...
The names and descriptions used in these elaborations aim to be mappable to those processes and be terminologically compatible with ITU-T X.1254 and its definitions of terms. An additional specifics in relation the above-listed processes is that they focus on the credentials (sets of data supporting identity or entitlement claims), while our scenarios are focused on authentication factors (something specific that is possessed, known or inherent). The subject entities are referred to as applicants, who are the physical persons whose identity is to be authenticated.
C: Commons
The actions listed here are common actions which may be used at multiple times at different stages and for various purposes. These actions are:
...
Output: decision: eligible (yes/no)
I: Application and Initiation
The initial request for an additional authentication factor during which vetting arrangements are made. This initiation can be integrated with face-to-face vetting sessions (if allowed by the service policy) when the actions needed to link this phase and separate verification session would not be necessary. These actions are I_FACTOR_DELIVERY and I_ARRANGE_VETTING. In some cases, this phase may be initiated by the Applicant's organisation, not directly by the applicant itself.
...
Output: appointment, code, confirmation data and instructions for the applicant, database record on the appointment
V: Identity Proofing and Information Verification
Do the actual vetting by proofing the applicant's identity and verifying (or vetting) identity information. This may be performed by an outside organisation or a separate internal service.
...
Effect on LoA: not applicable
B: Factor Binding and Activation
Establishment of an operational link between the identity of the user and factor.
...
Output: message to the applicant
Detailed Attributes
...