<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.idesg.org/index.php?action=history&amp;feed=atom&amp;title=Registration_and_credentialing</id>
	<title>Registration and credentialing - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.idesg.org/index.php?action=history&amp;feed=atom&amp;title=Registration_and_credentialing"/>
	<link rel="alternate" type="text/html" href="https://wiki.idesg.org/index.php?title=Registration_and_credentialing&amp;action=history"/>
	<updated>2026-05-01T11:35:20Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.38.4</generator>
	<entry>
		<id>https://wiki.idesg.org/index.php?title=Registration_and_credentialing&amp;diff=6197&amp;oldid=prev</id>
		<title>Omaerz: 45 revisions imported: Initial Upload of old pages from IDESG Wiki</title>
		<link rel="alternate" type="text/html" href="https://wiki.idesg.org/index.php?title=Registration_and_credentialing&amp;diff=6197&amp;oldid=prev"/>
		<updated>2018-06-28T04:03:18Z</updated>

		<summary type="html">&lt;p&gt;45 revisions imported: Initial Upload of old pages from IDESG Wiki&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;=== Overview ===&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Scenario Name&amp;#039;&amp;#039;&amp;#039;: Registration and credentialing&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Scenario Description&amp;#039;&amp;#039;&amp;#039;: In this step, the objective is that the user registers a particular digital identifier for their use. Note: It may be possible that registration of a digital identifier by itself, without associating it with a particular credential, is not a stand-alone step.] .&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Corresponds to&amp;#039;&amp;#039;&amp;#039;: Interactions A and B in [[Basic interactions in a single Trust Framework|Scenario: Basic Interactions]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Use-cases&amp;#039;&amp;#039;&amp;#039;: [[Credential Issuance Use Case|Use-case #6]],  [[Identity Proofing Use Case|Use-case #3]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Variations&amp;#039;&amp;#039;&amp;#039;: The following variations are conceivable&lt;br /&gt;
====Interface: Web-site====&lt;br /&gt;
# Registering and getting a credential at a web site&lt;br /&gt;
# Binding different (types of) credential(s) at a web site&lt;br /&gt;
# Renewing/resetting credential at a web site&lt;br /&gt;
&lt;br /&gt;
====Interface: Physical Location====&lt;br /&gt;
# Registering and getting a credential at a physical location&lt;br /&gt;
# Binding different (types of) credential(s) at a physical location&lt;br /&gt;
# Renewing/resetting credential at a physical location&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
==== Variation 1: Registering and getting a credential at a web site ====&lt;br /&gt;
At a high-level, this can be seen as constituting of 3 main steps, as shown in the picture below.&lt;br /&gt;
[[File:IntWG_RegCred_01.jpg]]&lt;br /&gt;
&lt;br /&gt;
Each step consists of possible sub-steps (or alternate ways of achieving that step), as shown in the picture below.&lt;br /&gt;
[[File:IntWG_RegCred_02.jpg]]&lt;br /&gt;
===== Discover, Reach, Assurance =====&lt;br /&gt;
1-A. Discover: It is a step in which the user becomes aware of the services provided by a particular IdP. &amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;IdP&amp;#039;s role&amp;#039;&amp;#039;&amp;#039;: IdP may be involved in advertising their services in appropriate places.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;IdEF&amp;#039;s role&amp;#039;&amp;#039;&amp;#039;: IdEF may also provide &amp;#039;registry/registries&amp;#039; of service providers providing different services.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Security considerations: &amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
   How do we provide authenticity/validity of the source (for this information)? Quick thought: What happens when this information comes through a phishing email?&lt;br /&gt;
&lt;br /&gt;
1-B. Reach:  In this step, the user finds out the specific address where the IdP provides the intended services. For example, this could be a web address (URL) or a physical address. They will then use that address to reach the IdP.&lt;br /&gt;
&lt;br /&gt;
1-C. Authentication: Once the user reaches the location where the IdP services are provided, either through a web address (URL) or physical address, the user needs a way to verify that they are at the right IdP&amp;#039;s location. So, they will use some clues (a big board having the business name, for example, in case of physical addresses) to get a guarantee that they are at the right IdP&amp;#039;s location. &amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;IdP&amp;#039;s role&amp;#039;&amp;#039;&amp;#039;: Particularly with respect to web interfaces, IdPs must follow well-accepted methods to prove the authenticity of the site to the user - for example, use EV-certificates.&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Security considerations: &amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
    Service providers should use valid EV-certificates for any site that provides IDE services. (Implicit: TLS should be used for any IDE services provided.)&lt;br /&gt;
    Service providers should ensure that their private keys are properly secured and administered.&lt;br /&gt;
    How to educate users to not ignore certificate validation errors?&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;UX considerations:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
    How to get better indicators (than browser green-coding of locks)?&lt;br /&gt;
&lt;br /&gt;
1-D. Assurance: To utilize the Identity services provided by a particular IdP, the user will need some assurance that the IdP adheres to some rules or laws. This is where a &amp;#039;IDEF&amp;#039; trust-mark comes into play. &amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;IDEF role&amp;#039;&amp;#039;&amp;#039;: Provide a secure mechanism for displaying trust-marks. Come up with UX considerations for showing these trust-marks consistently across all participants of IDE. IDE may also be involved in user-education.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;IdP&amp;#039;s role&amp;#039;&amp;#039;&amp;#039;: Follow UX and security requirements from IDESG to show the trust-marks.&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Security consideratons: &amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
   Trust-marks must be resilient to stealing/counterfeiting.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===== Registration =====&lt;br /&gt;
In this step, the user explicitly seeks registration operation. IdP may be required to reveal to the user what their security and privacy policies and certifications are (probably just one relevant IDESG trust-mark).&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Trust-mark consideration: &amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
   How can we provide operation specific certification/assurance to the users? Does it mean there is a separate trust-mark/certification/display option for each operation/area combination - for example Registration/security, Registration/privacy&amp;lt;br/&amp;gt;&lt;br /&gt;
[[File:IntWG_RegCred_030.png]]&lt;br /&gt;
&lt;br /&gt;
Reg-0: The user finds a way to perform the registration operation. Note: Service providers may provide a list of services they provide, and user selects which one they want to use.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;UX consideration[role: IdP]: &amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
   How to let a user know what (IdP) services this service provider is providing? Is there anything like standardized services we market as part of IDESG? How can the user get assurance on the trust-marks displayed by a service provider?&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;TrustMark considerations[role: IdP]: &amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
   What (broad/service-level) trust marks a service provider can (need to) display (on their home page)?&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Security considerations[role: IdP]: &amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
   Registration service/site should continue to use TLS with valid EV-certificates.&lt;br /&gt;
   Security requirement: Valid version of TLS and related standards (Enc/MD algorithms)&lt;br /&gt;
   Thought: Can IDESG scan the participant web sites, proactively, to detect malfunctions (certificate errors, other violations)?&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Reg-1 and Reg-2: IdP provides their security and privacy policy to the user. IdP may also show their (appropriate) IDESG certification to the user. (See above for a discussion of &amp;#039;appropriate&amp;#039;.)&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;UX consideration for TrustMarks:[role: IdP] &amp;#039;&amp;#039;&amp;#039;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;UX consideration for showing policies:[role: IdP] &amp;#039;&amp;#039;&amp;#039;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;TrustMarks consideration: &amp;#039;&amp;#039;&amp;#039;&amp;lt;br/&amp;gt;&lt;br /&gt;
     How do we provide to user a context-related trust mark - for example, in this case, that the IdP conforms to security and privacy of identity data?&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Security considerations:[role: IdP] &amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
   Any pop-ups used should also be using TLS and EV-certificates&lt;br /&gt;
   Display when was the last assessment done&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Registration of identity (or identifier in most cases) may be done in couple of ways - without any identity proofing (providing ownership evidence of attributes used to form the identity), or with identity proofing, as shown here.&lt;br /&gt;
In the later case, the process for registering an identifier may be as simple as picking the identifier of choice and confirming its availability.&lt;br /&gt;
[[File:IntWG_RegCred_03.png]]&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
2-A-1: User is shown a form to pick an IDentifier of their choice and submit it to the IdP&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;UX consideration for Privacy/security policies:[role: IdP] &amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
   How can the user know how this site uses their IDentifiers?&amp;lt;br/&amp;gt;&lt;br /&gt;
2-A-2: IdP provides an indication of whether the chosen IDentifier is &amp;#039;available&amp;#039; (meaning no one &amp;#039;took&amp;#039; it already, satisfies IdP policy for IDentifiers, so on).&amp;lt;br/&amp;gt;&lt;br /&gt;
2-A-3: IdP may ask for more attributes from the user. (Note: these attribute values are going to be &amp;#039;unverified&amp;#039;.)&lt;br /&gt;
&amp;lt;br/&amp;gt;If IdP asks for more attributes, it also provides their security/privacy policies and any associated certifications/trust-marks.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;UX consideration for Privacy/security policies:[role: IdP] &amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
   How can the user know how this site stores/uses their attributes?&amp;lt;br/&amp;gt;&lt;br /&gt;
2-A-4: User provides attribute values&amp;lt;br/&amp;gt;&lt;br /&gt;
2-A-4: IdP provides indication of successful completion of the &amp;#039;Registration&amp;#039; process.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In case of identity proofing, the notion of &amp;#039;verifying attribute ownership&amp;#039; will come into picture. The concept of proofing an identity, at the core, means verifying the ownership of certain attributes - the set of attributes chosen may depend on the business (driver&amp;#039;s license in some cases, SSN in others, so on). Note that such attributes may uniquely identify a particular person/entity - implying that the policies/certification may be more stringent than for non-verified attributes.  &amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:IntWG_RegCred_04.png]]&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
2-B-1: Here the IdP is letting the user know that they need to provide attributes for ownership verification - and why it is a required information for registration. Alongside, the security and privacy policies are also presented. The IdP may be required to get a consent (explicit consent) from the user, to collect such attributes.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;UX consideration for Privacy/security policies:[role: IdP] &amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
   How can the user know how this site stores/uses their attributes?&amp;lt;br/&amp;gt;&lt;br /&gt;
2-B-2: User is presented a form to fill-in the attribute data.&amp;lt;br/&amp;gt;&lt;br /&gt;
2-B-3: User fills in the attribute information&amp;lt;br/&amp;gt;&lt;br /&gt;
2-B-4: IdP verifies the veracity/ownership of the entered information. It informs the user that it accepted the entered information.&amp;lt;br/&amp;gt;&lt;br /&gt;
2-B-5: User may be allowed to pick an (unique) IDentifier&amp;lt;br/&amp;gt;&lt;br /&gt;
2-B-6: IdP confirms to user the validity/availability of the chosen IDentifier(, and indicates that registration step is now complete).&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===== Credentialing =====&lt;br /&gt;
Credentialing immediately follows registration (same session, so to speak). Some type of credentials may be issued online, and others may require them to be shipped to user&amp;#039;s home address (may be applicable for identity-proofed registration, though not necessarily).&lt;br /&gt;
[[File:IntWG_RegCred_05.png]]&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
Supported credential types: An IdP may support more than one credential type. If so, they should let the user know which types they support.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;UX considerations[role:IdP]: &amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
   SRD personal request: Can we standardize the password rules through IDESG, please?&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;UX considerations for trust-marks[role:IdP]: &amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
   How to show context-applicable trust marks?&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Trust-mark considerations[role:IdP]: &amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
   How to issue granular trust-marks?&lt;br /&gt;
&lt;br /&gt;
Security policy for storing credentials: &amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Security considerations[role:IdP]: &amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
   Minimum security requirements for standard credential types (like passwords, for example)?&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Online credential issuance could be a simple process of letting the user pick a credential value that satisfies IdP&amp;#039;s rules for that credential type.&lt;br /&gt;
[[File:IntWG_RegCred_06.png]]&lt;br /&gt;
&lt;br /&gt;
Offline credential issuance may be more involved (as a. the session is no longer applicable, and b. the credential needs to be shipped to an address that is verified to belong to the user)&lt;br /&gt;
====TBD====&lt;br /&gt;
[[File:IntWG_RegCred_07.png]]&lt;br /&gt;
&lt;br /&gt;
==== Variation 2: Binding different (types of) credential(s) at a web site ====&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;TBD&amp;#039;&amp;#039;&amp;#039;&amp;lt;br/&amp;gt;&lt;br /&gt;
Owner:&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Variation 3: Renewing/resetting credential at a web site ====&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;TBD&amp;#039;&amp;#039;&amp;#039;&amp;lt;br/&amp;gt;&lt;br /&gt;
Owner:&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Variation 4: Registering and getting a credential at a physical location ====&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;TBD&amp;#039;&amp;#039;&amp;#039;&amp;lt;br/&amp;gt;&lt;br /&gt;
Owner:&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Variation 5: Binding different (types of) credential(s) at a physical location ====&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;TBD&amp;#039;&amp;#039;&amp;#039;&amp;lt;br/&amp;gt;&lt;br /&gt;
Owner:&lt;br /&gt;
&amp;lt;br/&amp;gt;Ann Racuya-Robbins&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Variation 6: Renewing/resetting credential at a physical location ====&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;TBD&amp;#039;&amp;#039;&amp;#039;&amp;lt;br/&amp;gt;&lt;br /&gt;
Owner:&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Omaerz</name></author>
	</entry>
</feed>