Distributed Identity Assurance: Difference between revisions

From IDESG Wiki
Jump to navigation Jump to search
Line 1: Line 1:
==Full Title or Meme==
==Full Title or Meme==
[[Identity Proofing]] has often been viewed as a centralized function of a [[CSP]], but it can be more efficiently be realized using existing [[Identity Proofing]] in many real-world locations.
[[Identity Proofing]] has often been viewed as a centralized function of a [[Credential Service Provider]] (CSP), but it can be more efficiently be realized using existing [[Identity Proofing]] in many real-world locations.


==Context==
==Context==

Revision as of 17:13, 18 November 2019

Full Title or Meme

Identity Proofing has often been viewed as a centralized function of a Credential Service Provider (CSP), but it can be more efficiently be realized using existing Identity Proofing in many real-world locations.

Context

This concept of Distributed Identity Proofing is described here as a use case for attaining IAL2 identifier assurance in a Trustworthy Healthcare Ecosystem.

References