• Shopping Cart
    There are no items in your cart

ISO/IEC 29146:2016

Superseded

Superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

View Superseded by

Information technology — Security techniques — A framework for access management

Available format(s)

Hardcopy , PDF , PDF 3 Users , PDF 5 Users , PDF 9 Users

Superseded date

19-01-2024

Superseded by

ISO/IEC 29146:2024

Language(s)

English, French

Published date

01-06-2016

€60.00
Excluding VAT

ISO/IEC 29146:2016 defines and establishes a framework for access management (AM) and the secure management of the process to access information and Information and Communications Technologies (ICT) resources, associated with the accountability of a subject within some context.

This International Standard provides concepts, terms and definitions applicable to distributed access management techniques in network environments.

This International Standard also provides explanations about related architecture, components and management functions.

The subjects involved in access management might be uniquely recognized to access information systems, as defined in ISO/IEC 24760.

The nature and qualities of physical access control involved in access management systems are outside the scope of this International Standard.

Committee
ISO/IEC JTC 1/SC 27
DocumentType
Standard
Pages
35
PublisherName
International Organization for Standardization
Status
Superseded
SupersededBy
UnderRevision

17/30349181 DC : 0 BS ISO/IEC 24760-1 AMENDMENT 1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - A FRAMEWORK FOR IDENTITY MANAGEMENT - PART 1: TERMINOLOGY AND CONCEPTS
10/30143797 DC : 0 BS ISO/IEC 24760-1 - INFROMATION TECHNOLOGY - SECURITY TECHNIQUES - A FRAMEWORK FOR IDENTITY MANAGEMENT - PART 1: TERMINOLOGY AND CONCEPTS
BS ISO/IEC 24760-1:2011 Information technology. Security techniques. A framework for identity management Terminology and concepts
ISO/IEC 24760-1:2011 Information technology Security techniques A framework for identity management Part 1: Terminology and concepts
ISO/IEC TR 30117:2014 Information technology Guide to on-card biometric comparison standards and applications
ISO/IEC 24760-3:2016 Information technology — Security techniques — A framework for identity management — Part 3: Practice
ISO/IEC 24760-2:2015 Information technology — Security techniques — A framework for identity management — Part 2: Reference architecture and requirements
CAN/CSA-ISO/IEC 24760-3:18 Information technology — Security techniques — A framework for identity management — Part 3: Practice (Adopted ISO/IEC 24760-3:2016, first edition, 2016-08-01)

ISO/IEC 24760-2:2015 Information technology — Security techniques — A framework for identity management — Part 2: Reference architecture and requirements
ISO/IEC 24760-1:2011 Information technology Security techniques A framework for identity management Part 1: Terminology and concepts
ISO/IEC 27002:2013 Information technology Security techniques Code of practice for information security controls
ISO/IEC 29115:2013 Information technology — Security techniques — Entity authentication assurance framework
ISO/IEC 10181-3:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Access control framework
ISO/IEC 9594-8:2017 Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.