These guidelines provide technical requirements for federal agencies implementing digital identity services and are not intended to constrain the development or use of standards outside of this purpose. These guidelines focus on the authentication of subjects interacting with government systems over open networks, establishing that a given claimant is a subscriber who has been previously authenticated.
National Institute of Standards and Technology (NIST)
These guidelines provide technical requirements for federal agencies implementing digital identity services and are not intended to constrain the development or use of standards outside of this purpose. This guideline focuses on the enrollment and verification of an identity for use in digital authentication.
National Institute of Standards and Technology (NIST)
These guidelines provide technical requirements for federal agencies implementing digital identity services and are not intended to constrain the development or use of standards outside of this purpose. This guideline focuses on the use of federated identity and the use of assertions to implement identity federations. Federation allows a given credential service provider to provide authentication and (optionally) subscriber attributes to a number of separately-administered relying parties.
National Institute of Standards and Technology (NIST)
These guidelines from the National Institutes of Standard and Technology provide technical requirements for federal agencies implementing digital identity services.
National Institute of Standards and Technology (NIST)
The DigitalGov Usability Starter Kit offers a comprehensive collection of tools and templates designed to assist in creating user-centered digital experiences.
There is a key disconnect between policymakers’ intent and implementation of policies. A user-centric, iterative, and data-driven approach can result result in digital technology that provides much needed data and insights at a substantially lower cost.
Remote identify proofing is the process federal agencies and other entities use to verify that the individuals who apply online for benefits and services are who they claim to be. If the applicant responds correctly to personal questions, their identity is considered to be verified. However, data stolen in recent breaches could be used fraudulently to respond to knowledge-based verification questions. Alternative methods are available that provide stronger security, but these methods may have limitations in cost, convenience, technological maturity, and they may not be viable for all segments of the public.