<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.idesg.org/index.php?action=history&amp;feed=atom&amp;title=Baseline_Functional_Requirements_v1.0</id>
	<title>Baseline Functional Requirements v1.0 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.idesg.org/index.php?action=history&amp;feed=atom&amp;title=Baseline_Functional_Requirements_v1.0"/>
	<link rel="alternate" type="text/html" href="https://wiki.idesg.org/index.php?title=Baseline_Functional_Requirements_v1.0&amp;action=history"/>
	<updated>2026-05-01T07:17:44Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.38.4</generator>
	<entry>
		<id>https://wiki.idesg.org/index.php?title=Baseline_Functional_Requirements_v1.0&amp;diff=593&amp;oldid=prev</id>
		<title>Omaerz: 27 revisions imported: Initial Upload of old pages from IDESG Wiki</title>
		<link rel="alternate" type="text/html" href="https://wiki.idesg.org/index.php?title=Baseline_Functional_Requirements_v1.0&amp;diff=593&amp;oldid=prev"/>
		<updated>2018-06-28T03:00:53Z</updated>

		<summary type="html">&lt;p&gt;27 revisions imported: Initial Upload of old pages from IDESG Wiki&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;&lt;br /&gt;
Below is the list of the titles of each of the Requirements and Best Practices comprising the IDEF Baseline Functional Requirements v1.0.   Each title on this page provides a link to a separate page on this website (wiki) containing the text of the item.  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Additional commentary and supplemental material is in development and will be linked to each requirement page.  In the requirement text:  (a) Short titles for each item are included for indexing and ease of reading, but are not considered normative.  (b) Certain words are CAPITALIZED for ease of review and identifying specific roles, but that capitalization is not considered normative.&lt;br /&gt;
&lt;br /&gt;
A formal printed version of these same Requirements as approved, with IDESG logos, can be downloaded from: &amp;lt;br&amp;gt;&lt;br /&gt;
https://workspace.idesg.org/kws/public/download/442/IDEF-Baseline-Requirement-v1.0-with-Supplemental-Guidance.pdf&lt;br /&gt;
&lt;br /&gt;
== Scope ==&lt;br /&gt;
The [http://www.nist.gov/nstic National Strategy for Trusted Identities in Cyberspace (NSTIC)] envisions widespread, trusted identity exchanges using federated methods that are secure, interoperable, privacy-enhancing and easy to use.  Realization of that vision will require companies, agencies and individuals to perform at a new level.  The Requirements are our first step towards that goal, by describing a set of functions that parties must be able to fulfill, and a set of criteria for assessing those capabilities.  &lt;br /&gt;
 &lt;br /&gt;
The Requirements are an informed step forward in privacy, security, interoperability and usability based on the work of the IDESG&amp;#039;s diverse membership of practitioners expert in their respective fields. &lt;br /&gt;
 &lt;br /&gt;
Identity Ecosystem stakeholders can use the Requirements to identify and measure capabilities and services today and identify others to implement.  [http://www.idesg.org IDESG]&amp;#039;s Identity Ecosystem Framework (IDEF) includes guidance, listing and self-reporting facilities, in its [http://www.IDEFRegistry.org IDEF Registry].  The IDEF Registry supports reporting by identity service providers of their self-assessments.  IDESG plans include an option to expand this program to also accommodate third-party certification, based on execution of the initial listing and IDESG’s outreach, activities and stakeholder input.&lt;br /&gt;
&lt;br /&gt;
== Interpretation ==&lt;br /&gt;
&lt;br /&gt;
IDESG has approved and provided a [[IDEF_Glossary|Glossary of Terms]] for the IDEF program, and a list of [[APPENDIX A-Defined Terms|certain definitions]], linked below.   Defined terms that are used in these Requirements are hyperlinked, in the Requirement text displayed in this wiki, to the relevant definitions.   &lt;br /&gt;
&lt;br /&gt;
== Requirements ==&lt;br /&gt;
=== Interoperability ===&lt;br /&gt;
[[Interop Req 1|INTEROP-1.    THIRD PARTY AUTHENTICATION]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[Interop Req 2|INTEROP-2.    THIRD PARTY CREDENTIALS]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[Interop Req 3|INTEROP-3.    STANDARDIZED CREDENTIALS]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[Interop Req 4|INTEROP-4.    STANDARDIZED DATA EXCHANGES]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[Interop Req 5|INTEROP-5.    DOCUMENTED PROCESSES]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[Interop Req 6|INTEROP-6.    THIRD-PARTY COMPLIANCE]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[Interop Req 7|INTEROP-7.    USER REDRESS]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[Interop Req 8|INTEROP-8.    ACCOUNTABILITY]] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Privacy ===&lt;br /&gt;
[[Privacy Req 1|PRIVACY-1.    DATA MINIMIZATION]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[Privacy Req 2|PRIVACY-2.    PURPOSE LIMITATION]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[Privacy Req 3|PRIVACY-3.    ATTRIBUTE MINIMIZATION]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[Privacy Req 4|PRIVACY-4.    CREDENTIAL LIMITATION]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[Privacy Req 5|PRIVACY-5.    DATA AGGREGATION RISK]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[Privacy Req 6|PRIVACY-6.    USAGE NOTICE]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[Privacy Req 7|PRIVACY-7.    USER DATA CONTROL]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[Privacy Req 8|PRIVACY-8.    THIRD-PARTY LIMITATIONS]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[Privacy Req 9|PRIVACY-9.    USER NOTICE OF CHANGES]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[Privacy Req 10|PRIVACY-10.    USER OPTION TO DECLINE]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[Privacy Req 11|PRIVACY-11.    OPTIONAL INFORMATION]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[Privacy Req 12|PRIVACY-12.    ANONYMITY]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[Privacy Req 13|PRIVACY-13.    CONTROLS PROPORTIONATE TO RISK]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[Privacy Req 14|PRIVACY-14.    DATA RETENTION AND DISPOSAL]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[Privacy Req 15|PRIVACY-15.    ATTRIBUTE SEGREGATION]] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Security ===&lt;br /&gt;
[[Secure Req 1|SECURE-1.    SECURITY PRACTICES]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[Secure Req 2|SECURE-2.    DATA INTEGRITY]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[Secure Req 3|SECURE-3.    CREDENTIAL REPRODUCTION]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[Secure Req 4|SECURE-4.    CREDENTIAL PROTECTION]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[Secure Req 5|SECURE-5.    CREDENTIAL ISSUANCE]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[Secure Req 6|SECURE-6.    CREDENTIAL UNIQUENESS]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[Secure Req 7|SECURE-7.    TOKEN CONTROL]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[Secure Req 8|SECURE-8.    MULTIFACTOR AUTHENTICATION]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[Secure Req 9|SECURE-9.    AUTHENTICATION RISK ASSESSMENT]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[Secure Req 10|SECURE-10.    UPTIME]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[Secure Req 11|SECURE-11.    KEY MANAGEMENT]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[Secure Req 12|SECURE-12.    RECOVERY AND REISSUANCE]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[Secure Req 13|SECURE-13.    REVOCATION]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[Secure Req 14|SECURE-14.    SECURITY LOGS]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[Secure Req 15|SECURE-15.    SECURITY AUDITS]] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Usability ===&lt;br /&gt;
[[Usable Req 1|USABLE-1.    USABILITY PRACTICES]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[Usable Req 2|USABLE-2.    USABILITY ASSESSMENT]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[Usable Req 3|USABLE-3.    PLAIN LANGUAGE]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[Usable Req 4|USABLE-4.    NAVIGATION]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[Usable Req 5|USABLE-5.    ACCESSIBILITY]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[Usable Req 6|USABLE-6.    USABILITY FEEDBACK]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[Usable Req 7|USABLE-7.    USER REQUIREMENTS]] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Best Practices and Potential Future Requirements ==&lt;br /&gt;
&lt;br /&gt;
[[Interop Best Practice A|INTEROP-BP-A.    RECOMMENDED PORTABILITY]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[Interop Best Practice B|INTEROP-BP-B.    RECOMMENDED EXCHANGE STANDARDS]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[Interop Best Practice C|INTEROP-BP-C.    RECOMMENDED TAXONOMY STANDARDS]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[Interop Best Practice D|INTEROP-BP-D.    RECOMMENDED PROCESS MODELS]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[Interop Best Practice E|INTEROP-BP-E.    RECOMMENDED MODULARITY]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[Interop Best Practice F|INTEROP-BP-F.    RECOMMENDED FEDERATION COMPLIANCE]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[Interop Best Practice G|INTEROP-BP-G.    RECOMMENDED LEGAL COMPLIANCE]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[Privacy Best Practice A|PRIVACY-BP-A.    RECOMMENDED QUALITY CONTROLS]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[Privacy Best Practice B|PRIVACY-BP-B.    RECOMMENDED TECHNOLOGY ENFORCEMENT]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[Privacy Best Practice C|PRIVACY-BP-C.    RECOMMENDED CONSEQUENCES OF DECLINING]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[Usable Best Practice A|USABLE-BP-A.      RECOMMENDED ATTRIBUTE REQUIREMENTS QUERY]] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Defined Terms ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|&amp;gt;&amp;gt; ||&amp;#039;&amp;#039;Forward to:&amp;#039;&amp;#039;|| [[IDEF_Glossary]] &lt;br /&gt;
|-&lt;br /&gt;
|&amp;gt;&amp;gt; || || &lt;br /&gt;
[[APPENDIX A-Defined Terms]]&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Omaerz</name></author>
	</entry>
</feed>