INTRO TO ITU-T.1254 flowing text introduction to the ITU thing plus arguments for using it
The following generalised functional units (actions) serve to design and implement the vetting scenarios for second factor and multifactor authentication that fulfil some of ITU-T X.1254 entity authentication assurance framework processes. The following processes from its "8.1 Enrollment phase" are to be covered:
...
The names and descriptions used in these elaborations aim to be mappable to those processes and be terminologically compatible with ITU-T X.1254 and its definitions of terms. An additional specifics in relation the above-listed processes is that they focus on the credentials (sets of data supporting identity or entitlement claims), while our scenarios are focused on authentication factors (something specific that is possessed, known or inherent). The subject entities are referred to as applicants, who are the physical persons whose identity is to be authenticated.
These below are now our own terminology
These below is a vocabulary developed by ourselves
C: C
...
ommon Actions
The actions listed here are common actions which may be used at multiple times at different stages and for various purposes.
...
The applicant authenticates with his/her existing factor(s)already in place and function in the system. Username/password login is typically the first existing factor that is readily available.
...
Input: Credentials (e.g. username/password combination, certificate) provided by the user
Output: Authentication successful (yes/no), attributes is needed (e.g. affiliation)
...
Input: List of possible factors provided by the user
Output: factor selected/assigned and known by the applicant or in her possession of the applicant
C_USE_NEW_FACTOR Use Introduced Factor
...