
trusted device, with some degree of confidence, from a rogue device is fundamental to EAA.
LoA1 is the lowest level of assurance, and LoA4 is the highest level of assurance specified in this International
Standard. Determining which LoA is appropriate in a given situation depends on a variety of factors. The
determination of the required LoA is based mainly on risk: the consequences of an authentication error and/or
misuse of credentials, the resultant harm and impact, and their likelihood of occurrence. Higher LoAs shall be
used for higher perceived risk.
The EAAF provides requirements and implementation guidance for each of the four LoAs. In particular, it
provides requirements for the implementation of processes for the following phases:
a) Enrolment (e.g., identity proofing, identity information verification, registration);
b) Credential management (e.g., credential issuance, credential activation); and
c) Authentication.
It also provides guidance regarding management and organizational considerations (e.g., legal compliance,
information security management) that affect entity authentication assurance.
The LoAs are defined as shown in Table 6-1.
6 © ISO/IEC 2013 – All rights reserved

---------------------- Page: 12 ----------------------
ISO/IEC 29115:2013(E)
1
Table 6-1 – Levels of assurance
Level Description
1 – Low Little or no confidence in the claimed or asserted identity
2 – Medium Some confidence in the claimed or asserted identity
3 – High High confidence in the claimed or asserted identity
4 – Very high Very high confidence in the claimed or asserted identity

This framework contains requirements to achieve a desired LoA for each entity authentication assurance
framework phase. The overall LoA achieved by an implementation using this framework will be the level of the
phase with the lowest LoA.
6.1 Level of assurance 1 (LoA1)
At LoA1, there is minimal confidence in the claimed or asserted identity of the entity, but some confidence that
the entity is the same over consecutive authentication events. This LoA is used when minimum risk is
associated with erroneous authentication. There is no specific requirement for the authentication mechanism
used; only that it provides some minimal assurance. A wide range of available technologies, including the
credentials associated with higher LoAs, can satisfy the entity authentication assurance requirements for this
LoA. This level does not require use of cryptographic authentication methods (e.g., cryptographic-based
challenge-response protocol).
For example, LoA1 may be applicable for authentication in which an entity presents a self-registered
username or password to a service provider’s website to create a customized page, or transactions involving
websites that require registration for access to materials and documentation, such as news or product
documentation.
For example, at LoA1, a media access control (MAC) address may satisfy a device authentication requirement.
However, there is little confidence that another device will not be able to use the same MAC address.
6.2 Level of assurance 2 (LoA2)
At LoA2, there is some confidence in the claimed or asserted identity of the entity. This LoA is used when
moderate risk is associated with erroneous authentication. Single-factor authentication is acceptable.
Successful authentication shall be dependent upon the entity proving, through a secure authentication
protocol, that the entity has control of the credential. Controls should be in place to reduce the effectiveness of
eavesdropper and online guessing attacks. Controls shall be in place to protect against attacks on stored
credentials.
For example, a service provider might operate a website that enables its customers to change their address of
record. The transaction in which a beneficiary changes an address of record may be considered a LoA2
authentication transaction, as the transaction may involve a moderate risk of inconvenience. Since official
notices regarding payment amounts, account status, and records of changes are usually sent to the
beneficiary's address of record, the transaction additionally entails moderate risk of unauthorized release of
PII. As a result, the service provider should obtain at least some authentication assurance before allowing this
transaction to take place.
6.3 Level of assurance 3 (LoA3)
At LoA3, there is high confidence in the claimed or asserted identity of the entity. This LoA is used where
substantial risk is associated with erroneous authentication. This LoA shall employ multifactor authentication.
Any secret information exchanged in authentication protocols shall be cryptographically protected in transit

1
LoA is a function of the processes, management activities, and technical controls that have been implemented by a
CSP for each of the EAAF phases based on the criteria set forth in Clause 10.
© ISO/IEC 2013 – All rights reserved 7

---------------------- Page: 13 ----------------------
ISO/IEC 29115:2013(E)
and at rest (although LoA3 does not require the use of a cryptographic-based challenge-response protocol).
There are no requirements concerning the generation or storage of credentials; they may be stored or
generated in general purpose computers or in special purpose hardware.
For example, a transaction in which a company submits certain confidential information electronically to a
government agency may require a LoA3 authentication transaction. Improper disclosure could result in a
substantial risk for financial loss. Other LoA3 transaction examples include online access to accounts that
allow the entity to perform certain financial transactions, or use by a third party contractor of a remote system
to access potentially sensitive client personal information.
6.4 Level of assurance 4 (LoA4)
At LoA4, there is very high confidence in the claimed or asserted identity of the entity. This LoA is used when
high risk is associated with erroneous authentication. LoA4 provides the highest level of entity authentication
assurance defined by this International Standard. LoA4 is similar to LoA3, but it adds the requirements of in-
person identity proofing for human entities and the use of tamper-resistant hardware devices for the storage of
a
...

FINAL
INTERNATIONAL ISO/IEC
DRAFT
STANDARD FDIS
29115
ISO/IEC JTC 1
Information technology — Security
Secretariat: ANSI
techniques — Entity authentication
Voting begins on:
assurance framework
2012-07-20
Voting terminates on:
Technologies de l'information — Techniques de sécurité — Cadre
2012-09-20
d'assurance de l'authentification d'entité






RECIPIENTS OF THIS DRAFT ARE INVITED TO
SUBMIT, WITH THEIR COMMENTS, NOTIFICATION
OF ANY RELEVANT PATENT RIGHTS OF WHICH
THEY ARE AWARE AND TO PROVIDE SUPPORT-
ING DOCUMENTATION.
IN ADDITION TO THEIR EVALUATION AS
Reference number
BEING ACCEPTABLE FOR INDUSTRIAL, TECHNO-
ISO/IEC FDIS 29115:2012(E)
LOGICAL, COMMERCIAL AND USER PURPOSES,
DRAFT INTERNATIONAL STANDARDS MAY ON
OCCASION HAVE TO BE CONSIDERED IN THE
LIGHT OF THEIR POTENTIAL TO BECOME STAN-
DARDS TO WHICH REFERENCE MAY BE MADE IN
©
NATIONAL REGULATIONS. ISO/IEC 2012

---------------------- Page: 1 ----------------------
ISO/IEC FDIS 29115:2012(E)

Copyright notice
This ISO document is a Draft International Standard and is copyright-protected by ISO. Except as permitted
under the applicable laws of the user's country, neither this ISO draft nor any extract from it may be
reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic,
photocopying, recording or otherwise, without prior written permission being secured.
Requests for permission to reproduce should be addressed to either ISO at the address below or ISO's
member body in the country of the requester.
ISO copyright office
Case postale 56  CH-1211 Geneva 20
Tel. + 41 22 749 01 11
Fax + 41 22 749 09 47
E-mail copyright@iso.org
Web www.iso.org
Reproduction may be subject to royalty payments or a licensing agreement.
Violators may be prosecuted.



ii
© ISO/IEC 2012 – All rights reserved

---------------------- Page: 2 ----------------------
ISO/IEC 29115:2012 (E)

CONTENTS
Page
Foreword…………………………………………………………….……………………………………………………….iii
Introduction…………………………………………….……………………………….……………………………………iv
1  Scope . 1
2  Normative references . 1
2.1  Identical Recommendations | International Standards . 1
2.2  Paired Recommendations | International Standards . 1
2.3  Additional references . 1
3  Definitions. 1
4  Abbreviations . 3
5  Conventions . 4
6  Levels of assurance . 4
6.1  Level of assurance 1 (LoA1) . 5
6.2  Level of assurance 2 (LoA2) . 5
6.3  Level of assurance 3 (LoA3) . 5
6.4  Level of assurance 4 (LoA4) . 6
6.5  Selecting the appropriate level of assurance. 6
6.6  LoA mapping and interoperability . 7
6.7  Exchanging authentication results based on the 4 LoAs . 7
7  Actors . 8
7.1  Entity . 8
7.2  Credential service provider . 8
7.3  Registration authority . 8
7.4  Relying party . 9
7.5  Verifier . 9
7.6  Trusted third party . 9
8  Entity authentication assurance framework phases . 9
8.1  Enrolment phase . 9
8.2  Credential management phase . 11
8.3  Entity authentication phase . 13
9  Management and organizational considerations . 14
9.1  Service establishment . 14
9.2  Legal and contractual compliance . 14
9.3  Financial provisions . 14
9.4  Information security management and audit . 14
9.5  External service components . 15
9.6  Operational infrastructure . 15
9.7  Measuring operational capabilities . 15
10  Threats and controls . 15
10.1  Threats to, and controls for, the enrolment phase . 15
10.2  Threats to, and controls for, the credential management phase . 18
10.3  Threats to, and controls for, the authentication phase . 22
11  Service assurance criteria . 25
iii
© ISO/IEC 2012 – All rights reserved

---------------------- Page: 3 ----------------------
ISO/IEC 29115:2012 (E)

Annex A – Privacy and protection of PII………………………….………………….…………………………………….26
Annex B – Characteristics of a credential.…….…….….………….………………….……………………. 28
Annex C – Bibliography .…….…………….………….……………….……………………………………. 29

iv
© ISO/IEC 2012 – All rights reserved

---------------------- Page: 4 ----------------------
ISO/IEC 29115:2012 (E)

Foreword
The International Telecommunication Union (ITU) is the United Nations specialized agency in the field of
telecommunications. The ITU Telecommunication Standardization Sector (ITU-T) is a permanent organ of ITU. ITU-T is
responsible for studying technical, operating, and tariff questions and issuing Recommendations on them with a view to
standardising telecommunications on a world-wide basis. The World Telecommunication Standardization Assembly
(WTSA), which meets every four years, establishes the topics for study by the ITU-T study groups that, in turn, produce
Recommendations on these topics. The approval of ITU-T Recommendations is covered by the procedure laid down in
WTSA Resolution 1. In some areas of information technology that fall within ITU-T's purview, the necessary standards are
prepared on a collaborative basis with ISO and IEC.
ISO (the International Organization for Standardization) and IEC (the International Electrotechnical Commission) form the
specialized system for worldwide standardization. National bodies that are members of ISO or IEC participate in the
development of International Standards through technical committees established by the respective organization to deal
with particular fields of technical activity. ISO and IEC technical committees collaborate in fields of mutual interest. Other
international organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the work. In
the field of information technology, ISO and IEC have established a joint technical committee, ISO/IEC JTC 1.
International Standards are drafted in accordance with the rules given in the ISO/IEC Directives, Part 2.
The main task of the joint technical committee is to prepare International Standards. Draft International Standards adopted
by the joint technical committee are circulated to national bodies for voting. Publication as an International Standard
requires approval by at least 75 % of the national bodies casting a vote.
Attention is drawn to the possibility that some of the elements of this document may be the subject of patent rights. ISO and
IEC shall not be held responsible for identifying any or all such patent rights.
ISO/IEC 29115 was prepared by Joint Technical Committee ISO/IEC JTC 1, Information technology, Subcommittee SC 27,
Security techniques. The identical text is published as ITU-T Recommendation X.1254.

v
© ISO/IEC 2012 – All rights reserved

---------------------- Page: 5 ----------------------
ISO/IEC 29115:2012 (E)

Introduction
Many electronic transactions within or between ICT systems have security requirements which depend upon an understood
or specified level of confidence in the identities of the entities involved. Such requirements may include the protection of
assets and resources against unauthorized access, for which an access control mechanism might be used, and/or the
enforcement of accountability by the maintenance of audit logs of relevant events, as well as for accounting and charging
purposes.
This Recommendation | International Standard provides a framework for entity authentication assurance. Assurance within
this Recommendation | International Standard refers to the confidence placed in all of the processes, management activities,
and technologies used to establish and manage the identity of an entity for use in authentication transactions.

Technical Management
&

Organizational

• Application and initiation • Record-keeping/ • Service establishment
Enrolment

• Identity proofing and identity recording • Legal and contractual
phase
information verification • Registration compliance
• Financial provisions
• Information security
management and audit
• Credential suspension,
• Credential creation

• External service
revocation, and/or
• Credential issuance

components
destruction
• Credential activation
Credential
• Credential renewal • Operational
• Credential storage
management
infrastructure
and/or replacement
phase
• Record-keeping • Measuring operational
capabilities
Entity
• Authentication


authentication
• Record-keeping
phase

Figure 1 – Overview of the Entity Authentication Assurance Framework

Using four specified Levels of Assurance (LoAs), this Recommendation | International Standard provides guidance
concerning control technologies, processes, and management activities, as well as assurance criteria, that should be used to
mitigate authentication threats in order to implement the four LoAs. It also provides guidance for the mapping of other
authentication assurance schemes to the specified four levels, as well as guidance for exchanging the results of an
authentication transaction. Finally, this Recommendation | International Standard provides informative guidance
concerning the protection of personally identifiable information (PII) associated with the authentication process.
This Recommendation | International Standard is intended to be used principally by credential service providers (CSPs) and
by others having an interest in their services (e.g., replying parties, assessors and auditors of those services). This Entity
Authentication Assurance Framework (EAAF) specifies the minimum technical, management, and process requirements for
four LoAs to ensure equivalence among credentials issued by various CSPs. It also provides some additional management
vi
© ISO/IEC 2012 – All rights reserved

---------------------- Page: 6 ----------------------
ISO/IEC 29115:2012 (E)

and organizational considerations that affect entity authentication assurance, but it does not set forth specific criteria for
those considerations. Relying Parties (RPs) and others may find this Recommendation | International Standard helpful to
gain an understanding of what each LoA provides. Additionally, it may be adopted for use within a trust framework to
define technical requirements for LoAs. The EAAF is intended for, but not limited to, session-based and document-centric
use cases using various authentication technologies. Both direct and brokered trust scenarios are possible, within either
bilateral or federated legal constellations.
vii
© ISO/IEC 2012 – All rights reserved

---------------------- Page: 7 ----------------------
ISO/IEC 29115:2012 (E)

INTERNATIONAL STANDARD <29115>
ITU-T RECOMMENDATION

Information technology — Security techniques — Entity authentication assurance framework

1 Scope

This Recommendation | International Standard provides a framework for managing entity authentication assurance in a
given context. In particular, it:
- specifies four levels of entity authentication assurance;
- specifies criteria and guidelines for achieving each of the four levels of entity authentication assurance;
- provides guidance for mapping other authentication assurance schemes to the four LoAs;
- provides guidance for exchanging the results of authentication that are based on the four LoAs; and
- provides guidance concerning controls that should be used to mitigate authentication threats.

2 Normative references
The following Recommendations and International Standards contain provisions which, through reference in this text,
constitute provisions of this Recommendation | International Standard. At the time of publication, the editions indicated
were valid. All Recommendations and Standards are subject to revision, and parties to agreements based on this
Recommendation | International Standard are encouraged to investigate the possibility of applying the most recent
edition of the Recommendations and Standards listed below. Members of IEC and ISO maintain registers of currently
valid International Standards. The Telecommunication Standardization Bureau of the ITU maintains a list of currently
valid ITU-T Recommendations.
2.1 Identical Recommendations | International Standards
None.
2.2 Paired Recommendations | International Standards
None.
2.3 Additional references
None.

3 Definitions
For the purposes of this Recommendation | International Standard, the following definitions apply:
3.1 Assertion: Statement made by an entity without accompanying evidence of its validity [ITU-T X.1252].
NOTE - The meaning of the terms claim and assertion are generally agreed to be somewhat similar but with
slightly different meanings. For the purposes of this Recommendation | International Standard, an assertion is
considered to be a stronger statement than a claim.
3.2 Authentication: Provision of assurance in the identity of an entity [ISO/IEC 18014-2].
3.3 Authentication Factor: Piece of information and/or process used to authenticate or verify the identity of an
entity [ISO/IEC 19790].
ITU-T Rec. X.1254 (06/2012)      1

---------------------- Page: 8 ----------------------
ISO/IEC 29115:2012 (E)

NOTE - Authentication factors are divided into four categories:
- something an entity has (e.g., device signature, passport, hardware device containing a credential, private
key);
- something an entity knows (e.g., password, PIN);
- something an entity is (e.g., biometric characteristic); or
- something an entity typically does (e.g., behaviour pattern).
3.4 Authentication Protocol: Defined sequence of messages between an entity and a verifier that enables the
verifier to perform authentication of an entity.
3.5 Authoritative Source: Repository which is recognized as being an accurate and up-to-date source of
information.
3.6 Claim: Statement that something is the case, without being able to give proof [ITU-T X.1252].
NOTE - The meaning of the terms claim and assertion are generally agreed to be somewhat similar but with
slightly different meanings. For the purposes of this Recommendation | International Standard, an assertion is
considered to be a stronger statement than a claim.
3.7 Context: Environment with defined boundary conditions in which entities exist and interact [ITU-T X.1252].
3.8 Credential: Set of data presented as evidence of a claimed or asserted identity and/or entitlements.
NOTE – See Annex B for additional characteristics of a credential.
3.9 Credential Service Provider: Trusted actor that issues and/or manages credentials.
3.10  Entity: Something that has separate and distinct existence and that can be identified in a context [ITU-T
X.1252].
NOTE – For the purposes of this Recommendation | International Standard, entity is also used in the specific
case for something that is claiming an identity.
3.11 Entity Authentication Assurance: Degree of confidence reached in the authentication process that the entity
is what it is, or is expected to be [X.1252].
NOTE – The confidence is based on the degree of confidence in the binding between the entity and the identity
that is presented.
3.12 Identifier: One or more attributes that uniquely characterize an entity in a specific context.
3.13 Identity: Set of attributes related to an entity [ISO/IEC 24760].
NOTE - Within a particular context, an identity can have one or more identifiers to allow an entity to be
uniquely recognized within that context.
3.14 Identity Information Verification: Process of checking identity information and credentials against issuers,
data sources, or other internal or external resources with respect to authenticity, validity, correctness, and binding to the
entity.
3.15 Identity Proofing: Process by which the Registration Authority (RA) captures and verifies sufficient
information to identify an entity to a specified or understood level of assurance.
3.16 Man-in-the-middle Attack: Attack in which an attacker is able to read, insert, and modify messages between
two parties without their knowledge.
3.17 Multifactor Authentication: Authentication with at least two independent authentication factors [ISO/IEC
19790].
3.18 Mutual Authentication: Authentication of identities of entities which provides both entities with assurance
of each other's identity.
3.19 Non-repudiation: Ability to protect against denial by one of the entities involved in an action of having
participated in all or part of the action [X.1252].
3.20 Phishing: Scam by which an email user is duped into revealing personal or confidential information which
the scammer can then use illicitly.
3.21 Registration Authority: Trusted actor that establishes and/or vouches for the identity of an entity to a CSP.
3.22 Relying Party: Actor that relies on an identity assertion or claim.
2     ITU-T Rec. X.1254 (06/2012)

---------------------- Page: 9 ----------------------
ISO/IEC 29115:2012 (E)

3.23 Repudiation: Denial in having participated in all or part of an action by one of the entities involved
[X.1252].
3.24 Salt: Non-secret, often random, value that is used in a hashing process.
 NOTE - It is also referred to as sand.
3.25     Shared Secret: Secret used in authentication that is known only to the entity and the verifier.
3.26 Time Stamp: Reliable time variant parameter which denotes a point in time with respect to a common
reference.
3.27 Transaction: Discrete event between an entity and service provider that supports a business or programmatic
purpose.
3.28 Trust Framework: Set of requirements and enforcement mechanisms for parties exchanging identity
information.
3.29 Trusted Third Party: Authority or its agent, trusted by other actors with respect to specified activities (e.g.,
security-related activities).
NOTE - A trusted third party is trusted by an entity and/or a verifier for the purposes of authentication.
3.30 Validity Period: Time period during which an identity or credential may be used in one or more transactions.
3.31 Verification: Process of checking information by comparing the provided information with previously
corroborated information.
3.32 Verifier: Actor that corroborates identity information.
NOTE – The verifier can participate in multiple phases of the EAAF and can perform credential verification
and/or identity information verification.

4 Abbreviations
For the purposes of this Recommendation | International Standard, the following abbreviations apply:
CSP Credential Service Provider
EAA Entity Authentication Assurance
EAAF Entity Authentication Assurance Framework
IdM Identity Management
ICT Information and Communications Technology
IP Internet Protocol
LoA Level of Assurance
LoAs Levels of Assurance
MAC Media Access Control
NPE Non-Person Entity
PII Personally Identifiable Information
PIN Personal Identification Number
RA Registration Authority
RP Relying Party
SAML Security Assertion Markup Language
SSL Secure Sockets Layer
TCP/IP Transmission Control Protocol/Internet Protocol
ITU-T Rec. X.1254 (06/2012)      3

---------------------- Page: 10 ----------------------
ISO/IEC 29115:2012 (E)

TLS Transport Layer Security
TPM Trusted Platform Module
TTP Trusted Third Party
URL Uniform Resource Locator

5 Conventions
This Recommendation | International Standard follows the ISO Directive, Part 2, Annex H regarding verbal forms for
the expression of provisions.
a) “Shall” indicates a requirement;
b) “Should” indicates a recommendation;
c) “May” indicates a permission; and
d) “Can” indicates a possibility and capability.

6 Levels of assurance
This Entity Authentication Assurance Framework (EAAF) defines four levels of assurance (LoA) for entity
authentication. Each LoA describes the degree of confidence in the processes leading up to and including the
authentication process itself, thus providing assurance that the entity that uses a particular identity is in fact the entity to
which that identity was assigned. For the purposes of this Recommendation | International Standard, LoA is a function
of the processes, management activities, and technical controls that have been implemented by a CSP for each of the
EAAF phases based on the criteria set forth in Clause 10. Entity Authentication Assurance (EAA) is affected by
management and organizational considerations, but this Recommendation | International Standard does not provide
explicit normative criteria for those considerations. An entity can be a human or a non-person entity (NPE).
For example, a network’s LoA could be a function of the LoAs of all components that make up the network and
includes NPEs or endpoint devices (e.g., mobile phones, PDAs, set-top boxes, laptops).  In some instances, endpoint
devices may impersonate legitimate entities. Consequently, the ability to distinguish a trusted device, with some degree
of confidence, from a rogue device is fundamental to EAA.
LoA1 is the lowest level of assurance, and LoA4 is the highest level of assurance specified in this Recommendation |
International Standard. Determining which LoA is appropriate in a given situation depends on a variety of factors. The
determination of the required LoA is based mainly on risk: the consequences of an authentication error and/or misuse of
credentials, the resultant harm and impact, and their likelihood of occurrence. Higher LoAs shall be used for higher
perceived risk.
The EAAF provides requirements and implementation guidance for each of the four LoAs. In particular, it provides
requirements for the implementation of processes for the following phases:
a) Enrolment (e.g., identity proofing, identity verification, registration);
b) Credential management (e.g., credential issuance, credential activation); and
c) Authentication.
It also provides guidance regarding management and organizational considerations (e.g., legal compliance, information
security management) that affect entity authentication assurance.
The LoAs are defined as shown in Table 6-1.

4     ITU-T Rec. X.1254 (06/2012)

---------------------- Page: 11 ----------------------
ISO/IEC 29115:2012 (E)

1
Table 6-1 – Levels of assurance
Level Description
1 – Low Little or no confidence in the claimed or asserted identity
2 – Medium Some confidence in the claimed or asserted identity
3 – High High confidence in the claimed or asserted identity
4 – Very high Very high confidence in the claimed or asserted identity
This framework contains requirements to achieve a desired LoA for each entity authentication assurance framework
phase. The overall LoA achieved by an implementation using this framework will be the level of the phase with the
lowest LoA.
6.1 Level of assurance 1 (LoA1)
At LoA1, there is minimal confidence in the claimed or asserted identity of the entity, but some confidence that the
entity is the same over consecutive authentication events. This LoA is used when minimum risk is associated with
erroneous authentication. There is no specific requirement for the authentication mechanism used; only that it provides
some minimal assurance. A wide range of available technologies, including the credentials associated with higher
LoAs, can satisfy the entity authentication assurance requirements for this LoA. This level does not require use of
cryptographic authentication methods (e.g., cryptographic-based challenge-response protocol).
For example, LoA1 may be applicable for authentication in which an entity presents a self-registered username or
password to a service provider’s web site to create a customized page, or transactions involving web sites that require
registration for access to materials and documentation, such as news or product documentation.
For example, at LoA1, a media access control (MAC) address may satisfy a device authentication requirement.
However, there is little confidence that another device will not be able to use the same MAC address.
6.2 Level of assurance 2 (LoA2)
At LoA2, there is some confidence in the claimed or asserted identity of the entity. This LoA is used when moderate
risk is associated with erroneous authentication. Single-factor authentication is acceptable. Successful authentication
shall be dependent upon the entity proving, through a secure authentication protocol, that the entity has control of the
credential. Controls should be in place to reduce the effectiveness of eavesdropper and online guessing attacks.
Controls shall be in place to protect against attacks on stored credentials.
For example, a service provider might operate a website that enables its customers to change their address of record.
The transaction in which a beneficiary changes an address of record may be considered a LoA2 authentication
transaction, as the transaction may involve a moderate risk of inco
...

DRAFT INTERNATIONAL STANDARD ISO/IEC DIS 29115
ISO/IEC JTC 1 Secretariat: ANSI

Voting begins on Voting terminates on
2011-11-23 2012-04-23
INTERNATIONAL ORGANIZATION FOR STANDARDIZATION • МЕЖДУНАРОДНАЯ ОРГАНИЗАЦИЯ ПО СТАНДАРТИЗАЦИИ • ORGANISATION INTERNATIONALE DE NORMALISATION
INTERNATIONAL ELECTROTECHNICAL COMMISSION • МЕЖДУНАРОДНАЯ ЭЛЕКТРОТЕХНИЧЕСКАЯ КОММИСИЯ • COMMISSION ÉLECTROTECHNIQUE INTERNATIONALE


Information technology — Security techniques — Entity
authentication assurance framework
Technologies de l'information — Techniques de sécurité — Cadre d'assurance de l'authentification d'entité
ICS 35.040



In accordance with the provisions of Council Resolution 21/1986 this DIS is circulated in the
English language only.
Conformément aux dispositions de la Résolution du Conseil 21/1986, ce DIS est distribué en
version anglaise seulement.

To expedite distribution, this document is circulated as received from the committee
secretariat. ISO Central Secretariat work of editing and text composition will be undertaken at
publication stage.
Pour accélérer la distribution, le présent document est distribué tel qu'il est parvenu du
secrétariat du comité. Le travail de rédaction et de composition de texte sera effectué au
Secrétariat central de l'ISO au stade de publication.


THIS DOCUMENT IS A DRAFT CIRCULATED FOR COMMENT AND APPROVAL. IT IS THEREFORE SUBJECT TO CHANGE AND MAY NOT BE
REFERRED TO AS AN INTERNATIONAL STANDARD UNTIL PUBLISHED AS SUCH.
RPOSES,
IN ADDITION TO THEIR EVALUATION AS BEING ACCEPTABLE FOR INDUSTRIAL, TECHNOLOGICAL, COMMERCIAL AND USER PU
DRAFT INTERNATIONAL STANDARDS MAY ON OCCASION HAVE TO BE CONSIDERED IN THE LIGHT OF THEIR POTENTIAL TO BECOME
STANDARDS TO WHICH REFERENCE MAY BE MADE IN NATIONAL REGULATIONS.
RECIPIENTS OF THIS DRAFT ARE INVITED TO SUBMIT, WITH THEIR COMMENTS, NOTIFICATION OF ANY RELEVANT PATENT RIGHTS OF WHICH
THEY ARE AWARE AND TO PROVIDE SUPPORTING DOCUMENTATION.
International Organization for Standardization, 2011
©
International Electrotechnical Commission, 2011

---------------------- Page: 1 ----------------------
ISO/IEC DIS 29115

Copyright notice
This ISO document is a Draft International Standard and is copyright-protected by ISO. Except as permitted
under the applicable laws of the user's country, neither this ISO draft nor any extract from it may be
reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic,
photocopying, recording or otherwise, without prior written permission being secured.
Requests for permission to reproduce should be addressed to either ISO at the address below or ISO's
member body in the country of the requester.
ISO copyright office
Case postale 56 • CH-1211 Geneva 20
Tel. + 41 22 749 01 11
Fax + 41 22 749 09 47
E-mail copyright@iso.org
Web www.iso.org
Reproduction may be subject to royalty payments or a licensing agreement.
Violators may be prosecuted.
ii © ISO/IEC 2011 — All rights reserved

---------------------- Page: 2 ----------------------
ISO/IEC 29115:2011 (E)

CONTENTS
Page
Foreword…………………………………………………………….……………………………………………………….iii
Summary  …………………………………………….……………………………….……………………………………iv
1 Scope . 1
2 Normative references . 1
2.1 Identical Recommendations | International Standards . 1
2.2 Paired Recommendations | International Standards . 1
2.3 Additional references . 1
3 Definitions . 1
4 Abbreviations . 3
5 Conventions . 4
6 Levels of assurance . 4
6.1 Level of assurance 1 (LoA1) . 5
6.2 Level of assurance 2 (LoA2) . 5
6.3 Level of assurance 3 (LoA3) . 5
6.4 Level of assurance 4 (LoA4) . 5
6.5 Selecting the appropriate level of assurance . 6
6.6 LoA mapping and interoperability . 7
6.7 Exchanging authentication results based on the 4 LoAs . 7
7 Actors . 8
7.1 Entity . 8
7.2 Credential service provider . 8
7.3 Registration authority . 8
7.4 Relying party . 8
7.5 Verifier . 9
7.6 Trusted third party . 9
8 Entity authentication assurance framework phases . 9
8.1 Enrolment phase . 9
8.1.1 Application and initiation . 9
8.1.2 Identity proofing . 10
8.1.3 Identity verification . 11
8.1.4 Record-keeping/recording . 11
8.1.5 Registration . 11
8.2 Credential management phase . 11
8.2.1 Credential creation . 11
8.2.2 Credential issuance. 12
8.2.3 Credential activation . 12
8.2.4 Credential storage . 12
8.2.5 Credential suspension, revocation, and/or destruction . 12
8.2.6 Credential renewal and/or replacement . 13
8.2.7 Record-keeping . 13
ITU-T Rec. X.1254 (11/2011) i
DRAFT 2011

---------------------- Page: 3 ----------------------
ISO/IEC 29115:2011 (E)
8.3 Entity authentication phase . 13
8.3.1 Authentication . 13
8.3.2 Record-keeping . 13
9 Management and organizational considerations . 14
9.1 Service establishment . 14
9.2 Legal and contractual compliance . 14
9.3 Financial provisions . 14
9.4 Information security management and audit . 14
9.5 External service components . 14
9.6 Operational infrastructure . 15
9.7 Measuring operational capabilities. 15
10 Threats and controls . 15
10.1 Threats to and controls for the enrolment phase . 15
10.1.1 Enrolment phase threats . 15
10.1.2 Controls against enrolment phase threats by LoA . 15
10.2 Threats to and controls for the credential management phase . 18
10.2.1 Credential management threats . 18
10.2.2 Controls against credential management phase threats by LoA . 19
10.3 Threats to and controls for the authentication phase . 22
10.3.1 Authentication phase threats . 22
10.3.2 Controls against authentication phase threats by LoA . 23
11 Service assurance criteria . 26
Annex A – Privacy and protection of PII………………………….………………….…………………………………….27
Annex B – Characteristics of a credential.…….……… ….………….………………….…………………….28
Annex C – Bibliography.………………. ….………….………………….…………………………………….29





ii     ITU-T Rec. X.1254 (11/2011)
DRAFT 2011

---------------------- Page: 4 ----------------------
ISO/IEC 29115:2011 (E)

Foreword
The International Telecommunication Union (ITU) is the United Nations specialized agency in the field of
telecommunications. The ITU Telecommunication Standardisation Sector (ITU-T) is a permanent organ of ITU. ITU-T is
responsible for studying technical, operating, and tariff questions and issuing Recommendations on them with a view to
standardising telecommunications on a world-wide basis. The World Telecommunication Standardisation Assembly
(WTSA), which meets every four years, establishes the topics for study by the ITU-T study groups that, in turn, produce
Recommendations on these topics. The approval of ITU-T Recommendations is covered by the procedure laid down in
WTSA Resolution 1. In some areas of information technology that fall within ITU-T's purview, the necessary standards are
prepared on a collaborative basis with ISO and IEC.
ISO (the International Organization for Standardization) and IEC (the International Electrotechnical Commission) form the
specialized system for worldwide standardization. National bodies that are members of ISO or IEC participate in the
development of International Standards through technical committees established by the respective organization to deal with
particular fields of technical activity. ISO and IEC technical committees collaborate in fields of mutual interest. Other
international organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the work. In
the field of information technology, ISO and IEC have established a joint technical committee, ISO/IEC JTC 1.
International Standards are drafted in accordance with the rules given in the ISO/IEC Directives, Part 2.
The main task of the joint technical committee is to prepare International Standards. Draft International Standards adopted
by the joint technical committee are circulated to national bodies for voting. Publication as an International Standard
requires approval by at least 75 % of the national bodies casting a vote.
Attention is drawn to the possibility that some of the elements of this document may be the subject of patent rights. ISO and
IEC shall not be held responsible for identifying any or all such patent rights.
ISO/IEC 29115 was prepared by Joint Technical Committee ISO/IEC JTC 1, Information technology, Subcommittee SC 27,
Security techniques. The identical text is published as ITU-T Recommendation X.1254.

ITU-T Rec. X.1254 (11/2011) iii
DRAFT 2011

---------------------- Page: 5 ----------------------
ISO/IEC 29115:2011 (E)
Summary
Many electronic transactions within or between ICT systems have security requirements which depend upon an understood
or specified level of confidence in the identities of the entities involved. Such requirements may include the protection of
assets and resources against unauthorized access, for which an access control mechanism might be used, and/or the
enforcement of accountability by the maintenance of audit logs of relevant events, as well as for accounting and charging
purposes.
This Recommendation | International Standard provides a framework for entity authentication assurance. Assurance within
this Recommendation | International Standard refers to the confidence placed in all of the processes, management activities,
and technologies used to establish and manage the identity of an entity for use in authentication transactions.

Technical Management
&

Organizational

• Application and initiation • Record-keeping • Service establishment
Enrolment


• Identity proofing recording • Legal and contractual
phase
compliance
• Identity verification • Registration
• Financial provisions
• Information security
management and audit
• Credential creation • Credential storage

• External service
• Credential pre-processing • Credential suspension,

components
• Credential initialization revocation, and/or
Credential
• Operational
destruction
• Credential binding
management
infrastructure
• Credential renewal
• Credential issuance
phase
• Measuring operational
and/or replacement
• Credential activation
capabilities
• Record-keeping
Entity
• Authentication


authentication
• Record-keeping
phase

Figure 1 – Overview of the Entity Authentication Assurance Framework

Using four specified Levels of Assurance (LoAs), this Recommendation | International Standard provides guidance
concerning control technologies, processes, and management activities, as well as assurance criteria, that should be used to
mitigate authentication threats in order to implement the four LoAs. It also provides guidance for the mapping of other
authentication assurance schemes to the specified four levels, as well as guidance for exchanging the results of an
authentication transaction. Finally, this Recommendation | International Standard provides informative guidance
concerning the protection of personally identifiable information (PII) associated with the authentication process.
This Recommendation | International Standard is intended to be used principally by CSPs and by others having an interest
in their services (e.g., RPs, assessors and auditors of those services). This Entity Authentication Assurance Framework
(EAAF) specifies the minimum technical, management, and process requirements for four LoAs to ensure equivalence
among credentials issued by various CSPs. It also provides some additional management and organizational considerations
iv     ITU-T Rec. X.1254 (11/2011)
DRAFT 2011

---------------------- Page: 6 ----------------------
ISO/IEC 29115:2011 (E)

that affect entity authentication assurance, but it does not set forth specific criteria for those considerations. Relying Parties
(RPs) and others may find this Recommendation | International Standard helpful to gain an understanding of what each LoA
provides. Additionally, it may be adopted for use within a trust framework to define technical requirements for LoAs. The
EAAF is intended for, but not limited to, session-based and document-centric use cases using various authentication
technologies. Both direct and brokered trust scenarios are possible, within either bilateral or federated legal constellations.
ITU-T Rec. X.1254 (11/2011) v
DRAFT 2011

---------------------- Page: 7 ----------------------
ISO/IEC 29115:2011 (E)

INTERNATIONAL STANDARD <29115>
ITU-T RECOMMENDATION

Information technology — Security techniques — Entity authentication assurance framework

1 Scope

This Recommendation | International Standard provides a framework for managing entity authentication assurance in a
given context. In particular, it:
- specifies four levels of entity authentication assurance;
- specifies criteria and guidelines for achieving each of the four levels of entity authentication assurance;
- provides guidance for mapping other authentication assurance schemes to the four LoAs;
- provides guidance for exchanging the results of authentication that are based on the four LoAs; and
- provides guidance concerning controls that should be used to mitigate authentication threats.

2 Normative references
The following Recommendations and International Standards contain provisions which, through reference in this text,
constitute provisions of this Recommendation | International Standard. At the time of publication, the editions indicated
were valid. All Recommendations and Standards are subject to revision, and parties to agreements based on this
Recommendation | International Standard are encouraged to investigate the possibility of applying the most recent
edition of the Recommendations and Standards listed below. Members of IEC and ISO maintain registers of currently
valid International Standards. The Telecommunication Standardization Bureau of the ITU maintains a list of currently
valid ITU-T Recommendations.
2.1 Identical Recommendations | International Standards
None.
2.2 Paired Recommendations | International Standards
None.
2.3 Additional references
None.

3 Definitions
For the purposes of this Recommendation | International Standard, the following definitions apply:
3.1 Assertion: Statement made by an entity without accompanying evidence of its validity [ITU-T X.1252].
NOTE - The meaning of the terms claim and assertion are generally agreed to be somewhat similar but with
slightly different meanings. For the purposes of this Recommendation | International Standard, an assertion is
considered to be a stronger statement than a claim.
3.2 Authentication: Provision of assurance in the claimed identity of an entity [ISO/IEC 18014-2].
3.3 Authentication Factor: Piece of information and process used to authenticate or verify the identity of an
entity [ISO/IEC 19790].
ITU-T Rec. X.1254 (11/2011) 1
DRAFT 2011

---------------------- Page: 8 ----------------------
ISO/IEC 29115:2011 (E)
NOTE - Authentication factors are divided into four categories:
- something an entity has (e.g., device signature, passport, hardware device containing a credential, private
key);
- something an entity knows (e.g., password, PIN);
- something an entity is (e.g., biometric characteristic); or
- something an entity typically does (e.g., behaviour pattern).
3.4 Authentication Protocol: Defined sequence of messages between an entity and a verifier that enables the
verifier to corroborate the entity’s identity.
3.5 Authoritative Source: Repository which is recognized as being an accurate and up-to-date source of
information.
3.6 Claim: Statement that something is the case, without being able to give proof [ITU-T X.1252].
NOTE - The meaning of the terms claim and assertion are generally agreed to be somewhat similar but with
slightly different meanings. For the purposes of this Recommendation | International Standard, an assertion is
considered to be a stronger statement than a claim.
3.7 Context: Environment with defined boundary conditions in which entities exist and interact [ITU-T X.1252].
3.8 Credential: Set of data presented as evidence of an asserted identity and/or entitlements [ITU-T X.1252].
NOTE – See Annex A for additional characteristics of a credential.
3.9 Credential Service Provider: Trusted actor that issues and/or manages credentials.
  NOTE - The Credential Service Provider (CSP) may encompass Registration Authorities (RAs) and verifiers
  that it operates. A CSP may be an independent third party, or it may issue credentials for its own use.
3.10  Entity: Something that has separate and distinct existence and that can be identified in a context [ITU-T
X.1252].
NOTE – For the purposes of this Recommendation | International Standard, entity is also used in the specific
case for something that is claiming an identity.
3.11 Entity Authentication Assurance: Degree of confidence reached in the authentication process that the entity
is what it claims to be or is expected to be [X.1252].
NOTE – The confidence is based on the degree of confidence in the binding between the entity and the identity
that is presented.
3.12 Identifier: One or more attributes that uniquely characterize an entity in a specific context.
3.13 Identity: Set of attributes related to an entity [ISO/IEC 24760].
NOTE - Within a particular context, an identity may have one or more identifiers to allow an entity to be
uniquely recognized within that context.
3.14 Identity Proofing: Process by which the Registration Authority (RA) captures and verifies sufficient
information to identify an entity to a specified or understood level of assurance.
3.15 Man-in-the-middle Attack: Attack in which an attacker is able to read, insert, and modify messages between
two parties without their knowledge.
3.16 Multifactor Authentication: Authentication with at least two independent authentication factors [ISO/IEC
19790].
3.17 Mutual Authentication: Authentication of identities of entities which provides both entities with assurance
of each other's identity.
3.18 Non-repudiation: Ability to protect against denial by one of the entities involved in an action of having
participated in all or part of the action [X.1252].
3.19 Registration Authority: Trusted actor that establishes and/or verifies and vouches for the identity of an entity
to a CSP.
NOTE - The RA may be an integral part of a CSP, or it may be independent from a CSP, but it has a
relationship with the CSP.
3.20 Relying Party: Actor that relies on an identity assertion or claim.
2     ITU-T Rec. X.1254 (11/2011)
DRAFT 2011

---------------------- Page: 9 ----------------------
ISO/IEC 29115:2011 (E)

3.21 Repudiation: Denial by an entity of a claimed event or action.
3.22 Salt: Non-secret, often random, value that is used in a hashing process.
 NOTE - It is also referred to as sand.
3.23     Shared Secret: Secret used in authentication that is known only to the entity and the verifier.
3.24 Time Stamp: Reliable time variant parameter which denotes a point in time with respect to a common
reference.
3.25 Transaction: Discrete event between an entity and service provider that supports a business or programmatic
purpose.
3.26 Trust Framework: Set of requirements and enforcement mechanisms for parties exchanging identity
information.
3.27 Trusted Third Party: Authority or its agent, trusted by other actors with respect to security related activities.
NOTE - A trusted third party is trusted by an entity and/or a verifier for the purposes of authentication.
3.28 Validity Period: Time period during which an identity or credential may be used in one or more transactions.
3.29 Verification: Process of checking information by comparing the provided information with previously
corroborated information and the binding to the entity.
3.30 Verifier: Actor that corroborates identity information.
3.31 Verify: Check information by comparing the provided information with previously corroborated information
and the binding to the entity.

4 Abbreviations
For the purposes of this International Standard | Recommendation, the following abbreviations apply:
CSP Credential Service Provider
EAA Entity Authentication Assurance
EAAF Entity Authentication Assurance Framework
IdM Identity Management
ICT Information and Communications Technology
IP Internet Protocol
LoA Level of Assurance
LoAs Levels of Assurance
MAC Media Access Control
NPE Non-Person Entity
PII Personally Identifiable Information
PIN Personal Identification Number
RA Registration Authority
RP Relying Party
SAML Security Assertion Markup Language
SSL Secure Sockets Layer
TCP/IP Transmission Control Protocol/Internet Protocol
TLS Transport Layer Security
ITU-T Rec. X.1254 (11/2011) 3
DRAFT 2011

---------------------- Page: 10 ----------------------
ISO/IEC 29115:2011 (E)
TPM Trusted Platform Module
TTP Trusted Third Party
URL Uniform Resource Locator

5 Conventions
This Recommendation | International Standard follows the ISO Directive, Part 2, Annex H regarding verbal forms for
the expression of provisions.
a) “Shall” indicates a requirement;
b) “Should” indicates a recommendation;
c) “May” indicates a permission;
d) “Can” indicates a possibility and capability.

6 Levels of assurance
This Entity Authentication Assurance Framework (EAAF) defines four levels of assurance (LoA) for entity
authentication. Each LoA describes the degree of confidence in the processes leading up to and including the
authentication process itself, thus providing assurance that the entity claiming a particular identity (i.e., the entity) is in
fact the entity to which that identity was assigned. For the purposes of this Recommendation | International Standard,
LoA is a function of the process and technical controls that have been implemented by a CSP for each of the EAAF
phases based on the criteria set forth in Clause 10. Entity Authentication Assurance (EAA) is affected by management
and organizational considerations, but this Recommendation | Standard does not provide explicit normative criteria for
those considerations. An entity can be a human or a non-person entity (NPE).
For example, a network’s LoA could be a function of all components that make up the network and includes NPEs or
endpoint devices (e.g., mobile phones, PDAs, set-top boxes, laptops) that can impersonate entities. Consequently, the
ability to distinguish with some degree of confidence a trusted versus rogue device is fundamental to the EAAF.
LoA1 is the lowest level of assurance, and LoA4 is the highest level of assurance. Determining which LoA is
appropriate in a given situation depends on a variety of factors. The determination of the required LoA is based mainly
on risk: the consequences of an authentication error and/or misuse of credentials, the resultant harm and impact, and
their likelihood of occurrence. Higher LoAs shall be used for higher perceived risk.
The EAAF provides requirements and implementation guidance for each of the four LoAs. In particular, it provides
requirements for the implementation of processes for the following phases:
a) Enrolment (e.g., identity proofing, identity verification, registration);
b) Credential management (e.g., credential issuance, credential activation); and
c) Authentication.
It also provides guidance regarding management and organizational considerations (e.g., legal compliance, information
security management) that affect entity authentication assurance.
The LoAs are defined as shown in Table 6-1.
1
Table 6-1 – Levels of assurance
Level Description
1 – Low Little or no confidence in the asserted identity

1
LoA is a function of the process and technical
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.