203:(RA), which verifies the identity of the applicant, typically through the presentation of paper credentials and by records in databases. This process is called identity proofing. The RA, in turn, vouches for the identity of the applicant (and possibly other verified attributes) to a CSP. The applicant then becomes a subscriber of the CSP. The CSP establishes a mechanism to uniquely identify each subscriber and the associated tokens and credentials issued to that subscriber. There is always a relationship between the RA and CSP.
33:
215:
process. As a result, some regulatory agencies can ask individuals to prove their identities through a CSP. Today, regulatory agencies require physicians to be authenticated electronically before physicians can issue any prescription for controlled dangerous substances (CDS). Physicians have to seek
195:
and issues credentials as needed to bind that token to the identity, or to bind the identity to some other useful verified attribute. The subscriber may be given electronic credentials to go with the token at the time of registration, or credentials may be generated later as needed. Subscribers have
174:
that they must remember or carry around with them, but also applications and services must perform some level of registration and then some level of authentication of those users. As a result, Credential
Service Providers were created. A CSP separates those functions from the application or service
318:
Equifax provides credentialing solutions certified that meet
Federal security and privacy requirements. Equifax offers beyond basic name and address identification credential. Equifax provides methods of discerning an electronic identity in order to ensure that only trusted users have access to
153:
and e-authentication initiatives. An example of a CSP would be an online site whose primary purpose may be, for example, internet banking - but whose users may be subsequently authenticated to other sites, applications or services without further action on their part.
216:
for federally approved CSPs in order to receive a two-factor authentication credential or digital certificates. The CSPs conduct identity proofing that meets
National Institute of Standards and Technology Special Publication 800-63-1 Assurance Level 3.
145:
system, most typically identified as a separate entity in a
Federated authentication system. A CSP may be an independent third party, or may issue credentials for its own use. The term CSP is used frequently in the context of the
327:
MediQuin is a credential service provider located in Irvine, California. MediQuin provides
Medical Credentialing, provider applications, enrollment forms, verification services, and other medical related credential services.
224:
The federal government is currently the CSP for e-government transactions. However, the government plans to focus all their attention in the applications and leave the credential management business to other industries.
242:
As a result of this initiative, campuses may start offering to student, faculty and staff access to certain federal applications. However, before this happens, the government will impose the following requirements:
536:, a new authentication package called Credential Security Service Provider (CredSSP) was introduced. CredSSP uses the client-side CSP to enable applications to delegate user's credentials to the target server.
196:
a duty to maintain control of their tokens and comply with the responsibilities to the CSP. The CSP maintains registration records for each subscriber to allow recovery of registration records.
517:
The
Initiative Identity Assurance Accreditation and Approval Program is a Kantara program that tries to use CPS in order to provide to private sectors with better reliable digital credentials.
170:
and the multiplicity of services and applications that would ultimately require authentication. The result of this is that not only are users burdened with many
50:
683:
606:
633:
575:
147:
199:
In an e-authentication model, a claimant in an authentication protocol is a subscriber to some CSP. At some point, an applicant registers with a
97:
775:
658:
69:
801:
748:"Med-Advantage – Medical Credentialing | Customized Credentialing Services | Credential Verification Services - Credentials"
116:
232:
Build and enable mutual trust needed to support widespread use of electronic interactions between the public and the US Government.
76:
83:
54:
747:
65:
832:
238:
Deliver common interoperable authentication solutions, appropriately matching the levels of risk and business risks.
43:
212:
529:
191:
and credentials issued to that subscriber. The CSP registers or gives the subscriber a token to be used in an
388:
Below is a table that shows the approximate cost for a
Credential Service Provider in different Categories.
192:
637:
200:
228:
In 2004, the US government proposed an E-authentication initiative. The goals of the initiative include:
90:
582:
162:
In any authentication system, some entity is required to authenticate the user on behalf of the target
163:
235:
Minimize the burden on the public when obtaining trusted electronic services from the government.
277:
Those services provide wishing to join the
Federal Federation Directly will have to agree with:
677:
600:
525:
167:
779:
662:
622:
17:
310:
Below is a short list of some CSPs with a short description of the services they provide.
138:
187:
The CSP establishes a mechanism to uniquely identify each subscriber and the associated
175:
and typically provides trust to that application or service over a network (such as the
188:
142:
826:
533:
697:
150:
32:
751:
370:
Privileges - Verify
Hospital admitting Privileges and Delineation of Privileges
171:
802:"Credential Security Service Provider and SSO for Terminal Services Logon"
166:
or service. For many years there was poor understanding of the impact of
176:
560:
NIST Special
Publication 800-63, Revision 3, Digital Identity Guidelines
634:"E-Authentication Initiative: Federal Single Sign-On | EDUCAUSE"
559:
349:
Education - Verify Medical Education & Post graduate Education
343:
Criminal Background - Verify State and/or Federal Criminal History
273:
Service Provider Requirements to Join Federal Federation Directly
141:
or electronic credentials to subscribers. A CSP forms part of an
367:
HIPDB - Query The Healthcare Integrity and Protection Databank
361:
Malpractice Insurance - Verify from the Carrier or Certificate
26:
379:
Work History - Extract Work History from the Curriculum Vitae
722:
211:
CSPs can establish confidence of a user identity through an
346:
DEA/CDS Registration - Verify by NTIS and/or by certificate
770:
768:
340:
Board Certification - Verify Current certificate level
336:
Med Advantage provide numerous verification services.
376:
Sanctions - Query Medicare/Medicaid and State License
352:
FSMB - Query The Federation of State Medical Boards
263:
FedFed Membership requirements for levels 3 & 4
247:
FedFed Membership requirements for levels 1 & 2
57:. Unsourced material may be challenged and removed.
301:Procedural, audit and documentation requirements.
281:eAuthentication Business and Operating rules in
555:
553:
551:
549:
364:NPDB - Query The National Practitioner Databank
776:"Kantara Initiative » Identity Assurance"
723:"MediQuin.com - Medical Credentialing Service"
8:
618:
616:
358:Malpractice Claims - Verify from the carrier
373:References - Verify Professional references
390:
117:Learn how and when to remove this message
570:
568:
545:
417:Credential Service Provider Subscriber
682:: CS1 maint: archived copy as title (
675:
605:: CS1 maint: archived copy as title (
598:
258:Technical Interoperability at SAML 1.0
7:
698:"Prevent Fraud - Business - Equifax"
440:Credential Service Provider Renewal
319:sensitive data and secure networks.
268:Cross-certification with Federal PKI
255:Signing Business and Operating Rules
55:adding citations to reliable sources
463:Assessor Accreditation Subscriber
137:) is a trusted entity that issues
25:
293:Compliance with FIPS and NIST SPs
355:License- Verify State license(s)
31:
486:Assessor Accreditation Renewal
42:needs additional citations for
1:
66:"Credential service provider"
562:, Pages.nist.gov, June 2017
131:credential service provider
18:Credential Service Provider
849:
409:L2: 10001-25000 employees
220:CSP and the US Government
213:electronic authentication
530:authentication protocols
412:L3: >25000 employees
397:Educational Institution
406:L1: 101-1000 employees
193:authentication protocol
528:uses CSP to implement
513:The Kantara Initiative
296:Reporting requirements
201:Registration Authority
252:Credential Assessment
403:L0: 1-100 employees
51:improve this article
833:Federated identity
806:Docs.microsoft.com
508:
507:
127:
126:
119:
101:
16:(Redirected from
840:
817:
816:
814:
812:
797:
791:
790:
788:
787:
778:. Archived from
772:
763:
762:
760:
759:
750:. Archived from
744:
738:
737:
735:
733:
719:
713:
712:
710:
708:
694:
688:
687:
681:
673:
671:
670:
661:. Archived from
655:
649:
648:
646:
645:
636:. Archived from
630:
624:
620:
611:
610:
604:
596:
594:
593:
587:
581:. Archived from
580:
572:
563:
557:
391:
290:Security levels″
122:
115:
111:
108:
102:
100:
59:
35:
27:
21:
848:
847:
843:
842:
841:
839:
838:
837:
823:
822:
821:
820:
810:
808:
799:
798:
794:
785:
783:
774:
773:
766:
757:
755:
746:
745:
741:
731:
729:
721:
720:
716:
706:
704:
696:
695:
691:
674:
668:
666:
659:"Archived copy"
657:
656:
652:
643:
641:
632:
631:
627:
621:
614:
597:
591:
589:
585:
578:
576:"Archived copy"
574:
573:
566:
558:
547:
542:
523:
515:
386:
334:
325:
316:
308:
275:
265:
249:
222:
209:
185:
160:
148:US government's
139:security tokens
123:
112:
106:
103:
60:
58:
48:
36:
23:
22:
15:
12:
11:
5:
846:
844:
836:
835:
825:
824:
819:
818:
792:
764:
739:
714:
689:
650:
625:
612:
564:
544:
543:
541:
538:
522:
519:
514:
511:
506:
505:
502:
499:
496:
493:
490:
487:
483:
482:
479:
476:
473:
470:
467:
464:
460:
459:
456:
453:
450:
447:
444:
441:
437:
436:
433:
430:
427:
424:
421:
418:
414:
413:
410:
407:
404:
401:
398:
395:
385:
382:
381:
380:
377:
374:
371:
368:
365:
362:
359:
356:
353:
350:
347:
344:
341:
333:
330:
324:
321:
315:
312:
307:
304:
303:
302:
299:
298:
297:
294:
291:
288:
287:Service levels
285:
274:
271:
270:
269:
264:
261:
260:
259:
256:
253:
248:
245:
240:
239:
236:
233:
221:
218:
208:
205:
184:
181:
159:
156:
143:authentication
125:
124:
39:
37:
30:
24:
14:
13:
10:
9:
6:
4:
3:
2:
845:
834:
831:
830:
828:
807:
803:
796:
793:
782:on 2012-05-03
781:
777:
771:
769:
765:
754:on 2012-05-08
753:
749:
743:
740:
728:
724:
718:
715:
703:
699:
693:
690:
685:
679:
665:on 2022-04-04
664:
660:
654:
651:
640:on 2010-08-13
639:
635:
629:
626:
623:
619:
617:
613:
608:
602:
588:on 2012-10-01
584:
577:
571:
569:
565:
561:
556:
554:
552:
550:
546:
539:
537:
535:
534:Windows Vista
531:
527:
520:
518:
512:
510:
503:
500:
497:
494:
491:
488:
485:
484:
480:
477:
474:
471:
468:
465:
462:
461:
457:
454:
451:
448:
445:
442:
439:
438:
434:
431:
428:
425:
422:
419:
416:
415:
411:
408:
405:
402:
399:
396:
393:
392:
389:
383:
378:
375:
372:
369:
366:
363:
360:
357:
354:
351:
348:
345:
342:
339:
338:
337:
332:Med Advantage
331:
329:
322:
320:
313:
311:
305:
300:
295:
292:
289:
286:
284:Risk Analysis
283:
282:
280:
279:
278:
272:
267:
266:
262:
257:
254:
251:
250:
246:
244:
237:
234:
231:
230:
229:
226:
219:
217:
214:
206:
204:
202:
197:
194:
190:
182:
180:
178:
173:
169:
165:
157:
155:
152:
149:
144:
140:
136:
132:
121:
118:
110:
107:February 2009
99:
96:
92:
89:
85:
82:
78:
75:
71:
68: –
67:
63:
62:Find sources:
56:
52:
46:
45:
40:This article
38:
34:
29:
28:
19:
809:. Retrieved
805:
800:Tara Meyer.
795:
784:. Retrieved
780:the original
756:. Retrieved
752:the original
742:
730:. Retrieved
727:Mediquin.com
726:
717:
705:. Retrieved
701:
692:
667:. Retrieved
663:the original
653:
642:. Retrieved
638:the original
628:
590:. Retrieved
583:the original
524:
516:
509:
387:
335:
326:
317:
309:
276:
241:
227:
223:
210:
198:
186:
161:
134:
130:
128:
113:
104:
94:
87:
80:
73:
61:
49:Please help
44:verification
41:
811:24 February
732:24 February
707:24 February
702:Equifax.com
400:Non-Profit
183:CSP Process
172:credentials
164:application
786:2012-04-27
758:2012-05-07
669:2014-01-07
644:2012-05-21
592:2012-04-27
540:References
207:Importance
77:newspapers
504:$ 24,000
501:$ 16,000
498:$ 10,000
481:$ 25,000
478:$ 17,000
475:$ 11,000
458:$ 20,500
455:$ 15,500
435:$ 21,500
432:$ 16,500
306:Providers
827:Category
678:cite web
601:cite web
495:$ 4,000
492:$ 1,500
489:$ 1,000
472:$ 5,000
469:$ 2,000
466:$ 1,500
452:$ 8,000
449:$ 3,000
446:$ 1,000
443:$ 1,000
429:$ 9,000
426:$ 4,000
423:$ 2,000
420:$ 2,000
323:MediQuin
177:Internet
168:security
532:. With
526:Windows
521:Windows
314:Equifax
158:History
91:scholar
394:Level
189:tokens
93:
86:
79:
72:
64:
586:(PDF)
579:(PDF)
384:Costs
98:JSTOR
84:books
813:2019
734:2019
709:2019
684:link
607:link
151:eGov
70:news
179:).
135:CSP
53:by
829::
804:.
767:^
725:.
700:.
680:}}
676:{{
615:^
603:}}
599:{{
567:^
548:^
129:A
815:.
789:.
761:.
736:.
711:.
686:)
672:.
647:.
609:)
595:.
133:(
120:)
114:(
109:)
105:(
95:·
88:·
81:·
74:·
47:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.