ISO/IEC 24760-2:2025
(Main)Information security, cybersecurity and privacy protection — A framework for identity management — Part 2: Reference architecture and requirements
Information security, cybersecurity and privacy protection — A framework for identity management — Part 2: Reference architecture and requirements
This document: — provides guidelines for the implementation of systems for the management of identity information; — specifies requirements for the implementation and operation of a framework for identity management; — is applicable to any information system where information relating to identity is processed or stored; — is considered to be a horizontal document for the following reasons: ¾ it applies concepts such as distinguishing the term “identity” from the term “identifier” on the implementation of systems for the management of identity information and on the requirements for the implementation and operation of a framework for identity management, ¾ it provides an important contribution to assess identity management systems with regard to their privacy-friendliness and their ability to assure the relevant attributes of an identity, and consequently it provides a foundation and a common understanding for any other standard addressing identity, identity information, and identity management.
Sécurité de l'information, cybersécurité et protection de la vie privée — Cadre pour la gestion de l'identité — Partie 2: Architecture de référence et exigences
General Information
Relations
Standards Content (Sample)
International
Standard
ISO/IEC 24760-2
Second edition
Information security, cybersecurity
2025-09
and privacy protection —
A framework for identity
management —
Part 2:
Reference architecture and
requirements
Sécurité de l'information, cybersécurité et protection de la vie
privée — Cadre pour la gestion de l'identité —
Partie 2: Architecture de référence et exigences
Horizontal document
Reference number
© ISO/IEC 2025
All rights reserved. Unless otherwise specified, or required in the context of its implementation, no part of this publication may
be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting on
the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address below
or ISO’s member body in the country of the requester.
ISO copyright office
CP 401 • Ch. de Blandonnet 8
CH-1214 Vernier, Geneva
Phone: +41 22 749 01 11
Email: copyright@iso.org
Website: www.iso.org
Published in Switzerland
© ISO/IEC 2025 – All rights reserved
ii
Contents Page
Foreword .v
Introduction .vi
1 Scope . 1
2 Normative references . 1
3 Terms and definitions . 1
4 Symbols and abbreviated terms. 3
5 Reference architecture . 3
5.1 General .3
5.2 Deployment scenarios .3
5.3 Stakeholders .4
5.3.1 General .4
5.3.2 Principal .5
5.3.3 Identity management authority .5
5.3.4 Identity information authority .6
5.3.5 Relying party .6
5.3.6 Regulatory body .6
5.3.7 Consumer/citizen representative or advocate .6
5.4 Actors .7
5.4.1 General .7
5.4.2 Principal .8
5.4.3 Identity management authority .8
5.4.4 Identity registration authority .9
5.4.5 Relying party .10
5.4.6 Identity information authority .10
5.4.7 Identity information provider .11
5.4.8 Verifier . 12
5.4.9 Auditor . 13
5.5 Processes and services . 13
5.5.1 Documentation. 13
5.5.2 Identity information management processes .14
5.5.3 Specific identity information management processes . 15
5.5.4 Additional functions . .17
5.6 Viewpoints . 20
5.6.1 General . 20
5.6.2 Context viewpoint . 20
5.6.3 Functional viewpoint . 20
5.7 Use cases .21
5.7.1 General .21
5.7.2 Principal use cases . 22
5.8 Components . 23
5.8.1 General . 23
5.8.2 Principal . 23
5.8.3 Identity register . 23
5.9 Compliance and governance .24
5.10 Physical model .24
6 Architecture for managing internal identities, the enterprise model .24
6.1 Context .24
6.2 Stakeholders and concerns . 25
6.3 The enterprise deployment scenario . 26
6.4 Use cases . 26
6.4.1 Employee use cases . 26
6.4.2 Employer use cases .27
© ISO/IEC 2025 – All rights reserved
iii
7 Architecture for managing external identities .27
7.1 Context .27
7.2 Stakeholders and concerns .27
7.3 Deployment scenarios with external identities . 29
7.3.1 The federated deployment scenario . 29
7.3.2 The service deployment scenario . 29
7.3.3 The federated deployment scenario as applied as a service . 29
7.4 Use cases . 29
7.4.1 Device use cases . 29
7.4.2 Sharing use cases . 29
8 Requirements for the management of identity information .30
8.1 General . 30
8.2 Access policy for identity information . 30
8.3 Functional requirements for management of identity information . 30
8.3.1 Policy for identity information lifecycle . 30
8.3.2 Conditions and procedure to maintain identity information .31
8.3.3 Identity information interface .
...
Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.