1.1 Our Vectors of Trust are P2 Cb Mb Ac

1.1.1 Identity Proofing - P2: Identity is proofed either in person or remotely using trusted mechanisms.

1.1.2 Primary Credential Usage - Cb: Known Device.

1.1.3 Primary Credential Management - Mb: Remote issuance and rotation / use of backup recover credentials / deletion on request.

1.1.4 Assertion Presentation - Ac: Signed and verifiable assertion, passed through a back channel.

1.1 Our Vectors of Trust are P2 Cb Mb Ac

1.1.1 Identity Proofing - P2: Identity is proofed either in person or remotely using trusted mechanisms.

1.1.2 Primary Credential Usage - Cb: Known Device.

1.1.3 Primary Credential Management - Mb: Remote issuance and rotation / use of backup recover credentials / deletion on request.

1.1.4 Assertion Presentation - Ac: Signed and verifiable assertion, passed through a back channel.