Search results

Jump to navigation Jump to search
  • '''Category''': Trust Framework Provider Specification '''Description''': Consists of a set of requirements which assessors must fulfill in order to become 'Kantara-Accredited', a
    1 KB (119 words) - 04:02, 28 June 2018
  • ...fied. The value "0" indicates the End-User authentication did not meet the requirements of ISO/IEC 29115 [ISO29115] level 1. Authentication using a long-lived brow ...particular values to be used in the amr Claim is beyond the scope of this specification. Parties using this claim will need to agree upon the meanings of the value
    16 KB (2,576 words) - 19:23, 24 July 2020
  • ...ipt and authorization in response to this message which meets the security requirements of the intended purpose. * This specification applies only to service providers that have determined that they need to ac
    14 KB (2,250 words) - 01:29, 23 December 2020
  • Using a Patient's Cell Phone as the holder of their (1) Health Care Credential and (2) personal healthcare Information store. ...ticipant Member, or Individual User such as by means of burdensome testing requirements that are applied in a discriminatory manner or other means that limit the a
    19 KB (3,008 words) - 20:23, 20 March 2021
  • '''Category''': Credential Requirements Standard '''Description''': Requirements for non-Federal issuers of cards designed to interoperate with the Federal
    1,023 bytes (117 words) - 23:30, 12 January 2021
  • '''Title''': Biometric Data Specification for Personal Identity Verification '''Category''': Credential Requirements Specification
    774 bytes (87 words) - 04:02, 28 June 2018
  • Specification '''Category''': Credential Requirements Specification
    864 bytes (94 words) - 04:02, 28 June 2018
  • '''Category''': Credential Requirements Specification [[Category:Credential Requirements Specification]]
    1 KB (109 words) - 04:02, 28 June 2018
  • '''Category''': Credential Requirements Specification '''Description''': Describes requirements for PIV client application programming interface including information proc
    1 KB (120 words) - 04:02, 28 June 2018
  • '''Category''': Credential Requirements Specification '''Description''': Describes requirements for PIV client-application programming interface, PIV Card application, and
    1,002 bytes (102 words) - 04:02, 28 June 2018
  • '''Category''': Credential Requirements Specification '''Description''': Specifies the architectural and technical requirements for the Personal Identity Verification (PIV) card
    1 KB (173 words) - 03:58, 28 June 2018
  • '''Title''': Identity Assurance Framework: Additional Requirements for Credential Service Providers: US Federal '''Category''': Trust Framework Provider Specification
    848 bytes (97 words) - 00:51, 31 May 2020
  • '''Category''': Trust Framework Provider Specification consent for sharing PII. No requirements though.
    2 KB (203 words) - 21:48, 10 January 2020
  • .../index.php?title=Baseline_Functional_Requirements_v1.0 Baseline Functional Requirements v1.0 (BFR)]. .../index.php?title=Baseline_Functional_Requirements_v1.0 Baseline Functional Requirements v1.0 (BFR)].
    56 KB (9,154 words) - 00:16, 30 October 2020
  • ...f abstraction of the IDESG functions has been proposed in the [[Functional Requirements]]. This page describes the use of design patterns for user experiences in p ...ific types of roles they use, as long as the role adheres to the interface specification
    12 KB (1,958 words) - 17:45, 25 May 2019
  • CREDENTIAL AUTHENTICATION: Process of determining the validity of one or more CREDENTI ...rds employed within an entity to ensure compliance with applicable privacy requirements and manage privacy risks.
    11 KB (1,496 words) - 23:48, 5 September 2020
  • An identity credential; previously stored personal questions and answers. Also known as Challenge/ ...g the structure and content for an implementation-specific set of security requirements for an IT product or system.
    135 KB (15,051 words) - 04:00, 28 June 2018
  • ...tion and service application), each interface with distinct authentication requirements is considered a stand-alone AA. AAs manage all Business Transactions and al ...nder that their conformity to the appropriate agreement, and therefore the requirements of the AAS, remains their obligation.
    845 KB (86,833 words) - 04:00, 28 June 2018
  • '''Category''': Credential Requirements Specification '''Description''': Specifies the architectural and technical requirements for the Personal Identity Verification (PIV) card
    3 KB (374 words) - 00:25, 24 August 2020