National Institute of Standards and Technology Special Publication 800-63-3 Natl. The information in this publication, including concepts and methodologies, may be used by federal agencies even before the completion of such companion publications.Thus, until each publication is completed, current requirements, guidelines, and procedures, where they exist, remain operative.The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U. economy and public welfare by providing technical leadership for the nation’s measurement and standards infrastructure.ITL develops tests, test methods, reference data, proof of concept implementations, and technical analyses to advance the development and productive use of information technology.
This publication may be used by nongovernmental organizations on a voluntary basis and is not subject to copyright in the United States. Such identification is not intended to imply recommendation or endorsement by NIST, nor is it intended to imply that the entities, materials, or equipment are necessarily the best available for the purpose. This guideline is consistent with the requirements of the Office of Management and Budget (OMB) Circular A-130. NIST is responsible for developing information security standards and guidelines, including minimum requirements for federal information systems, but such standards and guidelines shall not apply to national security systems without the express approval of appropriate federal officials exercising policy authority over such systems.Attributes could be asserted by CSPs to RPs in support of pseudonymous identity with verified attributes.A CSP that supports IAL2 can support IAL1 transactions if the user consents.