Credential Service Provider

From IDESG Wiki
Jump to navigation Jump to search

Taxonomy Template:

Definition

A Trusted Entity that issues or registers subscriber authenticators and issues [verifications of] electronic credentials to subscribers. A CSP may be an independent third party or [it may] issue credentials for its own use.

Context

  • Each federation must establish rules for determine to determine how a Trusted Entity it to be registered in the Accreditation.
  • The slight change to the NIST wording was to meant to clarify that subscribers (or subjects) can create their own credentials is protected storage and ask the CSP to verify the security of those credentials.

Sources

  1. A trusted entity that issues or registers subscriber authenticators and issues electronic credentials to subscribers. A CSP may be an independent third party or issue credentials for its own use. (NIST SP 800-63-3)/
  2. A trusted entity that issues or registers Subscriber tokens and issues electronic credentials to Subscribers. The CSP may encompass Registration Authorities (RAs) and Verifiers that it operates. A CSP may be an independent third party, or may issue credentials for its own use. (Original proposal from IDESG)
  3. An entity that performs identity proofing, registration and issues some form of a subscriber token within some procedural context designed to convey a degree of trust.(Wallace)
  4. A trusted entity that issues credentials to Subscribers.(D'Agostino)

Status

Proposed Update

Details

  • For basic levels of assurance the CSP can provided verified attributes, but these should be treated by any relying party as self-asserted.
  • For higher levels of identity assurance the CSP must verify (2) remote or (3) physically present identity proofing, including pseudonymous identity.
  • For higher levels of authentication assurance the CSP must verify proof of possession and control of (2) two factors or (3) a hardware-based authenticator of 2 factors.
  • For higher levels of federation assurance the CSP must verify (2) approved encryption or (3) proof of possession and approved encryption.

References