This OpenID Provider shows how to:

IDEF Guidelines

The collections of IDEF guidelines current at the time were used to create this example of best practices.

UX Guidelines »

The list of the baseline Functional requirments the IDEF version 1.0 are used in the Self-Assesment and are referenced in links throughout this example using the same azure coloring and mouse hover tool tip as the button below.

Baseline Functional Reqs »

Mapping of roles used from the IDEF:
  1. Authenticate - This role is performed within this example for local users and in 3rd party providers if enabled.
  2. Authorize - This example, like all RPs, contain this role, some parts of which could be performed in other servers

IDEF Guidelines for business proceses

The collections of IDEF guidelines current at the time were used to create this example of best practices.

All Relying Parties shall document business polcies and proceedures for all identity functions.

Documented Processes »

NIST and the NSTIC

The origin and current direction of the National Strategy for Trusted Identities in Cyberspace.
Trusted Identities Group »
NSTIC Notes »
Origin Document »