Credential Service Provider

From IDESG Wiki
Jump to navigation Jump to search

Taxonomy Template:

Definition

A Trusted Entity that issues or registers subscriber authenticators and issues [verifications of] electronic credentials to subscribers. A CSP may be an independent third party or [it may] issue credentials for its own use.

Context

  • Each federation must establish rules for determining how a Trusted Entity will be accepted for inclusion in a registry by the federation's Accreditation Authority. (See details below for federation assurance.)
  • In other words, each federation must understand what they mean by Trusted Entity as the CSP will have the authority to validate credentials under the federations rules.
  • The slight change to the NIST wording was to meant to clarify that subscribers (or subjects) can create their own credentials is protected storage and ask the CSP to verify the security of those credentials.
  • Federation Agreement = a document, or group of documents, that contain the agreed upon “rules” by which the federation operates.

Sources

  1. A trusted entity that issues or registers subscriber authenticators and issues electronic credentials to subscribers. A CSP may be an independent third party or issue credentials for its own use. (NIST SP 800-63-3)/
  2. A trusted entity that issues or registers Subscriber tokens and issues electronic credentials to Subscribers. The CSP may encompass Registration Authorities (RAs) and Verifiers that it operates. A CSP may be an independent third party, or may issue credentials for its own use. (Original proposal from IDESG)
  3. An entity that performs identity proofing, registration and issues some form of a subscriber token within some procedural context designed to convey a degree of trust.(Wallace)
  4. A trusted entity that issues credentials to Subscribers.(D'Agostino)

Status

Proposed Update

Details

  • For basic levels of assurance the CSP can provided verified attributes, but these should be treated by any relying party as self-asserted.
  • For higher levels of identity assurance the CSP must verify (2) remote or (3) physically present identity proofing, including pseudonymous identity.
  • For higher levels of authentication assurance the CSP must verify proof of possession and control of (2) two factors or (3) a hardware-based authenticator of 2 factors.
  • For higher levels of federation assurance the CSP must verify (2) approved encryption or (3) proof of possession and approved encryption.

References