1.1 Our Vectors of Trust are P2 Cb Mb Ac
1.1.1 Identity Proofing - P2: Identity is proofed either in person or remotely using trusted mechanisms.
1.1.2 Primary Credential Usage - Cb: Known Device.
1.1.3 Primary Credential Management - Mb: Remote issuance and rotation / use of backup recover credentials / deletion on request.
1.1.4 Assertion Presentation - Ac: Signed and verifiable assertion, passed through a back channel.