About
ID Ecosystem Steering Group
- IDEF Registry
- Identity Ecosystem Framework (IDEF)
- Functional Element Layer Roles
IDEF Knowledge Base
-
Privacy
- PRIVACY-1. DATA MINIMIZATION
- PRIVACY-2. PURPOSE LIMITATION
- PRIVACY-3. ATTRIBUTE MINIMIZATION
- PRIVACY-4. CREDENTIAL LIMITATION
- PRIVACY-5. DATA AGGREGATION RISK
- PRIVACY-6. USAGE NOTICE
- PRIVACY-7. USER DATA CONTROL
- PRIVACY-8. THIRD-PARTY LIMITATIONS
- PRIVACY-9. USER NOTICE OF CHANGES
- PRIVACY-10. USER OPTION TO DECLINE
- PRIVACY-11. OPTIONAL INFORMATION
- PRIVACY-12. ANONYMITY
- PRIVACY-13. CONTROLS PROPORTIONATE TO RISK
- PRIVACY-14. DATA RETENTION AND DISPOSAL
- PRIVACY-15. ATTRIBUTE SEGREGATION
-
Security
- SECURE-1. SECURITY PRACTICES
- SECURE-2. DATA INTEGRITY
- SECURE-3. CREDENTIAL REPRODUCTION
- SECURE-4. CREDENTIAL PROTECTION
- SECURE-5. CREDENTIAL ISSUANCE
- SECURE-6. CREDENTIAL UNIQUENESS
- SECURE-7. TOKEN CONTROL
- SECURE-8. MULTIFACTOR AUTHENTICATION
- SECURE-9. AUTHENTICATION RISK ASSESSMENT
- SECURE-10. UPTIME
- SECURE-11. KEY MANAGEMENT
- SECURE-12. RECOVERY AND REISSUANCE
- SECURE-13. REVOCATION
- SECURE-14. SECURITY LOGS
- SECURE-15. SECURITY AUDITS
-
Best Practices
- INTEROP-BP-A. RECOMMENDED PORTABILITY
- INTEROP-BP-B. RECOMMENDED EXCHANGE STANDARDS
- INTEROP-BP-C. RECOMMENDED TAXONOMY STANDARDS
- INTEROP-BP-D. RECOMMENDED PROCESS MODELS
- INTEROP-BP-E. RECOMMENDED MODULARITY
- INTEROP-BP-F. RECOMMENDED FEDERATION COMPLIANCE
- INTEROP-BP-G. RECOMMENDED LEGAL COMPLIANCE
- PRIVACY-BP-A. RECOMMENDED QUALITY CONTROLS
- PRIVACY-BP-B. RECOMMENDED TECHNOLOGY ENFORCEMENT
- PRIVACY-BP-C. RECOMMENDED CONSEQUENCES OF DECLINING
- USABLE-BP-A. RECOMMENDED ATTRIBUTE REQUIREMENTS QUERY