Error
Jump to navigation
Jump to search
There is currently no text in this page. You can search for this page title in other pages, search the related logs, or create this page.
Subcategories
This category has the following 9 subcategories, out of 9 total.
Pages in category "Use Cases"
The following 109 pages are in this category, out of 109 total.
A
- Access Age Restricted Content Use Case
- Access Control in Special Ed Use Case
- Access Government Data Base Use Case
- Accredit an Organization Use Case
- Anonymity Facilitated with Limited Scope Claims
- Anonymous Browsing Use Case
- Approve a Product Use Case
- Approve Disclosure of PII Use Case
- Authenticate Organization Use Case
- Authenticate Person Use Case
- Authenticate Service Use Case
- Authenticate Using Pseudonymous Identity Use Case
- Authenticate Website Use Case
- Authentication for Enrollment in a Financial Service
C
- Certify a System Use Case
- Change Identity Provider (IdP) Use Case
- Change Identity Provider Use Case
- Change IdP
- Conduct Compliance Audit Use Case
- Conduct Product Testing Use Case
- Conduct System Testing Use Case
- Creating Composite Claims from Multiple Providers
- Credential Issuance Use Case
- Cryptographic Authentication for Access to Online Resources
D
- Delegate Credentials Use Case
- Delegate to Trusted Assistant Use Case
- Delegated Authentication for User Managed Access
- Delegated Authentication Use Case
- Device Integrity supporting User Authentication
- Digital Travel Credentials
- Disclose Storage of PII Use Case
- Discover Attributes about Credentials Use Case
- Discover Attributes about Individual Use Case
- Distributed Identity Assurance
E
- Economic Inclusion Breakout Use Case
- Emergency Contact Information Use Case
- End User to Cloud Authentication Use Case
- Enterprise SSO Authentication Use Case
- Enterprise to Cloud Authentication Use Case
- Enterprise to Cloud to End User Authentication Use Case
- Enterprise to Cloud to Enterprise Authentication Use Case
F
I
- ID Ecosystem Root
- Identity Ecosystem Framework enables individuals to protect their privacy through clear FIPPS rules
- Identity Ecosystem Framework protects individuals from unbounded liability in particular for losses that they were powerless to prevent.
- Identity Proofing Use Case
- IDESG Baseline Process Use Case
- IDESG Responsible for Development of Identity Ecosystem Framework
- Individuals Can Choose and Change Identity Account Providers and Can Use Between and Manage Multiple Different Interoperable Credentials
- Inform User of Disclosure of PII Use Case
- IRS Identity Theft
M
O
P
- Patient authenticates to EHR to access their lab results
- Patient Choice
- Patient Interaction with HIE
- Patient Journey as seen by the Browser
- Patient pull of information
- Patient Registration with Distributed Attributes
- Patient under 13 and Homeless Use Case
- Patient uses Trusted Third Party to authenticate and move EHR
- Patient with Lab and Referral Use Case
- Persona Attributes
- PIV-I Enrollment for Educational Institutions Use Case
- PIV-I Enrollment for Financial Institutions Use Case
- PlayaNym as Pseudonymous Identity Use Case
- Privacy Enhanced by User Agent
- Privacy Enhancing Technologies
- Privacy facilitated by User Agent Use Case
- Privacy-Preserving Accessibility Support
- Public Health Centers
- Publicly Discoverable ePayment Address(es)
- Publicly Discoverable ePayment Address(es) Part 2
- Publicly Discoverable ePayment Address(es) Part 3
R
- Re-Verification of Trust Credential Use Case
- Remote Attestation Use Case
- Remote E-Notarization Use Case
- Remote Electronic Identity Proofing Use Case
- Remote Employee Verification and Certification Use Case
- Remote High Value Transaction Use Case
- Restriction, Suspension, Revoked (Disqualified) Trust Credential Use Case
- Revocation of Delegated Authentication Use Case