Information technology — Security techniques — A framework for identity management — Part 2: Reference architecture and requirements