Search results
Jump to navigation
Jump to search
Page title matches
- #REDIRECT [[Un and Underserved Use Case]]41 bytes (6 words) - 03:58, 28 June 2018
- == Use Case Metadata == ====Use Case Lifecycle Status====7 KB (1,007 words) - 03:58, 28 June 2018
- '''Use Case Description''': ...ntifying any subject actors. Verb modifiers may be used to refine the use case. Examples: authenticate to system with trusted identity, authenticate to925 bytes (109 words) - 04:00, 28 June 2018
- == Use Case Metadata == A general use case which all other use cases can depend (unless they chose not to.)5 KB (810 words) - 04:00, 28 June 2018
- '''Please note,''' that this is not a Use Case, but at this time the IDESG do not have a process for documents like this o '''Title''': IDESG Baseline Process Use Case (Example: IDBL - 0.2468)23 KB (3,525 words) - 04:00, 28 June 2018
- == Use Case Metadata == ====Use Case Lifecycle Status====3 KB (328 words) - 21:41, 10 January 2020
- '''Use Case Description''': ...er's PII, this use case describes a process for informing the user of such use or disclosure.676 bytes (77 words) - 04:01, 28 June 2018
- #REDIRECT [[PIV-I Enrollment for Financial Institutions Use Case]]66 bytes (8 words) - 04:01, 28 June 2018
- '''Use Case Description''': ...ntifying any subject actors. Verb modifiers may be used to refine the use case. Examples: authenticate to system with trusted identity, authenticate to881 bytes (102 words) - 04:02, 28 June 2018
- ...000">Proposed</span> This Use Case is under development by members of the use cases ad hoc group. '''Use Case Description''':2 KB (375 words) - 04:02, 28 June 2018
- Online Safety for Democracy Activists Use Case '''Use Case Description''':2 KB (258 words) - 04:02, 28 June 2018
- '''Use Case Description''': ...ntifying any subject actors. Verb modifiers may be used to refine the use case. Examples: authenticate to system with trusted identity, authenticate to868 bytes (101 words) - 04:02, 28 June 2018
- #REDIRECT [[PIV-I Enrollment for Educational Institutions Use Case]]68 bytes (8 words) - 04:02, 28 June 2018
- '''Use Case Description''': This use case describes an educational institution as a PIV-I Electronic Credential Provi9 KB (1,241 words) - 04:02, 28 June 2018
- '''Use Case Description''': '''Use Case Category''': Trust/Assurance, Authentication, Interoperability, Privacy6 KB (830 words) - 04:02, 28 June 2018
- '''Use Case Description''': ...ntifying any subject actors. Verb modifiers may be used to refine the use case. Examples: authenticate to system with trusted identity, authenticate to1 KB (127 words) - 05:22, 31 March 2021
- 1 KB (150 words) - 04:02, 28 June 2018
Page text matches
- The goals set out the needs and constraints on an example for use by a Relying Party (RP) systems design. ...ncing technology is used to prevent linkage between different instances of use of the internet.24 KB (3,980 words) - 19:57, 13 November 2020
- == Value and Context for Use in IDESG == ...or are unsure about the identity of the data controller in any particular case, you should consult your legal adviser or seek the advice of the Data Prote3 KB (416 words) - 00:25, 15 February 2020
- == Use Case Metadata == ====Use Case Lifecycle Status====12 KB (1,835 words) - 20:44, 5 November 2020
- which can be combined to implement identified IDESG Use Cases. # Test an initial use case against the basic functional model(s) (above)3 KB (421 words) - 03:58, 28 June 2018
- ...ith him at the DMV and the Department of Housing in Virginia to be able to use that homeless shelter address along with other vetting documents that they ...e ID credential be converted to an authenticated e-ED?” He asked about the case where having a physical ID was not possible, i.e., homeless and elderly.5 KB (747 words) - 03:58, 28 June 2018
- ##USE Case Gap Analysis with 4-party Authentication ##Use Case Mapping Template is included [not actually a Gap Analysis, but will help] �5 KB (796 words) - 03:58, 28 June 2018
- #**Without another plan, could present the state of work related to use case analysis relative to draft functional elements #Use Case Analysis Feedback3 KB (466 words) - 03:58, 28 June 2018
- ...statue on their books on the obligation of companies to securely store and use the Social Security numbers and information as it relates to the military s ...ent storage of those identifies, but in the civilian world that is not the case. Their ID needs to be protected as a civilian. Even going into a doctor’s7 KB (1,073 words) - 03:58, 28 June 2018
- #**Without another plan, could present the state of work related to use case analysis relative to draft functional elements. ...onal elements, and potential definitional/consistency concerns between the use cases and functional elements. We will attempt to start addressing these by5 KB (753 words) - 03:58, 28 June 2018
- ...scussion – topics are proceeding, Adam will post Sal’s meeting notes. Use case selection to be discussed later today. #Gap Analysis – 14 current use Cases will be examined using gap analysis templates (on-line wiki sources),3 KB (408 words) - 03:58, 28 June 2018
- '''Use Case Description''': ...on the employee-employer relationship, it would work equally well for any case where their is a contractual relationship between the user and the identity3 KB (429 words) - 23:13, 20 May 2020
- == Use Case Criteria and/or Questions to Ask == # Is the use case describing a function/capability that does not exist today or just another961 bytes (148 words) - 03:58, 28 June 2018
- #REDIRECT [[Un and Underserved Use Case]]41 bytes (6 words) - 03:58, 28 June 2018
- #REDIRECT [[Four Party Authentication and Authorization Use Case]]66 bytes (8 words) - 03:58, 28 June 2018
- == Use Case Metadata == ====Use Case Lifecycle Status====7 KB (1,007 words) - 03:58, 28 June 2018
- Use cases or user experiences can be created at any level within the taxonomy o This requirements doc is informed by the efforts of the use case and user experience committee.8 KB (1,315 words) - 19:29, 30 July 2020
- The ability to use a resource or a service. More specifically, the Permissions or Entitlements To interact with a system entity in order to manipulate, use, gain knowledge of, and/or obtain a representation of some or all of a syst845 KB (86,833 words) - 04:00, 28 June 2018
- Rules that have been established and implemented concerning use of, security in, and acceptable level of Risk for the System. Rules will cl ...n access, connection to the Internet, use of copyrighted works, unofficial use of Federal Government equipment, the assignment and limitation of System pr135 KB (15,051 words) - 04:00, 28 June 2018
- '''Use Case Description''': ...ntifying any subject actors. Verb modifiers may be used to refine the use case. Examples: authenticate to system with trusted identity, authenticate to925 bytes (109 words) - 04:00, 28 June 2018
- == Use Case Metadata == A general use case which all other use cases can depend (unless they chose not to.)5 KB (810 words) - 04:00, 28 June 2018