This process is known as eAuthentication and contains two major sets of requirements that must be met: the verification of the user prior to the issuance of the credentials (identity proofing) and
a technical authentication method (user name and password).