Search results
Jump to navigation
Jump to search
- This use case helps the IRS determine whether a taxpayer's Social Security Number is being used fraudulently in a tax return. It does this by checking Internal Revenue Service, Social Security Administration, commercial tax preparation software vendors10 KB (1,744 words) - 17:43, 25 May 2019
- ...ategories and controls that can be implemented by a public cloud computing service provider acting as a PII processor. It has the following objectives. — To help the public cloud service provider to comply with applicable obligations when acting as a PII process4 KB (531 words) - 04:00, 28 June 2018
- ...private and subject to protections. A high-security pseudonymous identity service (for example a dating website) could verify attributes such as legal names2 KB (255 words) - 04:00, 28 June 2018
- ...the benefit of the user, not solely for the benefit of the web site of the service provider. The challenge will be to find a way to fund solutions to problems ...ony]] with an Identity or Attribute Provider that has an IDESG Trustmark. (security committee priority 1)12 KB (1,958 words) - 17:45, 25 May 2019
- ...and behaviors, while the data in the [[User Object]] held in some internet service will never contain more than a small subset of those attributes. The model ...entities is considered to be an independent browser. Web apps supplied by service providers are not fully explored in this version.56 KB (9,154 words) - 00:16, 30 October 2020
- ...gram state, it reduces user errors and surprises. A good GUI provides this service. Using an interactive program is like being a doctor trying to navigate a p ...ers deserve. After all the greatest hassle for users is created when their security or privacy are breached. While interoperability is seldom raised as a user8 KB (1,351 words) - 21:37, 27 March 2020
- Identity Proofing is the process by which a Credential Service Provider (CSP) and a Registration Authority (RA) collect and verify informa * Credential Service Provider.3 KB (328 words) - 21:41, 10 January 2020
- '''Security''': ...[[Public Key Infrastructure]], [[Relying Party]], [[Resource Provider]], [[Service Provider]], [[Shibboleth]], [[Sponsored Partner]], [[Support Contact]], [[T2 KB (205 words) - 04:01, 28 June 2018
- '''Security''': The document is an information security assurance framework. ...he document promotes interoperability by specifying the requirements for a service to operate at the2 KB (203 words) - 21:48, 10 January 2020
- '''Security''': The document is a information security profile at OMB-04-04 levels of assurance 1 and 2. ...he document promotes interoperability by specifying the requirements for a service to operate at the1 KB (156 words) - 04:01, 28 June 2018
- ...ibilities and the parameters of those requirements and responsibilities to Service Providers in online transactions. At more detailed and granular layers as d ...rinciples and created from a bi-direction approach balancing human userand service provider requirements, desires, and benefits.13 KB (1,906 words) - 19:16, 2 July 2021
- ...erent entities/roles (IdP, RP, User, etc.) that require different privacy, security, UX and other considerations. ...Such considerations will create a context for deriving requirements – like security requirements, UX requirements, and privacy requirements, so on.6 KB (888 words) - 04:01, 28 June 2018
- Entities that act as [[IDEF Glossary THIRD PARTIES|THIRD-PARTY]] service providers for another entity, in conducting [[IDEF Glossary DIGITAL IDENTIT ...service provider. For purposes of this Requirement, the term "THIRD-PARTY service provider" refers to THIRD-PARTIES that an assessed entity outsources or del3 KB (451 words) - 04:01, 28 June 2018
- *Standards – ISO 29115 has already been submitted by the Security Committee. **Self-Assessment Listing Service (SALS) will be up soon for examination and Sal requested that UXC review an3 KB (391 words) - 04:01, 28 June 2018
- ==SECURITY COMMITTEE / FUNCTIONAL MODEL MEETING NOTES== #**** A service provider can hold more than one role4 KB (608 words) - 04:02, 28 June 2018
- ==SECURITY COMMITTEE / FUNCTIONAL MODEL MEETING NOTES - '''''draft'''''== ...and Ryan Galluzzo. The task force will bring their findings to the broader Security Committee once they are finished. Again, if anyone joins the call outside o3 KB (454 words) - 04:02, 28 June 2018
- ...e''': Identity Assurance Framework: Additional Requirements for Credential Service Providers: US Federal ...ia supplement the Kantara IAF level of assurance requirements found in the Service848 bytes (97 words) - 00:51, 31 May 2020
- the Service Assessment Criteria (SAC), which establishes baseline criteria for general '''Security''':1 KB (128 words) - 04:02, 28 June 2018
- '''Security''': The document defines terms used in a security assurance framework. ...[[Security]], [[Service Assessment Criteria]], [[Signatory]], [[Specified Service]], [[Subject]], [[Subscriber]], [[Threat]], [[Token]]2 KB (217 words) - 04:02, 28 June 2018
- ...ments which will benefit both Kantara- accredited Assessors and Credential Service Providers having their services assessed against the IAF Service Assessment Criteria (SAC)1 KB (119 words) - 04:02, 28 June 2018