Distributed Identity Assurance: Difference between revisions
Jump to navigation
Jump to search
Line 1: | Line 1: | ||
==Full Title or Meme== | ==Full Title or Meme== | ||
[[Identity Proofing]] has often been viewed as a centralized function of a [[ | [[Identity Proofing]] has often been viewed as a centralized function of a [[Credential Service Provider]] (CSP), but it can be more efficiently be realized using existing [[Identity Proofing]] in many real-world locations. | ||
==Context== | ==Context== |
Revision as of 17:13, 18 November 2019
Full Title or Meme
Identity Proofing has often been viewed as a centralized function of a Credential Service Provider (CSP), but it can be more efficiently be realized using existing Identity Proofing in many real-world locations.
Context
This concept of Distributed Identity Proofing is described here as a use case for attaining IAL2 identifier assurance in a Trustworthy Healthcare Ecosystem.
References
- The Identity Proofing Use Case describes the existing, centralized Identity Proofing with a Registration Authority and Credential Service Provider.