This process is known as eAuthentication and contains two
major sets of requirements that must be met: the
verification of the user prior to the issuance of the credentials (
identity proofing) and a technical authentication method (user name and password).