CSA ISO/IEC 9594-8 : 0
Withdrawn
A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.
INFORMATION TECHNOLOGY - OPEN SYSTEMS INTERCONNECTION - THE DIRECTORY: AUTHENTICATION FRAMEWORK
Hardcopy , PDF
21-03-2003
English
1 SECTION 1 - GENERAL
1 Scope
2 Normative references
2.1 Identical Recommendations - International
Standards
2.2 Paired Recommendations - International
Standards equivalent in technical content
3 Definitions
3.1 OSI Reference Model security architecture
definitions
3.2 Directory model definitions
3.3 Authentication framework definitions
4 Abbreviations
5 Conventions
SECTION 2 - SIMPLE AUTHENTICATION
6 Simple authentication procedure
6.1 Generation of protected identifying information
6.2 Procedure for protected simple authentication
6.3 User Password attribute type
SECTION 3 - STRONG AUTHENTICATION
7 Basis of strong authentication
8 Obtaining a user's public key
8.1 Optimization of the amount of information
obtained fro the Directory
8.2 Example
9 Digital signatures
10 Strong authentication procedures
10.1 Overview
10.2 One-way authentication
10.3 Two-way authentication
10.4 Three-way authentication
11 Management of keys and certificates
11.1 Generation of key pairs
11.2 Management of certificates
Annex A - Authentication Framework in ASN.1
Annex B - Security requirements
Annex C - An introduction to public key cryptography
Annex D - The RSA Public Key Cryptosystem
Annex E - Hash functions
Annex F - Threats protected against by the strong
authentication method
Annex G - Data confidentiality
Annex H - Reference definition of algorithm object
identifiers
Annex J - Amendments and corrigenda
This standard: - specifies the form of authentication information held by the Directory; - describes how authentication information may be obtained from the Directory; - states the assumptions made about how authentication information is formed and placed in the Directory; - defines three ways in which applications may use this authentication information to perform authentication and describes how other security services may be supported by authentication. Describes two levels of authentication: simple authentication, using a password as a verification of claimed identity; and strong authentication, involving credentials formed using cryptographic techniques.
DocumentType |
Standard
|
Pages |
48
|
PublisherName |
Canadian Standards Association
|
Status |
Withdrawn
|
Standards | Relationship |
ISO/IEC 9594-8:2017 | Similar to |
ISO 7498-2:1989 | Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.