< BACK

Approval Profile for Credential Validation – tSd0109

Summary

This document defines the tScheme criteria against which organisations must be successfully assessed in order to be eligible for a Grant of Approval for the provision of services to Government, individuals, system objects, corporate entities and other relying parties for the validation of credentials to enable the authentication of the identity of individuals.

Scope

The criteria given in this Approval Profile are related to Services that are established to enable an individual to register with an Identity Provider in order to gain the means of transacting electronically with relying parties. These relying parties, who will be either Trust Service Providers or some other kind of service providers, need to be able to trust that ultimately they are transacting with the individual from whom the electronic transaction appears to originate. The Identity Provider links an electronic identity with a real-world identity. The End User presents proof of their real-world identity (e.g. documentation such as Passport, Driving Licence or pre-existing electronic evidence) to the Identity Provider so that they can validate and verify the registrant’s claimed real-world identity, issue them with a credential and then (if appropriate) pass authentication information to support credential validation to a Credential Validation Service Provider. No specific constraint of scope is intended in this Profile on how these processes could be carried out.

For some simple credentials, such as those based on PIN and Password, all that the credential validation service does is to confirm that the credential is valid and has not been suspended or revoked; for more sophisticated credentials, such as Chip & PIN smartcards, the credential validation service can support a Challenge/Response function to provide additional assurance that the credential is being used by an End User that knows how to access the credential. However, assurance that it is the correct End User depends on the strength of the registration process and on the security applied to prevent improper access to the credential. These factors are out of scope for the credential validation service.

Issue 1.05

The full Profile is available as a PDF document free of charge for non-commercial use. To track access, you must register (free of charge) – this entitles you to access the restricted Approvals Profiles page. To register for access to the Profiles please click here. Already registered? Login, then access the files here.

< BACK

Insights

A collection of white papers and presentations from tScheme.

MORE >

Why tScheme approval?

It’s the mark which says your service meets the highest standards of trust.

MORE >

Getting tScheme approval

Approval usually takes at least three months, but it can be quicker.

MORE >