Access Government Data Base Use Case

From IDESG Wiki
Revision as of 03:00, 28 June 2018 by Omaerz (talk | contribs) (4 revisions imported: Initial Upload of old pages from IDESG Wiki)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search
The printable version is no longer supported and may have rendering errors. Please update your browser bookmarks and please use the default browser print function instead.

Title: Accessing Government Data Bases for Public Users.


Use Case Description: Accessing Government Data bases for public as opposed to government users requires a different set of trusted identity criteria, and the uses vary depending on identity (status), proper enrollment, authentication, and verification of attributes that grant particularized access and use. Depending on the system and the required security and risk levels, it would involve an end to end set of identity use case elements or blocks, such as authenticate to system with trusted identity or authenticate to system with pseudonymous identity, match names between systems, verify attributes with privacy protection, grant access or redress for mistaken denials, and the technical levels of tokenization of users, changes to or correction of tokens and degrees of usage.



Use Case Category:


Contributor: Robert Faron, Senior Policy Advisor, USCIS/Verification Division


Use Case Details

Actors:


Goals:


Assumptions:


Requirements:


Process Flow:


Success Scenario:


Error Conditions:


Relationships

  • Extended by:
  • Extension of:

References and Citations