Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

The actions listed here are common actions which may be used at multiple times at different stages and for various purposes.These actions are:

...

...

C_USE_EXISTING_FACTOR Authenticate Using Existing Factor

...

Do the actual vetting by proofing the applicant's identity and verifying (or vetting) identity information. This may be performed by an outside organisation or a separate internal service.

  • Proof
  • Liveness
  • Source
  • Record

V_COMMENCE Begin Vetting (possibly by accessing and validating the prior request)

...

Establishment of an operational link between the identity of the user and factor.

...

B_FACTOR_AND_ID Bind Factor to Digital ID

...