Knowledge (XXG)

Credential service provider

Source 📝

203:(RA), which verifies the identity of the applicant, typically through the presentation of paper credentials and by records in databases. This process is called identity proofing. The RA, in turn, vouches for the identity of the applicant (and possibly other verified attributes) to a CSP. The applicant then becomes a subscriber of the CSP. The CSP establishes a mechanism to uniquely identify each subscriber and the associated tokens and credentials issued to that subscriber. There is always a relationship between the RA and CSP. 33: 215:
process. As a result, some regulatory agencies can ask individuals to prove their identities through a CSP. Today, regulatory agencies require physicians to be authenticated electronically before physicians can issue any prescription for controlled dangerous substances (CDS). Physicians have to seek
195:
and issues credentials as needed to bind that token to the identity, or to bind the identity to some other useful verified attribute. The subscriber may be given electronic credentials to go with the token at the time of registration, or credentials may be generated later as needed. Subscribers have
174:
that they must remember or carry around with them, but also applications and services must perform some level of registration and then some level of authentication of those users. As a result, Credential Service Providers were created. A CSP separates those functions from the application or service
318:
Equifax provides credentialing solutions certified that meet Federal security and privacy requirements. Equifax offers beyond basic name and address identification credential. Equifax provides methods of discerning an electronic identity in order to ensure that only trusted users have access to
153:
and e-authentication initiatives. An example of a CSP would be an online site whose primary purpose may be, for example, internet banking - but whose users may be subsequently authenticated to other sites, applications or services without further action on their part.
216:
for federally approved CSPs in order to receive a two-factor authentication credential or digital certificates. The CSPs conduct identity proofing that meets National Institute of Standards and Technology Special Publication 800-63-1 Assurance Level 3.
145:
system, most typically identified as a separate entity in a Federated authentication system. A CSP may be an independent third party, or may issue credentials for its own use. The term CSP is used frequently in the context of the
327:
MediQuin is a credential service provider located in Irvine, California. MediQuin provides Medical Credentialing, provider applications, enrollment forms, verification services, and other medical related credential services.
224:
The federal government is currently the CSP for e-government transactions. However, the government plans to focus all their attention in the applications and leave the credential management business to other industries.
242:
As a result of this initiative, campuses may start offering to student, faculty and staff access to certain federal applications. However, before this happens, the government will impose the following requirements:
536:, a new authentication package called Credential Security Service Provider (CredSSP) was introduced. CredSSP uses the client-side CSP to enable applications to delegate user's credentials to the target server. 196:
a duty to maintain control of their tokens and comply with the responsibilities to the CSP. The CSP maintains registration records for each subscriber to allow recovery of registration records.
517:
The Initiative Identity Assurance Accreditation and Approval Program is a Kantara program that tries to use CPS in order to provide to private sectors with better reliable digital credentials.
170:
and the multiplicity of services and applications that would ultimately require authentication. The result of this is that not only are users burdened with many
50: 683: 606: 633: 575: 147: 199:
In an e-authentication model, a claimant in an authentication protocol is a subscriber to some CSP. At some point, an applicant registers with a
97: 775: 658: 69: 801: 748:"Med-Advantage – Medical Credentialing | Customized Credentialing Services | Credential Verification Services - Credentials" 116: 232:
Build and enable mutual trust needed to support widespread use of electronic interactions between the public and the US Government.
76: 83: 54: 747: 65: 832: 238:
Deliver common interoperable authentication solutions, appropriately matching the levels of risk and business risks.
43: 212: 529: 191:
and credentials issued to that subscriber. The CSP registers or gives the subscriber a token to be used in an
388:
Below is a table that shows the approximate cost for a Credential Service Provider in different Categories.
192: 637: 200: 228:
In 2004, the US government proposed an E-authentication initiative. The goals of the initiative include:
90: 582: 162:
In any authentication system, some entity is required to authenticate the user on behalf of the target
163: 235:
Minimize the burden on the public when obtaining trusted electronic services from the government.
277:
Those services provide wishing to join the Federal Federation Directly will have to agree with:
677: 600: 525: 167: 779: 662: 622: 17: 310:
Below is a short list of some CSPs with a short description of the services they provide.
138: 187:
The CSP establishes a mechanism to uniquely identify each subscriber and the associated
175:
and typically provides trust to that application or service over a network (such as the
188: 142: 826: 533: 697: 150: 32: 751: 370:
Privileges - Verify Hospital admitting Privileges and Delineation of Privileges
171: 802:"Credential Security Service Provider and SSO for Terminal Services Logon" 166:
or service. For many years there was poor understanding of the impact of
176: 560:
NIST Special Publication 800-63, Revision 3, Digital Identity Guidelines
634:"E-Authentication Initiative: Federal Single Sign-On | EDUCAUSE" 559: 349:
Education - Verify Medical Education & Post graduate Education
343:
Criminal Background - Verify State and/or Federal Criminal History
273:
Service Provider Requirements to Join Federal Federation Directly
141:
or electronic credentials to subscribers. A CSP forms part of an
367:
HIPDB - Query The Healthcare Integrity and Protection Databank
361:
Malpractice Insurance - Verify from the Carrier or Certificate
26: 379:
Work History - Extract Work History from the Curriculum Vitae
722: 211:
CSPs can establish confidence of a user identity through an
346:
DEA/CDS Registration - Verify by NTIS and/or by certificate
770: 768: 340:
Board Certification - Verify Current certificate level
336:
Med Advantage provide numerous verification services.
376:
Sanctions - Query Medicare/Medicaid and State License
352:
FSMB - Query The Federation of State Medical Boards
263:
FedFed Membership requirements for levels 3 & 4
247:
FedFed Membership requirements for levels 1 & 2
57:. Unsourced material may be challenged and removed. 301:Procedural, audit and documentation requirements. 281:eAuthentication Business and Operating rules in 555: 553: 551: 549: 364:NPDB - Query The National Practitioner Databank 776:"Kantara Initiative » Identity Assurance" 723:"MediQuin.com - Medical Credentialing Service" 8: 618: 616: 358:Malpractice Claims - Verify from the carrier 373:References - Verify Professional references 390: 117:Learn how and when to remove this message 570: 568: 545: 417:Credential Service Provider Subscriber 682:: CS1 maint: archived copy as title ( 675: 605:: CS1 maint: archived copy as title ( 598: 258:Technical Interoperability at SAML 1.0 7: 698:"Prevent Fraud - Business - Equifax" 440:Credential Service Provider Renewal 319:sensitive data and secure networks. 268:Cross-certification with Federal PKI 255:Signing Business and Operating Rules 55:adding citations to reliable sources 463:Assessor Accreditation Subscriber 137:) is a trusted entity that issues 25: 293:Compliance with FIPS and NIST SPs 355:License- Verify State license(s) 31: 486:Assessor Accreditation Renewal 42:needs additional citations for 1: 66:"Credential service provider" 562:, Pages.nist.gov, June 2017 131:credential service provider 18:Credential Service Provider 849: 409:L2: 10001-25000 employees 220:CSP and the US Government 213:electronic authentication 530:authentication protocols 412:L3: >25000 employees 397:Educational Institution 406:L1: 101-1000 employees 193:authentication protocol 528:uses CSP to implement 513:The Kantara Initiative 296:Reporting requirements 201:Registration Authority 252:Credential Assessment 403:L0: 1-100 employees 51:improve this article 833:Federated identity 806:Docs.microsoft.com 508: 507: 127: 126: 119: 101: 16:(Redirected from 840: 817: 816: 814: 812: 797: 791: 790: 788: 787: 778:. Archived from 772: 763: 762: 760: 759: 750:. Archived from 744: 738: 737: 735: 733: 719: 713: 712: 710: 708: 694: 688: 687: 681: 673: 671: 670: 661:. Archived from 655: 649: 648: 646: 645: 636:. Archived from 630: 624: 620: 611: 610: 604: 596: 594: 593: 587: 581:. Archived from 580: 572: 563: 557: 391: 290:Security levels″ 122: 115: 111: 108: 102: 100: 59: 35: 27: 21: 848: 847: 843: 842: 841: 839: 838: 837: 823: 822: 821: 820: 810: 808: 799: 798: 794: 785: 783: 774: 773: 766: 757: 755: 746: 745: 741: 731: 729: 721: 720: 716: 706: 704: 696: 695: 691: 674: 668: 666: 659:"Archived copy" 657: 656: 652: 643: 641: 632: 631: 627: 621: 614: 597: 591: 589: 585: 578: 576:"Archived copy" 574: 573: 566: 558: 547: 542: 523: 515: 386: 334: 325: 316: 308: 275: 265: 249: 222: 209: 185: 160: 148:US government's 139:security tokens 123: 112: 106: 103: 60: 58: 48: 36: 23: 22: 15: 12: 11: 5: 846: 844: 836: 835: 825: 824: 819: 818: 792: 764: 739: 714: 689: 650: 625: 612: 564: 544: 543: 541: 538: 522: 519: 514: 511: 506: 505: 502: 499: 496: 493: 490: 487: 483: 482: 479: 476: 473: 470: 467: 464: 460: 459: 456: 453: 450: 447: 444: 441: 437: 436: 433: 430: 427: 424: 421: 418: 414: 413: 410: 407: 404: 401: 398: 395: 385: 382: 381: 380: 377: 374: 371: 368: 365: 362: 359: 356: 353: 350: 347: 344: 341: 333: 330: 324: 321: 315: 312: 307: 304: 303: 302: 299: 298: 297: 294: 291: 288: 287:Service levels 285: 274: 271: 270: 269: 264: 261: 260: 259: 256: 253: 248: 245: 240: 239: 236: 233: 221: 218: 208: 205: 184: 181: 159: 156: 143:authentication 125: 124: 39: 37: 30: 24: 14: 13: 10: 9: 6: 4: 3: 2: 845: 834: 831: 830: 828: 807: 803: 796: 793: 782:on 2012-05-03 781: 777: 771: 769: 765: 754:on 2012-05-08 753: 749: 743: 740: 728: 724: 718: 715: 703: 699: 693: 690: 685: 679: 665:on 2022-04-04 664: 660: 654: 651: 640:on 2010-08-13 639: 635: 629: 626: 623: 619: 617: 613: 608: 602: 588:on 2012-10-01 584: 577: 571: 569: 565: 561: 556: 554: 552: 550: 546: 539: 537: 535: 534:Windows Vista 531: 527: 520: 518: 512: 510: 503: 500: 497: 494: 491: 488: 485: 484: 480: 477: 474: 471: 468: 465: 462: 461: 457: 454: 451: 448: 445: 442: 439: 438: 434: 431: 428: 425: 422: 419: 416: 415: 411: 408: 405: 402: 399: 396: 393: 392: 389: 383: 378: 375: 372: 369: 366: 363: 360: 357: 354: 351: 348: 345: 342: 339: 338: 337: 332:Med Advantage 331: 329: 322: 320: 313: 311: 305: 300: 295: 292: 289: 286: 284:Risk Analysis 283: 282: 280: 279: 278: 272: 267: 266: 262: 257: 254: 251: 250: 246: 244: 237: 234: 231: 230: 229: 226: 219: 217: 214: 206: 204: 202: 197: 194: 190: 182: 180: 178: 173: 169: 165: 157: 155: 152: 149: 144: 140: 136: 132: 121: 118: 110: 107:February 2009 99: 96: 92: 89: 85: 82: 78: 75: 71: 68: –  67: 63: 62:Find sources: 56: 52: 46: 45: 40:This article 38: 34: 29: 28: 19: 809:. Retrieved 805: 800:Tara Meyer. 795: 784:. Retrieved 780:the original 756:. Retrieved 752:the original 742: 730:. Retrieved 727:Mediquin.com 726: 717: 705:. Retrieved 701: 692: 667:. Retrieved 663:the original 653: 642:. Retrieved 638:the original 628: 590:. Retrieved 583:the original 524: 516: 509: 387: 335: 326: 317: 309: 276: 241: 227: 223: 210: 198: 186: 161: 134: 130: 128: 113: 104: 94: 87: 80: 73: 61: 49:Please help 44:verification 41: 811:24 February 732:24 February 707:24 February 702:Equifax.com 400:Non-Profit 183:CSP Process 172:credentials 164:application 786:2012-04-27 758:2012-05-07 669:2014-01-07 644:2012-05-21 592:2012-04-27 540:References 207:Importance 77:newspapers 504:$ 24,000 501:$ 16,000 498:$ 10,000 481:$ 25,000 478:$ 17,000 475:$ 11,000 458:$ 20,500 455:$ 15,500 435:$ 21,500 432:$ 16,500 306:Providers 827:Category 678:cite web 601:cite web 495:$ 4,000 492:$ 1,500 489:$ 1,000 472:$ 5,000 469:$ 2,000 466:$ 1,500 452:$ 8,000 449:$ 3,000 446:$ 1,000 443:$ 1,000 429:$ 9,000 426:$ 4,000 423:$ 2,000 420:$ 2,000 323:MediQuin 177:Internet 168:security 532:. With 526:Windows 521:Windows 314:Equifax 158:History 91:scholar 394:Level 189:tokens 93:  86:  79:  72:  64:  586:(PDF) 579:(PDF) 384:Costs 98:JSTOR 84:books 813:2019 734:2019 709:2019 684:link 607:link 151:eGov 70:news 179:). 135:CSP 53:by 829:: 804:. 767:^ 725:. 700:. 680:}} 676:{{ 615:^ 603:}} 599:{{ 567:^ 548:^ 129:A 815:. 789:. 761:. 736:. 711:. 686:) 672:. 647:. 609:) 595:. 133:( 120:) 114:( 109:) 105:( 95:· 88:· 81:· 74:· 47:. 20:)

Index

Credential Service Provider

verification
improve this article
adding citations to reliable sources
"Credential service provider"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message
security tokens
authentication
US government's
eGov
application
security
credentials
Internet
tokens
authentication protocol
Registration Authority
electronic authentication
Windows
authentication protocols
Windows Vista


Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.