hash stringlengths 32 32 | doc_id stringlengths 7 13 | section stringlengths 3 121 | content stringlengths 0 2.2M |
|---|---|---|---|
b392cb6367becafeef785f2390da35ed | 119 461 | 4.6 Identity proofing service policy | When identity proofing is provided by an IPSP subcontracted to the TSP, the IPSP can define an identity proofing service policy that describes what is offered, and that can contain diverse information beyond the scope of the present document. An identity proofing service policy can indicate the applicability of the identity proofing service component and the identity proofing contexts to which the identity proofing service component can be applied. The recipients of the policy can be the TSPs and other actors that the IPSP provides its services to, and Conformity Assessment Bodies (CAB) performing audits of the IPSP and the concerned TSPs. The present document can be referred by an identity proofing service policy to provide information about the LoIP of the service. An IPSP conforming to the present document's normative requirements for Baseline LoIP or Extended LoIP for at least one use case defined in clause 9 or Annex C of the present document may use in its documentation the following specific Object Identifiers (OID) in addition to reference to the specific use cases from clause 9 and/or Annex C of the present document supported by the IPSP: • itu-t(0) identified-organization(4) etsi(0) IDENTITY-PROOFING-policies(19461) policy-identifiers(1) baseline(1) • itu-t(0) identified-organization(4) etsi(0) IDENTITY-PROOFING-policies(19461) policy-identifiers(1) extended(2) |
b392cb6367becafeef785f2390da35ed | 119 461 | 5 Operational risk assessment | OVR-5-01: The requirements specified in ETSI EN 319 401 [1], clause 5 shall apply. NOTE 1: When the identity proofing is done by the TSP itself, the TSP's risk assessment can cover the identity proofing. OVR-5-02: The IPSP's risk assessment shall be updated yearly. ETSI ETSI TS 119 461 V2.1.1 (2025-02) 25 OVR-5-03: The IPSP's risk assessment shall cover relevant risks related to identity proofing and at least: a) An assessment of the risks related to identity fraud; and b) An assessment of the risks related to information systems security. OVR-5-04: The IPSP's risk assessment shall be updated if an identity proofing process is changed. OVR-5-05: The IPSP shall have a documented and effective procedure for threats intelligence that ensures that the IPSP's service is adapted to new threats. EXAMPLE: Based on the ENISA report "Methodology for sectoral cybersecurity assessments" [i.28]. OVR-5-06: The IPSP's risk assessment shall be updated according to findings from the threats intelligence procedure. [CONDITIONAL] OVR-5-07: If the Baseline LoIP is claimed, the risk assessment shall consider at least attackers with moderate attack potential. [CONDITIONAL] OVR-5-08: If the Extended LoIP is claimed, the risk assessment shall consider at least attackers with high attack potential. NOTE 2: See clause 3.1 of the present document for definitions of moderate and high attack potential. The ENISA report "Methodology for sectoral cybersecurity assessments" [i.28], clauses 5 (especially clause 5.4) and 9 can be used as basis for describing attack potential. OVR-5-09: Based on findings from the threats intelligence procedure and changes to the risk assessment, the need for training of personnel shall be assessed and training be carried out if needed. OVR-5-10: The IPSP shall state in its practice statement goals for quality and security in terms of resilience to false acceptance and false rejection of applicants and perform regular testing of the performance against these goals. NOTE 3: While false acceptance and rejection are terms normally used for biometrics, the terms in this requirement apply to all use cases of clause 9 and Annex C of the present document, e.g. including physical presence. |
b392cb6367becafeef785f2390da35ed | 119 461 | 6 Policies and practices | |
b392cb6367becafeef785f2390da35ed | 119 461 | 6.1 Identity proofing service practice statement | OVR-6.1-01: The requirements specified in ETSI EN 319 401 [1], clause 6.1 shall apply. OVR-6.1-02: An IPSP claiming compliance with the present document shall identify in its practice statement the use cases for which compliance is claimed. NOTE 1: When the identity proofing is done by the TSP itself, the TSP's practice statement can cover the information on the identity proofing and there is no need for a specific practice statement for identity proofing. OVR-6.1-03: Identification of use cases for which compliance is claimed shall be by reference to specific parts of clause 9 and/or Annex C of the present document NOTE 2: An IPSP will typically only support some of the use cases defined in the present document. |
b392cb6367becafeef785f2390da35ed | 119 461 | 6.2 Terms and Conditions | OVR-6.2-01: The requirements specified in ETSI EN 319 401 [1], clause 6.2 shall apply. NOTE: Terms and conditions for identity proofing can be part of the terms and conditions for use of the trust service for which the identity proofing is done. ETSI ETSI TS 119 461 V2.1.1 (2025-02) 26 |
b392cb6367becafeef785f2390da35ed | 119 461 | 6.3 Information security policy | OVR-6.3-01: The requirements specified in ETSI EN 319 401 [1], clause 6.3 shall apply. |
b392cb6367becafeef785f2390da35ed | 119 461 | 7 Identity proofing service management and operation | |
b392cb6367becafeef785f2390da35ed | 119 461 | 7.1 Internal organization | OVR-7.1-01: The requirements specified in ETSI EN 319 401 [1], clause 7.1 shall apply. |
b392cb6367becafeef785f2390da35ed | 119 461 | 7.2 Human resources | OVR-7.2-01: The requirements specified in ETSI EN 319 401 [1], clause 7.2 shall apply. |
b392cb6367becafeef785f2390da35ed | 119 461 | 7.3 Asset management | OVR-7.3-01: The requirements specified in ETSI EN 319 401 [1], clause 7.3 shall apply. |
b392cb6367becafeef785f2390da35ed | 119 461 | 7.4 Access control | OVR-7.4-01: The requirements specified in ETSI EN 319 401 [1], clause 7.4 shall apply. |
b392cb6367becafeef785f2390da35ed | 119 461 | 7.5 Cryptographic controls | OVR-7.5-01: The requirements specified in ETSI EN 319 401 [1], clause 7.5 shall apply. |
b392cb6367becafeef785f2390da35ed | 119 461 | 7.6 Physical and environmental security | OVR-7.6-01: The requirements specified in ETSI EN 319 401 [1], clause 7.6 shall apply. |
b392cb6367becafeef785f2390da35ed | 119 461 | 7.7 Operation security | OVR-7.7-01: The requirements specified in ETSI EN 319 401 [1], clause 7.7 shall apply. |
b392cb6367becafeef785f2390da35ed | 119 461 | 7.8 Network security | OVR-7.8-01: The requirements specified in ETSI EN 319 401 [1], clause 7.8 shall apply. OVR-7.8-02: The information system making the identity proofing decision shall be logically or physically separated from non-critical information systems at the IPSP. NOTE: E.g. separated from office support systems. |
b392cb6367becafeef785f2390da35ed | 119 461 | 7.9 Vulnerabilities and incident management | OVR-7.9-01: The requirements specified in ETSI EN 319 401 [1], clause 7.9 shall apply. OVR-7.9-02: Reporting obligations according to ETSI EN 319 401 [1] REQ-7.9.2-02X and clause 7.9.3 shall be fulfilled as required by the identity proofing context and the obligations of the TSPs relying on the IPSP's service. EXAMPLE: Reporting to the supervisory authority supervising a TSP can be done in co-operation between the IPSP and the TSP; similar for identity proofing for other actors than TSPs. ETSI ETSI TS 119 461 V2.1.1 (2025-02) 27 |
b392cb6367becafeef785f2390da35ed | 119 461 | 7.10 Collection of evidence | OVR-7.10-01: The requirements specified in ETSI EN 319 401 [1], clause 7.10 shall apply. NOTE 1: Long-term requirements for retention of evidence can be fulfilled by the TSP requesting the identity proofing instead of by the IPSP when the TSP and the IPSP are different entities. NOTE 2: The requirements of clause 8.5.2 of the present document apply. |
b392cb6367becafeef785f2390da35ed | 119 461 | 7.11 Business continuity management | OVR-7.11-01: The requirements specified in ETSI EN 319 401 [1], clause 7.11 shall apply. OVR-7.11-02: Processes for crisis management according to ETSI EN 319 401 [1], REQ-7.11.3-01X shall be as required by the identity proofing context and the obligations of the TSPs relying on the IPSP's service. |
b392cb6367becafeef785f2390da35ed | 119 461 | 7.12 Termination and termination plans | OVR-7.12-01: The requirements specified in ETSI EN 319 401 [1], clause 7.12, excluding REQ-7.12-11, shall apply. NOTE: When the IPSP and the TSP requesting the identity proofing are different entities, they can agree mutual or unilateral assistance in establishing termination plans. |
b392cb6367becafeef785f2390da35ed | 119 461 | 7.13 Compliance | OVR-7.13-01: The requirements specified in ETSI EN 319 401 [1], clause 7.13 shall apply. |
b392cb6367becafeef785f2390da35ed | 119 461 | 7.14 Supply chain | OVR-7.14-01: The requirements specified in ETSI EN 319 401 [1], clause 7.14 shall apply. |
b392cb6367becafeef785f2390da35ed | 119 461 | 8 Identity proofing service requirements | |
b392cb6367becafeef785f2390da35ed | 119 461 | 8.1 Initiation | INI-8.1-01X: The applicant shall be informed of, and shall actively accept before the identity proofing process is started, the purpose of the identity proofing and the related terms and conditions as required by the identity proofing context. INI-8.1-02X: If alternative identity proofing processes are available to achieve the purpose of the identity proofing, the applicant should be allowed to select which of the alternative processes to use. INI-8.1-03X: The applicant shall receive clear guidance regarding how the identity proofing process will be carried out, regarding the identity information that will be collected, regarding what data is kept and for how long, regarding the evidence that the applicant is required to present, and regarding any tool that the applicant is required to use. EXAMPLE 1: Information on the applicable data protection rules, notably GDPR if the identity proofing process is carried out under the legislation of an EU Member State. EXAMPLE 2: The identity proofing process can require the use of a specific type of device (e.g. a smartphone) with the installation of specific software (e.g. an app). INI-8.1-04: The identity proofing process, or at least one process if alternative processes are available, shall be available to persons with disabilities in accordance with the applicable legislation. EXAMPLE 3: Directive (EU) 2019/882 [i.31] in the EU. ETSI ETSI TS 119 461 V2.1.1 (2025-02) 28 |
b392cb6367becafeef785f2390da35ed | 119 461 | 8.2 Attribute and evidence collection | |
b392cb6367becafeef785f2390da35ed | 119 461 | 8.2.1 General requirements | COL-8.2.1-01X: Mandatory and optional identity attributes to collect shall be defined for each identity proofing context. COL-8.2.1-01A: All mandatory attributes for a specific identity proofing context shall be collected. COL-8.2.1-02: The identity attributes collected shall provide unique identification of the applicant for the identity proofing context. COL-8.2.1-03X: The identity attributes collected shall be validated by use of one or more authoritative evidence and optionally one or more supplementary evidence. NOTE 1: An identity proofing process can use multiple evidence, including several evidence of the same type, e.g. several identity documents, either routinely, or with further evidence added if identity proofing using the initial evidence yields insufficient reliability of the result. COL-8.2.1-04: The evidence collected shall meet the requirements of the identity proofing context. NOTE 2: The identity proofing context can pose requirements for the use of specific types of evidence, e.g. resulting from applicable legislation. COL-8.2.1-05: The evidence shall be issued by entities trusted in the identity proofing context. NOTE 3: Meaning that the evidence can be validated and that the reliability of the attributes conveyed can be assessed. COL-8.2.1-06X: The identity proofing practice statement shall identify a list of the identity proofing use cases supported, the authoritative and optionally supplementary evidence that shall be trusted, and, as far as possible, the identity proofing contexts supported. NOTE 4: Identification of use cases can be by reference to clause 9 or Annex C of the present document. NOTE 5: While the list of evidence that can be trusted is required to be comprehensive, a specific identity proofing context can place restrictions on the selection of evidence applicable to the identity proofing context. COL-8.2.1-07: The freshness of the identity attributes obtained from evidence shall be evaluated against the freshness requirements of the identity proofing context. EXAMPLE: A passport can have a lifetime of 10 years, and an eID or signing certificate can have a lifetime of 2-5 years, meaning the identity attributes obtained from this evidence can have changed since the evidence was issued. Some evidence issuers can apply revocation and re-issuing if information changes. NOTE 6: If the identity attributes conveyed from an evidence do not fulfil the information freshness requirements of the identity proofing context, the situation can be compensated by the use of supplementary evidence. |
b392cb6367becafeef785f2390da35ed | 119 461 | 8.2.2 Attribute collection | |
b392cb6367becafeef785f2390da35ed | 119 461 | 8.2.2.1 Attribute collection for natural person | [CONDITIONAL] If the applicant is a natural person, the requirements in the present clause apply. COL-8.2.2.1-01X: The identity proofing practice statement shall identify for each identity proofing context supported, the means used to collect identity attributes for a natural person. EXAMPLES: • From a physical identity document by transcription or scanning (e.g. OCR reading). • From a digital identity document. ETSI ETSI TS 119 461 V2.1.1 (2025-02) 29 • From the use of an eID authenticating the applicant. • From a certificate supporting a digital signature applied by the applicant. • Directly from the applicant by typing in information or otherwise; such information is required to be validated against authoritative sources. • From authoritative sources such as public registers. NOTE 1: Identity attributes from authoritative sources can be conveyed directly from the source or in the form of attribute attestations issued by a trusted provider of electronic attestation of attributes. • From existing information in auxiliary data sources such as customer records and databases. • From other documents supplied by the applicant or from other sources. NOTE 2: For attributes obtained from other sources than authoritative sources, validation against an authoritative source is needed. COL-8.2.2.1-02: The following attributes shall at a minimum be collected if the applicant is a natural person: a) family name(s), first name(s), which should be current names; b) further information as needed to uniquely identify the applicant as a natural person in the identity proofing context. NOTE 3: There can be cases where the name attributes collected need to match the name provided by an evidence, which is not necessarily the current name when a name change occurred after the evidence was issued. NOTE 4: Requirements for the presence of naming attributes can depend on the identity proofing context. In some contexts, a full name (all family names and first names) can be required, while in other contexts full name is not needed. In rare cases, a person can have only one name, classified as either first name or family name. NOTE 5: Depending on the identity proofing context, unique identification can be in the form of a single attribute such as a national identity number, or as one or more additional attributes that together with the name provide unique identification. NOTE 6: ETSI EN 319 412-2 [i.9] specifies X.509 certificate profile for natural persons. In addition to the name of the subject, a country attribute with undefined semantics is mandatory, and usually a serialNumber attribute is required to guarantee a unique identity. While values for the country and the serialNumber attributes can be part of the attributes collected, these values can also be generated and added by the certification authority. COL-8.2.2.1-02A: The outcome of the identity proofing process may be a pseudonymous identity. NOTE 7: Although the outcome of the identity proofing can be a pseudonym identity, identity proofing conforming to the present document requires identification of the real identity of the person as determined by applicable identity documents, trusted registers or other authoritative sources. COL-8.2.2.1-03: The attributes to collect shall be as determined by the identity proofing context. NOTE 8: Given the identity proofing context, the legal basis for collecting certain attributes can be laws or regulations allowing collection or consent by the applicant. Applicant's consent can be extended to the collection of attributes additional to the minimum set needed for the identity proofing context. NOTE 9: When the identity proofing context is for issuing of electronic attestations of attributes as defined by the amended eIDAS regulation [i.25], the attribute set to collect can be extensive and span multiple authoritative sources. COL-8.2.2.1-04: The identity proofing process shall not collect identity attributes that are not included in the result of the identity proofing, except when such attributes are required for attribute and evidence validation and/or binding to applicant. ETSI ETSI TS 119 461 V2.1.1 (2025-02) 30 |
b392cb6367becafeef785f2390da35ed | 119 461 | 8.2.2.2 Attribute collection for legal person | [CONDITIONAL] If the applicant is a legal person, the requirements in the present clause apply. COL-8.2.2.2-01X: For each identity proofing context supported, the means used to collect identity attributes for a legal person shall be identified by the identity proofing practice statement. NOTE: Depending on the identity proofing context, attribute collection for a legal person may vary from basic company information to an extensive record of information about the legal person, including information such as beneficial owners and personnel in key roles. EXAMPLE 1: Attributes can be collected from business registers, commercial information providers, documents and attestations, electronic attestation of attributes, or by manual input in the course of the identity proofing process. For attributes obtained from other sources than authoritative sources, validation against an authoritative source can be needed. COL-8.2.2.2-02: The attributes collected shall uniquely identify the applicant as a legal person in the identity proofing context. COL-8.2.2.2-03: The following attributes shall, as a minimum, be collected if the applicant is a legal person: a) full name of the legal person; b) country of registration of the legal person; c) unique identifier and type of identifier for the legal person (unless such identifier does not exist). EXAMPLE 2: Unique identifier can be national registration number, tax number, VAT number, or Legal Entity Identifier (LEI). |
b392cb6367becafeef785f2390da35ed | 119 461 | 8.2.2.3 Attribute collection for natural person representing legal person | [CONDITIONAL] If the applicant is a natural person representing a legal person, the requirements in the present clause apply. COL-8.2.2.3-01: Identity attributes for the natural person shall be collected according to the requirements in clause 8.2.2.1 of the present document. COL-8.2.2.3-02: Identity attributes for the legal person shall be collected according to the requirements in clause 8.2.2.2 of the present document. COL-8.2.2.3-03: The role of the natural person with respect to the legal person and identification of the source of the authorization of the natural person to represent the legal person shall be collected. EXAMPLE: Roles and authorizations can be collected from business registers, commercial information providers, documents and attestations, electronic attestation of attributes, or by manual input in the course of the identity proofing process. |
b392cb6367becafeef785f2390da35ed | 119 461 | 8.2.3 Use of physical or digital identity document as evidence | [CONDITIONAL] If physical and/or digital identity documents are used as evidence, the requirements in the present clause apply. COL-8.2.3-01X: An identity document used as evidence shall be in physical or digital form. NOTE 1: A physical or digital identity document as defined in the present document will usually represent a natural person only. Identity documents that evidence that a natural person represents a legal person can be envisaged but cannot be assumed to be generally available. COL-8.2.3-02X: A document used as authoritative evidence shall contain a face photo and/or other information that can be used to uniquely identify the applicant when compared with the applicant's physical appearance. NOTE 2: Required for verification against the applicant's physical appearance for binding to applicant. The binding is by biometric technology or by manual verification, or a combination of the two, see clause 8.4 of the present document. ETSI ETSI TS 119 461 V2.1.1 (2025-02) 31 NOTE 3: This does not exclude the use of documents without a face photo or similar information as supplementary evidence. NOTE 4: The present document only specifies requirements for binding to applicant using face biometrics and/or manual face verification. Requirement COL-8.2.3-02X does not exclude the possibility of using other biometrics, e.g. fingerprint or iris, but the present document does not specify requirements for such use cases. COL-8.2.3-03X: For each identity proofing context supported, a list of the identity documents that are accepted shall be identified by the identity proofing practice statement. EXAMPLE: The list can consist of document types, e.g. all passports, or named documents, e.g. passports and national identity cards from specific countries. [CONDITIONAL] COL-8.2.3-04X: If physical identity documents are used as authoritative evidence, only passports, national identity cards and other official identity documents that according to the identity proofing context offer the same or higher reliability of the identity shall be accepted, where the judgement on comparable reliability shall be based on an assessment of the security features and issuance process of the other identity document towards the security features and issuance process of passport and/or identity card. NOTE 5: The comparable reliability of other identity documents can be based on a comparison of protection against known threats. NOTE 6: Some countries issue national identity cards or have valid national identity cards that are below current practice in the security of national identity documents. Identity proofing context requirements can be to not accept such national identity cards. [CONDITIONAL] COL-8.2.3-05X: If a physical identity document is used as evidence, the IPSP shall verify that the document is presented in its original form. NOTE 7: Meaning the applicant is required to present the original in the identity proofing process to evidence proof of possession of the identity document; the identity proofing process can subsequently capture another representation of the document, e.g. by a video sequence, image, or scan. [CONDITIONAL] COL-8.2.3-06X: If digital identity documents are used as authoritative evidence, only eMRTD digital identity documents according to ICAO 9303 part 10 [2] and other digital documents that according to the identity proofing context offer the same or higher reliability of the identity shall be accepted, where the judgement on comparable reliability shall be based on an assessment of the security features and issuance process of the other identity document towards the security features and issuance process required by ICAO 9303 part 10 [2]. NOTE 8: The comparable reliability of other identity documents can be based on a comparison of protection against known threats. [CONDITIONAL] COL-8.2.3-07: If required attributes to be collected cannot be validated by the identity document, these attributes shall be collected from other sources and validated, including assessing that the attributes are bound to the applicant, by use of other authoritative sources in accordance with the identity proofing context. |
b392cb6367becafeef785f2390da35ed | 119 461 | 8.2.4 Use of existing eID means as evidence | [CONDITIONAL] If existing eID means for authentication is used as evidence, the requirements in the present clause apply. COL-8.2.4-01X: For each identity proofing context supported, the conditions that an eID or eID scheme is required to fulfil to be accepted for identity proofing shall be identified by the identity proofing practice statement. NOTE 1: Most eID solutions today represent a natural person, although eID means for a legal person or a natural person representing a legal person are possible. EXAMPLE 1: The documentation can list named eIDs or eID schemes or describe the necessary characteristics of eIDs or eID schemes by referring to a required LoA as defined by an assurance level framework. EXAMPLE 2: Acceptance for an identity proofing context can require that certain identity attributes are asserted by the eID means. ETSI ETSI TS 119 461 V2.1.1 (2025-02) 32 EXAMPLE 3: The identity proofing context can state that only eIDs notified according to the amended eIDAS regulation [i.25] Article 9 can be used. [CONDITIONAL] COL-8.2.4-02X: If the Baseline LoIP is targeted, the eID shall at least conform to eIDAS LoA substantial or conform to another assurance level framework offering comparable assurance to eIDAS LoA substantial. [CONDITIONAL] COL-8.2.4-02A: If the Extended LoIP is targeted, the eID shall conform to eIDAS LoA high or conform to another assurance level framework offering comparable assurance to eIDAS LoA high. NOTE 2: eIDAS LoAs are specified by CIR (EU) 2015/1502 [i.3]. The identity proofing context can require conformance to specifically the eIDAS LoA framework and can also require that eIDs are notified according to the amended eIDAS regulation [i.25] Article 9. EXAMPLE 4: The eID can conform to a national assurance level framework of an EU Member State or an assurance level framework of a non-EU state; in both cases, the assurance level framework can be aligned with the eIDAS LoAs. NOTE 3: The comparable assurance to an eIDAS LoA level can be assessed by an independent, accredited conformity assessment body. NOTE 4: The identity proofing context can place further requirements on the issuing of the eID, e.g. to avoid a long chain of eID renewals where the presence (physical or remote) of the eID subject is a long time in the past, or to avoid a long chain of eIDs that are all issued based on another eID. [CONDITIONAL] COL-8.2.4-03X: If required attributes to be collected cannot be validated by the authentication using the eID means, these attributes shall be collected from other sources and validated, including assessing that the attributes are bound to the applicant, by use of other authoritative sources in accordance with the identity proofing context. NOTE 5: Typically, this happens when required attributes are not present in the identity assertion obtained from the authentication protocol. NOTE 6: When the eID used is a European Digital Identity Wallet as specified by the amended eIDAS regulation [i.25] or similar type of eID, the authentication can convey an extended set of attributes. [CONDITIONAL] COL-8.2.4-04: VOID, moved to clause C.2. |
b392cb6367becafeef785f2390da35ed | 119 461 | 8.2.5 Use of existing digital signature means as evidence | [CONDITIONAL] If an existing digital signature means with a supporting certificate is used as evidence, the requirements in the present clause apply. COL-8.2.5-01X: For each identity proofing context supported, the conditions under which digital signatures and certificates are accepted shall be identified by the identity proofing practice statement. NOTE 1: A digital signature can be applied by a natural person (electronic signature as defined by eIDAS), a legal person (electronic seal as defined by eIDAS), or a natural person representing a legal person, depending on the identity attributes included in the certificate and the semantics of these attributes. NOTE 2: The conditions can be stated in the form of a signature policy; see ETSI TS 119 172-1 [i.13]. NOTE 3: The present document makes no assumption on the format or content of the document signed. Identity attributes are evidenced by the certificate, not by the signed document. EXAMPLE 1: Regarding digital signature, the identity proofing context can require that a qualified electronic signature/seal, according to the amended eIDAS regulation [i.25], is used. EXAMPLE 2: Regarding certificate, the list can consist of named certificate issuers or describe the necessary characteristics of the certificate, e.g. by referring to a policy level as defined by ETSI EN 319 411-1 [i.7] or ETSI EN 319 411-2 [i.8]. EXAMPLE 3: Acceptance for an identity proofing context can pose requirements for certificate content, e.g. require that certain identity attributes are present for the named subject. ETSI ETSI TS 119 461 V2.1.1 (2025-02) 33 [CONDITIONAL] COL-8.2.5-02: If a digital signature with a supporting certificate is accepted as evidence of identity for a natural person representing a legal person, the certificate should evidence the connection between the natural and the legal person. NOTE 4: For an X.509 certificate, this will typically imply that the Subject field of the certificate identifies both the natural and the legal person; however, such identification in itself does not evidence that the natural person is authorized to represent the legal person for the identity proofing. [CONDITIONAL] COL-8.2.5-03X: If the Baseline LoIP is claimed, the certificate of the digital signature shall have been issued based on identity proofing to Baseline or Extended LoIP. [CONDITIONAL] COL-8.2.5-03A: If the Extended LoIP is claimed, the certificate of the digital signature shall have been issued based on identity proofing to Extended LoIP. NOTE 5: The identity proofing context can place further requirements on the issuing of the certificate, e.g. to avoid a long chain of certificate renewals where the presence (physical or remote) of the certificate subject is a long time in the past, or to avoid a long chain of certificates that are all issued based on another certificate. A requirement for the certificate to be issued based on one of the use cases defined in the present document can be recommended. [CONDITIONAL] COL-8.2.5-04X: If required attributes to be collected are not present in the certificate, these attributes shall be collected from other sources and validated, including assessing that the attributes are bound to the applicant, by use of other authoritative sources in accordance with the identity proofing context. [CONDITIONAL] COL-8.2.5-05: VOID, moved to clause C.2. COL-8.2.5-06X: The digital signature shall be made under a guarantee of sole control by the signer when the signer is a natural person and under a guarantee of control when the signer is a legal person. |
b392cb6367becafeef785f2390da35ed | 119 461 | 8.2.6 Use of trusted register as supplementary evidence | [CONDITIONAL] If a trusted register is used as supplementary evidence, the requirements in the present clause apply. COL-8.2.6-01X: For each identity proofing context supported, a list of the trusted registers used to collect and/or validate attributes, and whether lookup in these registers is mandatory or optional, shall be identified by the identity proofing practice statement. NOTE 1: Availability of trusted registers can vary between countries, ranging from no availability to lookup in particular sources, e.g. national population registers or business registers, mandated by national regulation. EXAMPLE 1: Trusted registers can be used both to validate attributes that are already collected to ensure that the attribute values are correct and up to date, and to fetch additional attributes. COL-8.2.6-01A: Attributes collected from a trusted register shall be reliably linked to the applicant. COL-8.2.6-02: Only official national or nationally approved registers should be accepted as trusted registers. EXAMPLE 2: Authentic sources as defined by the amended eIDAS regulation [i.25]. EXAMPLE 3: Depending on the identity proofing context, identity attribute sources such as existing customer databases of TSPs or other service providers can be defined as trusted registers. [CONDITIONAL] COL-8.2.6-03X: If the applicant is a legal person and is registered in an available trusted register accepted as authoritative source, this register shall be used for collection and/or validation of the attributes of the legal person. NOTE 2: There can be a need to do identity proofing of entities that do not possess a unique identifier and that are not present in any business register, e.g. public sector agencies in some countries. ETSI ETSI TS 119 461 V2.1.1 (2025-02) 34 |
b392cb6367becafeef785f2390da35ed | 119 461 | 8.2.7 Use of proof of access as supplementary evidence | [CONDITIONAL] If proof of access is used as supplementary evidence, the requirements in the present clause apply. COL-8.2.7-01X: For each identity proofing context supported, a list of the proof of access mechanisms that are required or accepted as supplementary evidence of identity and the attributes that are collected and/or validated from these mechanisms shall be identified by the identity proofing practice statement. NOTE: Proof of access will usually be relevant only for natural persons. EXAMPLE 1: Proof of access to a bank account with identity attributes obtained from the bank. EXAMPLE 2: Proof of access to a mobile phone with identity attributes obtained from the mobile operator's subscription register. COL-8.2.7-02: The attributes returned from the proof of access shall be reliably linked to the applicant. EXAMPLE 3: Proof of access to a bank account owned by another person could result in attributes for the other person to be returned. COL-8.2.7-03X: The reliability of attributes obtained from proof of access mechanisms shall be evaluated and be sufficient for the identity proofing context. EXAMPLE 4: The general outcome of an identity proofing process is Baseline or Extended, but a mobile phone number obtained from proof of access can have lower reliability. |
b392cb6367becafeef785f2390da35ed | 119 461 | 8.2.8 Use of documents and attestations as supplementary evidence | [CONDITIONAL] If documents and attestations are used as supplementary evidence, the requirements in the present clause apply. COL-8.2.8-01X: For each identity proofing context supported, a list of the documents and/or attestations required or accepted as supplementary evidence of identity and the attributes that are collected or validated from this documentation shall be identified by the identity proofing practice statement. EXAMPLE 1: Qualified or non-qualified electronic attestation of attributes as defined by the amended eIDAS regulation [i.25]. EXAMPLE 2: For a natural person, in some countries, utility bills or similar can be required as evidence of address. EXAMPLE 3: Attestations can be used as evidence that a legal person exists and for further information on its legal status, and as evidence that a natural person is entitled to represent the legal person. COL-8.2.8-01A: Attributes collected from documents and attestations shall be reliably linked to the applicant. [CONDITIONAL] COL-8.2.8-02: If the applicant is a legal person, a statement from a natural person verified to represent the legal person may be accepted as evidence. COL-8.2.8-03X: The reliability of attributes obtained from documents and attestations shall be evaluated and be sufficient for the identity proofing context. EXAMPLE 4: The general outcome of an identity proofing process is Baseline or Extended, but an address obtained from a utility bill can have lower reliability. COL-8.2.8-04: Acceptance of digital documents and attestations should be limited to digital documents and attestations that are evidenced by the issuer's digital signature. NOTE: The identity proofing context can pose requirements that a digital signature is required to fulfil to be accepted. EXAMPLE 5: Qualified electronic attestation of attributes as defined by the amended eIDAS regulation [i.25] requires the qualified electronic seal or qualified electronic signature of the issuer. ETSI ETSI TS 119 461 V2.1.1 (2025-02) 35 |
b392cb6367becafeef785f2390da35ed | 119 461 | 8.2.9 Evidence collection for natural person representing legal person | [CONDITIONAL] If the applicant is a natural person purporting to represent a legal person, the requirements in the present clause apply. COL-8.2.9-01: Evidence for the natural person's identity shall be collected according to the relevant requirements from clauses 8.2.3 to 8.2.8 of the present document. COL-8.2.9-02: Evidence for the legal person's identity shall be collected according to the relevant requirements from clauses 8.2.3 to 8.2.8 of the present document. COL-8.2.9-03X: For each identity proofing context supported, the accepted means to evidence the link between the natural person's identity and the legal person's identity shall be identified by the identity proofing practice statement. EXAMPLE 1: Trusted registers like business registers, or required documents and attestations. EXAMPLE 2: Authentic source or electronic attestation of attributes as defined by the amended eIDAS regulation [i.25]. COL-8.2.9-04X: For each identity proofing context supported, the positions, roles, or other relationships accepted for a natural person to represent a legal person shall be identified in the identity proofing practice statement. EXAMPLE 3: Directors, executives, board members, employees or a natural person with authorization duly delegated from another natural person in an authorized role. COL-8.2.9-05X: For each identity proofing context supported, any freshness (current) requirement applicable to any statement or document regarding the natural person's relationship to the legal person shall be identified by the identity proofing practice statement. [CONDITIONAL] COL-8.2.9-06X: If the legal person is listed in a trusted register, the role of the natural person concerning the legal person shall be collected from or validated against this register to the extent that the register is accessible and that the required attributes are present in the register. EXAMPLE 4: A trusted register can be appointed as authentic source according to the amended eIDAS regulation [i.25] and the role of the natural person concerning the legal person can be conveyed by a qualified or non-qualified electronic attestation of attributes. NOTE: Practices for registration vary between countries. As one example, public sector entities are not registered in business registers in all countries. [CONDITIONAL] COL-8.2.9-07X: If the legal person is not listed in a trusted register, or the required attributes to collect or validate the role of the natural person concerning the legal person are not present in the register, the role of the natural person concerning the legal person shall be collected or validated by other means providing the same confidence as a trusted register would do. EXAMPLE 5: Information source can be a public notary, other registers than business registers, contacts with representatives of the legal person other than the concerned natural person, etc. COL-8.2.9-08: Documents and attestations from the concerned legal person may be used as evidence of a natural person's authorization to represent the legal person. |
b392cb6367becafeef785f2390da35ed | 119 461 | 8.3 Attribute and evidence validation | |
b392cb6367becafeef785f2390da35ed | 119 461 | 8.3.1 General requirements | VAL-8.3.1-01X: All necessary identity attributes shall be validated to the required reliability by an authoritative source. VAL-8.3.1-02: Evidence of the identity proofing process shall be collected and secured supporting requirements in clause 8.5.2 of the present document. VAL-8.3.1-03X: The handling of differences in encoding of identity attributes between different evidence or between evidence and attributes collected from other sources than evidence shall be specified in the practice statement. ETSI ETSI TS 119 461 V2.1.1 (2025-02) 36 EXAMPLE 1: Typical sources of differences are transcription between alphabets (e.g. between Cyrillic and Latin) or from non-alphabetical scripts (e.g. Chinese) to an alphabet, transcription of national language characters (e.g. Norwegian æ, ø, å) into Latin characters, and transcription of diacritics (e.g. French é, è, ê) into Latin characters. VAL-8.3.1-04X: The handling of differences in name attributes between different evidence or between evidence and attributes collected from other sources than evidence shall be specified in the practice statement. EXAMPLE 2: Missing names (middle names or first names), change of name not reflected (e.g. evidence contains a name before a later change of name), use of initials, truncation (e.g. limited number of characters that can be printed on an identity document), use of prefix (e.g. Dr) or suffix (e.g. Jr). VAL-8.3.1-05: The identity proofing process shall verify that the evidence is of a type accepted according to the identity proofing context. VAL-8.3.1-06X: The identity proofing process shall verify that the issuer of evidence is trusted according to the identity proofing context. [CONDITIONAL] VAL-8.3.1-07: If the evidence has an explicit validity period, the identity proofing process shall verify that the time of the identity proofing is within this validity period. EXAMPLE 3: Valid from and valid to attributes of a digital signature certificate, date of expiry of an identity document. VAL-8.3.1-08X: The identity proofing process shall verify the authenticity and integrity of the evidence, i.e. that the evidence is genuine and presented in its original form. NOTE 1: An evidence of a type that actually exists, and that is not counterfeit, has not been tampered with and, where applicable, is not a copy of the original. VAL-8.3.1-09: VOID (merged with VAL-8.3.1-08X). VAL-8.3.1-10X: The IPSP shall for all accepted evidence document the security features that are to be verified. NOTE 2: This needs not be all security elements of e.g. a physical identity document. A selection of suitable elements sufficient for assessing that the evidence is genuine can be applied, see requirements VAL-8.3.3-07X and VAL-8.3.3-07A. NOTE 3: Publication of the selection of features is not recommended. Internal documentation is assumed. NOTE 4: A remote identity proofing process might not allow verification of all security elements. VAL-8.3.1-11X: The identity proofing process shall whenever practically possible verify that the evidence is valid at the time of the identity proofing. EXAMPLE 4: An identity document can be declared lost, stolen, or revoked, but not all document issuers provide an online status service that can be used to check current status, and if an online status service exists, its availability can be restricted. EXAMPLE 5: Certificates and eIDs can be revoked before their expiry time. This includes certificates of evidence issuers, where the identity proofing context determines if an evidence is accepted or not if the issuer's certificate has expired or is revoked. VAL-8.3.1-12: Validation of evidence shall be done in an environment controlled by the actor responsible for the identity proofing process. NOTE 5: This requirement does not prohibit remote access to this environment by registration officers. NOTE 6: This requirement does not prohibit cloud service hosting of the environment. ETSI ETSI TS 119 461 V2.1.1 (2025-02) 37 |
b392cb6367becafeef785f2390da35ed | 119 461 | 8.3.2 Validation of digital identity document | [CONDITIONAL] If a digital identity document is used as authoritative evidence, the requirements in the present clause apply. NOTE 1: Some legislations restrict access to the chip of national identity cards for reading of the digital identity document or of the face photo. If such restrictions apply to a document used in an identity proofing context, the digital document cannot be used as evidence. VAL-8.3.2-00: Successful validation of a digital identity document shall imply that the identity document as evidence is validated and that the identity attributes conveyed from the identity document are validated. [CONDITIONAL] VAL-8.3.2-01: If the digital identity document is used in a remote identity proofing process, the data from the identity document shall be transferred to an environment controlled by the actor responsible for the identity proofing process in a manner that ensures authenticity, integrity, and confidentiality of the document content. VAL-8.3.2-02: The digital identity document shall only be accepted if the issuer's digital signature on the document is successfully validated. NOTE 2: Usually this means that the validation result is TOTAL-PASSED as defined by ETSI EN 319 102-1 [i.5]. NOTE 3: For an eMRTD document following ICAO 9303 part 10 [2], country signing certificates, e.g. downloaded from the ICAO PKD (Public Key Database), are needed for validation. [CONDITIONAL] VAL-8.3.2-03: If an online status service to confirm the document's validity exists and is practically available, the process shall use this service to verify that the document is currently valid. NOTE 4: Meaning not revoked, suspended, or reported as lost/stolen. Not all document issuers have available lookup services to check validity, and in some cases access to lookup services is restricted. Regarding current validity, note that there can be a delay in the order of days between the events of revoking a document and updating a status service. NOTE 5: If digital identity documents from many different sources are accepted, online access (interactive or by API) to all the different status services can be impractical for documents that occur infrequently. [CONDITIONAL] VAL-8.3.2-04X: If the digital identity document is required to be read from a chip embedded in a physical identity document, the identity proofing process shall protect against injection into the process, by the applicant or an external attacker, of a copy of a digital identity document that has previously been obtained and stored by the attacker. NOTE 6: Fulfilment of this requirement can depend on the protocol supported by the chip; reliable fulfilment can be difficult if the chip does not support a protocol that supports cloning detection. NOTE 7: Fulfilment of this requirement can rely on the applicant's use of software that is approved for the identity proofing process, e.g. mobile app functionality. NOTE 8: Means for biometric injection attack detection, e.g. as per TS 18099 [5] can be used as a basis to also detect this type of injection attack. [CONDITIONAL] VAL-8.3.2-04A: If the digital identity document is required to be read from a chip embedded in a physical identity document, in case of an interruption of the identity proofing process for any reason (e.g. loosing internet connection), if the identity proofing process is resumed, the identity document shall be reread from the chip. VAL-8.3.2-05: Information obtained from the digital identity document shall be recorded as needed for binding to applicant and to evidence the identity proofing process. NOTE 9: In addition to identity attributes, required information to be recorded is typically at least issuer, validity period, and the document's unique identification number. VAL-8.3.2-06: The face photo contained in the digital identity document shall be extracted to enable binding to applicant. ETSI ETSI TS 119 461 V2.1.1 (2025-02) 38 |
b392cb6367becafeef785f2390da35ed | 119 461 | 8.3.3 Validation of physical identity document | [CONDITIONAL] If a physical identity document is used as authoritative evidence, the requirements in the present clause apply. NOTE 1: A physical identity document can be used with the applicant's physical presence and remotely by the applicant presenting the document in front of a camera. VAL-8.3.3-00: Successful validation of a physical identity document shall imply that the identity document as evidence is validated and that the identity attributes conveyed from the identity document are validated. VAL-8.3.3-01: The process shall verify that the physical identity document presented is visually equal to the expected visual appearance of the document type. [CONDITIONAL] VAL-8.3.3-02X: If a physical identity document is used as evidence in a remote identity proofing process, the process shall ensure that the applicant has the document in hand and presents the document in real-time in front of a camera. NOTE 2: It is required that this happens at the time of the identity proofing; submission of a pre-recorded photo or video stream of an identity document is considered not to meet the requirements for identity proofing to Baseline or Extended LoIP. Means for biometric presentation attack detection, e.g. as specified by ISO/IEC 30107-1 [i.16] and 3 [3], can be used as a basis to detect a presentation attack using a pre-recorded or artificially generated video of an identity document. Means for biometric injection attack detection, e.g. as per TS 18099 [5] can be used as a basis to detect an injection attack using a pre-recorded or artificially generated video of an identity document. NOTE 3: This can rely on the applicant's use of software approved for the identity proofing process, e.g. mobile app functionality. VAL-8.3.3-03: The process shall ensure that the document presented by the applicant is a genuine, physical identity document that is not counterfeited or falsified/modified. [CONDITIONAL] VAL-8.3.3-04X: If the physical identity document is used in a remote identity proofing process, the applicant's presentation of the identity document in front of a camera shall include recording at the time of the identity proofing of a video sequence to visualize the physical characteristics of the identity document and its security features. The recording shall cover each relevant side of the identity document presented by the applicant. EXAMPLE 1: The applicant can be given instructions for the movement of the identity document, where the specific actions and/or their sequence are unpredictable to the applicant. NOTE 4: With the current state of technology, the use of only a still photo of the identity document is not considered sufficient for Baseline or Extended LoIP. EXAMPLE 2: Both the front and back sides of a national identity card will usually need to be presented. [CONDITIONAL] VAL-8.3.3-04A: If the physical identity document is used in a remote identity proofing process, the video recording of the document shall use frame rate and resolution sufficient for the analysis of the document. EXAMPLE 3: A frame rate of 25 frames per second and a resolution of 1280×720 pixels or 960×720 pixels (landscape) or 720×1280 pixels or 720×960 pixels (portrait). [CONDITIONAL] VAL-8.3.3-04B: If the physical identity document is used in a remote identity proofing process, the process should capture from or integral to the video sequence one or more images of each relevant side of the identity document. [CONDITIONAL] VAL-8.3.3-04C: If the physical identity document is used in a remote identity proofing process, and an image of the document is captured in the process, the image shall have sufficient resolution for the analysis of the document. EXAMPLE 4: A resolution of 1280×720 pixels or 960×720 pixels (landscape) or 720×1280 pixels or 720×960 pixels (portrait). ETSI ETSI TS 119 461 V2.1.1 (2025-02) 39 [CONDITIONAL] VAL-8.3.3-05X: If the physical identity document is used in a remote identity proofing process, the process shall ensure that the video stream and any images captured are transmitted to an environment controlled by the actor responsible for the identity proofing process in a manner that ensures authenticity, integrity, and confidentiality of the video stream and images. [CONDITIONAL] VAL-8.3.3-05A: If the physical identity document is used in a remote identity proofing process, the process shall protect against injection into the process, by the applicant or an external attacker, of a previously recorded or artificially generated video stream. NOTE 5: Means for biometric injection attack detection, e.g. as per TS 18099 [5], can be used as a basis to also detect this type of injection attack. [CONDITIONAL] VAL-8.3.3-05B: If the physical identity document is used in a remote identity proofing process, the process shall apply means that are reliably able to detect identity documents that are artificially generated or have been manipulated by an attacker with the relevant attack potential. NOTE 6: See requirements OVR-5-07 and OVR-5-08 regarding attack potential. [CONDITIONAL] VAL-8.3.3-05C: If the physical identity document is used in a remote identity proofing process, the useability (e.g. lighting conditions, reflections, sharpness) of video and any images captured in the same process or derived from the video sequence shall be assessed, and video and images shall be rejected if they are not useable, with instructions to the applicant to repeat the process under better conditions. VAL-8.3.3-05D: There shall be an upper limit on the number of retries on the video capture before the process is aborted with failed result. [CONDITIONAL] VAL-8.3.3-06: If the process is performed with manual validation of the physical identity document, the registration officer shall have access to authoritative sources of information on document appearance and document validation. EXAMPLE 5: Public Register of Authentic Travel and Identity Documents Online (PRADO). VAL-8.3.3-07X: A sufficient number of, and at least three, different security features of physical identity documents shall be reliably verified considering an attacker with the relevant attack potential. EXAMPLE 6: Security elements can be watermarks, holograms, printing techniques, visual and ultraviolet light patterns, and see-through elements. The reliability of remote verification of different security elements can vary. NOTE 7: PRADO has published an overview of security features [i.27] of identity documents. [CONDITIONAL] VAL-8.3.3-07A: If the physical identity document is used in a remote identity proofing process, at least two of the security features verified shall be optically variable features. NOTE 8: This implies that a document that has less than two optically variable features cannot be used in remote identity proofing processes. VAL-8.3.3-07B: Selection of which variable security elements of physical identity documents to verify should have some randomness to hamper attackers targeting falsifying specific elements. VAL-8.3.3-07C: The verification process for all security elements in scope of the IPSP's service shall be documented. NOTE 9: Publication of the verification process information is not recommended. Internal documentation is assumed. [CONDITIONAL] VAL-8.3.3-08: If the process is performed with the physical presentation of physical identity documents, the registration officer shall verify optical and haptic/tactile security features if any. NOTE 10: Selection of security features to verify can depend on the tools that the registration officer has available, If no tool is available, only Level 1 security features can be verified. With tools such as magnifying glass or UV lamp, Level 2 security features can be verified. [CONDITIONAL] VAL-8.3.3-09: If an online status service to confirm the physical identity document's validity exists and is practically available, the process shall use this service to verify that the document is currently valid. ETSI ETSI TS 119 461 V2.1.1 (2025-02) 40 NOTE 11: Meaning not revoked, suspended, or reported as lost/stolen. Not all document issuers have available lookup services to check validity, and in some cases access to lookup services is restricted. Regarding current validity, note that there can be a delay in the order of days between the events of revoking a document and updating a status service. NOTE 12: If physical identity documents from many different sources are accepted, online access (interactive or by API) to all the different status services can be impractical for documents that occur infrequently. VAL-8.3.3-10: Information printed on physical identity documents shall be recorded as needed for binding to applicant and to evidence the identity proofing process. NOTE 13: Information can be extracted by manual transcription, automatically for example by optical scanning and OCR techniques, and in some cases by photo/photocopy of the document. NOTE 14: In addition to identity attributes, required information to be recorded is typically at least issuer, validity period, and the document's unique identification number. [CONDITIONAL] VAL-8.3.3-11: If face biometrics is applied to bind the physical identity document to the applicant, the face photo printed on the identity document shall be extracted. [CONDITIONAL] VAL-8.3.3-12X: If the physical identity document is used in a remote identity proofing process, and the identity document has an Machine Readable Zone (MRZ), the information from the MRZ shall be extracted, validated, and compared with the information from the visible part of the identity document. [CONDITIONAL] VAL-8.3.3-13: If the physical identity document is validated by manual procedures, the validation task should be assigned randomly among available registration officers. [CONDITIONAL] VAL-8.3.3-14X: If validation of physical identity documents is done manually, the validation shall be carried out by a registration officer that has received appropriate training covering at least the following: a) Fraud prevention and detection of forgery. b) Data protection. c) Communication training (when the registration officer is required to communicate with the applicant). d) Training on software and equipment used. e) Training on verification of documents and their security elements. f) Training on detection of presentation and injection attacks. [CONDITIONAL] VAL-8.3.3-14A: If validation of physical identity documents is done manually, the registration officer shall be allowed sufficient time for the validation and have working conditions that do not impair the registration officer's judgement. [CONDITIONAL] VAL-8.3.3-15X: If validation of physical identity documents is done manually, the training of the registration officers shall be repeated or refreshed as required by threats intelligence, updates to procedures or tools, and at least annually. [CONDITIONAL] VAL-8.3.3-16: If validation of physical identity documents is done manually, and the process is performed with the physical presentation of the document, the registration officer should have available tools to enhance the reliability of the validation. EXAMPLE 7: Magnifying glass and ultraviolet lamp. Without tools, only Level 1 security features as defined by ICAO can be verified. [CONDITIONAL] VAL-8.3.3-17: If validation of physical identity documents is done manually, and the document is used in a remote identity proofing process, the registration officer shall have available tools to enhance the reliability of the validation. EXAMPLE 8: Computerized tool to zoom in on details of the document. VAL-8.3.3-18: Automated means and machine-learning technology should be used to analyse the characteristics of physical identity documents against their expected appearance, including analysis of security elements of documents and potential manipulation of documents. ETSI ETSI TS 119 461 V2.1.1 (2025-02) 41 NOTE 15: This requirement implies that a purely manual process for validating a physical identity document is allowed both for physical presence and for remote identity proofing. However, the use of (additional) automated means is recommended. NOTE 16: For unattended remote identity proofing, a purely manual validation process can only support the Baseline LoIP, see clause 9.2.3.2 of the present document. NOTE 17: The document type, e.g. a passport of a specific country, can be an input parameter to the analysis, or the analysis can determine the type by automated means. NOTE 18: Automated and manual analysis can be used in combination, e.g. with fall-back to manual analysis if the automated process yields an uncertain result, or by using automated analysis as a tool for a registration officer. [CONDITIONAL] VAL-8.3.3-19X: If the physical identity document is used in a remote identity proofing process, the video stream and any image recorded shall be of sufficient quality for analysis by automated means and machine-learning technology and/or manual verification. [CONDITIONAL] VAL-8.3.3-20: If automated means and machine-learning technology are used to analyse physical identity documents, the algorithms and technology shall be systematically tested against reference datasets and be kept updated to cope with changes in the threats and risk situation. |
b392cb6367becafeef785f2390da35ed | 119 461 | 8.3.4 Validation of eID means | [CONDITIONAL] If authentication by use of an existing eID means is used as evidence, the requirements in the present clause apply. VAL-8.3.4-01X: An authentication protocol that confirms at an assurance level similar to the LoA of the eID used that the holder of the eID means is successfully authenticated and that the eID means used is valid (not expired, suspended, or revoked) shall be executed. VAL-8.3.4-02: Successful authentication shall imply that the eID means as evidence is validated and that the identity attributes conveyed from the eID means are validated and bound to the applicant. NOTE 1: The eID means can represent a natural person, a legal person, or a natural person representing a legal person. NOTE 2: The authentication protocol can include attributes conveyed from a European Digital Identity Wallet as specified by the amended eIDAS regulation [i.25] or similar eID means. |
b392cb6367becafeef785f2390da35ed | 119 461 | 8.3.5 Validation of digital signature with certificate | [CONDITIONAL] If a digital signature with certificate is used as evidence, the requirements in the present clause apply. VAL-8.3.5-00: Successful validation of the digital signature shall imply that the identity attributes conveyed from the certificate supporting the digital signature are validated and bound to the applicant. NOTE 1: Usually, this means that the validation result is TOTAL-PASSED as defined by ETSI EN 319 102-1 [i.5]. NOTE 2: The certificate can represent a natural person, a legal person, or a natural person representing a legal person. VAL-8.3.5-01: The digital signature shall be created as part of the identity proofing process. NOTE 3: This is to avoid threats from the use of documents previously signed by the applicant. VAL-8.3.5-02X: The digital signature shall be validated and the signing certificate shall only be used as evidence for identity attributes if the signature is valid and confirmed to have been created as part of the identity proofing process. VAL-8.3.5-03: VOID (moved to clauses C.2.3 and C.3.3). ETSI ETSI TS 119 461 V2.1.1 (2025-02) 42 |
b392cb6367becafeef785f2390da35ed | 119 461 | 8.3.6 Validation of trusted registers | NOTE 1: A trusted register can be an authentic source as defined by the amended eIDAS regulation [i.25]. [CONDITIONAL] If a trusted register is used as supplementary evidence in an identity proofing process, the requirements in the present clause apply. VAL-8.3.6-00: Successful authentication of a trusted register and validation of authenticity and integrity of the communication with the trusted register shall imply that the statement of the trusted register on validity of identity attributes is trusted. NOTE 2: A trusted register can be used in two ways: either the trusted register can be queried to convey identity attributes registered on the applicant, or previously collected attributes can be sent to the trusted register for validation. In the latter case, the response can be just a yes/no answer on validity of the attributes. [CONDITIONAL] VAL-8.3.6-01: If the communication towards the trusted register is online, the communication channel shall be secured by using an up to date version of the TLS protocol or another protocol offering a comparable level of security. [CONDITIONAL] VAL-8.3.6-02: If the communication towards the trusted register is online, the trusted register shall be authenticated. EXAMPLE 1: By a website certificate. [CONDITIONAL] VAL-8.3.6-03: If the communication towards the trusted register is message-based, all messages shall be authenticated and integrity protected. EXAMPLE 2: By use of digital signatures. The identity proofing context can pose requirements that a digital signature is required to fulfil to be accepted. [CONDITIONAL] VAL-8.3.6-04: If the communication towards the trusted register is message-based, all messages containing personal identity information shall be encrypted. VAL-8.3.6-05X: The integrity and authenticity of identity attributes obtained from the trusted register shall be validated. VAL-8.3.6-06X: The procedure to apply in case of discrepancies between the identity attributes obtained from trusted registers and information from other evidence shall be specified in the practice statement. EXAMPLE 3: A trusted register can override identity attributes obtained from other evidence. The identity proofing context can pose requirements. |
b392cb6367becafeef785f2390da35ed | 119 461 | 8.3.7 Validation of proof of access | [CONDITIONAL] If proof of access is used as supplementary evidence in an identity proofing process, the requirements in the present clause apply. VAL-8.3.7-00: Successful validation of proof of access shall imply that the identity attributes conveyed from the proof of access are validated. VAL-8.3.7-01: A proof of access protocol shall be executed to ensure that the applicant controls the item in question. EXAMPLE 1: To confirm possession of mobile phone number, email address, or bank account. VAL-8.3.7-02X: The identity attributes obtained shall be transferred or otherwise be made available for the identity proofing process in a way that ensures the authenticity of the source of information and integrity and confidentiality of the information. VAL-8.3.7-03: The integrity and authenticity of the identity attributes obtained shall be validated. EXAMPLE 2: Information from an existing customer record of a bank or a telecommunications service provider. [CONDITIONAL] VAL-8.3.7-04: If proof of access to a bank account is used as supplementary evidence, the applicant's access to the bank account shall be reliably authenticated. ETSI ETSI TS 119 461 V2.1.1 (2025-02) 43 EXAMPLE 3: By use of eID means fulfilling requirements for EU Payment Services Directive (PSD2) Strong Customer Authentication (SCA) [i.2]. EXAMPLE 4: A payment made by the applicant to an account associated with the identity proofing process can be part of the proof of access protocol. VAL-8.3.7-05X: The procedure to apply in case of discrepancies between the identity attributes obtained from proof of access and identity attributes from other evidence shall be specified in the practice statement. EXAMPLE 5: The identity attributes obtained from proof of access can be regarded as authoritative and override other sources of attributes, or other evidence can be regarded as authoritative, or an arbitration procedure can be used. The identity proofing context can pose requirements. |
b392cb6367becafeef785f2390da35ed | 119 461 | 8.3.8 Validation of documents and attestations | NOTE 1: Attestations can be (qualified) electronic attestation of attributes as defined by the amended eIDAS regulation [i.25]. [CONDITIONAL] If documents and attestations are used as supplementary evidence in an identity proofing process, the requirements in the present clause apply. VAL-8.3.8-01: The identity proofing process shall verify that the document or attestation presented is of an accepted type and is issued by an actor trusted according to the identity proofing context. VAL-8.3.8-02X: The identity of the issuer of the document or attestation, and the authenticity and integrity of the contained identity attributes, shall be verified while ensuring their confidentiality. NOTE 2: For a digital document, this can imply validating a digital signature on the document or attestation. The identity proofing context can pose requirements that a digital signature is required to fulfil to be accepted. NOTE 3: When attributes are conveyed from a European Digital Identity Wallet as specified by the amended eIDAS regulation [i.25] or similar eID means, the protocol used can guarantee authenticity, integrity and confidentiality. NOTE 4: For a physical document, this can be by physical signatures or seals, logos and other visual elements, and by examining the document to detect falsification and tampering. [CONDITIONAL] VAL-8.3.8-03: If a document or attestation is in physical form or digital form rendered for human validation, the identity proofing process shall verify that the document presented is visually equal to the expected visual appearance. [CONDITIONAL] VAL-8.3.8-04: If a document or attestation is in physical form and the document type contains security elements, these security elements shall be verified to the extent required by the identity proofing context. VAL-8.3.8-05X: The procedure to apply in case of discrepancies between the identity attributes obtained from documents and attestations and identity attributes from other evidence shall be specified in the practice statement. EXAMPLE: The identity attributes obtained from documents and attestations can be regarded as authoritative and override other sources of identity attributes, or other evidence can be regarded as authoritative, or an arbitration procedure can be used. The identity proofing context can pose requirements. |
b392cb6367becafeef785f2390da35ed | 119 461 | 8.4 Binding to applicant | |
b392cb6367becafeef785f2390da35ed | 119 461 | 8.4.1 General requirements | BIN-8.4.1-01X: The identity proofing process shall verify that the applicant is the legitimate holder of the authoritative evidence. BIN-8.4.1-02X: The identity proofing process shall verify that the authoritative evidence is in the possession of the applicant. ETSI ETSI TS 119 461 V2.1.1 (2025-02) 44 NOTE 1: For the authoritative evidence types existing eID means and existing digital signature means, no specific binding requirements are needed since the validation of the evidence also verifies the binding. This is under the assumption that only the applicant can use the eID means or digital signature means. NOTE 2: For the supplementary evidence types trusted register, proof of access, and documents and attestations, no specific binding requirements are needed. If the binding of the authoritative evidence (identity document, eID means, or digital signature means) to the applicant is successful, and the supplementary evidence is validated and identifies the same person, the supplementary evidence is considered bound to the applicant. |
b392cb6367becafeef785f2390da35ed | 119 461 | 8.4.2 Capture of face image of the applicant | [CONDITIONAL] If the applicant is a natural person, and an identity document is used as evidence, and the identity proofing process is carried out remotely, the following requirements apply. BIN-8.4.2-01: A video stream of the applicant's face shall be captured. NOTE 1: The video stream and images extracted from the stream can be used for binding to applicant by both face biometrics and manual means. BIN-8.4.2-01A: The video recording shall use frame rate and resolution of sufficient quality for the identity proofing process. EXAMPLE 1: 25 frames per second and a resolution of 1280×720 pixels or 960×720 pixels (landscape) or 720×1280 pixels or 720×960 pixels (portrait). BIN-8.4.2-02X: The video capture process shall apply presentation attack detection means to ensure that the video stream is of a live person present in front of the camera at the time of the identity proofing. BIN-8.4.2-02A: The video capture process shall happen at the time of the identity proofing. NOTE 2: Submission of a pre-recorded video stream is considered not to meet the requirements for identity proofing to Baseline or Extended LoIP. NOTE 3: Active presentation attack detection, e.g. instructing the applicant to perform certain actions, where the specific actions or their sequence are unpredictable to the applicant, can be used for presentation attack detection. NOTE 4: Passive presentation attack detection such as the capture of skin reflections or eye movements from the use of random light patterns can be used for presentation attack detection. BIN-8.4.2-03X: The video stream capture shall apply means to detect artificially generated or manipulated face appearance. NOTE 5: Such attacks are sometimes termed "deep fake" attacks. [CONDITIONAL] BIN-8.4.2-04: If the video stream is captured on the applicant's device, the identity proofing process shall ensure that the video stream is transmitted to an environment controlled by the actor responsible for the identity proofing process in a manner that ensures authenticity, integrity, and confidentiality of the video stream. BIN-8.4.2-04A: The identity proofing process shall apply biometric injection attack prevention and detection means to ensure that neither the applicant nor an external attacker can undetectably inject into the process a previously recorded or artificially generated video stream NOTE 6: This can rely on the applicant's use of software approved for the identity proofing process, e.g. mobile app functionality. [CONDITIONAL] BIN-8.4.2-04B: If the identity proofing targets Baseline LoIP, the biometric injection attack detection means shall be tested by an accredited laboratory according to TS 18099 [5] level Substantial (level 2) at the latest before the end of 2026. [CONDITIONAL] BIN-8.4.2-04C: If the identity proofing targets Extended LoIP, the biometric injection attack detection means shall be tested by an accredited laboratory according to TS 18099 [5] level High (level 3) at the latest before the end of 2026. ETSI ETSI TS 119 461 V2.1.1 (2025-02) 45 BIN-8.4.2-04D: Evaluation of biometric injection detection means by an accredited laboratory according to TS 18099 [5] shall be repeated at least every second year. NOTE 7: TS 18099 [5] poses requirements for external laboratory testing of injection attack detection means. Setting end of 2026 to enforce testing according to TS 18099 [5] is intended to provide IPSPs, laboratories, and accreditation authorities for laboratories sufficient time to prepare. NOTE 8: Regardless of the evaluation according to TS 18099 [5], the IPSP is required to keep biometric injection attack detection means constantly updated according to the IPSP's risk intelligence procedures, see clause 5 of the present document. [CONDITIONAL] BIN-8.4.2-05X: If face biometrics is used for binding to applicant, at least one image of sufficient quality for binding to applicant shall be captured integral to the video capturing or be extracted from the video stream. [CONDITIONAL] BIN-8.4.2-05A: If face biometrics is used for binding to applicant, and a face image of the applicant is captured in the process, the face image shall have a resolution of sufficient quality for the identity proofing process. EXAMPLE 2: A resolution of 1280×720 pixels or 960×720 pixels (landscape) or 720×1280 pixels or 720×960 pixels (portrait). BIN-8.4.2-05B: The conditions (e.g. lighting conditions, reflections, sharpness) of video and images shall be assessed, and video and images shall be rejected if they are not suited for binding to applicant, with an instructions to the applicant to repeat the process under better conditions. NOTE 9: The upcoming ISO/IEC 29794-5 [i.32] standard on biometric sample quality, face image data, can become a reference for image quality in future versions of the present document. BIN-8.4.2-05C: There shall be an upper limit on the number of retries before the process is aborted with failed result. BIN-8.4.2-05D: The IPSP shall in its practice statement state goals for APCER (attack presentation classification error rate) and BPCER (bona fide presentation classification error rate) values that are at least at the level of industry best practice and that the service shall aim to achieve. BIN-8.4.2-05E: The IPSP shall keep its APCER and BPCER goals updated based on its threats intelligence procedure. BIN-8.4.2-06X: The PAD means and APCER and BPCER rates shall be systematically tested in accordance with ISO/IEC 30107-3 [3] against updated reference data sets and against the goals set by the IPSP. NOTE 10: Regarding ISO/IEC 30107-3 [3], the task of an IPSP will usually be a verification or identification process and metrics can be applied at data capture subsystem or full-system level depending on the design of the IPSP's system. BIN-8.4.2-07X: The PAD means shall be evaluated by an accredited laboratory according to ISO/IEC 19989-3 [6] at the latest before the end of 2026. BIN-8.4.2-07A: Evaluation of PAD means by an accredited laboratory according to ISO/IEC 19989-3 [6] shall be repeated at least every second year. NOTE 11: ISO/IEC 19989-3 [6] specifies security evaluation of PAD by external laboratory testing applying Common Criteria (ISO/IEC 15408-1 [i.24]). Setting end of 2026 to enforce testing according to ISO/IEC 19989-3 [6] is intended to provide IPSPs, laboratories, and accreditation authorities for laboratories sufficient time to prepare. NOTE 12:Regardless of the evaluation according to ISO/IEC 19989-3 [6], the IPSP is required to keep PAD means constantly updated according to the IPSP's risk intelligence procedures, see clause 5 of the present document. NOTE 13: The upcoming CEN standard on "European requirements for biometric products" can be referenced from future versions of the present document to define the evaluation procedures, methodologies, parameters and tests for the functional and security evaluation of the video stream. The CEN standard will be based on ISO/IEC 19795-1 [4], ISO/IEC 19989-1 [i.30], ISO/IEC 19989-3 [6] and ISO/IEC 30107-3 [3]. BIN-8.4.2-08X: Test results for the PAD shall achieve an APCER as defined by ISO/IEC 30107-3 [3] in accordance with the goal stated in the practice statement. ETSI ETSI TS 119 461 V2.1.1 (2025-02) 46 NOTE 14: No specific number is specified for the APCER. Rapid technology improvement can lead to significant progress in industry best practice APCER performance even in the short term. BIN-8.4.2-09X: Test results for the PAD should achieve BPCER as defined by ISO/IEC 30107-3 [3] in accordance with the goal stated in the practice statement. NOTE 15: The BPCER has impact on user-friendliness and can thus indirectly have an impact on security. BIN-8.4.2-10: VOID. |
b392cb6367becafeef785f2390da35ed | 119 461 | 8.4.3 Binding to applicant by automated face biometrics | [CONDITIONAL] If binding to applicant is by automated face biometrics, the following requirements apply: NOTE 1: Use of other biometric means than face biometrics is currently out of scope but can be a future possibility. BIN-8.4.3-01X: The process shall provide a reliable, automated comparison between face image(s) extracted from the identity document presented by the applicant and face image(s) captured according to the requirements of clause 8.4.2 of the present document. BIN-8.4.3-02X: Data capture and preliminary data quality assessment may be done in equipment controlled by the applicant. BIN-8.4.3-03: Biometric signal processing, comparison, data storage, and decision shall be carried out in an environment controlled by the actor responsible for the identity proofing process. EXAMPLE 1: To protect against threats to the biometric system as described in ISO/IEC 30107-1 [i.16], clause 5.1. [CONDITIONAL] BIN-8.4.3-04: If biometric face recognition is used with the physical presence of the applicant, properly secured equipment shall be used to read the identity document presented by the applicant and obtain a face image of the applicant. [CONDITIONAL] BIN-8.4.3-05: If biometric face recognition is used with the physical presence of the applicant, locally installed and properly secured equipment may be used for the biometric face recognition processing. EXAMPLE 2: For fulfilment of the two requirements above, a biometric kiosk as commonly used at passport offices, or equipment similar to that used for automated border control, can be used. BIN-8.4.3-05A: The IPSP shall in its practice statement state goals for False Acceptance Rate (FAR) and False Rejection Rate (FRR) values that are at least at the level of industry best practice and that the service shall aim to achieve. BIN-8.4.3-05B: The IPSP shall keep its FAR and FRR goals updated based on its threats intelligence procedure. NOTE 2: Rapid technology improvement can lead to significant progress in industry best practice FAR and FRR performance even in the short term. NOTE 3: An example of industry best practice reference can be the one-to-one face matching results reported from the NIST Face Recognition Vendor Test. NOTE 4: The upcoming CEN standards on "European requirements for biometric products" can in the future provide application profiles that can be used by the IPSP to define such goals. BIN-8.4.3-06X: The biometric algorithms and technologies applied shall be systematically tested in accordance with ISO/IEC 19795-1 [4] against updated reference data sets and against the goals set by the IPSP. NOTE 5: The applicable analysis in ISO/IEC 19795-1 [4] will usually be one-to-one matching. BIN-8.4.3-07X: Test results for the biometric face recognition shall achieve FAR in accordance with the goal stated in the practice statement. BIN-8.4.3-08X: Test results for the biometric face recognition should achieve False Rejection Rate (FRR) in accordance with the goal stated in the practice statement. NOTE 6: False Rejection Rate has impact on user-friendliness, which can indirectly have an impact on security. ETSI ETSI TS 119 461 V2.1.1 (2025-02) 47 BIN-8.4.3-09X: The biometric face recognition should apply means to detect morphed photos in identity documents. NOTE 7: A morphed photo is created by merging the face photos of two or more different persons into one photo. Since some countries allow persons to bring their own photo for issuing a passport or national identity card, there is a risk that documents are issued with morphed photos. With a morphed photo, there is a risk that both/all the persons can be recognized both by a registration officer and by face biometrics with a reliability above the applied threshold, meaning more than one person can use the identity document containing the morphed photo. NOTE 8: Morphing detection means are best applied in the binding to applicant step of an identity proofing process when a new photo, known not to be morphed, of the applicant can be compared to the potentially morphed reference photo. The upcoming ISO/IEC 20059 [i.33] "Methodologies to evaluate the resistance of biometric recognition systems to morphing attacks" can in the future provide guidance. |
b392cb6367becafeef785f2390da35ed | 119 461 | 8.4.4 Binding to applicant by manual face verification | [CONDITIONAL] If manual binding of the applicant to an identity document is used, the following requirements apply: BIN-8.4.4-01X: The registration officer shall compare the face image obtained from the applicant's identity document with the applicant's physical appearance, either from the applicant's physical presence, from a video sequence captured according to the requirements of clause 8.4.2 of the present document, or from image(s) derived from or captured together with the video sequence. BIN-8.4.4-02: The registration officer performing the binding to applicant shall receive training before being allowed to make any comparison, with training repeated or refreshed at least yearly. EXAMPLE 1: See the FISWG Minimum Training Criteria for Assessors Using Facial Recognition Systems [i.22] or for more extensive description the ENFSI Best Practice Manual for Facial Image Comparison [i.23], Appendix A. BIN-8.4.4-03: The registration officer shall perform a morphological analysis according to a defined feature list. EXAMPLE 2: As recommended by the FISWG Facial Comparison Overview and Methodology Guidelines [i.20] and the corresponding checklist in [i.21]. BIN-8.4.4-04X: The registration officer shall be allowed to spend sufficient time for the face comparison and have working conditions that do not impede the registration officer's judgement. NOTE 1: In general, an assessment according to the FISWG Facial Comparison Overview and Methodology Guidelines [i.20] can be sufficient, while a review according to the same document can be required at least for remote identity proofing. BIN-8.4.4-05: The registration officer should have tools available to magnify images to view details. NOTE 2: With physical presence and physical identity document, this can be a magnifying glass for the face image printed on the document. If face images are used, computerized tools are assumed. [CONDITIONAL] BIN-8.4.4-06: If binding to applicant is done by comparing face images or video sequences, the registration officer should use computerized tools in the face comparison. EXAMPLE 3: Tool for superimposition of images described by the FISWG Facial Comparison Overview and Methodology Guidelines [i.20]. 8.4.5 Binding to applicant for legal person and natural person representing legal person [CONDITIONAL] If the applicant is a legal person or a natural person representing a legal person, the following requirements apply: BIN-8.4.5-01: Validated evidence shall prove that the legal person exists and that the application to the trust service is a willful act carried out on behalf of the legal person. ETSI ETSI TS 119 461 V2.1.1 (2025-02) 48 [CONDITIONAL] BIN-8.4.5-02X: If the applicant is a natural person representing a legal person, the identity of the natural person shall be proven according to an applicable use case from clause 9 or Annex C of the present document. [CONDITIONAL] BIN-8.4.5-03: If the applicant is a natural person representing a legal person, validated evidence shall prove the natural person's authorization to represent the legal person. [CONDITIONAL] BIN-8.4.5-04X: If the applicant is a natural person representing a legal person, and the legal person is listed in a trusted register, the natural person's authorization to represent the legal person should be proven by information from that register. NOTE 1: This implies that the natural person has one of the roles listed in the trusted register and that this role is authorized to represent the legal person in the identity proofing context. NOTE 2: The trusted register can be an authentic source as defined by the amended eIDAS regulation [i.25] and the evidence can be conveyed as a qualified or non-qualified electronic attestation of attributes as defined by the same regulation. |
b392cb6367becafeef785f2390da35ed | 119 461 | 8.5 Issuing of proof | |
b392cb6367becafeef785f2390da35ed | 119 461 | 8.5.1 Result of the identity proofing | ISS-8.5.1-01: The result of the identity proofing shall be delivered securely to the trust service provider, regarding the authenticity, integrity, and confidentiality of the result. EXAMPLE 1: The result can be digitally signed and encrypted at the message level or be transmitted over a properly secured communication channel. NOTE 1: The present document places no requirement on the format of the result of the identity proofing. Example formats can be a document (e.g. PDF), structured data (e.g. XML, JSON), an identity assertion (e.g. OIDC, SAML), or an electronic attestation of attributes. NOTE 2: The result of the identity proofing process can convey the attributes that are verified and the LoIP, but can even be a simple 'success' or 'failure' statement meaning that identity attributes provided by the TSP at the start of the identity proofing process are verified (or not) against the applicant to the required LoIP. NOTE 3: The present document makes no assumption on the attributes to convey, whether the applicant is a natural person, a legal person, or a natural person representing a legal person (roles or authorizations can be relevant in the latter case). NOTE 4: The present document makes no assumptions on the information to convey for identity proofing processes that do not complete successfully. ISS-8.5.1-02: The result of the identity proofing process shall convey the LoIP achieved by the identity proofing process for the identity attributes required for the unique identification of the applicant in the identity proofing context. EXAMPLE 2: By referring to the Baseline or Extended LoIP defined by the present document. [CONDITIONAL] ISS-8.5.1-03X: If the identity proofing process conveys identity attributes that are not required for unique identification in the identity proofing context, and whose assurance differ from the LoIP of the overall result of the identity proofing process, an indication of the differing assurance should be conveyed in the identity proofing result. |
b392cb6367becafeef785f2390da35ed | 119 461 | 8.5.2 Evidence of the identity proofing process | NOTE 1: In this clause 8.5.2, the term "evidence" means audit information for the identity proofing process as such, and not authoritative or supplementary evidence as in other clauses of the document. See also clause 7.10 of the present document. ISS-8.5.2-01: Evidence of the identity proofing process shall be gathered and retained in compliance with the identity proofing context. NOTE 2: Evidence can be retained in digital or paper format. ETSI ETSI TS 119 461 V2.1.1 (2025-02) 49 NOTE 3: The need to retain evidence of identity proofing processes that did not complete successfully can be determined by the identity proofing context. NOTE 4: Gathering and retention of evidence is required to comply with applicable data protection legislation, notably GDPR if the identity proofing process is carried out under the legislation of an EU Member State ISS-8.5.2-02X: The evidence of the identity proofing process shall document the authoritative and supplementary evidence used in the identity proofing process and the issuer or source of that evidence. EXAMPLE 1: An identity document can be identified by the issuer name and document number, or by retaining a copy of the document, possibly in the form of an image if a physical identity document is used. Retaining a copy can, depending on the identity proofing context, be required, allowed, or forbidden. ISS-8.5.2-03: The evidence of the identity proofing process should completely document the identity proofing process. EXAMPLE 2: Including images captured in a remote identity proofing process; however, retaining images of a human applicant can, depending on the identity proofing context, be required, allowed, forbidden, or limited in time. ISS-8.5.2-04: Evidence of the identity proofing process shall be retained for the necessary retention time given by the identity proofing context. EXAMPLE 3: A typical requirement from a TSP is to retain evidence of the identity proofing process as long as the applicant remains a subject/subscriber of the TSP plus some years after that time. ISS-8.5.2-05: The evidence of the identity proofing process shall be stored in a tamper-proof way. ISS-8.5.2-05A: The time of completion of the identity proofing process shall be part of the evidence. NOTE 5: A (qualified) timestamp applied to the evidence can both prove the time and provide the tampering protection of the evidence. ISS-8.5.2-06: The evidence of the identity proofing process shall be stored in a way that guarantees the confidentiality of the information. ISS-8.5.2-07: The evidence of the identity proofing process shall be stored in a way that ensures the possibility to search, retrieve, and re-verify the identity proofing result. NOTE 6: Offline storage or other means that will result in a prolonged response time are possible. NOTE 7: If an identity document has been used in the identity proofing process, and no copy of that document has been retained, re-verification depends on the ability to obtain the document based on its identification. ISS-8.5.2-08: At the end of the retention time defined by ISS 8.5.2-04, the evidence of the identity proofing process and all personal data on the applicant shall be deleted. 9 Use cases for identity proofing to Baseline and Extended LoIP 9.1 Introduction, compliance with the present document, general requirements for all use cases USE-9.1-01X: To be compliant with the present document, an identity proofing process shall conform to at least one of the use cases in clause 9 or Annex C of the present document for Baseline LoIP or Extended LoIP. USE-9.1-01A: Compliance with the claimed use cases and the claimed LoIP from the present document should be assessed by an independent, accredited conformity assessment body. ETSI ETSI TS 119 461 V2.1.1 (2025-02) 50 NOTE 1: Clause 9 of the present document specifies identity proofing use cases by combining requirements from clause 8 covering the five steps of an identity proofing process: initiation, attribute and evidence collection, attribute and evidence validation, binding to applicant, issuing of proof. Conformance to one or more of the use cases specified can be claimed. NOTE 2: The identity proofing context can pose requirements that only certain use cases are applicable. NOTE 3: The proposed use cases can be carried out in a synchronous process, meaning that all steps of the identity proofing process including issuing of proof are carried out in one continuous process, or an asynchronous process, where the validation and binding tasks and issuing of proof are done at a later time. NOTE 4: See ETSI EN 319 403-1 [i.6] for guidance on the assessment of TSP processes and services. USE-9.1-02X: The requirements in the following clauses of the present document shall apply to all use cases: • clause 5 (operational risk assessment); • clause 6 (policies and practices); • clause 7 (identity proofing service management and operation); • clause 8.1 (initiation); • clause 8.2.1 (attribute and evidence collection general requirements); • clause 8.3.1 (attribute and evidence validation general requirements); • clause 8.4.1 (binding to applicant general requirements); and • clause 8.5 (issuing of proof). USE-9.1-03X: Other use cases than those in the present clause 9 may be specified by combining elements from clause 8 of the present document in different ways; for such use cases, the resulting use case's proper handling of the risks identified as relevant to the Baseline or Extended LoIP shall be demonstrated. NOTE 5: Other means, and consequently other use cases, than those described in the present document can be used to reach Baseline LoIP or Extended LoIP. For example, the present document does not consider use cases where the applicant is a known subject, e.g. in cases where identity proofing is required to be repeated regularly, or use cases for continuous identity proofing where the behaviour of the subject over time can be used to determine the risk or the likelihood that the identity is correct. |
b392cb6367becafeef785f2390da35ed | 119 461 | 9.2 Use cases for identity proofing of natural person | 9.2.1 Use cases using an identity document with physical presence of the applicant |
b392cb6367becafeef785f2390da35ed | 119 461 | 9.2.1.1 General requirements | [CONDITIONAL] If the identity proofing is based on the applicant's physical presence, the following requirements apply. NOTE 1: For the physical presence use cases, the same requirements apply for both Baseline and Extended LoIP. NOTE 2: The requirement for physical presence does not imply that the applicant has to be present during all the steps of the use case, e.g. an identity proofing process can be asynchronous with the result determined at a later time than the capturing of the information. NOTE 3: The identity proofing context can mandate a manual operation use case, or an automated use case, or a hybrid use case, or leave the selection of use case open. ETSI ETSI TS 119 461 V2.1.1 (2025-02) 51 NOTE 4: While the normal case is that the applicant visits the physical location where the identity proofing takes place, a case where the registration officer visits the physical location where the applicant is present is also possible. USE-9.2.1.1-01: Attribute collection shall be according to the requirements of clause 8.2.2.1 of the present document. USE-9.2.1.1-02: At least one digital or physical identity document shall be used as authoritative evidence. USE-9.2.1.1-03: Collection of evidence shall be according to the requirements in clause 8.2.3 of the present document. USE-9.2.1.1-04: The identity proofing may use trusted registers and/or proof of access and/or documents and attestations as supplementary evidence. USE-9.2.1.1-05: The identity proofing may use additional digital or physical identity documents as supplementary evidence. USE-9.2.1.1-06: The identity proofing may use existing eID means as supplementary evidence. USE-9.2.1.1-07: The identity proofing may use existing digital signature means as supplementary evidence. NOTE 5: The identity proofing context can require the use of specific supplementary evidence, e.g. validation of the identity against a population register or identity document register. |
b392cb6367becafeef785f2390da35ed | 119 461 | 9.2.1.2 Use case for manual operation | [CONDITIONAL] If the identity proofing is based on the applicant's physical presence, and validation of evidence is manual using a physical identity document, and binding to applicant is by manual face verification, then the following requirements apply. NOTE: This is the most common use case for physical presence, where a registration officer manually validates a physical identity document and manually performs binding to applicant. The hybrid and automated use cases cover use of digital identity documents. USE-9.2.1.2-01: The registration officer shall guide the applicant and carry out the identity proofing process according to a defined process description. USE-9.2.1.2-02: The identity proofing process shall specify how the registration officer shall handle deviations from expected results or expected behaviour of the applicant, including the conditions where the identity proofing process shall be aborted, and the information to convey to the applicant when an identity proofing process is aborted. EXAMPLE: The applicant can be informed only that the process has failed with no further information, or be informed of the specific reason why the process failed. USE-9.2.1.2-03X: At least one physical identity document shall be used as authoritative evidence. USE-9.2.1.2-04X: Evidence validation shall be according to the requirements in clause 8.3.3 of the present document, including requirements that are marked CONDITIONAL, where the condition is on physical presentation of the identity document or on manual validation of the identity document. USE-9.2.1.2-05: Binding to applicant shall be according to requirements in clause 8.4.4 of the present document. |
b392cb6367becafeef785f2390da35ed | 119 461 | 9.2.1.3 Use case for hybrid manual and automated operation | [CONDITIONAL] If the identity proofing is based on the applicant's physical presence, validation of evidence is automated using a digital identity document, and binding to applicant is by manual face verification, then the following requirements apply. NOTE 1: This use case resembles manual border control with a digital identity document obtained from the chip of a passport or national identity card. The identity document content, including face photo, is displayed on a screen to the registration officer that manually compares to the applicant's appearance. USE-9.2.1.3-01: The registration officer shall guide the applicant and carry out the identity proofing process according to a defined process description. ETSI ETSI TS 119 461 V2.1.1 (2025-02) 52 USE-9.2.1.3-02: The identity proofing process shall specify how the registration officer shall handle deviations from expected results or expected behaviour of the applicant, including the conditions where the identity proofing process shall be aborted, and the information to convey to the applicant when an identity proofing process is aborted. EXAMPLE: The applicant can be informed only that the process has failed with no further information, or be informed of the specific reason why the process failed. USE-9.2.1.3-03X: At least one digital identity document shall be used as authoritative evidence. NOTE 2: The use of a physical identity document is not considered common practice for the hybrid use case of physical presence. This would require on-site equipment to scan and analyse the physical identity document. When the digital identity document is read from a chip embedded in a physical identity document, the physical identity document can however be used as supplementary evidence. USE-9.2.1.3-04: Evidence validation shall be according to the requirements in clause 8.3.2 of the present document. USE-9.2.1.3-04A: A face image of the applicant should be captured. [CONDITIONAL] USE-9.2.1.3-04B: If a face image is captured according to USE-9.2.1.3-04A, unless the face image is captured by specialized equipment in a controlled environment, the capture of the face image of the applicant shall be according to the requirements in clause 8.4.2 of the present document NOTE 3: Manual binding to applicant can be done by comparing the face image from the identity document to the applicant's physical appearance, although comparing against a face image is recommended. NOTE 4: See note 3 in clause 9.2.1.4 below regarding "specialized equipment". USE-9.2.1.3-05: Binding to applicant shall be according to the requirements in clause 8.4.4 of the present document. |
b392cb6367becafeef785f2390da35ed | 119 461 | 9.2.1.4 Use case for automated operation | [CONDITIONAL] If the identity proofing is based on the physical presence of the applicant, validation of evidence is automated using digital identity document, and binding to applicant is by automated face biometrics, then the following requirements apply. NOTE 1: This use case requires equipment that can read and validate a digital identity document, obtain a face photo of the applicant, and perform binding to applicant by face biometrics. The use case resembles automated border control. USE-9.2.1.4-01: At least one registration officer shall be present at the physical location of the identity proofing. USE-9.2.1.4-02: The applicant shall receive guidance on the process either by automated means or by the registration officer. USE-9.2.1.4-03: The registration officer shall be alerted in case of deviations from expected results or expected behaviour of the applicant. USE-9.2.1.4-04: The identity proofing process shall specify how the registration officer shall handle deviations from expected results or expected behaviour of the applicant, including the conditions where the identity proofing process shall be aborted, and the information to convey to the applicant when an identity proofing process is aborted. EXAMPLE: The applicant can be informed only that the process has failed with no further information or be informed of the specific reason why the process failed. USE-9.2.1.4-05X: At least one digital identity document shall be used as authoritative evidence. NOTE 2: A fully automated procedure to Baseline or Extended LoIP requires the use of a digital identity document. USE-9.2.1.4-06: Evidence validation shall be according to the requirements in clause 8.3.2 of the present document. USE-9.2.1.4-07: A face image of the applicant shall be captured. [CONDITIONAL] USE-9.2.1.4-08X: Unless the face image is captured by specialized equipment in a controlled environment, the capture of the face image of the applicant shall be according to the requirements in clause 8.4.2 of the present document. ETSI ETSI TS 119 461 V2.1.1 (2025-02) 53 NOTE 3: Specialized equipment can be similar to automated border control or a biometric kiosk in a controlled environment. When the applicant is physically present, the requirements in clause 8.4.2, e.g. to capture a video sequence, are not necessarily relevant under such conditions. USE-9.2.1.4-09: Binding to applicant shall be according to the requirements in clause 8.4.3 of the present document. 9.2.2 Use cases using an identity document for attended remote identity proofing |
b392cb6367becafeef785f2390da35ed | 119 461 | 9.2.2.1 General requirements | [CONDITIONAL] If the identity proofing is based on the remote presence of the applicant with online communication with a registration officer, the following requirements apply. NOTE 1: For the attended remote use cases, the requirements for Baseline LoIP and Extended LoIP differ in that manual validation of a physical identity document can be used for Baseline LoIP but not for Extended LoIP. In addition, the risk assessment for the two levels, especially concerning attack potential to consider, will be different and can lead to differences in implementation. NOTE 2: The identity proofing context can mandate a manual operation use case, or a hybrid use case, or leave the selection of use case open. As attended remote identity proofing requires the presence of a registration officer, fully automated identity proofing is considered not relevant. USE-9.2.2.1-01: The registration officer shall guide the applicant and carry out the identity proofing process according to a defined process description. USE-9.2.2.1-02: The identity proofing process shall specify how the registration officer shall handle deviations from expected results or expected behaviour of the applicant, including the conditions where the identity proofing process shall be aborted, and the information to convey to the applicant when an identity proofing process is aborted. EXAMPLE: The applicant can be informed only that the process has failed with no further information or be informed of the specific reason why the process failed. USE-9.2.2.1-03: Attribute collection shall be according to the requirements of clause 8.2.2.1 of the present document. USE-9.2.2.1-04: At least one digital or physical identity document shall be used as authoritative evidence. USE-9.2.2.1-05: Collection of evidence shall be according to the requirements in clause 8.2.3 of the present document. USE-9.2.2.1-06: VOID. USE-9.2.2.1-07: The identity proofing may use trusted registers and/or proof of access and/or documents and attestations as supplementary evidence. USE-9.2.2.1-08: The identity proofing may use additional digital or physical identity documents as supplementary evidence. USE-9.2.2.1-09: The identity proofing may use existing eID means as supplementary evidence. USE-9.2.2.1-10: The identity proofing may use existing digital signature means as supplementary evidence. NOTE 3: The identity proofing context can require use of the specific supplementary evidence, e.g. validation of the identity against a population register or identity document register. |
b392cb6367becafeef785f2390da35ed | 119 461 | 9.2.2.2 Use case for manual operation (Baseline LoIP only) | [CONDITIONAL] If the identity proofing is based on the remote presence of the applicant with online communication with a registration officer, and validation of evidence is manual using a physical identity document, and binding to applicant is by manual face verification, then the following requirements apply. ETSI ETSI TS 119 461 V2.1.1 (2025-02) 54 NOTE 1: This use case is similar to the physical appearance with manual operation case in clause 9.2.1.2 of the present document. Validation of the physical identity document and binding to applicant are more difficult than with physical presence, but the use case is acceptable for Baseline LoIP provided that the difficulty is compensated by the specialist skills of the registration officer and the availability of tools to the registration officer. The hybrid use case in clause 9.2.2.3 is strongly recommended above the manual use case. USE-9.2.2.2-01X: At least one physical identity document shall be used as authoritative evidence. USE-9.2.2.2-02X: Evidence validation shall be according to the requirements in clause 8.3.3 of the present document, including requirements that are marked CONDITIONAL, where the condition is on remote presentation of the identity document or on manual validation of the identity document. USE-9.2.2.2-02A: A face image of the applicant should be captured according to the requirements in clause 8.4.2 of the present document NOTE 2: Manual binding to applicant can be done by comparing the face image from the identity document to the applicant's online appearance, although comparing against a face image is recommended. USE-9.2.2.2-03: Binding to applicant shall be according to the requirements in clause 8.4.4 of the present document. |
b392cb6367becafeef785f2390da35ed | 119 461 | 9.2.2.3 Use case for hybrid manual and automated operation | [CONDITIONAL] If the identity proofing is based on remote presence of the applicant with online communication with a registration officer, and validation of evidence is either automated using a digital identity document or combined automated and manual for a physical identity document, and binding to applicant is either by manual face verification or a combination of manual face verification and face biometrics, then the following requirements apply. NOTE 1: This hybrid use case can use either digital or physical identity document, where automated means for evidence validation is required even for a physical identity document. While manual binding to applicant is allowed as per the manual use case in clause 9.2.2.2, combined manual and face biometric binding to applicant is highly recommended. [CONDITIONAL] USE-9.2.2.3-01X: If a digital identity document is used as authoritative evidence, evidence validation shall be according to the requirements in clause 8.3.2 of the present document. NOTE 2: A digital identity document will yield more reliable evidence validation than a physical identity document. [CONDITIONAL] USE-9.2.2.3-02X: If a physical identity document is used as authoritative evidence, evidence validation shall be according to the requirements in clause 8.3.3 of the present document, including requirements that are marked CONDITIONAL, where the condition is on remote presentation of the identity document or on manual validation of the identity document. [CONDITIONAL] USE-9.2.2.3-03X: If a physical identity document is used as authoritative evidence, requirements VAL-8.3.3-18, VAL-8.3.3-19, and VAL-8.3.3-20 of the present document shall apply as additional to manual validation of the identity document. NOTE 3: Meaning that automated analysis and machine learning technology is mandatory for validation of the physical identity document, combined with manual validation. [CONDITIONAL] USE-9.2.2.3-03A: If face biometrics is used for binding to applicant, a face image of the applicant shall be captured according to the requirements in clause 8.4.2 of the present document. [CONDITIONAL] USE-9.2.2.3-03B: If only manual binding to applicant is used, a face image of the applicant should be captured according to the requirements in clause 8.4.2 of the present document. NOTE 4: Manual binding to applicant can be done by comparing the face image from the identity document to the applicant's online appearance, although comparing against a face image is recommended. USE-9.2.2.3-04: Binding to applicant shall be according to one of the following alternatives: a) by applying both manual binding to applicant (clause 8.4.4) and face biometrics (clause 8.4.3) in parallel; or ETSI ETSI TS 119 461 V2.1.1 (2025-02) 55 b) by applying face biometrics (clause 8.4.3) with fallback to manual binding (clause 8.4.4), where the outcome of the face biometrics does not yield a reliable match; or c) by applying only manual binding to applicant (clause 8.4.4). [CONDITIONAL] USE-9.2.2.3-05X: If binding to applicant is by applying manual face verification and automated face biometrics in parallel, and the two binding methods yield different results, the identity proofing process shall be aborted. 9.2.3 Use cases using an identity document for unattended remote identity proofing |
b392cb6367becafeef785f2390da35ed | 119 461 | 9.2.3.1 General requirements | [CONDITIONAL] If the identity proofing is based on the remote presence of the applicant with unattended online communication, the following requirements apply. NOTE 1: For the unattended remote use cases, manual operation, whether it is manual validation of a physical identity document or manual binding to applicant or both, is considered to only be able to reach Baseline LoIP. Hybrid manual and automated operation and automated operation can reach Extended LoIP; automated operation requires use of a digital identity document. NOTE 2: While the user dialogue of the identity proofing is automated, subsequent validation of evidence and binding to applicant can still be manual as for the attended remote use case but only to reach Baseline LoIP. Hybrid automated and manual validation of evidence and binding to applicant and fully automated operation are more relevant use cases. The identity proofing context can mandate an automated use case, or a hybrid use case, or a manual use case, or leave the selection of use case open. USE-9.2.3.1-01: The applicant shall receive automated guidance throughout the identity proofing process. USE-9.2.3.1-02: The automated process' handling of deviations from expected results or expected behaviour of the applicant shall be specified, including the conditions where the identity proofing process shall be aborted, and the information to convey to the applicant when an identity proofing process is aborted. EXAMPLE: The applicant can be informed only that the process has failed with no further information or be informed of the specific reason why the process failed. USE-9.2.3.1-03: Attribute collection shall be according to the requirements of clause 8.2.2.1 of the present document. USE-9.2.3.1-04: The process shall use at least one digital or physical identity document as authoritative evidence. USE-9.2.3.1-05: Collection of evidence shall be according to the requirements in clause 8.2.3 of the present document. USE-9.2.3.1-06: The capture of the face image of the applicant shall be according to the requirements in clause 8.4.2 of the present document. USE-9.2.3.1-07: The identity proofing may use trusted registers and/or proof of access and/or documents and attestations as supplementary evidence. USE-9.2.3.1-08: The identity proofing may use additional digital or physical identity documents as supplementary evidence. USE-9.2.3.1-09: The identity proofing may use existing eID means as supplementary evidence. USE-9.2.3.1-10: The identity proofing may use existing digital signature means as supplementary evidence. NOTE 3: The identity proofing context can require the use of specific supplementary evidence, e.g. validation of the identity against a population register or identity document register. ETSI ETSI TS 119 461 V2.1.1 (2025-02) 56 |
b392cb6367becafeef785f2390da35ed | 119 461 | 9.2.3.2 Use case for manual operation (Baseline LoIP only) | [CONDITIONAL] If the identity proofing is based on the remote presence of the applicant with unattended online communication, and validation of evidence is manual using a physical identity document, and binding to applicant is by manual face verification, then the following requirements apply. NOTE 1: The hybrid use case in clause 9.2.3.3 is strongly recommended above the manual use case. USE-9.2.3.2-01: The identity proofing process shall specify how the registration officer shall handle deviations from expected results or expected behaviour of the applicant, including the conditions where the identity proofing process shall be aborted, and the information to convey to the applicant when an identity proofing process is aborted. NOTE 2: Deviations can be detected both by automated means during the online communication with the applicant and by the registration officer during the manual validation of evidence and manual binding to applicant. USE-9.2.3.2-03X: At least one physical identity document shall be used as authoritative evidence. USE-9.2.3.2-04X: Evidence validation shall be according to the requirements in clause 8.3.3 of the present document, including requirements that are marked CONDITIONAL, where the condition is on remote presentation of the identity document or on manual validation of the identity document. USE-9.2.3.2-05: Binding to applicant shall be according to the requirements in clause 8.4.4 of the present document. |
b392cb6367becafeef785f2390da35ed | 119 461 | 9.2.3.3 Use case for hybrid manual and automated operation | [CONDITIONAL] If the identity proofing is based on the remote presence of the applicant with unattended online communication, and validation of evidence is either automated using a digital identity document or combined automated and manual for physical identity document, and binding to applicant is either by manual face verification or a combination of manual face verification and face biometrics, then the following requirements apply. NOTE 1: This hybrid use case can use a digital or physical identity document; automated means for evidence validation is required even for a physical identity document. USE-9.2.3.3-01: The identity proofing process shall specify how the registration officer shall handle deviations from expected results or expected behaviour of the applicant, including the conditions where the identity proofing process shall be aborted, and the information to convey to the applicant when an identity proofing process is aborted. NOTE 2: Deviations can be detected by automated means during the online communication with the applicant, by automated means during subsequent automated evidence validation and binding to applicant, and by the registration officer during manual validation of evidence and manual binding to applicant. [CONDITIONAL] USE-9.2.3.3-02X: If a digital identity document is used as authoritative evidence, evidence validation shall be according to the requirements in clause 8.3.2 of the present document. NOTE 3: A digital identity document will yield more reliable evidence validation than a physical identity document. [CONDITIONAL] USE-9.2.3.3-03X: If physical identity document is used as authoritative evidence, evidence validation shall be according to the requirements in clause 8.3.3 of the present document, including requirements that are marked CONDITIONAL, where the condition is on remote presentation of the identity document or on manual validation of the identity document. [CONDITIONAL] USE-9.2.3.3-04X: If a physical identity document is used as authoritative evidence, requirements VAL-8.3.3-18, VAL-8.3.3-19, and VAL-8.3.3-20 of the present document shall apply as additional to manual validation of the identity document. NOTE 4: Meaning that automated analysis and machine learning technology is mandatory for validation of the physical identity document, combined with manual validation. USE-9.2.3.3-05X: Binding to applicant shall be according to one of the following alternatives: a) by applying both manual binding to applicant (clause 8.4.4) and face biometrics (clause 8.4.3) in parallel; or b) by applying face biometrics (clause 8.4.3) with fallback to manual binding (clause 8.4.4) where the outcome of the face biometrics does not yield a reliable match; or ETSI ETSI TS 119 461 V2.1.1 (2025-02) 57 c) by applying only manual binding to applicant (clause 8.4.4); this alternative can only be used for Baseline LoIP. [CONDITIONAL] USE-9.2.3.3-06X: If binding to applicant is achieved by applying manual face verification and automated face biometrics in parallel, and the two binding methods yield different results, the identity proofing process shall be aborted. |
b392cb6367becafeef785f2390da35ed | 119 461 | 9.2.3.4 Use case for automated operation | [CONDITIONAL] If the identity proofing is based on the remote presence of the applicant with automated online communication, and validation of evidence is automated using a digital identity document, and binding to applicant is by automated face biometrics, then the following requirements apply. NOTE: A fully automated process requires the use of a digital identity document. USE-9.2.3.4-01X: At least one digital identity document shall be used as authoritative evidence. USE-9.2.3.4-02: Evidence validation shall be according to the requirements in clause 8.3.2 of the present document. USE-9.2.3.4-03: Binding to applicant shall be according to the requirements in clause 8.4.3 of the present document. |
b392cb6367becafeef785f2390da35ed | 119 461 | 9.2.4 Use case for identity proofing by authentication using eID means | [CONDITIONAL] If the identity proofing is based on authentication using eID means, the following requirements apply. USE-9.2.4-01: Attribute collection shall be according to the requirements of clause 8.2.2.1 of the present document. USE-9.2.4-02: Collection of evidence shall be according to the requirements in clause 8.2.4 of the present document. [CONDITIONAL] USE-9.2.4-02A: If Baseline LoIP is targeted, requirement COL-8.2.4-02X shall apply. [CONDITIONAL] USE-9.2.4-02B: If Extended LoIP is targeted, requirement COL-8.2.4-02A shall apply. USE-9.2.4-03: Validation of evidence shall be according to the requirements in clause 8.3.4 of the present document. USE-9.2.4-04: The identity proofing may use trusted registers and/or proof of access and/or documents and attestations as supplementary evidence. USE-9.2.4-05: The identity proofing may use digital or physical identity documents as supplementary evidence. USE-9.2.4-06: The identity proofing may use another eID means as supplementary evidence. USE-9.2.4-07: The identity proofing may use existing digital signature means as supplementary evidence. NOTE: The identity proofing context can require the use of specific supplementary evidence, e.g. validation of the identity against a population register. |
b392cb6367becafeef785f2390da35ed | 119 461 | 9.2.5 Use case for identity proofing using digital signature with certificate | [CONDITIONAL] If the identity proofing is based on the use of a digital signature with a certificate, the following requirements apply. USE-9.2.5-01: Attribute collection shall be according to the requirements of clause 8.2.2.1 of the present document. USE-9.2.5-02: Collection of evidence shall be according to the requirements in clause 8.2.5 of the present document. [CONDITIONAL] USE-9.2.4-02A: If Baseline LoIP is targeted, requirement COL-8.2.5-03X shall apply. [CONDITIONAL] USE-9.2.4-02B: If Extended LoIP is targeted, requirement COL-8.2.5-03A shall apply. USE-9.2.5-03: Validation of evidence shall be according to the requirements in clause 8.3.5 of the present document. USE-9.2.5-04: The identity proofing may use trusted registers and/or proof of access and/or documents and attestations as supplementary evidence. ETSI ETSI TS 119 461 V2.1.1 (2025-02) 58 USE-9.2.5-05: The identity proofing may use digital or physical identity documents as supplementary evidence. USE-9.2.5-06: The identity proofing may use eID means as supplementary evidence. USE-9.2.5-07: The identity proofing may use an additional digital signature using a different certificate as supplementary evidence. NOTE: The identity proofing context can require the use of specific supplementary evidence, e.g. validation of the identity against a population register. |
b392cb6367becafeef785f2390da35ed | 119 461 | 9.3 Use case for identity proofing of legal person | [CONDITIONAL] If identity proofing is of a legal person, the following requirements apply. NOTE 1: The same requirements apply for both Baseline and Extended LoIP. NOTE 2: The present clause does not assume the involvement of an authorized natural person representing the legal person, but in reality some human involvement is needed in the process. NOTE 3: The use of identity document and proof of access as evidence is considered out of scope for a legal person. USE-9.3-01: The identity proofing shall collect attributes according to the requirements in clause 8.2.2.2 of the present document. USE-9.3-02X: The identity proofing shall use documents and attestations as authoritative evidence witnessing the purpose of the identity proofing according to the requirements in clauses 8.2.8 and 8.3.8 of the present document. NOTE 4: Attestations can be in the form of qualified or non-qualified electronic attestation of attributes as defined by the amended eIDAS regulation [i.25]. [CONDITIONAL] USE-9.3-03X: If the legal person is registered in a trusted register, the requirements in clauses 8.2.6 and 8.3.6 of the present document shall apply. NOTE 5: The trusted register can be an authentic source as defined by the amended eIDAS regulation [i.25]. NOTE 6: The identity proofing context can require the use of specific documents and attestations or trusted registers as evidence. [CONDITIONAL] USE-9.3-03A: If the legal person is not registered in any trusted register, the attributes that would otherwise be collected and validated from a trusted register shall be collected and validated by other means providing the same confidence as a trusted register would do. EXAMPLE: In some countries, public sector bodies are not registered in official legal person registers. USE-9.3-04X: The identity proofing may use authentication by eID means as evidence according to the requirements in clauses 8.2.4 and 8.3.4 of the present document; requirement VAL-8.2.4-02X or VAL-8.2.4-02A apply dependent on whether the desired LoIP is Baseline or Extended. NOTE 7: While eID means authenticating a legal person exists in the market, such solutions are not common. USE-9.3-05X: The identity proofing may use a digital signature with a certificate as evidence according to the requirements in clauses 8.2.5 and 8.3.5 of the present document; requirement VAL-8.2.5-03X or VAL-8.2.5-03A apply dependent on whether the desired LoIP is Baseline of Extended. NOTE 8: A digital signature for a legal person is termed an 'electronic seal' by the amended eIDAS regulation [i.25]. NOTE 9: Digital signatures for legal persons (electronic seals) are used for different purposes. It is, in general, difficult to assess that identity proofing of the legal person is a legitimate use of the digital signature and certificate. The amended eIDAS regulation [i.25] Article 35 assigns to a qualified electronic seal only the presumption of integrity of the data sealed and correctness of the origin of the data. ETSI ETSI TS 119 461 V2.1.1 (2025-02) 59 USE-9.3-06: The identity proofing may, in addition to documents and attestations and trusted register as covered by requirements USE-9.3-02X and USE-9.3-03X, use additional trusted registers and/or proof of access and/or additional documents and attestations as supplementary evidence. 9.4 Use case for identity proofing of natural person representing legal person [CONDITIONAL] If identity proofing is of a natural person representing a legal person, the following requirements apply. [CONDITIONAL] USE-9.4-01X: If Baseline LoIP is targeted, the identity proofing for the natural person shall be done according to at least the requirements for one of the use cases for Baseline LoIP in clause 9.2 of the present document. [CONDITIONAL] USE-9.4-01A: If Extended LoIP is targeted, the identity proofing of the natural person shall be done according to the requirements for one of the use cases for Extended LoIP in clause 9.2 of the present document. NOTE 1: The identity proofing context can specify that only certain use cases are allowed. USE-9.4-01B: Attribute collection shall be according to the requirements of clause 8.2.2.3 of the present document. USE-9.4-02X: Evidence collection shall be according to the requirements in clause 8.2.9 of the present document. USE-9.4-03X: Evidence validation for the legal person shall be according to the relevant clauses 8.3.2 to 8.3.8 of the present document. [CONDITIONAL] USE-9.4-04: If the legal person is registered in a trusted register, the requirements in clauses 8.2.6 and 8.3.6 of the present document apply. NOTE 2: The trusted register can be an authentic source as defined by the amended eIDAS regulation [i.25]. [CONDITIONAL] USE-9.4-05: If the legal person is not registered in any trusted register, or the required attributes to validate the role of the natural person concerning the legal person are not present in the register, the required attributes for the legal person, including the natural person's authorization to represent the legal person, shall be validated by other means providing the same confidence as a trusted register would do. EXAMPLE: In some countries, public sector bodies are not registered in official legal person registers. USE-9.4-06: The identity proofing may, in addition to trusted register as covered by requirement USE-9.4-04, use additional trusted registers and/or proof of access and/or documents and attestations as supplementary evidence. 9.5 Use cases for additional identity proofing to enhance an identity proven by use of an eID from Baseline LoIP to Extended LoIP |
b392cb6367becafeef785f2390da35ed | 119 461 | 9.5.1 General requirements | [CONDITIONAL] If the applicant is a natural person, including a natural person representing a legal person, and the identity of the applicant has been proven to Baseline LoIP by means of authentication using an eID, and an enhancement to Extended LoIP is required, the following requirements apply. NOTE 1: Enhancing identity proofing for a legal person is out of scope of the present clause 9.5. EXAMPLE: The purpose of the identity proofing process can be to issue a qualified certificate for electronic signature according to the amended eIDAS regulation [i.25] where the applicant is in possession of an eID at LoA substantial. This eID can be used to reach Baseline LoIP with enhancement according to one of the use cases in the present clause 9.5 in order to reach Extended LoIP. USE-9.5.1-01: The identity proofing to Baseline LoIP shall be done by use of an eID according to the use case in clause 9.2.4 of the present document. ETSI ETSI TS 119 461 V2.1.1 (2025-02) 60 USE-9.5.1-02: The evidence used to enhance identity proofing from Baseline LoIP to Extended LoIP shall prove the same identity as the identity obtained from the identity proofing to Baseline LoIP. NOTE 2: Note requirements in clause 8.3.1 of the present document for handling deviations in identity attributes between different evidence. USE-9.5.1-03: The eID used for identity proofing to Baseline LoIP shall have been issued based on a separate identity proofing process from the identity proofing process to enhance to Extended LoIP. NOTE 3: The eID can be issued based on evidence that is also used to enhance the identity proofing, but not in the same process. USE-9.5.1-04: The identity proofing may use trusted registers and/or proof of access and/or documents and attestations as supplementary evidence. USE-9.5.1-05: The identity proofing may use digital or physical identity documents as supplementary evidence. USE-9.5.1-06: The identity proofing may use additional eID means as supplementary evidence. USE-9.5.1-07: The identity proofing may use existing digital signature means as supplementary evidence. 9.5.2 Use case for enhancing identity proofing to Extended LoIP by a full identity proofing using an identity document [CONDITIONAL] If the applicant is a natural person, including a natural person representing a legal person, and the identity of the applicant has been proven to Baseline LoIP by means of authentication using an eID, and an enhancement to Extended LoIP is done by use of identity proofing using an identity document and capture of face image of the applicant, the following requirements apply. NOTE: One application of this use case can be to capture a reference face image and identity attributes bound to that face image that can later be used together with the eID to enhance identity proofing from Baseline to Extended LoIP according to clause 9.5.3 of the present document. USE-9.5.2-01: The identity proofing to enhance from Baseline to Extended LoIP shall be according to the requirements for Extended LoIP from one of the use cases described in clauses 9.2.1, 9.2.2, or 9.2.3 of the present document. 9.5.3 Use case for enhancing identity proofing to Extended LoIP by use of a previously captured reference face image [CONDITIONAL] If the applicant is a natural person, including a natural person representing a legal person, and the identity of the applicant has been proven to Baseline LoIP by means of authentication using an eID, and an enhancement to Extended LoIP is done by capturing a face image of the applicant and binding this image to a previously captured reference face image bound previously to the applicant's identity, the following requirements apply. NOTE 1: For this use case, a face image and identity attributes bound to this face image are firstly captured for the applicant by a separate identity proofing process fulfilling requirements for Extended LoIP. The enhancement is done by using an eID to reach Baseline LoIP, and then in the same process capturing another face image according to the requirements for Extended LoIP and binding (comparing) this face image to the previously captured (reference) face image, and comparing the identity attributes bound to this (reference) face image to the identity attributes obtained from the eID. If these identity attributes match, an enhancement is obtained. USE-9.5.3-01: An identity proofing process fulfilling the requirements for Extended LoIP from one of the use cases described in clauses 9.2.1, 9.2.2, or 9.2.3 of the present document shall be used to capture a reference face image and to bind the necessary identity attributes to this reference face image. USE-9.5.3-02: All storage and transmission of the reference face image, the identity attributes bound to this reference face image, and the link between them shall be protected with respect to authenticity, integrity and confidentiality according to the identity proofing context. ETSI ETSI TS 119 461 V2.1.1 (2025-02) 61 NOTE 2: E.g. according to GDPR when the legislation of an EU Member State applies. The storage can be the responsibility of the IPSP, the TSP or another actor requesting the enhancement of the identity proofing, or another actor trusted by the IPSP to reliably store the reference face image and the identity attributes bound to this reference face image. NOTE 3: The record of the reference face image and the identity attributes bound to this reference face image will be used as an authoritative source of identity information. USE-9.5.3-03: The reference face image should be stored as a biometric template. USE-9.5.3-04: Capturing a face image to be used to enhance to Extended LoIP shall be done according to the requirements for Extended LoIP in clause 8.4.2 of the present document. USE-9.5.3-05: Binding of the face image used to enhance to Extended LoIP to the reference face image and the identity attributes bound to this reference face image shall be done either by automated face biometrics according to the requirements of clause 8.4.3 of the present document, or by a combination of automated face biometric according to the requirements of clause 8.4.3 of the present document and manual binding according to the requirements of clause 8.4.4 of the present document. USE-9.5.3-06: A reference face image and the identity attributes bound to this reference face image shall have a determined maximum validity period, which shall be stated by the IPSP in its practice statement. EXAMPLE 1: An updated reference face image and updated identity attributes can be required every 2-5 years. USE-9.5.3-07: The IPSP shall in its practice statement state any rules the IPSP applies for obsoleting a reference face image and the identity attributes bound to this reference face image. EXAMPLE 2: A reference face image can be deemed useful only as long as the identity document used in the identity proofing process to capture the reference face image and the identity attributes is valid. ETSI ETSI TS 119 461 V2.1.1 (2025-02) 62 Annex A (informative): Void ETSI ETSI TS 119 461 V2.1.1 (2025-02) 63 Annex B (informative): Threats to identity proofing The list of threats below is compiled by ENISA in the report "Remote ID proofing - Analysis of methods to carry out identity proofing remotely" [i.15]. The list is compiled from the replies received by ENISA from their stakeholders' questionnaire and considering various other literature on identity proofing as referenced by the ENISA report. It is a non-exhaustive list of threats, as all such lists will be not least due to the rapidly changing threat landscape in the identity proofing area. The threats are at a relatively coarse level that can be detailed in further versions of the present document. Such detailing can be based on further work by ENISA. Threats are described relatively to the process tasks described in clause 4.2 of the present document but with no specific threats for the issuing of proof task. The following threats are described for the initiation task. Table B.1: Example threats to the initiation task of identity proofing Initiation threats Coverage by ETSI TS 119 461 (the present document) [T_POLICY_FLAW] Policy flaw. A remote identification proofing process has to take into account a large number of different contexts and when some are not correctly understood when defining the policy, this can lead to several vulnerabilities. Identity proofing is required to identify the applicable identity proofing context and fulfil the constraints and requirements found by this context. Requirements to this effect are posed throughout clause 8. [T_PHISHING] User accepts process initiation from attacker. Some remote identity proofing may be exposed to phishing attacks. This is for example the case in processes with interruptions and reconnections using SMS or email. Full protection against phishing is not possible only by the TSP (or IPSP) since, if the applicant is tricked into visiting a phishing site, the TSP/IPSP will not even be aware of the situation. However, requirements in clauses 8.3.2 and 8.3.3 aim to ensure that even if an attacker uses a phishing site to trick the victim into a purported identity proofing process using identity documents, the attacker cannot later reuse the captured information to gain an identity proofing in the identity of the victim. Clauses 8.3.4 and 8.4.5 pose requirements for validation of eID means and digital signature means. Even when notified at eIDAS level substantial or high, some such means can be vulnerable to phishing attacks, which is out of control of the TSP/IPSP. The following threats are described for the attribute and evidence collection and validation tasks. Table B.2: Example threats to the attribute and evidence collection task of identity proofing Attribute and evidence collection and validation threats Coverage by ETSI TS 119 461 (the present document) [T_DOC_WEAK] Insufficiently secured Identity document. Some identity documents which are still valid in Europe do not have remotely verifiable security features strong enough to achieve the expected level of assurance. The starting point is that only passports and national identity cards are accepted. The identity proofing context will specify which documents to accept and can deny the use of documents that are of insufficient quality, like some old types of national identity cards. The identity proofing context can also accept other document types that have security to passports and national identity cards. ETSI ETSI TS 119 461 V2.1.1 (2025-02) 64 Attribute and evidence collection and validation threats Coverage by ETSI TS 119 461 (the present document) [T_DOC_IMPRECISE] Insufficiently precise Identity document. Some identity documents which are still valid in Europe do not include all the information necessary to uniquely and positively identify the applicant. Some do not have a unique identifier of the person and the information mentioned is not sufficient to avoid duplicates. For example, on the French identity card in force at the date of writing of this report, only the surname, first name, sex, date and name of the commune of birth appear. Cases of perfect duplicates on these elements are obviously common. Attributes collected are required to uniquely identify the person in the identity proofing context. When necessary attributes are not available from a single evidence, supplementary evidence can be used to prove the remaining attributes. This includes additional attributes for electronic attestations of attributes. [T_DOC_STOLEN] Stolen or revoked identity document. This case refers to an attacker using a stolen authentic document. This is a common identity theft scenario, most often combined with a presentation attack on the verification stage to deceive the software or the person who is going to verify that the picture on the identity document matches the person presenting it. If the stolen document is genuine and belongs to another person, the situation can be detected during the binding to applicant task. For identity documents, revocation checking is covered by VAL-8.3.2-04X and VAL-8.3.3-09, stating that if an online status service exists for the document, this is required to be used if practically possible. In many cases, online checking may not be provided, or access may be limited. Implementing access may be infeasible for documents that are seldomly encountered if many different documents are accepted. For eID means a proper authentication protocol will not accept the use of a revoked eID. For digital signature means, revocation checking is an integral part of signature and certificate validation. [T_DOC_FAKE] Counterfeited or forged identity document. A counterfeited document is a complete reproduction of an identity document while a forged document is an original document on which an attacker has modified one or more elements. In some cases, it may also be a stolen blank document personalized by the attacker. The imperfections of a counterfeited or forged document may be easier to conceal in the case of remote verification. See T_QUALITY_ALTERATION. Verification of security elements of a physical identity document is required to ensure that the document is not counterfeit and not tampered with. For remote identity proofing, video capture of the presentation of the document is required since a picture will not enable the same level of checking of security elements. Hybrid processing with both manual and automated, machine-learning technology for validation is recommended, while a manual process is allowed, but only for Baseline LoIP. See also the response to T_DOC_FANTASY below. For a digital identity document, validation of the signature on the information is required, also checking that the issuer is trusted according to the identity proofing context. [T_DOC_FANTASY] Fantasy or non-recognized identity document. A fantasy document is a document created from scratch without reference to an existing type of document. It is generally of a fairly coarse quality, although there are some relatively likely production channels for fancy documents. Identity documents issued by non-recognized states or by states that no longer exist can be classified in the same category. The registration officer is required to have access to authoritative sources of information on document appearance and validation, such as PRADO. This is needed to ensure that the document exists and has the expected appearance and to obtain knowledge of security elements that can be checked (also for T_DOC_FAKE above). [T_DOC_HUMAN_CAPABILITIES] Lack of operator capability or knowledge about [some] accepted identity documents. If an operator is involved in the data validation or verification phase, he may not have the capability or competence to perform this task satisfactorily. For example, he may be unfamiliar with the document or data source presented to him. An attacker will seek to produce a forged document relating to a type rarely encountered by operators to take advantage of their lack of expertise. If the identity proofing context allows the use of many different documents, the measures mentioned for T_DOC_FAKE and T_DOC_FANTASY above are crucial. Requirements for training of registration officers are posed to ensure competence. ETSI ETSI TS 119 461 V2.1.1 (2025-02) 65 Attribute and evidence collection and validation threats Coverage by ETSI TS 119 461 (the present document) [T_DOC_HUMAN_ERROR] Non-handled human error. If an operator is involved in the data validation or verification phase, he may make an error. Clear procedures are required to handle deviations, see requirements for the use cases in clause 9.2. Training is important, where requirements are posed both in VAL-8.3.3-13 for manual validation of a physical identity document and in clause 8.4.4 on binding to applicant by manual face verification. A hybrid use case combining automated and manual validation and binding to applicant is recommended, especially when physical identity documents are used, although manual processing is allowed. Still human errors cannot 100 % be eliminated. A fully automated process is possible when digital identity documents are used, removing the human error possibility. The same applies to use of eID means or digital signature means where validation is assumed to be fully automated. [T_DOC_SOFTWARE_PERFORMANCE] Software capability to authenticate identity documents not at the required level. If a software component is involved in the data validation or verification phase, it may not be able to validate or verify adequately the identity document it is presented. Indeed, there are hundreds (or even thousands if one takes into account every single model variation) of valid identity document in use around the world. Software could support documents in an uneven way. An attacker will seek to produce a forged document relating to a more permissive document type. This threat is relevant only when physical identity documents are used. VAL-8.3.3-20 states that if automated means and machine-learning technology are used to analyse physical identity documents, the algorithms and technology are required to be systematically tested against reference datasets and be kept updated to cope with changes in the threats and risk situation. [T_DOC_CHIP_READING_NOT ALLOWED] Chip reading not allowed. Reading the chip of an eMRTD (electronic Machine- Readable Travel Document); most passports are compliant with ICAO 9303 Part 10 [2] if done carefully is a good way to recover identity attributes with a high level of assurance. However, this operation, while technically possible in accordance with ICAO 9303 Part 10 [2], is not always legally possible in some EU countries such as France. This is an applicable threat with some national identity cards, like France as mentioned, and the restriction may only concern the face photo of the eMRTD and not the entire eMRTD. Additionally, not all existing national identity cards, and not all passports, have a chip with eMRTD. In all cases where a passport has eMRTD support, the eMRTD will expose a face photo. If the identity proofing context requires a digital identity document, then a passport or national identity card without eMRTD, or a national identity card where a face photo is unavailable with the eMRTD, cannot be used alone. The present document requires that an authoritative identity document includes a face photo since this is needed for binding to applicant. An eMRTD document that cannot expose a face photo can, however, be used in two ways: 1) As supplementary evidence of identity information, where binding to applicant is done by use of other evidence (another document, eID, digital signature). 2) As an eID, covered by the requirements for use of eID means in the present document, if the eMRTD document can be used in an authentication protocol. For example, the latter is the case for the German nPA eID building on eMRTD technology and the associated "eIDAS token" specification. The physical identity card containing the eMRTD can always be used as physical identity card, if this is allowed. ETSI ETSI TS 119 461 V2.1.1 (2025-02) 66 Attribute and evidence collection and validation threats Coverage by ETSI TS 119 461 (the present document) [T_QUALITY_ALTERATION] Artificial image or video quality alteration. When data collection is performed remotely, transmitted identity document image or video is altered in such a way as to degrade its quality to the point of making it difficult or even impossible to detect a forged or counterfeit document or to identify with confidence the applicant. This can be exploited by acting on the quality of the transmission, for example by artificially limiting the bandwidth, or by acting on the capture conditions, for example by reducing lighting. This is usually exploited in combination with one or more of the following to increase the likelihood of success. Clause 8.3.3 poses requirement for quality of the video stream and any images captured when a physical identity document is used remotely. [T_DOC_IMAGE] Image presented instead of genuine document. The attacker may attempt to mislead the system by using photos instead of legitimate document. This type of attack is particularly common on fully automatic systems that require a picture of the identity document. For example, the attacker will present a photo of a forged identity document. For this type of attack, a screen is usually placed in front of the camera in the place of the applicant. Photo of identity document is not accepted. Video is required. T_DOC_VIDEO] Video presented instead of genuine document. The attacker may attempt to mislead the system by using a video instead of legitimate document. This type of attack is particularly common on fully automatic systems that require a dynamic capture of the id document. For example, the attacker will present a video of a forged identity document including simulated OVD (Optically Variable Device are security features which show different information depending on the viewing angle and/or lightning conditions such as holograms, iridescent ink, etc.). For this type of attack, a screen is usually placed in front of the camera in the place of the applicant. VAL-8.3.3-02 requires that a real document is presented in front of the camera. Fully automated process is not allowed for remote identity proofing with physical identity documents; hybrid using combination of automated and manual validation is preferred, while a manual process is accepted. Measures for biometric presentation attack and injection attack prevention and detection as specified in clause 8.4.2 of the present document can be used to protect against also presentation and injection attacks for remote use of physical identity documents. [T_DOC_AI] AI generated video presented instead of genuine document. The attacker may attempt to mislead the system by altering the signal using a video manipulating technology in order to make it look like a genuine document. For instance, an AI-based software can generate data corresponding to an original identity document (for instance by including all artifacts produced by OVDs). This attack can be prepared in advance when the scenario is predictable or generated on the fly. It can use a screen or projector placed in front of the camera or directly replace the video stream generated by the camera. The possibilities of applying AI in the field of presentation attacks are significant and rapidly evolving. The video capture process is required to ensure that a real document is presented in front of the camera. Security elements of the document are required to be checked. Fully automated process is not allowed for remote identity proofing with physical identity documents; hybrid automated manual (preferred) or manual are required. Use of a deep fake video requires that the video is presented or injected into the identity proofing process. Measures for biometric presentation attack and injection attack prevention and detection as specified in clause 8.4.2 of the present document can be used to protect against also presentation and injection attacks for remote use of physical identity documents. T_DATA_INJECTION] Data injection. When a data capture system is set up, the possibility for the attacker to inject data directly by bypassing the capture system makes it possible to avoid the validation treatments that could be carried out on the applicant's equipment and to industrialise replay or AI-based presentation attacks. VAL-8.3.2-04X and VAL-8.3.3-02X cover protection against this type of attack for identity documents. Clause 8.4.2 poses requirements for protection against injection attacks for capture of face image of applicant. [T_DATA_ALTERATION] Data alteration before it is sent to the system. It may allow an attacker to modify the captured data. This vulnerability is particularly severe when part of the validation operations is carried out on the applicant's equipment. VAL-8.3.2-02 covers this threat for digital identity document, VAL-8.3.3-04X for physical identity document. Clause 8.4.2 poses requirements for capture of face image of applicant. ETSI ETSI TS 119 461 V2.1.1 (2025-02) 67 Attribute and evidence collection and validation threats Coverage by ETSI TS 119 461 (the present document) [T_REPLAY] Interception and replay of captured data. This can allow an attacker to carry out a replay attack. A loophole allows the attacker to capture data collected when verifying the identity of a legitimate applicant. Possibly through a Man In The Middle. The replay attack consists of using the captured data by presenting it again to the system, thus impersonating the legitimate applicant. VAL-8.3.2-04X and VAL-8.3.3-02X cover protection against this type of attack for identity documents. Clause 8.4.2 covers this for capture of face image of the applicant. The following threats are described for the binding to applicant task. NOTE: For the social engineering, bribery, and insider threats, dual control (two persons) could be considered. This is not normal practice, and the present document does not include requirements for dual control. Table B.3: Example threats to the binding to applicant task of identity proofing Binding to applicant threats Coverage by ETSI TS 119 461 (the present document) [T_FACE_IMAGE] Image presented instead of applicant's face. The attacker may attempt to mislead the system by using photos instead of the genuine face of the legitimate applicant. This type of attack is particularly common on fully automatic systems that require a picture of the applicant for binding with the presented identity document. For example, the attacker will present a photo of the legitimate applicant. For this type of attack, a screen or a printed photo can be placed in front of the camera in the place of the applicant's face. Several photos can be used to mislead systems that require some actions to be performed by the applicant (such as smile, close an eye, etc.). Requirements in clause 8.4.2 require presentation attack detection measures to protect against this threat. [T_FACE_VIDEO] Video presented instead of applicant's face. The attacker may attempt to mislead the system by using a video instead of genuine face of the legitimate applicant. This type of attack is particularly common on fully automatic systems that require a dynamic capture of the applicant's face for binding with the presented id document. For example, the attacker will present an edited video of the legitimate applicant performing the actions sequence requested by the system. For this type of attack, a screen is usually placed in front of the camera in the place of the applicant. Requirements in clause 8.4.2 require presentation attack detection measures to protect against this threat. [T_FACE_MASK] Mask. The attacker uses a mask usually to impersonate a person whose identity has been provided with a stolen identity document [T_DOC_STOLEN]. There is a wide variety of techniques easily available to produce a mask to match a person, ranging from a simple cut-out photo to a more realistic latex or silicone mask. Requirements in clause 8.4.2 require presentation attack detection measures to protect against this threat. This also protects against an attack using makeup and not mask. [T_FACE_AI] AI generated video presented instead of applicant's face. An AI-based software can generate in real time a video of the legitimate applicant mimicking the behaviour of the attacker. This attack can be prepared in advance when the scenario is predictable or generated on the fly. It can use a screen or projector placed in front of the camera or directly replace the video stream generated by the camera. The possibilities of applying AI in the field of presentation attacks are significant and rapidly evolving. Requirements for presentation and injection attack prevention and detection are posed in clause 8.4.2 to protect against this threat. In addition, BIN-8.4.2-03X requires measures to detect deep fake attacks. ETSI ETSI TS 119 461 V2.1.1 (2025-02) 68 Binding to applicant threats Coverage by ETSI TS 119 461 (the present document) [T_FACE_HUMAN_CAPABILITIES] Lack of operator's abilities to identify a person. If an operator is involved in the binding and verification step, he may not have the capabilities or competence to perform this task satisfactorily. For example, he may not have the ability to reliably identify a person from another ethnic group. This situation may be exploited by an attacker. Requirements are posed in clause 8.4.4 on how to do binding to applicant by manual face verification; this can be seen as an important addition by the present document. Clause 8.4.4 also poses requirements on training of the registration officer. [T_FACE_LOOKALIKE] Similar looking person. Solutions using biometrics to perform the binding step are vulnerable when people with strong similarities to the legitimate applicant attempt to mislead the system. This is the case, for example, with twins or even members of the same family when the identity documents used as a reference are a little old. Clause 8.4.3 poses requirement on the FAR when biometrics are used. For manual binding to applicant, the requirements in clause 8.4.4 are intended to protect against erroneous binding to applicant as far as reasonably possible. [T_FACE_OLD_REFERENCE] Old identity document. Even if it is not a good practice, identity documents can be valid during a long period (up to 15 years in France at the time this report is written for example). As a result, the time lapse between the date on which the photo on the identity document is taken and the date on which the verification is carried out may be significant and the appearance of the applicant may have changed significantly, especially for young people. COL-8.2.1-07 allows the identity proofing context to pose freshness requirements on identity information, which includes pictures and the evidence as such. With face biometrics, clause 8.4.3 poses requirements for FAR and FRR. With an old reference photo, both false rejection and false acceptance can be more likely, but the FAR requirement still applies. For manual face verification, clause 8.4.4 has requirements and an important measure is that the registration officer can rely on procedures where "no" is a justified answer, see requirements for all manual and hybrid use cases in clause 9.2. [T_FACE_POOR_QUALITY_REFERENCE] Poor quality photo on the identity document. Photographs on identity documents can be small, of poor quality, sometimes in shades of grey. This can be exploited for a "lookalike" attack. The requirements cited for T_FACE_OLD_REFERENCE above, except the freshness requirement, apply in this case as well. This is one reason why an automated, biometric procedure using physical identity documents cannot be expected to yield sufficiently reliable results. [T_FACE_SOFTWARE_PERFORMANCE] Performance of facial recognition software not at the expected level. When facial recognition is done or assisted by software, possible lack of performance of the software is a vulnerability. Indeed, the context (reference photo from an identity document and possibly a relatively old one) may lead to favouring the FRR (False Rejection Rate, i.e. the proportion of people who should have been accepted but were unduly rejected) rather than the FAR (False Acceptance Rate, i.e. the rate of people who should have been rejected but who nevertheless broke into the system). Clause 8.4.3 poses requirements for FAR and FRR for biometrics, that the stated goals for these parameters are fulfilled, and that means are required to be systematically tested against reference datasets and kept updated to cope with changes in the threats and risk situation. [T_DATA_INCONSISTENCY_INACCURACY] Inconsistency or inaccuracy of reference data. When reference data is used to validate or verify an identity, it is possible in some configurations to find cases of inconsistent or incomplete reference data, for example, differences in transliteration, homonyms, etc. For instance, during the remote identity proofing for a legal person, identification of a legal representative is key and it may occur that the person being the legal representative is not uniquely defined by the registered identity attributes thus allowing legal person impersonation by anyone sharing the common set of registered identity attributes. The management policy (automatic or manual) of these cases can constitute a loophole that can be exploited by an attacker. Requirements in clause 8.3.1 demand clear procedures to resolve conflicts between name representation from different sources/evidence: Encoding (character representation, transcription, lack of diacritics), differences in representation of names (initials versus full name, missing middle names change of name not reflected in evidence, truncation etc.). When supplementary evidence is used, VAL-8.3.6-06, VAL-8.3.7-05, and VAL-8.3.8-05 requires that the procedure to apply in case of discrepancies in attributes obtained from the supplementary evidence and from other evidence is defined; meaning which evidence is authoritative regarding the attribute values. ETSI ETSI TS 119 461 V2.1.1 (2025-02) 69 Binding to applicant threats Coverage by ETSI TS 119 461 (the present document) [T_SOCIAL ENGINEERING] Social engineering. If an operator is involved in the data validation or verification phase and interaction with the applicant is part of the process, it is possible for an attacker to convince the operator to improperly validate an identity verification operation, for instance by appealing to his sensitivity. Requirements for thorough procedures that are required to be followed, as posed for all manual and hybrid use cases in clause 9.2. Additionally, the training requirements cited earlier for registration officers contribute to counter this threat. [T_BRIBERY] Bribery of an operator. If an operator is involved in the data validation or verification phase and interaction with the applicant is part of the process, it is possible for an attacker to convince the operator to improperly validate an identity verification operation by bribing him. ETSI EN 319 401 [1] has requirements for screening of personnel. If several registration officers are available, VAL-8.3.3-13 requires tasks to be allocated randomly between them. [T_INSIDER] Insider. If an operator is involved in the data validation or verification phase and interaction with the applicant is part of the process, it is possible for an attacker to have the remote identity proofing service provider hire a malicious operator who will validate identities that should normally have been rejected. ETSI EN 319 401 [1] has requirements for screening of personnel. If several registration officers are available, VAL-8.3.3-13 requires tasks to be allocated randomly between them. [T_REVOKED_CERTIFICATE] Revoked certificate. Use of revoked certificate as a proof of identity without checking its status. For all cases where certificates are used, requirements are posed to check their validity, which includes revocation checking. This applies when digital signature means are used (clause 8.3.5) as well as for use of digitally signed material with other evidence (e.g. signed eMRTD digital document, signed documents and attestations). [T_EMRTD_WEAK_IMPLEMENTATION] eMRTD weak implementation. Security of eMRTD relies on the country or organization certificate. There is no complete official master list of these certificates. Using an unsecure list of certificates or not using that security make the system vulnerable to forged eMRTD. A poor implementation of security mechanisms ensuring data integrity and chip presence makes the solution vulnerable to various attacks such as Man in the middle, eMRTD cloning, etc. COL-8.2.3-03 requires that for each identity proofing context supported, a list of the documents accepted is required to be identified by the identity proofing practice statement, and VAL-8.3.2-02 requires that a digital identity document is accepted only if the issuer's digital signature is successfully validated. [T_BLACKBOX] Blackbox. eID, IdP, or any other digital proof of identity related threats should be handled as a blackbox threat. Any vulnerability on these systems may lead to a vulnerability on the remote identity proofing system. Quality requirements are posed on digital identity document, eID, digital signature and supplementary evidence. No evidence can be used unless its quality is assessed. The identity proofing context can decide for example that an eID alone is not sufficient, due to the risk that an attacker controls the victims eID or the risk of a social engineering attack, supplementary evidence can be required. ETSI ETSI TS 119 461 V2.1.1 (2025-02) 70 The following general threats that are not specific to any task of the identity proofing process, are described. Table B.4: Example general threats to identity proofing General threats Coverage by ETSI TS 119 461 (the present document) [T_CONSTRAINT] Applicant under constraint. During remote identity proofing, the applicant may be threatened and perform this operation under constraint. This vulnerability, which also exists in face-to-face interviews, is made easier to exploit in the context of a remote verification. The requirements in clause 8.4.2 on video provides better protection against this type of attack than use of merely photo. [T_PROCESS_FLAW] Process flaw. Generally speaking, any flaw/inaccuracy in the remote identity verification process can constitute a loophole that can be exploited by an attacker. The present document does not pose requirements on processes but describes use cases in clause 9 and Annex C that are recommended, and strict requirements in clause 8 for the tasks of an identity proofing process. Processes are recommended to be audited and approved/supervised when identity proofing is done for a (qualified) trust service. [T_DELEGATION] Delegated operator. Delegation of responsibilities could weaken the process. If the remote identity proofing is delegated to another organization (e.g. a bank asking an identity provider to do so, or a parent company with respect to a more specialized subsidiary), it is possible that some ambiguity in this outsourcing arises as soon as organizational boundaries are crossed. This could loosen the security of the entire process. If identity proofing is outsourced from a TSP to a specialized IPSP, the IPSP is required to adhere to the requirements of the present document and be audited accordingly. A TSP is clearly responsible for identity proofing for its services and is required to manage subcontracting accordingly. The identity proofing context is required to be identified, and its requirements obeyed. ETSI ETSI TS 119 461 V2.1.1 (2025-02) 71 Annex C (normative): Use cases for identity proofing for EU qualified trust services C.1 Introduction This annex specifies requirements for identity proofing targeted explicitly to fulfil requirements of the original eIDAS regulation [i.1] and the amended eIDAS regulation [i.25]. Requirements for identity proofing are posed in Article 24.1 of the original eIDAS regulation [i.1] for issuing of qualified certificates, in Article 24.1, 24.1a, and 24.1b of the amended eIDAS regulation [i.25] for issuing of qualified certificates and qualified electronic attestation of attributes, and in Article 44 (same requirements for both the original [i.1] and the amended [i.25] eIDAS regulation) for identification of senders and addressees of Qualified Electronic Registered Delivery Services (QERDS). For other qualified trust services, neither the original nor the amended eIDAS regulation [i.25] pose specific requirements for identity proofing. Article 24.1 of the original eIDAS regulation [i.1] is superseded by Article 24.1, 24.1a, and 24.1b of the amended eIDAS regulation [i.25] but the amended eIDAS regulation [i.25] Article 51.2b specifies a transitional measure where a qualified trust service provider that is granted the qualified status before entry into force of the amended eIDAS regulation [i.25] is allowed to continue to rely on the methods set out in Article 24.1 of the original eIDAS regulation [i.1] until 24 months after the entry into force of the amended eIDAS regulation [i.25]. Hence, the present document includes use cases to fulfil the requirements of Article 24.1 of the original eIDAS regulation [i.1] in clause C.2. Regarding qualified electronic attestation of attributes, Annex VI of the amended eIDAS regulation [i.25] specifies a minimum list of attributes for which EU Member States are required to provide means for verification against authentic sources. Many of these attributes cannot be expected to be provided by authoritative evidence as defined by the present document, meaning supplementary evidence is required for these attributes. The amended eIDAS regulation [i.25] however has no requirement for a qualified electronic attestation of attributes to be based (solely) on authentic sources; other supplementary evidence can be used. Qualified electronic attestations of attributes can include other attributes than those defined by Annex VI of the amended eIDAS regulation [i.25]. C.2 Use cases for issuing of qualified certificate according to Article 24.1 of the original eIDAS regulation C.2.1 Use case for identity proofing by physical presence of the applicant [CONDITIONAL] If identity proofing is done for the purpose of issuing qualified certificate according to Article 24.1 of the original eIDAS regulation [i.1], and identity proofing is done by physical presence according to letter a of this Article, the following requirements apply. QTS-C.2.1-01: The requirements of clause 9.2.1.1 of the present document shall apply. QTS-C.2.1-02: The requirements of either clause 9.2.1.2 or clause 9.2.1.3 or clause 9.2.1.4 of the present document shall apply. ETSI ETSI TS 119 461 V2.1.1 (2025-02) 72 C.2.2 Use case for identity proofing by authentication using eID means [CONDITIONAL] If identity proofing is done for the purpose of issuing qualified certificate according to Article 24.1 of the original eIDAS regulation [i.1], and identity proofing is done by authentication using eID means according to letter b of this Article, the following requirements apply. QTS-C.2.2-01: The requirements for Baseline LoIP of clause 9.2.4 of the present document shall apply. QTS-C.2.2-02: The eID means shall be eIDAS substantial eID or eIDAS high eID. QTS-C.2.2-03: The eID means shall have been issued based on physical presence of the natural person or an authorized representative of the legal person. C.2.3 Use case for identity proofing by certificate of qualified electronic signature or qualified electronic seal [CONDITIONAL] If identity proofing is done for the purpose of issuing qualified certificate according to Article 24.1 of the original eIDAS regulation [i.1], and identity proofing is done by the certificate of a qualified electronic signature or qualified electronic seal according to letter c of this Article, the following requirements apply. QTS-C.2.3-01: The requirements of clause 9.2.5 of the present document shall apply. [CONDITIONAL] QTS-C.2.3-02: If the applicant is a natural person or a natural person representing a legal person, the digital signature shall be a qualified electronic signature. [CONDITIONAL] QTS-C.2.3-03: If the applicant is a legal person, the digital signature shall be a qualified electronic seal or a qualified electronic signature. QTS-C.2.3-04: The qualified certificate shall have been issued based on identity proofing either by a prior physical presence of the natural person or of an authorized representative of the legal person, or by an eIDAS substantial eID or an eIDAS high eID that is in turn based on identity proofing by the physical presence of the natural person or an authorized representative of the legal person. QTS-C.2.3-05: The signature shall be validated by eIDAS signature validation. NOTE: Conformant to eIDAS Article 32, which has identical text in both the original and the amended eIDAS regulation [i.25]. QTS-C.2.3-06: The signature should be validated according to ETSI TS 119 172-4 [7]. C.2.4 Use case for identity proofing by other identification means [CONDITIONAL] If identity proofing is done for the purpose of issuing qualified certificate according to Article 24.1 of the original eIDAS regulation [i.1], and identity proofing is done by other identification means according to letter d of this Article, the following requirements apply. NOTE: Baseline LoIP is considered sufficient for identity proofing under the requirements of the original eIDAS regulation [i.1]. [CONDITIONAL] QTS-C.2.4-01: If attended remote identity proofing using physical or digital identity document as authoritative evidence is used, the requirements of clause 9.2.2.1 of the present document shall apply. [CONDITIONAL] QTS-C.2.4-02: If attended remote identity proofing using physical or digital identity document as authoritative evidence is used, the requirements of either clause 9.2.2.2 or 9.2.2.3 of the present document shall apply. [CONDITIONAL] QTS-C.2.4-03: If unattended remote identity proofing using physical or digital identity document as authoritative evidence is used, the requirements of clause 9.2.3.1 of the present document shall apply. ETSI ETSI TS 119 461 V2.1.1 (2025-02) 73 [CONDITIONAL] QTS-C.2.4-04: If unattended remote identity proofing using physical or digital identity document as authoritative evidence is used, the requirements of either clause 9.2.3.2 or 9.2.3.3 or 9.2.3.4 of the present document shall apply. QTS-C.2.4-05: The identity proofing method shall be recognized at national level by the EU Member State in which the qualified trust service provider is registered. QTS-C.2.4-06: The identity proofing method shall in terms of reliability provide equivalent assurance of the identity proofing to physical presence as determined at national level by the EU Member State in which the qualified trust service provider is registered. QTS-C.2.4-07: The fulfilment of requirement QTS-C.2.4-06 shall be confirmed by a conformity assessment body. C.2.5 Use case for identity proofing of legal person [CONDITIONAL] If identity proofing is done for the purpose of issuing qualified certificate according to Article 24.1 of the original eIDAS regulation [i.1], and identity proofing is of a legal person, the following requirements apply. QTS-C.2.5-01: The requirements of clause 9.3 of the present document shall apply. [CONDITIONAL] QTS-C.2.5-02: Where applicable, the legal person registration number as stated in the appropriate official, trusted register shall be collected and validated. NOTE: According to Annex III of the original eIDAS regulation [i.1]. Some legal persons, e.g. public sector bodies in some EU Member States, can be exempted from registration in official registers. C.2.6 Use case for identity proofing of natural person representing legal person [CONDITIONAL] If identity proofing is done for the purpose of issuing qualified certificate according to Article 24.1 of the original eIDAS regulation [i.1], and identity proofing is of a natural person representing a legal person, the following requirements apply. QTS-C.2.6-01: The requirements of clause 9.4 of the present document for Baseline LoIP or Extended LoIP shall apply. QTS-C.2.6-02: The identity of the natural person shall be proven according to the requirements of clause C.2.1, or C.2.2, or C.2.3, or C.2.4 of the present document. [CONDITIONAL] QTS-C.2.6-03: Where applicable, the legal person registration number as stated in the appropriate official, trusted register shall be collected and validated. NOTE: According to Annex III of the original eIDAS regulation [i.1]. Some legal persons, e.g. public sector bodies in some EU Member States, can be exempted from registration in official registers. ETSI ETSI TS 119 461 V2.1.1 (2025-02) 74 C.3 Use cases for issuing of qualified certificate or qualified electronic attestation of attributes according to Article 24.1, 24.1a, and 24.1b of the amended eIDAS regulation C.3.1 Use case for identity proofing by physical presence of the applicant [CONDITIONAL] If identity proofing is done for the purpose of issuing qualified certificate or qualified electronic attestation of attributes according to Article 24.1, 24.1a, or 24.1b of the amended eIDAS regulation [i.25], and identity proofing is done by physical presence according to letter d of Article 24.1a and/or letter e of Article 24.1b, the following requirements apply. QTS-C.3.1-01: The requirements for Extended LoIP of clause 9.2.1.1 of the present document shall apply. QTS-C.3.1-02: The requirements for Extended LoIP of either clause 9.2.1.2 or 9.2.1.3 or 9.2.1.4 of the present document shall apply. QTS-C.3.1-03: The procedure for physical presence shall be in accordance with national law in the EU Member State where the qualified trust service provider is registered. QTS-C.3.1-04: Identity proofing for any further attributes additional to the unique identity of the person shall be either according to the requirements of one of the clauses C.3.1, C.3.2, C.3.3, or C.3.4 of the present document, or by means of qualified electronic attestation of attributes, or by means of supplementary evidence that according to the identity proofing context is regarded as authoritative evidence according to the requirements of clauses 8.2.6 and 8.3.6 (trusted register), and/or clauses 8.2.7 and 8.3.7 (proof of access), and/or clauses 8.2.8 and 8.3.8 (documents and attestations) of the present document. NOTE: This requirement answers Article 24.1b of the amended eIDAS regulation [i.25] when identity proofing of the applicant's unique identity is by physical presence according to clause C.3.1 of the present document. C.3.2 Use case for identity proofing by authentication using eID means [CONDITIONAL] If identity proofing is done for the purpose of issuing qualified certificate or qualified electronic attestation of attributes according to Article 24.1, 24.1a, or 24.1b of the amended eIDAS regulation [i.25], and identity proofing is done by authentication using eID means according to letter a of Article 24.1a and/or letter a of Article 24.1b, the following requirements apply. QTS-C.3.2-01: The requirements for Extended LoIP of clause 9.2.4 of the present document shall apply. QTS-C.3.2-02: The eID means shall conform to eIDAS high eID. QTS-C.3.2-03: The eID means shall be eIDAS notified eID. NOTE 1: All European Digital Identity Wallets will fulfil requirements QTS-C.3.2-02 and C.3.2-03. QTS-C.3.2-04: Identity proofing for any further attributes additional to the unique identity of the person shall be either according to the requirements of one of the clauses C.3.1, C.3.2, C.3.3, or C.3.4 of the present document, or by means of qualified electronic attestation of attributes, or by means of supplementary evidence that according to the identity proofing context is regarded as authoritative evidence according to the requirements of clauses 8.2.6 and 8.3.6 (trusted register), and/or clauses 8.2.7 and 8.3.7 (proof of access), and/or clauses 8.2.8 and 8.3.8 (documents and attestations) of the present document. ETSI ETSI TS 119 461 V2.1.1 (2025-02) 75 NOTE 2: This requirement answers Article 24.1b of the amended eIDAS regulation [i.25] when identity proofing of the applicant's unique identity is by authentication using eID means according to clause C.3.2 of the present document. C.3.3 Use case for identity proofing by certificate of qualified electronic signature or qualified electronic seal [CONDITIONAL] If identity proofing is done for the purpose of issuing qualified certificate or qualified electronic attestation of attributes according to Article 24.1, 24.1a, or 24.1b of the amended eIDAS regulation [i.25], and identity proofing is done by the certificate of a qualified electronic signature or qualified electronic seal according to letter b of Article 24.1a and/or letter b of Article 24.1b, the following requirements apply. QTS-C.3.3-01: The requirements for Extended LoIP of clause 9.2.5 of the present document shall apply. [CONDITIONAL] QTS-C.3.3-02: If the applicant is a natural person or a natural person representing a legal person, the digital signature shall be a qualified electronic signature. [CONDITIONAL] QTS-C.3.3-03: If the applicant is a legal person, the digital signature shall be a qualified electronic seal or a qualified electronic signature. QTS-C.3.3-04: The qualified certificate used for the identity proofing shall have been issued based on identity proofing by one of the following alternatives a) physical presence according to clause C.3.1 or C.2.1 of the present document; b) eID means according to clause C.3.2 of the present document; c) eID means according to clause C.2.2 of the present document when the eID is both an eIDAS high eID and an eIDAS notified eID; d) Other identification means according to clause C.3.4 of the present document. NOTE 1: This excludes use of qualified certificates issued under the original eIDAS regulation [i.1], except when these certificates are issued based on physical presence, where the requirements are at same level as in the amended eIDAS regulation [i.25], or are issued based on an eID that fulfils the requirements set by both the original eIDAS regulation [i.1] and the amended eIDAS regulation [i.25]. NOTE 2: Specification of a certificate extension to mediate the identity proofing method used to issue a certificate is ongoing in ETSI TC ESI. QTS-C.3.3-05: Identity proofing for any further attributes additional to the unique identity of the person shall be either according to the requirements of one of the clauses C.3.1, C.3.2, C.3.3, or C.3.4 of the present document, or by means of qualified electronic attestation of attributes, or by means of supplementary evidence that according to the identity proofing context is regarded as authoritative evidence according to the requirements of clauses 8.2.6 and 8.3.6 (trusted register), and/or clauses 8.2.7 and 8.3.7 (proof of access), and/or clauses 8.2.8 and 8.3.8 (documents and attestations) of the present document. NOTE 3: This requirement answers Article 24.1b of the amended eIDAS regulation [i.25] when identity proofing of the applicant's unique identity is by certificate of qualified electronic signature or qualified electronic seal according to clause C.3.3 of the present document. QTS-C.3.3-06: The signature shall be validated according to eIDAS signature validation. NOTE 4: Conformant to eIDAS Article 32, which has identical text in both the original and the amended eIDAS regulation [i.25]. QTS-C.3.3-07: The signature should be validated according to ETSI TS 119 172-4 [7]. ETSI ETSI TS 119 461 V2.1.1 (2025-02) 76 C.3.4 Use case for identity proofing by other identification means [CONDITIONAL] If identity proofing is done for the purpose of issuing qualified certificate or qualified electronic attestation of attributes according to Article 24.1, 24.1a, or 24.1b of the amended eIDAS regulation [i.25], and identity proofing is done by other identification means according to letter c of Article 24.1a and/or letter d of Article 24.1b, the following requirements apply. [CONDITIONAL] QTS-C.3.4-01: If attended remote identity proofing using physical or digital identity document as authoritative evidence is used, the requirements for Extended LoIP of clause 9.2.2.1 of the present document shall apply. [CONDITIONAL] QTS-C.3.4-02: If attended remote identity proofing using physical or digital identity document as authoritative evidence is used, the requirements for Extended LoIP of clause 9.2.2.3 of the present document shall apply. NOTE 1: Manual operation as described in clause 9.2.2.2 is not considered to support Extended LoIP and hence not issuing of qualified certificates or qualified electronic attestations of attributes according to the amended eIDAS regulation [i.25]. [CONDITIONAL] QTS-C.3.4-03: If unattended remote identity proofing using physical or digital identity document as authoritative evidence is used, the requirements for Extended LoIP of clause 9.2.3.1 of the present document shall apply. [CONDITIONAL] QTS-C.3.4-04: If unattended remote identity proofing using physical or digital identity document as authoritative evidence is used, the requirements for Extended LoIP of either clause 9.2.3.3 or clause 9.2.3.4 of the present document shall apply. NOTE 2: Manual operation as described in clause 9.2.3.2 is not considered to support Extended LoIP and hence not issuing of qualified certificates or qualified electronic attestations of attributes according to the amended eIDAS regulation [i.25]. [CONDITIONAL] QTS-C.3.4-05: If identity proofing is done by enhancing an identity proofing for Baseline LoIP using eID as authoritative evidence, the requirements of clause 9.5 of the present document shall apply. [CONDITIONAL] QTS-C.3.4-06: If identity proofing is done by enhancing an identity proofing for Baseline LoIP using eID as authoritative evidence, the eID used as authoritative evidence shall be an eIDAS substantial eID or eIDAS high eID and either: a) be an eIDAS notified eID; or b) be an eIDAS certified eID; or c) have been assessed by an independent conformity assessment body to fulfil the requirements for an eIDAS substantial eID or eIDAS high eID. NOTE 3: Notified according to Article 9 of the amended eIDAS regulation [i.25], or certified according to Article 12a of the amended eIDAS regulation [i.25], or assessed by independent conformity assessment. QTS-C.3.4-07: Identity proofing for any further attributes additional to the unique identity of the person shall be either according to the requirements of one of the clauses C.3.1, C.3.2, C.3.3, or C.3.4 of the present document, or by means of qualified electronic attestation of attributes, or by means of supplementary evidence that according to the identity proofing context is regarded as authoritative evidence according to the requirements of clauses 8.2.6 and 8.3.6 (trusted register), and/or clauses 8.2.7 and 8.3.7 (proof of access), and/or clauses 8.2.8 and 8.3.8 (documents and attestations) of the present document. NOTE 4: This requirement answers Article 24.1b of the amended eIDAS regulation [i.25] when identity proofing of the applicant's unique identity is by other identification means according to clause C.3.4 of the present document. QTS-C.3.4-08: The conformity of the identity proofing method with the requirements of this clause C.3.4 of the present document shall be confirmed by a conformity assessment body. ETSI ETSI TS 119 461 V2.1.1 (2025-02) 77 NOTE 5: The requirement of letter c of Article 24.1a of the amended eIDAS regulation [i.25] is for the conformity assessment to confirm that the identification method ensures the identification of a natural person with a high level of confidence. The use cases referred by requirements QTS-C.3.4-01 to QTS-C.3.4-05 are all presumed to provide identity proofing with a high level of confidence. The requirement of letter d of Article 24.1b of the amended eIDAS regulation [i.25] is for the conformity assessment to confirm that the verification of attributes is done with a high level of confidence. Requirement QTS-C.3.4-07 is intended to ensure such high level of confidence. C.3.5 Use case for identity proofing of legal person [CONDITIONAL] If identity proofing is done for the purpose of issuing qualified certificate or qualified electronic attestation of attributes according to Article 24.1, 24.1a, or 24.1b of the amended eIDAS regulation [i.25], and identity proofing is of a legal person, the following requirements apply. QTS-C.3.5-01: Identity proofing for the unique identity of the legal person shall be according to the requirements for Extended LoIP of clause 9.3 of the present document. QTS-C.3.5-02: Identity proofing for any further attributes additional to the unique identity of the legal person shall be either according to the requirements for Extended LoIP of clause 9.3 of the present document or by means of qualified electronic attestation of attributes. NOTE 1: Clause 9.3 of the present document covers use of all of the means authentication by eID, certificate of digital signature or seal, trusted register, proof of access, and documents and attestations for identity proofing of further attributes of a legal person. [CONDITIONAL] QTS-C.3.5-03: Where applicable, the legal person registration number as stated in the appropriate official, trusted register shall be collected and validated. NOTE 2: According to Annex III of the amended eIDAS regulation [i.25]. Some legal persons, e.g. public sector bodies in some EU Member States, can be exempted from registration in official registers. C.3.6 Use case for identity proofing of natural person representing legal person [CONDITIONAL] If identity proofing is done for the purpose of issuing qualified certificate or qualified electronic attestation of attributes according to Article 24.1, 24.1a, or 24.1b of the amended eIDAS regulation [i.25], and identity proofing is of a natural person representing a legal person, the following requirements apply. QTS-C.3.6-01: The requirements for Extended LoIP of clause 9.4 of the present document shall apply. QTS-C.3.6-02: The identity of the natural person shall be proven according to the requirements of clause C.3.1, or C.3.2, or C.3.3, or C.3.4 of the present document. QTS-C.3.6-03: Identity proofing for any further attributes additional to the unique identity of the legal person and/or the natural person shall be either according to the requirements for Extended LoIP of clause 9.4 of the present document or by means of qualified electronic attestation of attributes. NOTE 1: Clause 9.4 of the present document covers use of trusted register, proof of access, and documents and attestations for identity proofing of further attributes of a natural person, legal person, and the relationship between the natural and the legal person. [CONDITIONAL] QTS-C.3.6-04: Where applicable, the legal person registration number as stated in the appropriate official, trusted register shall be collected and validated. NOTE 2: According to Annex III of the amended eIDAS regulation [i.25]. Some legal persons, e.g. public sector bodies in some EU Member States, can be exempted from registration in official registers. ETSI ETSI TS 119 461 V2.1.1 (2025-02) 78 C.4 Use case for qualified electronic registered delivery services according to Article 44 of the amended eIDAS regulation NOTE: Requirements for identification of senders and addressees of Qualified Electronic Registered Delivery Services (QERDS) are not changed from the original to the amended eIDAS regulation [i.25]. In line with current practice for deployed QERDSs, the requirement for identity proofing is set to Baseline LoIP according to clause C.2 of the present document. Preamble (52) to the amended eIDAS regulation [i.25] can be read as requiring a higher level of identity proofing. This is reflected in conditional requirements for Extended LoIP where authenticity and/or confidentiality of the information delivered is critical. QTS-C.4-01: Identity proofing for senders and addressees of a QERDS shall at a minimum be done by application of the relevant use case from clause C.2 of the present document. [CONDITIONAL] QTS-C.4-02: If the QERDS supports deliveries where the authenticity of the information is critical, identity proofing for the relevant senders of the QERDS should be done by application of the relevant use case from clause C.3 of the present document. [CONDITIONAL] QTS-C.4-03: If the QERDS supports deliveries where the confidentiality of the information is critical, identity proofing for the relevant addressees of the QERDS should be done by application of the relevant use case from clause C.3 of the present document. ETSI ETSI TS 119 461 V2.1.1 (2025-02) 79 Annex D (informative): Mapping to applicable requirements of the amended eIDAS regulation Identity proofing is not in itself a trust service, but a trust service component. Table D.1 below covers the requirements from the amended eIDAS regulation [i.25] that explicitly apply to identity proofing. When a QTSP subcontracts an IPSP for identity proofing, the IPSP will need to fulfil certain eIDAS requirements especially regarding risk management and security. These aspects are not covered in the table below because fulfilment of eIDAS requirements will be part of the contract between the QTSP and the IPSP and responsibilities can be divided between them in different ways. The present document aids in fulfilment of relevant eIDAS requirements by requiring an IPSP to handle service management and operations according to the relevant requirements from ETSI EN 319 401 [1] and to manage risks related to identity proofing in accordance with ETSI EN 319 401 [1] and clause 5 of the present document. The amended eIDAS regulation [i.25] Article 51.2b specifies a transitional measure where a QTSP that is granted the qualified status before entry into force of the amended eIDAS regulation [i.25] is allowed to continue to rely on the methods set out in Article 24.1 of the original eIDAS regulation [i.1] until 24 months after the entry into force of the amended eIDAS regulation [i.25]. The table below only considers the requirements of the amended eIDAS regulation [i.25]. Table D.1: Mapping of eIDAS requirements to requirements of the present document Regulation Article 5 Pseudonyms in electronic transaction ETSI TS 119 461 (1) Without prejudice to specific rules of Union or national law requiring users to identify themselves or to the legal effect given to pseudonyms under national law, the use of pseudonyms that are chosen by the user shall not be prohibited. COL-8.2.2.1-02A and note. Regulation Article 15 Accessibility for persons with disabilities and special needs ETSI TS 119 461 The provision of electronic identification means, trust services and end- user products that are used in the provision of those services shall be made available in plain and intelligible language, in accordance with the United Nations Convention on the Rights of Persons with Disabilities and with the accessibility requirements of Directive (EU) 2019/882, thus also benefiting persons who experience functional limitations, such as elderly people, and persons with limited access to digital technologies. INI-8.1-04 and note. ETSI ETSI TS 119 461 V2.1.1 (2025-02) 80 Regulation Article 24 Requirements for qualified trust service providers ETSI TS 119 461 reference (1) When issuing a qualified certificate or a qualified electronic attestation of attributes, a qualified trust service provider shall verify the identity and, if applicable, any specific attributes of the natural or legal person to whom the qualified certificate or the qualified electronic attestation of attributes is to be issued. Clause C.3. (1a) The verification of the identity referred to in paragraph 1 shall be performed, by appropriate means, by the qualified trust service provider, either directly or by means of a third party, on the basis of one of the following methods or, when needed, on a combination thereof in accordance with the implementing acts referred to in paragraph 1c: Regarding combination, QTS-C.3.4-05 and QTS-C.3.4-06 cover use of an eID at LoA 'substantial' plus additional means. Note the possibility to use trusted registers (e.g. authentic sources), attributes and attestations (e.g. (Q)EAA), and proof of access in combination with the methods (a)-(d) below. (a) by means of the European Digital Identity Wallet or a notified electronic identification means which meets the requirements set out in Article 8 with regard to assurance level high; Clause C.3.2. In addition, clause C.3.5 for legal person. In addition, clause C.3.6 for natural person representing legal person. (b) by means of a certificate of a qualified electronic signature or of a qualified electronic seal, issued in compliance with point (a), (c) or (d); Clause C.3.3. In addition, clause C.3.5 for legal person. In addition, clause C.3.6 for natural person representing legal person. (c) by using other identification methods which ensure the identification of the person with a high level of confidence, the conformity of which shall be confirmed by a conformity assessment body; Clause C.3.4. In addition, clause C.3.5 for legal person. In addition, clause C.3.6 for natural person representing legal person. (d) through the physical presence of the natural person or of an authorised representative of the legal person, by means of appropriate evidence and procedures, in accordance with national law. Clause C.3.1. In addition, clause C.3.5 for legal person. In addition, clause C.3.6 for natural person representing legal person. (1b) The verification of the attributes referred to in paragraph 1 shall be performed, by appropriate means, by the qualified trust service provider, either directly or by means of a third party, on the basis of one of the following methods or, where necessary, on a combination thereof, in accordance with the implementing acts referred to in paragraph 1c: Combinations are implicitly allowed from the requirements below. The requirements cited are for all use cases, where unique identity is proven by one means, additional attributes can be proven by any other applicable means. (a) by means of the European Digital Identity Wallet or a notified electronic identification means which meets the requirements set out in Article 8 with regard to assurance level high; QTS-C3.1-04, QTS-C.3.2-04, QTS-C-3-3-05, QTS-C.3.4-07. In addition, QTS-C.3.5-02 for legal person. In addition, QTS-C.3.6-03 for natural person representing legal person. (b) by means of a certificate of a qualified electronic signature or of a qualified electronic seal, issued in accordance with paragraph 1a, point (a), (c) or (d); QTS-C3.1-04, QTS-C.3.2-04, QTS-C-3-3-05, QTS-C.3.4-07. In addition, QTS-C.3.5-02 for legal person. In addition, QTS-C.3.6-03 for natural person representing legal person. (c) by means of a qualified electronic attestation of attributes; QTS-C3.1-04, QTS-C.3.2-04, QTS-C-3-3-05, QTS-C.3.4-07. In addition, QTS-C.3.5-02 for legal person. In addition, QTS-C.3.6-03 for natural person representing legal person. (d) by using other methods, which ensure the verification of the attributes with a high level of confidence, the conformity of which shall be confirmed by a conformity assessment body; QTS-C3.1-04, QTS-C.3.2-04, QTS-C-3-3-05, QTS-C.3.4-07. In addition, QTS-C.3.5-02 for legal person. In addition, QTS-C.3.6-03 for natural person representing legal person. (e) by means of the physical presence of the natural person or of an authorised representative of the legal person, by means of appropriate evidence and procedures, in accordance with national law. QTS-C3.1-04, QTS-C.3.2-04, QTS-C-3-3-05, QTS-C.3.4-07. In addition, QTS-C.3.5-02 for legal person. In addition, QTS-C.3.6-03 for natural person representing legal person. Regulation Article 44 Requirements for qualified electronic registered delivery services ETSI TS 119 461 (1) Qualified electronic registered delivery services shall fulfil the following requirements: (c) they ensure with a high level of confidence the identification of the sender; (d) they ensure the identification of the addressee before delivery of the data; Clause C.4 ETSI ETSI TS 119 461 V2.1.1 (2025-02) 81 History Document history V1.1.1 July 2021 Publication V2.1.1 February 2025 Publication |
01baa530c4a62e404e91e3569227c3a1 | 119 442 | 1 Scope | The present document specifies the semantics of a protocol for requesting to a remote server (and for receiving the corresponding response) the validation of AdES digital signatures compliant with the following ETSI deliverables: ETSI EN 319 122 [2], ETSI EN 319 132 [3], ETSI EN 319 142 [4], ETSI TS 101 733 [5], ETSI TS 102 778 [9], ETSI TS 101 903 [7], ETSI TS 103 171 [8], ETSI TS 103 172 [10] and ETSI TS 103 173 [6]. The present document specifies the semantics of a second protocol for requesting the augmentation of AdES digital signatures compliant with the aforementioned ETSI deliverables. The present document also specifies the semantics of a third protocol for requesting the validation and augmentation of AdES digital signatures compliant with the aforementioned ETSI deliverables. Finally, the present document specifies two bindings, each one in a different syntax (XML and JSON), for each of the aforementioned protocols. As far as it has been possible and suitable, the protocols have re-used constructs of DSS-X core v2.0: "Digital Signature Service Core Protocols, Elements, and Bindings Version 2.0" [1] (also identified as DSS-X core v2.0 hereinafter). The protocols define new features which are not supported by DSS-X core v2.0. NOTE 1: The protocols specified in the present document do not include components for submitting to the server ASiC containers compliant with ETSI EN 319 162-1 [i.1], ETSI EN 319 162-2 [i.2], ETSI TS 102 918 [i.3], and ETSI TS 103 174 [i.4]. They do not include either components for reporting on the validation of signatures included within an ASiC container. However, clients can always extract individual signatures and groups of signed documents from ASiC containers and prepare and submit suitable requests to the server for these individual signatures and groups of signed documents. NOTE 2: The protocols specified in the present document do not include components for submitting to the server time-stamp tokens for their verification. They do not include either components for reporting on the verification of time-stamp tokens. Protocols specified by OASIS DSS-X Technical Committees include this type of components. NOTE 3: The present document builds on a draft OASIS Committee Specification as the final OASIS specification was not available at the time of publication of the present document. The present deliverable will then be updated when the OASIS Committee Specification is formally adopted. |
01baa530c4a62e404e91e3569227c3a1 | 119 442 | 2 References | |
01baa530c4a62e404e91e3569227c3a1 | 119 442 | 2.1 Normative references | References are either specific (identified by date of publication and/or edition number or version number) or non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the referenced document (including any amendments) applies. Referenced documents which are not found to be publicly available in the expected location might be found at https://docbox.etsi.org/Reference. NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee their long term validity. The following referenced documents are necessary for the application of the present document. [1] OASIS Committee Specification Draft 01: "Digital Signature Service Core Protocols, Elements, and Bindings Version 2.0". NOTE: Available at http://docs.oasis-open.org/dss-x/dss-core/v2.0/csprd01/dss-core-v2.0-csprd01.pdf. [2] ETSI EN 319 122 (all parts): "Electronic Signatures and Infrastructures (ESI); CAdES digital signatures". ETSI ETSI TS 119 442 V1.1.1 (2019-02) 9 [3] ETSI EN 319 132 (all parts): "Electronic Signatures and Infrastructures (ESI); XAdES digital signatures". [4] ETSI EN 319 142 (all parts): "Electronic Signatures and Infrastructures (ESI); PAdES digital signatures". [5] ETSI TS 101 733 (V2.2.1): "Electronic Signatures and Infrastructures (ESI); CMS Advanced Electronic Signatures (CAdES)". [6] ETSI TS 103 173 (V2.2.1): "Electronic Signatures and Infrastructures (ESI); CAdES Baseline Profile". [7] ETSI TS 101 903 (V1.4.2): "Electronic Signatures and Infrastructures (ESI); XML Advanced Electronic Signatures (XAdES)". [8] ETSI TS 103 171 (V2.1.1): "Electronic Signatures and Infrastructures (ESI); XAdES Baseline Profile". [9] ETSI TS 102 778 (all parts): "Electronic Signatures and Infrastructures (ESI); PDF Advanced Electronic Signature Profiles". [10] ETSI TS 103 172 (V2.2.2): "Electronic Signatures and Infrastructures (ESI); PAdES Baseline Profile". [11] ETSI TS 119 102-2 (V1.2.1): "Electronic Signatures and Infrastructures (ESI); Procedures for Creation and Validation of AdES Digital Signatures; Part 2: Signature Validation Report". [12] IETF RFC 5646: "Tags for Identifying Languages". [13] ETSI TS 119 102-1 (V1.2.1): "Electronic Signatures and Infrastructures (ESI); Procedures for Creation and Validation of AdES Digital Signatures; Part 1: Creation and Validation". [14] IETF RFC 3061 (February 2001): "A URN Namespace of Object Identifiers". [15] H. Andrews. JSON Schema draft 07: "JSON Schema Validation: A Vocabulary for Structural Validation of JSON", March 19, 2018. NOTE: Available at https://json-schema.org/draft-07/json-schema-validation.html. |
01baa530c4a62e404e91e3569227c3a1 | 119 442 | 2.2 Informative references | References are either specific (identified by date of publication and/or edition number or version number) or non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the referenced document (including any amendments) applies. NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee their long term validity. The following referenced documents are not necessary for the application of the present document but they assist the user with regard to a particular subject area. [i.1] ETSI EN 319 162-1: "Electronic Signatures and Infrastructures (ESI); Associated Signature Containers (ASiC); Part 1: Building blocks and ASiC baseline containers". [i.2] ETSI EN 319 162-2: "Electronic Signatures and Infrastructures (ESI); Associated Signature Containers (ASiC); Part 2: Additional ASiC containers". [i.3] ETSI TS 102 918: "Electronic Signatures and Infrastructures (ESI); Associated Signature Containers (ASiC)". [i.4] ETSI TS 103 174: "Electronic Signatures and Infrastructures (ESI); ASiC baseline profile". [i.5] ETSI TS 119 441: "Electronic Signatures and Infrastructures (ESI); Policy requirements for TSP providing signature validation services". ETSI ETSI TS 119 442 V1.1.1 (2019-02) 10 [i.6] ETSI TR 119 001: "Electronic Signatures and Infrastructures (ESI); The framework for standardization of signatures; Definitions and abbreviations". [i.7] W3C Recommendation (11 April 2013): "XML Signature Syntax and Processing. Version 1.1". [i.8] ISO 32000-1: "Document management -- Portable document format -- Part 1: PDF 1.7". 3 Definition of terms, symbols, abbreviations and terminology |
01baa530c4a62e404e91e3569227c3a1 | 119 442 | 3.1 Terms | For the purposes of the present document, the terms given in ETSI TR 119 001 [i.6], ETSI TS 119 441 [i.5] and the following apply: attachment reference container: sub-component of input documents container for transferring a reference to an underlying protocol attachment where either the signed document or the transformed document is placed augment signature result container: response protocol component for transferring to the client the results of the process carried out by the server when trying to augment one signature NOTE: This component is specified in clause 6.2.3 of the present document. augmented signature container: response protocol container for transferring to the client an augmented non- embedded AdES signature NOTE: The document with signature container and augmented signature container are components of response messages for the augmentation protocol and for the validation and augmentation protocol. document container: sub-component of input documents container for transferring to the server one signed document or a reference to one underlying transport protocol attachment where the signed document is placed document digest container: sub-component of input documents container for transferring to the server the digest of one signed document document with signature container: response protocol container for transferring to the client one signed document embedding its signature(s) or a reference to one underlying transport protocol attachment where the signed document embedding its signature(s) is placed embedded AdES signature: AdES signature placed within a document that it signs totally or partially NOTE 1: A XAdES enveloped signature (a XAdES signature that signs a data object that contains the XAdES signature itself) is an example, but there may be other situations where a non enveloped XAdES signature is an embedded XAdES signature, for example a XAdES signature that is a component of a XML file, signs only one specific part of that XML file, and this signed part does not envelope the signature. NOTE 2: The rationale for this definition is that the placement of the signature to be validated and the signed documents within the protocol messages depends on whether the signature is embedded or not, as specified in clause 5.1.2. enveloped AdES signature: AdES signature placed within the portion of the document that it signs NOTE: The portion signed by the signature can be either the whole document or a part of it. What makes the signature be enveloped is that the signature is placed within the signed portion of the document. If the signature is placed within the document but not within the signed portion, then the signature is embedded but not enveloped. ETSI ETSI TS 119 442 V1.1.1 (2019-02) 11 global result component: response protocol component for notifying to the client a generic result of the processing performed by the server following the request submitted by the client NOTE: If the response contains one or more processing signature results containers this component instructs the client to check the signature processing results. Otherwise, the result has only processed one signature and this component provides the result of this processing. input documents container: request protocol component for transferring to the server either the signed documents themselves, or the transformed documents, or the digest of the signed documents, or references to underlying transport protocol attachments where the signed documents or the transformed documents are placed NOTE: For more information about transformations of signed documents, see W3C Recommendation (11 April 2013) [i.7]. representation of a (signed) document: either the (signed) document itself, its digest, or the result of applying to the (signed) document a certain set of known transformations signature object container: request protocol component for transferring to the server either one non-embedded signature, or a reference to an embedded signature EXAMPLE: For instance, the client can place a reference to the signature instead of the signature itself in this component when the signature is embedded within the signed document. In these situations, the client can include the signed document (and its embedded signature) within the input documents container and include a reference to the signature within the signature object container. NOTE 1: From the definitions above, input documents container can contain signatures as long as they are embedded within documents. And signature object container can contain signed documents as long as they are fully enveloped by the signature. The basic principle for placement of signed documents and signatures is the following: a signature that in essence is a non-embedded signature (even if it envelops a signed document) is placed in the signature object container; and an object that in essence is a document (even if it embeds a signature) is placed in or is referenced from the input documents object container. NOTE 2: Input documents container and signature object container components are implemented by specific XML and JSON types and elements in the bindings defined by the present document. signature processing results container: response protocol component including the optional outputs generated by the server when processing (validating, augmenting, or validating and augmenting) one specific signature NOTE: This component is specified in clause 5.2.3.2.1 of the present document. The requests of the three protocols specified in the present document can contain more than one signature. This container includes all the optional outputs generated by the server when it processes one of these signatures. The response message can, consequently, contain one or more signature results containers. signature reference component: request and response protocol component referencing one signature NOTE: The XML binding of this component is specified in [11], which is copied in clause 5.1.4.2.4.2 of the present document. Clause 5.1.4.2.4.3 of the present document specifies a JSON binding for this component. signatures-to-process-refs container: request protocol component that includes references to those signatures whose processing the client requests to the server NOTE 1: See clause 3.4 of the present document on terminology for an explanation of the meaning of the term "processing". NOTE 2: A request message can include more than one signature. This component allows the client to instruct the server to process (validate, augment, or validate and augment) a selected subset of them. transformed document container: sub-component of input documents container for transferring to the server the transformed document or a reference to one underlying transport protocol attachment where the transformed document is placed ETSI ETSI TS 119 442 V1.1.1 (2019-02) 12 |
01baa530c4a62e404e91e3569227c3a1 | 119 442 | 3.2 Symbols | Void. |
01baa530c4a62e404e91e3569227c3a1 | 119 442 | 3.3 Abbreviations | For the purposes of the present document, the following abbreviations apply: CMS Cryptographic Message Syntax DSS-X Digital Signature Services eXtended DSSX, DSS-X Digital Signature Services eXtended ERS Evidence Record Syntax IETF Internet Engineering Task Force ISO International Organization for Standardization JSON JavaScript Object Notation OASIS Organization for the Advancement of Structured Information Standards OCSP Online Certificate Status Protocol OID Object Identifier RFC Request For Comments URI Uniform Resource Identifier URN Uniform Resource Name UTC Universal Time Coordinated XML eXtensible Markup Language |
01baa530c4a62e404e91e3569227c3a1 | 119 442 | 3.4 Terminology | The term "digest of the document", "document" being one of the documents signed by one signature submitted to a server within the request of any of the three protocols defined in the present document, is understood as indicated below: • If the document is signed by a CAdES signature, it is the digest of the signed document itself. • If the document is signed by a XAdES signature, it is the digest computed as specified inW3C Recommendation (11 April 2013) [i.7]. • If the document is a PDF document signed by a PAdES signature built on CMS or CAdES, it is the digest computed as specified in ISO 32000-1 [i.8]. The term "process" applied to AdES signature means either "validate", or "augment", or "validate and augment" depending of the protocol where the term is used. If the term is used out of the context of one protocol it does mean the action performed by the server on the signature, which is one of the three actions aforementioned. 4 Technical approach to the specification of the protocols |
01baa530c4a62e404e91e3569227c3a1 | 119 442 | 4.1 Main features | The main features supported by the 'validation' protocol specified in the present document, which are not supported by DSS-X core v2.0 [1] are: 1) Supports requesting the validation of one or more PAdES signatures embedded in one PDF document, if the client submits it to the server. It supports the validation of one PAdES signature if the client only submits the digest of the document where the aforementioned signature is placed. 2) Supports, when the request message contains more than one signature, requesting the validation of a subset of them. ETSI ETSI TS 119 442 V1.1.1 (2019-02) 13 3) Supports requesting to the server the application of a certain signature validation policy for validating the AdES signature(s). The server may notify in the response, the signature validation policy applied. The server may notify the list of signature validation policies that it supports. 4) Supports requesting a signed or unsigned detailed validation report for each validated signature. The server may include one signed or unsigned validation report for each signature within the response. The server may also include one signed or unsigned validation report for several validated signatures. NOTE: The ETSI TS 119 102-2 [11] defines a validation report that can contain details of the validation of one or more AdES signatures. 5) The server may generate one or more signature processing results containers, each one providing all the details (including the aforementioned signed or unsigned validation report) concerning the validation of one signature. The main features supported by the 'validation and augmentation' protocol specified in the present document, which are not supported by DSS-X core v2.0 [1] are: 1) Supports requesting the validation and augmentation of one or more PAdES signatures embedded in one PDF document, if the client submits it to the server. It supports the validation and augmentation of one PAdES signature if the client only submits the digest of the document where the aforementioned signature is placed. 2) Supports, when the request message contains more than one signature, requesting the validation and augmentation of a subset of them. 3) Supports requesting to the server the application of a certain signature validation policy for validating the AdES signature(s). The server may notify in the response, the signature validation policy applied. The server may notify the list of signature validation policies that it supports. 4) Supports requesting a signed or unsigned detailed validation report for each validated signature. The server may include one signed or unsigned validation report for each signature within the response. The server may also include one signed or unsigned validation report for several validated signatures. 5) The server may generate one or more signature processing results containers, each one providing all the details (including the aforementioned signed or unsigned validation report) concerning the validation and the augmentation of one signature. The main features supported by the 'augmentation' protocol specified in the present document are: 1) Supports requesting the augmentation of one or more XAdES signatures and of one or more of CAdES signatures. The incorporation of the signatures and the signed documents are as specified in DSS-X core v2.0 [1]. 2) Supports requesting the augmentation of one or more PAdES signatures embedded in one PDF document, if the client submits it to the server. It supports the augmentation of one PAdES signature if the client only submits the digest of the document. 3) Supports, when the request message contains more than one signature, requesting the augmentation of a subset of them. 4) Supports submission of validation material required for augmenting the signatures. 5) Supports submission of the claimed identity of the client. 6) The server may generate one or more signature processing results containers, each one providing all the details concerning the augmentation of one signature. ETSI ETSI TS 119 442 V1.1.1 (2019-02) 14 |
01baa530c4a62e404e91e3569227c3a1 | 119 442 | 4.2 General requirements | The protocols specified in the present document re-use, wherever it is possible, the components specified in DSS-X core v2.0 [1]. Wherever the protocols defined in the present document require a certain component whose semantics and/or syntax is not offered by any of the components specified in DSS-X core v2.0 [1], the present document defines and fully specifies new components. For components re-used from DSS-X core v2.0 [1], and in the absence of any further requirement defined in the present document, the requirements defined in DSS-X core v2.0 [1], shall apply. The present document may define additional requirements for these re-used components. In case that a requirement defined in the present document contradicts any requirement defined in DSS-X core v2.0 [1] the requirement defined in the present document shall take precedence. For components re-used from DSS-X core v2.0 [1], and in the absence of a different processing model defined in the present document, the processing model (including results returned by the server) defined in DSS-X core v2.0 [1] shall apply. The present document may modify the processing model defined in DSS-X core v2.0 [1] for these components. In case that a certain aspect of the processing model defined in the present document contradicts any aspect of the processing model defined in DSS-X core v2.0 [1], the processing model defined in the present document shall take precedence. EXAMPLE: The present document does not specify, for instance, that the presence of a certain re-used optional component in the request message implies the presence of a certain re-used optional component in the response message: this is a requirement inherited from the aforementioned OASIS specifications. NOTE: The protocols defined in the present document on one hand restrict the degree of optionality for certain features of the verification protocol defined in DSS-X core v2.0 [1]. But at the same time, on the other hand, some of the protocols defined in the present document incorporate features that are not present in DSS-X core v2.0 [1]. Services implementing the protocols defined in the present document shall support all the components specified in the present document, which apply to the AdES signature type(s) that the service is able to process (i.e. to validate, to augment, or to validate-and-augment), regardless whether their incorporation in the messages is mandatory or optional. The rest of the present document is organized as follows: 1) Clauses 4.3 and 4.4 provide general remarks on the XML and JSON protocols relying on the DSS-X core v2.0 protocol. 2) Clause 5 specifies all the components for the validation protocol in its two bindings (XML and JSON) relying on the DSS-X core v2.0 protocol. 3) Clause 6 specifies those specific components for the augmentation protocol in its two bindings (XML and JSON) relying on the DSS-X core v2.0 protocol. 4) Clause 7 specifies those specific components for the validation and augmentation protocol in its two bindings (XML and JSON) relying on the DSS-X core v2.0 protocol. 5) Clause 8 specifies the processing models for the three protocols. 6) Clause 9 specifies components for allowing asynchronous processing in the three protocols. For each component of the aforementioned protocols, the present document: 1) Defines requirements for the semantics of the component (i.e. its mandatory contents, its optional contents, etc.). These requirements are defined in clauses "Component semantics". 2) Defines requirements for the components of the XML binding within clauses named "XML component". 3) Defines requirements for the JSON component of the JSON binding within clauses named "JSON component". ETSI ETSI TS 119 442 V1.1.1 (2019-02) 15 |
01baa530c4a62e404e91e3569227c3a1 | 119 442 | 4.3 XML protocol | |
01baa530c4a62e404e91e3569227c3a1 | 119 442 | 4.3.1 Introduction | The new structures defined in the present document are contained in the XML schema file "19442xmlSchema.xsd". This file also contains the redefinition of certain structures defined in DSS-X core v2.0 [1], as shown in clause 4.3.2 of the present document. The new elements and types defined in that schema are defined within the XML namespace whose URI value is shown below: • http://uri.etsi.org/19442/v1.1.1# Table 1 shows the URI values of other XML namespaces and their corresponding prefixes used in the aforementioned schema file and within the present document. Table 1 URI value of the XML Namespace Prefix http://uri.etsi.org/19442/v1.1.1# etsival http://uri.etsi.org/19102/v1.2.1# etsivr http://docs.oasis-open.org/dss/ns/core dss2 http://docs.oasis-open.org/dss/ns/base dsb http://www.w3.org/2000/09/xmldsig# ds urn:oasis:names:tc:SAML:2.0:assertion saml2 http://www.w3.org/2001/XMLSchema xs |
01baa530c4a62e404e91e3569227c3a1 | 119 442 | 4.3.2 Redefined DSS-X types | The present document redefines three types already defined by DSS-X core v2.0 [1]. These redefinitions are contained in the XML schema file "19442xmlSchema.xsd" and are copied below for information, as well as in the clauses where these types are specified: <!—targetNamespace="http://uri.etsi.org/19442/v1.1.1#" --> <xs:redefine schemaLocation="foo_dss_core.xsd"> <xs:complexType name="dss2:OptionalInputsVerifyType"> <xs:complexContent> <xs:extension base="dss2:OptionalInputsVerifyType"> <xs:sequence> <xs:element ref="etsival:ProcessSignatures" minOccurs="0"/> <xs:element ref="etsival:UseSignatureValidationPolicy" minOccurs="0"/> <xs:element ref="etsival:ReturnValidationReport" minOccurs="0"/> <xs:element ref="etsival:ReturnAugmentedSignature" minOccurs="0"/> <xs:element ref="etsival:ProofsOfExistence" minOccurs="0"/> <xs:element name="TSTokensQualityLevel" type="xs:anyURI" minOccurs="0"/> </xs:sequence> </xs:extension> </xs:complexContent> </xs:complexType> <xs:complexType name="dss2:OptionalOutputsVerifyType"> <xs:complexContent> <xs:extension base="dss2:OptionalOutputsVerifyType"> <xs:sequence> <xs:element ref="etsival:ValidationReport" minOccurs="0"/> <xs:element ref="etsival:ResultsForOneSignature" minOccurs="0" maxOccurs="unbounded"/> <xs:element ref="etsival:AppliedSignatureValidationPolicy" minOccurs="0"/> <xs:element ref="etsival:AvailableSignatureValidationPolicies" minOccurs="0"/> </xs:sequence> </xs:extension> </xs:complexContent> </xs:complexType> <xs:complexType name="dss2:DocumentHashType"> <xs:complexContent> <xs:extension base="dss2:DocumentHashType"> <xs:sequence> <xs:element name="PAdESFieldName" type="xs:string" minOccurs="0"/> </xs:sequence> </xs:extension> </xs:complexContent> ETSI ETSI TS 119 442 V1.1.1 (2019-02) 16 </xs:complexType> </xs:redefine> • Clause 5.1.3.2.2.3 specifies the redefined dss2:DocumentHashType. • Clause 5.1.4.1.2 specifies the redefined dss2:OptionalInputsVerifyType. • Clause 5.2.3.1.2 specifies the redefined dss2:OptionalOutputsVerifyType. NOTE: The present document redefines dss2:DocumentHashType because this component has to have an additional component for containing a PDF field name. This is required for allowing to submit the digest document when the client requires validation of PAdES signatures. |
01baa530c4a62e404e91e3569227c3a1 | 119 442 | 4.4 JSON protocol | |
01baa530c4a62e404e91e3569227c3a1 | 119 442 | 4.4.1 Introduction | The new structures defined in the present document are contained in the schema file "19442jsonSchema.json". This file also contains the extensions of certain structures defined in DSS-X core v2.0 [1]. These structures are listed in clause 4.4.2 of the present document. |
01baa530c4a62e404e91e3569227c3a1 | 119 442 | 4.4.2 Extension of DSS-X types | The present document extends three types defined by DSS-X core v2.0 [1]. These extensions are contained in the JSON schema file "19442jsonSchema.json". The extension mechanism is implemented using the keyword "allOf" as specified in "JSON Schema Validation: A Vocabulary for Structural Validation of JSON" [15]. The types that are defined as extensions of DSS-X types are listed below: • OptionalInputsVerifyType extends dss2-OptionalInputsVerifyType. It is defined in clause 5.1.4.1.3. • OptionalOutputsVerifyType extends dss2-OptionalOutputsVerifyType. It is defined in clause 5.2.3.1.3. • DocumentHashType extends dss2-DocumentHashType. It is defined in clause 5.1.3.3.2.3. NOTE: The present document defines this new type extending dss2-DocumentHashType because this component has to have an additional component for containing a PDF field name. This is required for allowing to submit the digest document when the client requires validation of PAdES signatures. The present document defines two additional new types that are built on some of the aforementioned types, namely: • InputDocumentsType, that builds on DocumentHashType. It is defined in clause 5.1.3.3.1. • VerifyRequestType, that builds on OptionalInputsType and InputDocumentsType. It is defined in clause 5.1.1.3. ETSI ETSI TS 119 442 V1.1.1 (2019-02) 17 |
01baa530c4a62e404e91e3569227c3a1 | 119 442 | 5 Protocol for validation of AdES signatures | |
01baa530c4a62e404e91e3569227c3a1 | 119 442 | 5.1 Request message | |
01baa530c4a62e404e91e3569227c3a1 | 119 442 | 5.1.1 Component for requesting validation | |
01baa530c4a62e404e91e3569227c3a1 | 119 442 | 5.1.1.1 Component semantics | The message for requesting the validation of an AdES signature to a remote server shall contain components for: 1) Submitting either the signature to be validated or a reference to the signature to be validated when this signature is enveloped within a signed document. Clause 5.1.2 specifies semantic requirements for this component. 2) Submitting the signed document(s) or representation(s) of these signed document(s). Clause 5.1.3 specifies semantic requirements for this component. NOTE 1: When the signature to validate is separate from all or part of the documents it signs, the signature is placed in one component and the signed document(s) is (are) placed in another component. NOTE 2: When the signature to validate envelops the signed document (this is the case of a XAdES enveloping signature that is not embedded in other document -a XAdES signature can envelop one document and be embedded in another document- or a CAdES attached structure) or it is placed within the signed document (this is the case of a PDF document with one or more PAdES signatures, or an embedded XAdES signature), signature and signed documents are placed in one component. 3) Identifying one or more protocols and/or profiles that the request message is compliant with. The first one of such components shall have the following URI as value, identifying the request message as one that has been built using the "validation" protocol specified in the present document: - http://uri.etsi.org/19442/v1.1.1/validationprotocol#. This message may contain a unique identifier. This message may contain an identifier of the service policy the client requests the server to use for processing the signatures. This message may contain other components for requesting to the server additional features. Clause 5.1.4.1 lists these optional components and contains references to clauses that specify semantic requirements for each component. |
01baa530c4a62e404e91e3569227c3a1 | 119 442 | 5.1.1.2 XML component | The element that shall be the component for requesting the validation of AdES signature(s) shall be the element dss2:VerifyRequest as specified in clause 4.2.10.2 of DSS-X core v2.0 [1]. The dss2:VerifyRequest element shall be as specified in DSS-X core v2.0 [1]. The dss2:VerifyRequest element shall have one or more dsb:Profile children elements. The first one shall have the value http://uri.etsi.org/19442/v1.1.1/validationprotocol#, identifying the request as a validation request compliant with the validation protocol specified in the present document. The dss2:SignatureObject child element shall not contain any time-stamp token. Any optional component specified in clause 5.1.4 shall appear as child of the dss2:OptionalInputs child element of the dss2:VerifyRequest element. ETSI ETSI TS 119 442 V1.1.1 (2019-02) 18 |
01baa530c4a62e404e91e3569227c3a1 | 119 442 | 5.1.1.3 JSON component | The element that shall implement the verify request message for the JSON binding of the protocol shall be the VerifyReq element. This element shall be an instance of the VerifyRequestType, defined as in JSON Schema file "19442jsonSchema.json", whose location is detailed in clause A.1, and is copied below for information. "VerifyRequestType": { "type": "object", "properties": { "profile": { "type": "array", "items": { "type": "string" } }, "reqID": { "type": "string" }, "inDocs": { "$ref": "#/definitions/InputDocumentsType" }, "optInp": { "$ref": "#/definitions/OptionalInputsVerifyType" }, "sigObj": { "$ref": "http://docs.oasis-open.org/dss-x/dss- core/v2.0/csprd01/schema/schema.json#definitions/dss2-SignatureObjectType" } } } The profile, reqID, and sigObj elements shall be as specified in clauses 4.2.10.1, and 4.2.8.1 of DSS-X core v2.0 [1]. The profile array shall have one or more items as specified in clause 4.2.10.1 of DSS-X core v2.0 [1]. The first one shall have the value http://uri.etsi.org/19442/v1.1.1/validationprotocol#, identifying the request as a validation request compliant with the validation protocol specified in the present document. The optInp shall be as specified in clause 5.1.4.1.3 of the present document. The inDocs element shall be as specified in clause 5.1.3.3 of the present document. |
01baa530c4a62e404e91e3569227c3a1 | 119 442 | 5.1.2 Component for submitting signature to be validated | |
01baa530c4a62e404e91e3569227c3a1 | 119 442 | 5.1.2.1 Component semantics | The protocol shall allow including the signature in different containers according to the following rules: 1) If the signature is an embedded AdES signature, the embedding document and the signature shall be placed either: - within one sub-component of the input documents container; or - within an underlying protocol attachment. In this case, a sub-component of the input documents container shall include a reference to the aforementioned attachment. Additionally the signature object container shall contain a reference to the embedded signature. 2) If the signature is a non-embedded AdES signature, it shall be placed within the signature object container. 3) If the signature is embedded AdES signature and the digest of the embedding document is submitted instead the document itself, then the AdES signature shall be placed within the signature object container. NOTE: This implies that the protocols defined in the present document support submitting several PAdES signatures embedded within one PDF document, if this one is submitted to the server. However, if the client submits the digest of the document, the request message can only have one PAdES signature. ETSI ETSI TS 119 442 V1.1.1 (2019-02) 19 Table 2 shows the cardinalities of the components required in this protocol for incorporating signature(s), for requesting the validation of AdES signatures, depending on its types (CAdES, PAdES or XAdES) and their relative position with respect the signed document(s). Rows in the table show information corresponding to the different types of AdES signatures whose validation is requested, as well as their relative position to the signed document(s). The first column shows the different types of AdES signatures that can be submitted to the server. Column I shows the cardinalities of the signature object container. Colum II shows the contents of the signature object container. The values appearing in the cells of this column may be the following ones: • Signature: This value indicates that the signature object container contains the non-embedded signature itself. • Reference: This content appears when submitting an embedded signature. It indicates that the signature object container shall contain a reference to the embedded signature. Column III shows the cardinalities of the input documents container that includes either a document embedding the signature or a reference to an underlying protocol attachment that contains the document embedding the signature. Each cell in I and III columns indicates the required cardinality of the component shown in the header of the corresponding column, for the type of signature, located in a relative position to the signed document(s) as indicated in the header of the corresponding row. An integer value indicates an exact number of components, "*" stands for "0 or more", and "0..1" means "0 or 1". Table 2: Placement of signatures Component Type of signature I Signature object container II Contents of signature object container III Input documents container containing embedded signatures or references to attachments with signatures CMS structure attached 1 Signature 0 CMS structure detached 1 Signature 0 Non-embedded XAdES 1 Signature 0 Embedded XAdES 0..1 Reference 1 PAdES enveloped within the PDF document (embedded signature) 0..1 Reference 1 NOTE: Within one CMS structure there are as many CAdES signatures as items within the signerInfos component. |
01baa530c4a62e404e91e3569227c3a1 | 119 442 | 5.1.2.2 XML components | The element that shall be the component for submitting the signature(s) to be validated shall be either: a) the dss2:SignatureObject child element of the dss2:VerifyRequest root element if the signature is not embedded within the signed document(s); or b) the dss2:InputDocument child element of the dss2:VerifyRequest element if the signature(s) is embedded within the signed document. The dss2:SignatureObject element shall be the XML implementation of the signature object container and the dss2:InputDocument element shall be the XML implementation of the input documents container within the XML binding of the protocol. The requirements governing the presence, cardinalities, and contents of the aforementioned elements are given in clause 5.1.3.4. ETSI ETSI TS 119 442 V1.1.1 (2019-02) 20 |
01baa530c4a62e404e91e3569227c3a1 | 119 442 | 5.1.2.3 JSON component | The element that shall be the component for submitting the signature(s) to be validated shall be either: a) the sigObj child element of the VerifyReq root element if the signature is not embedded within the signed document(s); or b) the inDocs child element of the VerifyReq element if the signature(s) is embedded within the signed document. The requirements governing the presence, cardinalities, and contents of the aforementioned elements are given in clause 5.1.3.4. 5.1.3 Components for submitting signed documents or representations of the signed documents |
01baa530c4a62e404e91e3569227c3a1 | 119 442 | 5.1.3.1 Components semantics | The protocol shall allow including the signed document in several containers depending on its relative position regarding the signature that signs it: 1) If a non-embedded signature envelops the document, then the client shall place the enveloping signature and the enveloped signed document within the signature object container. 2) If the signature is not as in item 1), then the client shall place the signed document either directly within the input documents container or within an underlying protocol attachment. Additionally, the input documents container shall contain one sub-component containing either the document or a reference to the attachment where the document is placed. The current protocol shall also allow submitting to the server other representations of the signed documents different than the actual documents. Each type of representation shall be placed in a different sub-component of the input documents container, as indicated below: a) If a client wants to submit the digest of the actual signed document, then the client shall place this digest within the document digest container. b) If a client wants to submit the result of transforming a document, it shall place this transformed document either: - within the transformed document container; OR - within an underlying transport protocol attachment. In this case, the transformed document container shall include a reference to this attachment. Table 3 shows the cardinalities of the components required in this protocol for incorporating signed documents, or signed documents representations (transformed documents and documents digests) for requesting the validation of AdES signatures, depending on the types of the signatures and their relative position with the signed document(s). Rows in the table show information corresponding to the different types of AdES signatures whose validation is requested, as well as their relative position to the signed document(s). The first column shows the different types of AdES signatures that can be submitted to the server. Column Document container shows the cardinalities of the document container. Column Transformed document container shows the cardinalities of transformed document container. Column Document digest container shows the cardinalities of document digest container. The conventions used in Table 3 for indicating cardinalities are the same as the conventions used in Table 2. ETSI ETSI TS 119 442 V1.1.1 (2019-02) 21 Table 3: Components containing either documents or representations of documents in validation requests messages Component and subcomponents Type of signature Input documents container containing documents or documents representations Document container Transformed document container Document digest container CMS structure attached 0 0 0 CMS structure detached 0..1 0 0..1 Non-embedded XAdES * * * Embedded XAdES 1..* * * PAdES enveloped within the PDF document 0..1 0 0..1 NOTE 1: In the case of embedded XAdES document container has a minimum cardinality of 1, as it is the only way of submitting to the server the embedded signature: within the signed document that embeds it. If the signature is not embedded, then either the document or a representation of the document can be submitted as the signature is submitted within the signature object container. NOTE 2: The protocols defined in the present document allow sending either one PDF document enclosing one or more PAdES signatures, or one PAdES signature detached from any PDF document and the digest of the document, understood as specified in clause 3.4. As that clause mentioned, details on how to compute the digest for each signature of this type, can be found in ISO 32000-1 [i.8]. |
01baa530c4a62e404e91e3569227c3a1 | 119 442 | 5.1.3.2 XML components | |
01baa530c4a62e404e91e3569227c3a1 | 119 442 | 5.1.3.2.1 General requirements | The dss2:SignatureObject element shall implement the signature object container for the XML binding of the protocol. The dss2:InputDocuments element shall implement the input documents container for the XML binding of the protocol. The requirements governing the presence, cardinalities, and contents of the XML components are given in clause 5.1.3.4. |
01baa530c4a62e404e91e3569227c3a1 | 119 442 | 5.1.3.2.2 Additional requirements for contents of dss2:InputDocuments | 5.1.3.2.2.1 Element dss2:Document for sending original documents The dss2:Document element shall implement the document container for the XML binding of the protocol. NOTE: dss2:Base64Data child element of the dss2:Document can contain either the signed document in its dsb:Value child element, or a reference to an underlying protocol attachment (where the signed document is placed) in its dsb:AttRef child element. 5.1.3.2.2.2 Element dss2:TransformedData for sending transformed documents The dss2:TransformedData element shall implement the transformed document container for the XML binding of the protocol. If the signature(s) to be validated is(are) XAdES signature(s), and if the client wants to submit to the server not the original document, but the result of a set of transformations applied to it, then the client shall incorporate the base-64 encoding of the binary representation of the result of applying this set (which may be either the full sequence of transformations specified in their ds:Reference ancestor element, or a part of it) to the original document either into the dss2:Base64Data child element of the dss2:TransformedData child element of the dss2:InputDocuments or within an underlaying protocol attachment. The client shall submit one dss2:TransformedData element for each result of applying a sequence of transformations to one of the original documents. The dss2:TransformedData element shall incorporate the WhichReference attribute. ETSI ETSI TS 119 442 V1.1.1 (2019-02) 22 NOTE: dss2:Base64Data child element of the dss2:TransformedData can contain either the transformed document in its dsb:Value child element, or a reference to an underlying protocol attachment (where the transformed document is placed) in its dsb:AttRef child element. 5.1.3.2.2.3 Element dss2:DocumentHash for sending digest of documents The element that shall implement the digest document container for the XML binding of the protocol shall be the dss2:DocumentHash element, instance of dss2:DocumentHashType, redefined as in XML Schema file "19442xmlSchema.xsd", whose location is detailed in clause A.1. The redefinition of dss2:DocumentHashType has been copied in clause 4.3.2 for information. The requirements for each instance of the redefined the dss2:DocumentHashType shall be as specified in clause 4.2.5.1 of DSS-X core v2.0 [1]. In addition, the following requirements shall also apply: • If the signature(s) to be validated is(are) XAdES then the dss2:DocumentHash element shall incorporate the WhichReference attribute and shall not incorporate the PAdESFieldName element. • If the signature(s) to be validated is(are) CAdES or PAdES built on CMS then the dss2:DocumentHash element shall not incorporate the WhichReference attribute. • If the signature(s) to be validated is(are) PAdES then the PAdESFieldName element shall be present and it shall have as value the name of the PDF field where the PAdES signature is placed within the PDF signed document. |
01baa530c4a62e404e91e3569227c3a1 | 119 442 | 5.1.3.3 JSON components |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.