- Identity proof users that require accounts for logical access to systems based on appropriate identity assurance level requirements as specified in applicable standards and guidelines;
- Resolve user identities to a unique individual; and
- Collect, validate, and verify identity evidence.
Identity proofing is the process of collecting, validating, and verifying a user's identity information for the purposes of establishing credentials for accessing a system. Identity proofing is intended to mitigate threats to the registration of users and the establishment of their accounts. Standards and guidelines specifying identity assurance levels for identity proofing include SP 800-63-3 and SP 800-63A. Organizations may be subject to laws, executive orders, directives, regulations, or policies that address the collection of identity evidence. Organizational personnel consult with the senior agency official for privacy and legal counsel regarding such requirements.
Require that the registration process to receive an account for logical access includes supervisor or sponsor authorization.
Require evidence of individual identification be presented to the registration authority.
Require that the presented identity evidence be validated and verified through [Assignment: organizational defined methods of validation and verification].
Require that the validation and verification of identity evidence be conducted in person before a designated registration authority.
Require that a [Assignment: registration code, notice of proofing] be delivered through an out-of-band channel to verify the users address (physical or digital) of record.
Accept externally-proofed identities at [Assignment: organization-defined identity assurance level].