...
The actions listed here are common actions which may be used at multiple times at different stages and for various purposes.These actions are:
...
...
C_USE_EXISTING_FACTOR Authenticate Using Existing Factor
...
Do the actual vetting by proofing the applicant's identity and verifying (or vetting) identity information. This may be performed by an outside organisation or a separate internal service.
- Proof
- Liveness
- Source
- Record
V_COMMENCE Begin Vetting (possibly by accessing and validating the prior request)
...
Establishment of an operational link between the identity of the user and factor.
...
B_FACTOR_AND_ID Bind Factor to Digital ID
...