| optional |
|
| 2.2) User performs authentication with that token to prove possession |
| optional |
|
3) Identification | 3.1) Eligibility check of user |
| optional |
|
| 3.2) Vet identity of user |
|
|
|
|
| 3.2.1) Compare claimed/transmitted/spoken information with user's identity proof (e.g. ID doc, activation code) | mandatory |
|
|
| 3.2.2) Check user's identity proof with it's original source for validity | optional | ↓ |
|
| 3.2.3) Record identity proof |
|
|
4) Token binding | 4.1) User chooses own token or handover of token to usr |
| optional when activity 2 took place |
|
| 4.2) Bind token to digital ID |
| mandatory | ↓ |
| 4.3) Token activation | 4.2) Token-proof of-possession (e.g. test authentication) |
|
|
|
|
|
|
|