regify supported authentication levels
Today, in addition to no authentication, the available levels are 1,3,5,7 and 9. The remaining levels are reserved for future use. The levels are defined as follows:
|| User has access to the used email-address. This level is identifying the absence of any further authentication.
The regify provider simply checked, if someone clicked the activation link inside of the initializing e-mail.
||The user contacted the regify-provider verbally and made his identity credible (social barrier). This can be done by telephone, Skype or other voice systems.|
||The user sent or faxed a copy of his identification card to the regify-provider.||The user sent a copy of the identification card of the manager or a copy of the business registration / certificate of registration.|
|| The details of the user or company are checked against a public directory (e.g. call back phone number out of the telephone directory).
Alternatively, the regify-provider already has an existing, attestable long business relationship with the user or organization.
The regify-provider personally knows the user (e.g. human resources department).
|| The user personally verified his identity to the regify-provider (e.g. personally showing identification card).
The user is employed by the regify-provider for more than 2 months.
||The user has been authenticated by a legally accepted authentication procedure like PostIDENT (Germany), Ident.Brief (Austria), Die Gelbe Identifikation (Switzerland) etc.|| |
how to offer authentication
As a regify provider, your software already has all functions available to offer customers authentication. But you need to fulfill the following prerequisites:
- Decide about, what authenticatiojn level you want to offer (see list above).
- Your company's authentication process must get certified by regify S.A.
- You need to support SMS sending (provider option).
If you have any further questions on authentication or you want to offer, please contact support (AT) regify.com.