GBZ24294.3-2017 English PDFUS$339.00 · In stock
Delivery: <= 4 days. True-PDF full-copy in English will be manually translated and delivered via email. GBZ24294.3-2017: Information security technology -- Guide of implementation for Internet-based e-government information security -- Part 3: Identity authentication and authorization Status: Valid
Basic dataStandard ID: GB/Z 24294.3-2017 (GB/Z24294.3-2017)Description (Translated English): Information security technology -- Guide of implementation for Internet-based e-government information security -- Part 3: Identity authentication and authorization Sector / Industry: National Standard Classification of Chinese Standard: L80 Classification of International Standard: 35.040 Word Count Estimation: 17,152 Date of Issue: 2017-05-31 Date of Implementation: 2017-12-01 Older Standard (superseded by this standard): GB/Z 24294-2009 Quoted Standard: GM/T 0015-2012 Issuing agency(ies): General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China, Standardization Administration of the People's Republic of China Summary: This standard specifies the implementation guidelines for identity authentication and authorization management in Internet e-government, clarifies its functional requirements and installs deployment requirements, and defines the technical specifications for identity authentication and authorization management. To rely on the Internet to build a trusted government service platform as the goal, for the establishment of credible, manageable, controllable Internet e-government information system based on the provision of technical guidance. This standard is applicable to the design, research and development of identity authentication and authorization management system based on Internet e-government system, and provides management and technical reference for managers, engineering and technical personnel and information security product providers to establish unified identity authentication and authorization management system. Involving national secrets, or stored, processed, transmitted information may be involved in state secrets, in accordance with national secrecy provisions and standards. GBZ24294.3-2017: Information security technology -- Guide of implementation for Internet-based e-government information security -- Part 3: Identity authentication and authorization---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order. Information security technology. Guide to implementation for Internet-based e-government information security. Part 3. Identity authentication and authorization ICS 35.040 L80 People's Republic of China national standardization of technical guidance documents Partially replace GB /Z 24294-2009 Information Security Technology Internet-based e-government information security implementation guidelines Part 3. Identity and authorization management Guide of implementation for Internet-base-government information security- Part 3.Identityauthenticationandauthorization 2017-05-31 Published on.2017-12-01 Implement General Administration of Quality Supervision, Inspection and Quarantine of People's Republic of China China National Standardization Administration released Directory Foreword Ⅲ Introduction IV 1 Scope 1 2 Normative references 1 3 Terms and definitions 1 4 Abbreviations 1 5 unified authentication and authorization management security features 2 5.1 unified authentication function 2 5.2 Authorization Management Function 2 5.3 system deployment requirements 2 5.4 Storage Security Requirements 2 6 Unified Authentication Technical Specification 2 6.1 Unified User Identification 2 6.2 authentication method 4 6.3 password algorithm 4 6.4 Certification Agreement 4 7 unified licensing management technical specifications 4 7.1 Role Management 4 7.2 Resource Management 5 7.3 Rights Management Operation 5 7.4 Authorization Management System Service Mode 7 Appendix A (Informative) Identity Authentication and Authorization Management System Application Example 9 Appendix B (informative) authorization management system strategy that 11 ForewordGB /Z 24294 "Information Security Technology Internet-based e-government information security implementation guidelines" is divided into four parts. --- Part 1. General principles; --- Part 2. Access control and security exchange; --- Part 3. Identity and authorization management; --- Part 4. Terminal Security. This section GB /Z 24294 Part 3. This section drafted in accordance with GB/T 1.1-2009 given rules. Part of this section instead of GB /Z 24294-2009 "Information Security Technology Internet-based e-government information security implementation guidelines," and GB /Z 24294-2009 compared to the main technical changes are as follows. --- Added a unified authentication and authorization management of security features; --- Added unified authentication technology requirements; --- Added a unified licensing management technical requirements; --- For the construction of the trust system, complemented the authentication and authorization management system deployment examples. This part of the National Information Security Standardization Technical Committee (SAC/TC260) and focal point. This part of the drafting unit. People's Liberation Army Information Engineering University, China Electronics Standardization Institute, Beijing Tian Rong Xin Technology Co., Ltd. Zheng Dazhou Great Information Technology Co., Ltd. The main drafters of this section. Chen Xingyuan, Du Xuehui, Sun Yi, Xia Chuntao, Cao Li-feng, Zhang Dongwei, Ren Zhiyu, Luo Feng surplus, Shangguan Xiao Li, Dong Guohua. This part replaces the standards previously issued as. --- GB /Z 24294-2009.IntroductionBecause of the open nature of internet e-government, e-government system is faced with identity fraud, information leakage, non-teaching Security of access and other security threats, the use of authentication, authorization management and other technologies can effectively improve the safety of Internet e-government system. In order to promote the application of the Internet in China's e-government and to guide the technical specifications based on Internet e-government identity authentication and authorization management Work, specially formulated in this section. This part of the Internet first of all e-government identity authentication and authorization management of security features to regulate, respectively, after the identity Certificate and license management in the process of implementation of technical specifications for a detailed description of the Internet and e-government security interface to regulate. This part of the main norms in the Internet-based e-government system implementation of identity authentication and authorization of the technical activities carried out by the phase Guan management activities. Information Security Technology Internet-based e-government information security implementation guidelines Part 3. Identity and authorization management1 ScopeThis part of GB /Z 24294 gives the implementation guide of identity authentication and authorization management in Internet e-government, clarifying its functional requirements And install the deployment requirements, define the authentication and authorization management technical specifications. To rely on the Internet to build a credible government service platform as the goal Establish a credible, manageable and controllable Internet-based e-government information system to provide technical guidance. This section applies to Internet-based e-government system authentication and authorization management system design, development and construction, as managers Members, engineers, information security product providers to build a unified authentication and authorization management system to provide management and technical reference. Involved State secrets, or the state secrets that may be involved after the information stored, processed and transmitted are collected, shall be subject to the provisions of state secrets and standards.2 Normative referencesThe following documents for the application of this document is essential. For dated references, only the dated version applies to this article Pieces. For undated references, the latest edition (including all amendments) applies to this document. Digital Certificate Format Specification Based on SM2 Cipher Algorithm3 Terms and definitionsThe following terms and definitions apply to this document. 3.1 Attribute Authorities attributeauthority A certification authority that distributes permissions by publishing a certificate of attributes, also known as a property management agency. 3.2 Attribute certificate attributecertificate Attribute Authorities digitally sign a data structure that binds the holder's identity information to some attribute value. 3.3 Specific rights management infrastructure privilegemanagementinfrastructure A comprehensive infrastructure that supports authorized services is closely linked to public key infrastructure.4 AbbreviationsThe following abbreviations apply to this document. LDAP Lightweight Directory Access Protocol (LightweightDirectoryAccessProtocol) PMS authorization management system (PrivilegeManagementSystem) ......Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GBZ24294.3-2017_English be delivered?Answer: Upon your order, we will start to translate GBZ24294.3-2017_English as soon as possible, and keep you informed of the progress. The lead time is typically 2 ~ 4 working days. The lengthier the document the longer the lead time.Question 2: Can I share the purchased PDF of GBZ24294.3-2017_English with my colleagues?Answer: Yes. The purchased PDF of GBZ24294.3-2017_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to Sales@ChineseStandard.net. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay. |