Information technology — Security techniques — A framework for identity management — Part 3: Practice