TDIF Document Update: Verified Documents
TDIF Document Update: Verified Documents
# A80000OFFICIAL
A80000OFFICIAL #
Updated Page A C I X
(YYMMDD) Section/Requirement
# A80000OFFICIAL
A80000OFFICIAL #
Description
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
Advised Providers of
Author
Change
AV, MOK
# A80000OFFICIAL
A80000OFFICIAL #
S
TDIF Requirements (All changes 7 June 21) Applicability O
Requirement A Indicator
C I X R
T
ACCRED 3 1 1 The Applicant MUST formally request TDIF A C I X ACCRED
accreditation with a TDIF Application Letter . ###
ACCRED 3 1 1 a All information provided to the DTA for the purpose A C I X
of TDIF accreditation MUST be in English .
###
ACCRED 3 1 1 b The Applicant MUST have a registered and active A C I X
ABN. ###
ACCRED 3 1 2 b The TDIF Application Letter MUST specify whether the C I ACCRED
identity system supports web responsive design,
mobile apps or a combination of these. This
information will determine the scope of the
Accessibility Assessment.
###
ACCRED 3 1 2 c The TDIF Application Letter MUST specify whether the A C I X
Applicant is seeking to connect to the Australian
Government identity federation .
###
ACCRED 3 1 3 The Application Letter MUST include a Statement of A C I X ACCRED
Applicability which describes the scope of the
Applicant’s identity system.
###
ACCRED 3 1 3 a At a minimum, the Statement of Applicability MUST: A C I X ACCRED
a) Be written for an operational identity system,
regardless of whether the Applicant’s identity system
is operational or not.
b) summarise the fraud control, privacy, protective
security and user experience features of the identity
system.
c) Provide a high-level summary of how the
Applicant will meet the fraud control, privacy,
protective security and user experience requirements
set out in TDIF 04 Functional Requirements.
d) Include the version of the Australian Government
Information Security Manual used as its basis (i.e.
month and year).
The Statement of Applicability forms the basis of the
Applicant’s Functional Assessments.
###
ACCRED 3 1 3 b For multi-entity identity systems, the Statement of A C I X ACCRED
Applicability MUST also include all fraud control,
privacy, protective security, and user experience
controls which directly contribute to meeting TDIF
requirements.
###
# A80000OFFICIAL
A80000OFFICIAL #
###
ACCRED 3 1 4 a The TDIF Application Letter MUST propose a A C I X ACCRED
commencement date and a date by which TDIF
accreditation is anticipated .
###
ACCRED 3 1 5 The TDIF Application Letter MUST include the names A C I X ACCRED
and contact details of people responsible within the
Applicant’s organisation(s) to manage their TDIF
accreditation .
###
ACCRED 3 1 6 The TDIF Application Letter MAY include any relevant A C I X ACCRED
TDIF Exemption Requests in accordance with the
process set out in Appendix A: TDIF exemption
process.
###
ACCRED 3 1 6 a Each TDIF Exemption Request MUST include all A C I X ACCRED
information as described in Appendix A: TDIF
exemption process.
###
ACCRED 3 1 7 The Applicant MAY include a copy of prior audit work A C I X ACCRED
which it requests the DTA consider as a substitute for
relevant Functional Assessments.
###
ACCRED 3 1 7 a Any request made to the DTA to consider prior audit A C I X
work MUST include:
a. An indication of which Functional Assessment it is
provided as a substitute for.
b. A rationale why it is being provided.
c. A summary of which TDIF requirements the
Applicant believes will be addressed by the prior audit
work.
###
FRAUD 2 2 2 The Fraud Control Plan (and supporting Fraud Control A C I X FRAUD
Plans) MUST be reviewed annually by the Applicant’s
Accountable Authority and when there is a change in
the ownership, structure, functions or activities of the
Applicant which may impact the operation of the
fraud control components of their identity system.
###
# A80000OFFICIAL
A80000OFFICIAL #
###
PRIV 3 4 1 An Applicant, covered by the Privacy Act, MUST A C I X PRIV
report eligible data breaches to affected individuals
and the Information Commissioner as required under
the Privacy Act and also report the eligible data
breach to the DTA.
###
PRIV 3 4 1 a An Applicant, not covered by the Privacy Act, MUST A C I X PRIV
report eligible data breaches as defined in the Privacy
Act 1988 to affected individuals and the DTA.
###
PRIV 3 5 2 The Applicant MUST include a statement in their A C I X
privacy notices advising that the Applicant may use
the Individual’s information as required by the TDIF,
including to detect, manage and investigate fraud.
###
# A80000OFFICIAL
A80000OFFICIAL #
PRIV 3 7 1 The Applicant MUST only collect, use and disclose an A C I X PRIV
Individual’s Behavioural Information to:
a) Verify the Identity of an Individual and assist
them to receive a digital service from a Relying Party.
b) To support identity fraud management functions.
c) To improve the performance or usability of the
Applicant’s identity system.
d) To de-identify the data to create aggregate data.
###
PRIV 3 7 1 a The Applicant MUST NOT sell or disclose an A C I X
Individual’s Behavioural information to a third party.
###
PRIV 3 8 2 Biometric information collected to for the purpose of I PRIV
proofing an Individual’s Identity MUST be destroyed
once the Biometric information has been used to
verify that identity (for example it has been matched
against a source photograph), unless:
• The Individual chooses to retain the Biometric
information stored or controlled by the Individual on
their device, or
• The Biometric information is collected or was
collected to create a government Identity document
(for example where a Road Traffic and Transport
Authority is an Identity document issuer and an
Identity Service Provider), or
The Biometric information is reused for
authentication use (in accordance with CSP-04-03-03).
###
PRIV 3 9 1 The Applicant MUST ensure Express Consent is A C I X PRIV
obtained from an Individual prior to disclosing that
individual’s Attributes to a Relying Party or any third
party.
###
PRIV 3 9 1 a This requirement has been archived in version 1.2. A C I X PRIV
###
PRIV 3 9 2 The Applicant MUST allow an Individual to withdraw A C I X PRIV
their Express Consent. ###
PRIV 3 9 2 a The Applicant MUST demonstrate how this Express A C I X PRIV
Consent withdrawal process is straightforward and
easy to use.
###
# A80000OFFICIAL
A80000OFFICIAL #
###
PRIV 3 9 5 The Applicant MUST obtain Express Consent to A I PRIV
disclose and verify Identity Attributes with an
Authoritative Source. For example, through an
Identity Matching Service.
###
PRIV 3 10 2 a If it discloses Personal information to an overseas A C I X PRIV
recipient that is not the individual, the Applicant
MUST demonstrate to the DTA’s reasonable
satisfaction it has appropriate contractual and
practical measures to ensure the overseas recipient
complies with these TDIF privacy requirements.
###
PROT 4 1 13 The System Security Plan (and supporting System A C I X PROT
Security Plans) MUST be reviewed annually by the
Applicant’s Accountable Authority and when there is a
change in the ownership, structure, functions or
activities of the Applicant which may impact the
operation of the protective security components of
their identity system.
###
PROT 4 1 19 a The Applicant MUST document and present evidence A C I X PROT
of their security maturity to the DTA. ###
PROT 4 2 15 The Applicant MUST develop and use procedures to A C I X PROT
report Cyber security incidents to the DTA.
###
PROT 4 2 15 a As soon as they become aware the Applicant MUST A C I X PROT
report Cyber security incidents to the DTA.
###
# A80000OFFICIAL
A80000OFFICIAL #
###
PROT 4 2 24 The Applicant MUST ensure their ICT systems A C I X PROT
(including software) incorporate processes for
generating Audit Logs.
###
PROT 4 2 24 a At a minimum, Audit Logs MUST include the following A C I X PROT
activities:
• Successful and failed elevation of privileges by
Personnel.
• User and group additions, deletions and
modification to permissions.
• Security related system alerts and failures (e.g.
attempted access that is denied, crashes or error
messages).
• Unauthorised access attempts to critical systems
and files.
###
# A80000OFFICIAL
A80000OFFICIAL #
###
PROT 4 2 24 c Audit logs MUST include: C PROT
• Credential type used.
• Credential Level achieved.
###
PROT 4 2 24 d Audit Logs MUST include: I PROT
• Identity Proofing Level achieved.
• The binding of any Attributes to a Digital Identity.
###
PROT 4 2 24 e Audit Logs MUST include: X
• Interaction type. (E.g. OIDC Authentication
Request and response).
• Unique interaction identifier. (in accordance with
IDX-06-01-01).
• Entity. An Identity Service Provider or a Relying
Party.
• Entity link. Any identity link used in the
interaction, such as the RP Link or IdP Link.
• Names of any Attributes requested and returned.
• Any Identity Proofing Level or Credential Level
requested and returned.
###
PROT 4 2 24 f Audit Logs MUST include the following events: A
• The binding of any Attributes to a Digital Identity.
• The retrieval of any Attributes by a Third Party.
###
# A80000OFFICIAL
A80000OFFICIAL #
###
ASSESS 7 2 1 The Applicant’s identity system MUST undergo a A C I X ASSESS
Security assessment by one or more Assessors (or
IRAP Assessor or other security professional) to
identify security deficiencies as part of initial
accreditation and annually thereafter as part of the
Annual Assessment.
###
ASSESS 7 3 1 The Applicant’s identity system MUST commission an A C I X ASSESS
Assessor to conduct an Accessibility Assessment and,
at a minimum:
• meet WCAG version 2.0 to the AA standard for
web-based identity services
• meet WCAG version 2.1 to the AA standard for
mobile-based identity services
as part of initial accreditation and annually thereafter
as part of the Annual Assessment.
###
ASSESS 7 4 2 The Applicant MUST define the scope , objectives and A C I X ASSESS
criteria for each Functional Assessment.
###
# A80000OFFICIAL
A80000OFFICIAL #
ROLE 2 1 1 The Applicant MUST have user terms that include: A C I X ROLE
a) A description of the nature of the identity system
(consistent with the TDIF) provided to the User by the
Applicant.
b) A general acknowledgment by the User that their
use of the identity system provided by the Applicant is
governed by the user terms.
c) The Applicant’s identity system is provided on an
‘as is’ and ‘as available’ basis.
d) The scope of the User’s right to access and use
the identity system must be consistent with the TDIF.
e) The User is responsible for their use of the
Applicant’s identity system, including any Identity
Documents it provides to the Applicant, and will use
the service in compliance with all applicable laws.
f) The User is responsible to provide accurate
Identity Documents and Attributes to the Applicant.
g) The Applicant does not share Attributes, Personal
information or Sensitive information, or Credentials
with third parties without the Consent of the
Individual.
h) The User reports unauthorised use of their Digital
Identity or Credential to the Applicant as soon as they
become aware of it.
i) The Applicant may suspend, cancel or terminate
the User’s access to the identity system at any time.
j) That the Applicant may make changes to the user
terms at any time without prior notice and if the user
terms are changed, the User’s continued use of the
identity system will be subject to their acceptance of
the updated user terms.
###
ROLE 2 1 4 The Applicant MUST have user terms, including: A C I X ROLE
a) All title, rights and interest in and to the
intellectual property of the Applicant, including any
modifications, corrections or enhancements thereto,
will remain vested in the Applicant, in accordance
with the TDIF.
b) The User is liable for breaches of intellectual
property caused by the User’s use of the service other
than in accordance with the TDIF.
c) The User must not use, reproduce, amend or
alter intellectual property rights in the service.
d) The User must comply with security requirements
or instructions provided to it by the Applicant.
###
ROLE 2 2 1 This requirement has been archived in version 1.7. A C I X ROLE
###
# A80000OFFICIAL
A80000OFFICIAL #
###
ROLE 2 2 1 b This requirement has been archived in version 1.7. A C I X ROLE
###
IDP 3 2 1 At a minimum, the Applicant MUST operate a TDIF I IDP
accredited identity system at Identity Proofing level 1
Plus as described in Table 1 below . [Table 1 of TDIF:
05 Role Requirements]
###
IDP 3 3 1 a The alternative Identity Proofing processes MAY I IDP
include:
• Acceptance of alternative types of EoI (for
example, evidence of the operation of an Identity in a
non-Australian community over time.
• Verification of an Individual’s claimed Identity
with a trusted referee whose Identity has been
verified to an equal or greater Identity Proofing Level.
• Verification of an Individual’s claimed Identity
with reputable organisations or bodies known to them
(for example, Aboriginal and Torres Strait Islander
organisations may hold, or be able to verify, the
Identity of Individuals where no prior government
record exists).
• Reliance on the Identity Proofing processes of
other organisations that have verified the Identity of
the Individual (i.e. Known Customer)
• A detailed interview with the Individual about
their life story to assess the consistency and
legitimacy of their claims.
• Alternative methods of providing Attributes or
Identity Documents (such as the provision of certified
copies by trusted third parties instead of attending an
in-person interview where an Individual can
demonstrate they live in a very remote area).
• Providing support for Individuals to obtain
evidence (such as assisting the Individual to register
their birth with a RBDM)
• Any other processes or approaches supported by
the IdP consistent with requirement IDP-03-03-01b
###
IDP 3 6 1 The Applicant MUST NOT collect, verify or validate I IDP
Attributes beyond those listed in Table 2 and Table 3.
[Table 2 and 3 of TDIF: 05 Role Requirements]
###
# A80000OFFICIAL
A80000OFFICIAL #
###
IDP 3 7 1 a This requirement This requirement has been archived I IDP
in version 1.7.
###
IDP 3 7 2 In accordance with PRIV-03-09-01, the Applicant I IDP
MUST limit this disclosure to the following Attributes:
• Identity attributes (verified) listed in Table 2.
• Contact attributes (validated) listed in Table 2.
• Identity system metadata listed in Table 2.
• Assumed self-asserted Attributes listed in Table 3.
###
IDP 3 7 3 The Applicant MUST seek permission from the DTA to I IDP
disclose Attributes beyond those listed in IDP-03-07-
02.
###
IDP 3 7 3 a The Applicant MUST NOT disclose Attributes beyond I IDP
those listed in IDP-03-07-02 unless approved by the
DTA to do so.
###
IDP 3 8 15 b The minimum number of subjects for the testing I IDP
MUST be at least the same as described in current
published version of the FIDO Biometric Requirements
.
###
IDP 3 8 31 If the Applicant utilises manual processes, The I IDP
Applicant MUST include this in their risk assessment
for biometric binding processes.
###
IDP 3 8 34 The Applicant MUST only undertake remote Manual I IDP
Face Comparison utilising Assessing Officers located
within Australia.
###
CSP 4 1 1 The Applicant MUST support at least one of the C CSP
Credential Levels described in Table 4.. [Table 4 of
TDIF: 05 Role Requirements]
###
# A80000OFFICIAL
A80000OFFICIAL #
###
CSP 4 2 1 a Memorised secrets MUST be at least 8 characters in C
length if chosen by the Individual. ###
CSP 4 2 1 b Memorised secrets chosen randomly by the Applicant C
MUST be at least 6 characters in length and MAY be
entirely numeric.
###
CSP 4 2 1 c If the Applicant disallows a chosen memorised secret C
based on its appearance on a blacklist of
compromised values, the Individual MUST be required
to choose a different memorised secret.
###
CSP 4 2 1 d When processing requests to establish and change C
memorised secrets, the Applicant MUST compare the
prospective secrets against a list that contains values
known to be commonly used, expected, or
compromised. For example, the list may include, but
is not limited to:
• Passwords obtained from previous breach
corpuses.
• Dictionary words.
• Repetitive or sequential characters (e.g. ‘aaaaaa’,
‘1234abcd’).
• Context-specific words, such as the name of the
service, the username, and derivatives thereof.
###
CSP 4 2 1 e If the chosen secret is found in the list, the Applicant C
MUST:
• advise the Individual that they need to select a
different secret,
• provide the reason for rejection, and
• require the Individual to choose a different value.
###
# A80000OFFICIAL
A80000OFFICIAL #
###
CSP 4 2 1 g C
# A80000OFFICIAL
A80000OFFICIAL #
CSP 4 2 2 C CSP
# A80000OFFICIAL
A80000OFFICIAL #
CSP 4 2 3 b C
# A80000OFFICIAL
A80000OFFICIAL #
CSP 4 2 3 f C
# A80000OFFICIAL
A80000OFFICIAL #
CSP 4 2 3 k C
# A80000OFFICIAL
A80000OFFICIAL #
CSP 4 2 4 g C
# A80000OFFICIAL
A80000OFFICIAL #
CSP 4 2 5 g C
When a MF OTP Credential is being associated with an
Individual’s digital identity account, the Applicant
MUST use AACAs to either generate and exchange, or
to obtain the secrets required to duplicate the
authentication output. ###
CSP 4 2 5 h C
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
CSP 4 2 8 d C
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
CSP 4 3 3 l C
# A80000OFFICIAL
A80000OFFICIAL #
CSP 4 3 5 C CSP
# A80000OFFICIAL
A80000OFFICIAL #
CSP 4 3 7 a C
To be considered CSP-compromise resistant, public
keys stored by the Applicant MUST be associated with
the use of approved cryptographic algorithms (i.e.
AACAs). ###
CSP 4 3 7 b C
Keys MUST provide at least the minimum-security
strength specified in the latest version of the ISM. ###
CSP 4 3 8 C CSP
# A80000OFFICIAL
A80000OFFICIAL #
CSP 4 3 11 C
# A80000OFFICIAL
A80000OFFICIAL #
CSP 4 4 1 g C
When any new Credential is bound to an Individual’s
account, the Applicant MUST ensure that the binding
protocol and the protocol for provisioning the
associated key(s) are done at a level of security
commensurate with the CL at which the Credential
will be used. ###
CSP 4 4 2 C CSP
# A80000OFFICIAL
A80000OFFICIAL #
CSP 4 4 3 C CSP
If a Applicant supports the binding of additional
Credentials to an Individual’s account, then it MUST
implement the following requirements for the
operation of binding additional credentials to an
individual’s account. ###
CSP 4 4 3 a C
###
CSP 4 4 6 C CSP
# A80000OFFICIAL
A80000OFFICIAL #
CSP 4 5 2 C
# A80000OFFICIAL
A80000OFFICIAL #
CSP 4 7 2 C
###
CSP 4 8 3 This requirement has been archived in version 1.7. C CSP
###
CSP 4 8 4 This requirement has been archived in version 1.7. C CSP
###
CSP 4 8 5 This requirement has been archived in version 1.7. C CSP
###
CSP 4 9 1 C CSP
# A80000OFFICIAL
A80000OFFICIAL #
CSP 4 9 1 d C
# A80000OFFICIAL
A80000OFFICIAL #
CSP 4 11 3 C
# A80000OFFICIAL
A80000OFFICIAL #
###
IDX 6 2 1 In accordance with PRIV-03-09-03, the Applicant X
MUST maintain the following information as part of
its auditable logs:
• timestamp.
• Duration of Consent. (including any time limit on
the consent).
• Relying Party. (i.e. The RP that requested to
receive the attributes).
• The Identifier that identifies the User at the
Relying Party authorised to receive the attributes.
• IdP/AP from which the attributes were sourced.
• The link to the identity at the source of the
attributes.
• Name of any attribute or attribute set authorised.
• Consent decision. This may be “grant”, “deny”, or
“ongoing”.
###
IDX 6 3 1 If single sign on is supported, then the Applicant X
MUST implement the following requirements to
operate single sign on.
###
IDX 6 3 2 The Applicant MUST support the ability for a Relying X
Party to request that a User authenticates regardless
of whether a pre-existing session exists.
###
IDX 6 3 2 a The Applicant MUST implement a single log out X
mechanism according to the Federation Protocol that
it supports.
###
IDX 6 3 3 The Applicant MAY securely cache Attributes from an X
Identity Service Provider for the duration of an
authenticated session to support single sign on.
###
IDX 6 3 3 a If the Applicant securely caches attributes as per IDX- X
06-03-03, these attributes MUST NOT be accessible to
the Applicant’s Personnel.
###
IDX 6 3 4 The Applicant MAY restrict the expiration period for X
an authentication session to manage security risks.
###
# A80000OFFICIAL
A80000OFFICIAL #
###
IDX 6 4 2 The Applicant MUST display to the Individual their X
Consumer History and enable the Individual to view
the Express Consent they have provided to share
attributes with a Relying Party or any third party.
###
IDX 6 4 3 The Applicant MUST NOT store Attributes of the X
Individual beyond the Individual’s presence at the
User Dashboard.
###
IDX 6 5 1 If IdP Selection is supported, the Applicant MUST X
implement the following requirements for the
operation of IdP Selection.
###
IDX 6 5 2 The list of Identity Service Providers presented by the X
Applicant to the User MUST be capable of meeting
the Credential Level and Identity Proofing Level
requested in the Authentication Request.
###
IDX 6 5 3 The Applicant MAY provide a mechanism for an X
Individual’s selection of an Identity Service Provider to
be remembered so the Individual does not have to
select an Identity Service Provider (again) when
accessing a Relying Party.
###
IDX 6 5 3 a Express Consent MUST be obtained from the X
Individual prior to offering the mechanism described
in IDX-06-05-02.
###
IDX 6 5 3 b The Individual MUST have the ability to opt out of X
using the mechanism described in IDX-06-05-02.
###
FED 2 1 7 This requirement has been archived in version 1.1. X FED
The content of this requirement has been moved to
PRIV-03-09-03.
###
# A80000OFFICIAL
A80000OFFICIAL #
###
FED 2 1 8 The Applicant’s Audit logs MUST store a record of all X FED
federated identity interactions that relate to an
Individual, including any requests and responses
between a Relying Party and an Identity Exchange, or
an Identity Service Provider and an Identity Exchange.
###
FED 2 1 8 a This requirement has been archived in version 1.1. X FED
The content of this requirement has been moved to
PROT-04-02-24e.
###
FED 2 1 9 The Applicant MUST develop and use procedures to A C I X
report incidents of fraud or suspected fraud to the
Oversight Authority (this replaces FRAUD-02-05-10).
###
FED 2 1 9 a As soon as they become aware the Applicant MUST A C I X
report incidents of fraud or suspected fraud to the
Oversight Authority (this replaces FRAUD-02-05-10a).
###
# A80000OFFICIAL
A80000OFFICIAL #
###
FED 2 1 10 An Applicant, covered by the Privacy Act, MUST A C I X
report eligible data breaches to affected individuals
and the Information Commissioner as required under
the Privacy Act[1] and also report the eligible data
breach to the Oversight Authority (this replaces PRIV-
03-04-01).
###
FED 2 1 10 a An Applicant, not covered by the Privacy Act, MUST A C I X
report eligible data breaches as defined in the Privacy
Act 1988 to affected individuals and the Oversight
Authority (this replaces PRIV-03-04-01a).
###
FED 2 1 11 The Applicant MUST include a statement in their A C I X
privacy notices advising that the Applicant may use
the Individual’s information as required by the
Oversight Authority, including to detect, manage and
investigate fraud (this replaces PRIV-03-05-02).
###
FED 2 1 12 The Applicant MAY include a statement in their A C I X
privacy notices advising that the Applicant may
provide the Individual’s system metadata to the
Oversight Authority to enable it to perform the
Oversight Authority’s functions related to fraud
management.
###
# A80000OFFICIAL
A80000OFFICIAL #
###
FED 2 1 14 The Applicant MUST develop and use procedures that A C I X
ensure:
a) All elements of the Applicant’s System Security
Plan are achieved.
b) Cyber security incidents are investigated,
responded to and reported to the Oversight
Authority.
c) Relevant security policy or legislative obligations
are met.
(This replaces PROT-04-01-06).
###
FED 2 1 15 The Applicant MUST develop and use procedures to A C I X
report Cyber security incidents to the Oversight
Authority (this replaces PROT-04-02-15).
###
FED 2 1 15 a As soon as they become aware the Applicant MUST A C I X
report Cyber security incidents to the Oversight
Authority (this replaces PROT-04-02-15a).
###
# A80000OFFICIAL
A80000OFFICIAL #
###
FED 2 3 1 The Applicant MUST generate Pairwise Identifiers in I X FED
accordance with section 8.1 of the OpenID Connect
Core 1.0 specification [OpenIDCore] and use these to
interact with Relying Parties regardless of the
Federation Protocol the Applicant is using to
communicate with other Participants in the
Federation.
###
FED 2 3 9 This requirement has been archived in version 1.1. X FED
###
FED 2 3 10 The Applicant MUST have a process to conduct X FED
Deduplication of Digital identities which pass through
an Identity Exchange to ensure that a User with
multiple digital identities is presented as the same
user to a Relying Party.
###
FED 2 3 11 The Applicant MUST only deduplicate Digital Identities X FED
which have been proved to the same Identity Proofing
Level.
###
FED 2 3 21 If the Applicant supports single sign on, it MUST X FED
support the ability for a Relying Party to request
Authentication for a particular User using the method
specified in the Federation Protocol being used. See
section 4.2 for more detail on how an Identity
Exchange can support this.
###
# A80000OFFICIAL
A80000OFFICIAL #
###
FED 2 3 23 This requirement has been archived in version 1.1. C I X FED
The content of this requirement has been moved to
IDX-06-03-02a
###
FED 2 3 25 This requirement has been archived in version 1.1. X FED
The content of this requirement has been moved to
IDX-06-03-03a
###
FED 2 3 26 This requirement has been archived in version 1.1. C I X FED
###
FED 2 3 27 This requirement has been archived in version 1.1. X FED
The content of this requirement has been moved to
IDX-06-03-03
###
FED 2 3 28 This requirement has been archived in version 1.1. C I X FED
The content of this requirement has been moved to
IDX-06-03-04
###
FED 2 3 29 This requirement has been archived in version 1.1. X FED
###
FED 2 3 30 This requirement has been archived in version 1.1. I FED
###
FED 3 2 1 The Applicant’s Audit Log MUST include any User A FED
Consent managed by the Applicant that enables the
sharing of attributes with a Relying Party.
###
FED 3 2 2 The Applicant’s Audit Log MUST include the value of A FED
the RP Audit Id Attribute received from an Identity
Exchange for the following events:
• The retrieval of Attributes by an Identity
Exchange.
• The binding of any Attributes to a Digital Identity
brokered by an Identity Exchange.
###
FED 3 2 3 This requirement has been archived in version 1.1. A FED
###
FED 4 1 1 This requirement has been archived in version 1.1. X FED
The content of this requirement has been moved to
IDX-06-01-01.
###
# A80000OFFICIAL
A80000OFFICIAL #
###
FED 4 1 3 The Applicant MUST provide the unique audit id X FED
described in IDX-06-01-01 to the Relying Party using
the RP_audit_id Attribute in response to every logical
interaction between a Relying Party (including an
Attribute Service Provider) and an Identity Exchange
###
FED 4 1 4 When the Applicant calls an API provided by an X FED
Attribute Service Provider, they MUST include the
value of the unique audit id that has been generated
by the Identity Exchange for the Relying Party that
requested the Attributes.
###
FED 4 1 5 The Applicant MUST NOT send the unique audit id X FED
that has been generated by the Identity Exchange for
the Relying Party that requested the Attributes to an
Identity Service Provider.
###
FED 4 1 6 The Applicant MUST implement a User Dashboard in X FED
accordance with the requirements in section 6.4 of
the TDIF 05 – Role Requirements.
###
FED 4 1 7 This requirement has been archived in version 1.1. X FED
The content of this requirement has been moved to
IDX-06-04-02.
###
FED 4 1 8 This requirement has been archived in version 1.1. X FED
The content of this requirement has been moved to
IDX-06-04-03.
###
FED 4 1 13 The Applicant MUST implement IdP Selection in X FED
accordance with the requirements in section 6.5 of
the TDIF 05 – Role Requirements.
###
FED 4 1 14 This requirement has been archived in version 1.1. X FED
The content of this requirement has been moved to
IDX-06-05-01b.
###
# A80000OFFICIAL
A80000OFFICIAL #
###
FED 4 1 16 This requirement has been archived in version 1.1. X FED
The content of this requirement has been moved to
IDX-06-05-02
###
FED 4 2 1 This requirement has been archived in version 1.1. X FED
###
FED 4 2 1 a This requirement has been archived in version 1.1. X FED
###
FED 4 2 1 b This requirement has been archived in version 1.1. X FED
###
FED 4 2 1 c This requirement has been archived in version 1.1. X FED
###
FED 4 2 1 d This requirement has been archived in version 1.1. X FED
###
FED 4 2 3 c If the sub (subject) claim is specified then it MUST be X FED
processed as per the requirements in section 4.2.2.2
###
FED 4 2 10 The Applicant MUST evaluate the ACR returned from X FED
the Identity Service Provider and if the ACR meets or
exceeds the originally requested value(s), return one
of the originally requested values
###
# A80000OFFICIAL
A80000OFFICIAL #
###
FED 4 2 14 This requirement has been archived in version 1.1 X FED
###
FED 4 2 19 The Applicant MUST evaluate the X FED
<saml:AuthnContextClassRef> returned from the
Identity Service Provider and if the
<saml:AuthnContextClassRef> meets or exceeds the
originally requested ACR value(s), return one of the
originally requested values.
###
FED 5 1 1 The Applicant MUST support the disclosure of all X FED
Attributes described in section 3.1 of the TDIF: 06D -
Attribute Profile using one of the federation protocols
specified in section 2.1.1 of the TDIF 06 – Federation
Onboarding Requirements
###
FED 5 1 2 The Applicant MUST support the disclosure of all I FED
Attributes listed as mandatory in section 3.1 of the
TDIF: 06D - Attribute Profile using one of the
federation protocols specified in section 2.1.1 of the
TDIF 06 – Federation Onboarding Requirements
###
FED 5 1 3 The Applicant MAY support the disclosure of an I FED
Attribute listed as optional in section 3.1 of TDIF: 06D
- Attribute Profile using one of the federation
protocols specified in section 2.1.1 of the TDIF 06 –
Federation Onboarding Requirements
###
FED 5 1 4 The Applicant MUST support the disclosure of all I FED
Attributes listed as mandatory in section 3.2 of the
TDIF: 06D - Attribute Profile using one of the
federation protocols specified in section 2.1.1 of the
TDIF 06 – Federation Onboarding Requirements.
###
FED 5 1 6 The Applicant MUST support the disclosure of all X FED
Attributes described in section 3.3 of TDIF: 06D -
Attribute Profile using one of the federation protocols
specified in section 2.1.1 of the TDIF 06 – Federation
Onboarding Requirements
###
# A80000OFFICIAL
A80000OFFICIAL #
###
FED 5 3 1 The Applicant MAY support the disclosure of X FED
Attributes an Attribute Service Provider is accredited
to provide. These Attributes are defined in section 5
of the TDIF: 06D - Attribute Profile.
###
FED 5 3 2 The Applicant MUST ensure that it only disclosure, or A FED
provides to an Identity Exchange to be shared,
Attributes that are relevant to the Relying Party
requesting the Attributes
###
FED 5 4 1 The Applicant MUST only disclose Attributes with X FED
Relying Parties in accordance with the Attribute
Sharing Policy specified for the Attribute Set which an
Attribute is part of as described in section 2.2 of the
TDIF: 06D - Attribute Profile.
###
FED 5 5 1 When disclosing Attributes to other Participants in the A I X FED
Identity Federation, the Applicant MUST use the
attribute data representation for Attributes specified
in section 6 of the TDIF: 06D - Attribute Profile.
###
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
3 1 5 The TDIF Application Letter MUST include the names and contact
details of people responsible within the Applicant’s organisation
to manage their TDIF accreditation .
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
7 4 2 The Applicant MUST define the scope , objectives and criteria for
each Functional Assessment and provide this to the DTA as part of
its Accreditation Plan.
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
3 6 1 For each EoI document used, the Applicant MAY collect and verify,
and create and record the Attributes listed in Table 2. [pg 17 of
TDIF: 05 Role Requirements]
# A80000OFFICIAL
A80000OFFICIAL #
3 7 3 The Applicant MAY seek permission from the DTA to request the
sharing of more Attributes than those listed in TDIF req: IDP-03-
07-02.
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
4 1 8 The Applicant MUST ensure that the User Dashboard feature does
not store personal Attributes of the User beyond the User’s
presence at the User Dashboard.
# A80000OFFICIAL
A80000OFFICIAL #
4 2 10 The Applicant MUST evaluate the ACR returned from the Identity
Service Provider and if the ACR meets or exceeds the originally
requested value, return the originally requested value.
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
Colour Key
Changed
New
Archived
# A80000OFFICIAL
A80000OFFICIAL #
ACCRED ACCRED-03-01-01a 4.3.1 All information provided to the DTA for the
purpose of TDIF accreditation MUST be in English .
ACCRED ACCRED-03-01-01b 4.3.1 The Applicant MUST have a registered and active
ABN.
ACCRED ACCRED-03-01-02a 4.3.1 The TDIF Application Letter MUST specify the
assurance levels supported by their identity
service. For Identity Service Providers this means
Identity Proofing Levels. For Credential Service
Providers this means Credential Levels .
# A80000OFFICIAL
A80000OFFICIAL #
ACCRED ACCRED-03-01-02b 4.3.1 The TDIF Application Letter MUST specify whether
the identity system supports web responsive
design, mobile apps or a combination of these.
This information will determine the scope of the
Accessibility Assessment.
ACCRED ACCRED-03-01-02c 4.3.1 The TDIF Application Letter MUST specify whether
the Applicant is seeking to connect to the
Australian Government’s identity federation
# A80000OFFICIAL
A80000OFFICIAL #
ACCRED ACCRED-03-01-05 4.3.1 The TDIF Application Letter MUST include the
names and contact details of people responsible
within the Applicant’s organisation(s) to manage
their TDIF accreditation .
# A80000OFFICIAL
A80000OFFICIAL #
ACCRED ACCRED-03-01-06 4.3.1 The TDIF Application Letter MAY include any
relevant TDIF Exemption Requests in accordance
with the process set out in Appendix A: TDIF
exemption process.
ACCRED ACCRED-03-01-06a 4.3.1 Each TDIF Exemption Request MUST include all
information as described in Appendix A: TDIF
exemption process.
ACCRED ACCRED-03-01-07 4.3.1 The Applicant MAY include a copy of prior audit
work which it requests the DTA consider as a
substitute for relevant Functional Assessments.
ACCRED ACCRED-03-01-07a 4.3.1 Any request made to the DTA to consider prior
audit work MUST include:
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
FRAUD FRAUD-02-02-01a 4.2.2 The Fraud Control Plan MUST detail the:
# A80000OFFICIAL
A80000OFFICIAL #
FRAUD FRAUD-02-02-02 4.2.2 The Fraud Control Plan (and supporting Fraud
Control Plans) MUST be reviewed annually by the
Applicant’s Accountable Authority and when there
is a change in the ownership, structure, functions
or activities of the Applicant which may impact the
operation of the fraud control components of their
identity system.
# A80000OFFICIAL
A80000OFFICIAL #
FRAUD FRAUD-02-03-01 4.2.3 The Applicant MUST provide all Personnel with
fraud awareness training at engagement and
annually thereafter. A copy of these training
materials will be requested by the DTA as part of
initial accreditation and annually thereafter as part
of the Annual Assessment.
FRAUD FRAUD-02-03-02 4.2.3 The Applicant MUST demonstrate to the DTA how
it considers the risk of fraud when planning and
conducting activities associated with the operation
of its identity system.
# A80000OFFICIAL
A80000OFFICIAL #
FRAUD FRAUD-02-04-02a 4.2.4 The Applicant MUST compare all new registrations
and updates to existing records against the fraud
control mechanism used to flag incidents of fraud
or suspected fraud.
FRAUD FRAUD-02-04-02b 4.2.4 The Applicant MUST NOT allow a new registration
or update to be completed if the fraud control
mechanism indicates the registration or update is
fraudulent or suspected fraud.
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
FRAUD FRAUD-02-05-07 4.2.5 The Applicant MUST refer all instances of potential
or serious or complex fraud offences to the AFP in
accordance with the AGIS and AFP referral process,
except in the following circumstances:
a) Where legislation sets out specific alternative
arrangements.
b) Where the Applicant:
i. Has the capacity and the appropriate skills and
resources needed to investigate potential criminal
matters.
ii. Meets the requirements of the AGIS for
gathering evidence and the Commonwealth
Director of Public Prosecutions (CDPP) in preparing
briefs of evidence.
FRAUD FRAUD-02-05-09 4.2.5 The Applicant MUST take all reasonable measures
to recover financial losses caused by illegal activity
through proceeds of crime and civil recovery
processes or administrative remedies.
FRAUD FRAUD-02-05-10 4.2.5 The Applicant MUST develop and use procedures
to report incidents of fraud or suspected fraud to
the DTA.
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
FRAUD FRAUD-02-06-03 4.2.6 The Applicant MUST have in place processes such
as appropriate identification of an Individual
whose Attributes, Digital Identity or Credential has
been compromised and appropriate technologies
to enable the applicant to flag the Attributes,
Digital Identity or Credential as compromised.
FRAUD FRAUD-02-06-04 4.2.6 The Applicant MUST prevent the fraudulent use of
a User’s Attributes, Digital Identity or Credentials
(including continued fraudulent activity) once the
Applicant suspects or it becomes aware of the
fraudulent use.
# A80000OFFICIAL
A80000OFFICIAL #
PRIV PRIV-03-02-01 4.3.2 The Applicant MUST have at least one designated
Privacy Officer who is the primary point of contact
for advice on privacy matters.
# A80000OFFICIAL
A80000OFFICIAL #
PRIV PRIV-03-02-02a 4.3.2 The Applicant MUST demonstrate how its Privacy
Champion promotes a culture of privacy that
values and protects Personal information.
PRIV PRIV-03-02-02b 4.3.2 The Applicant MUST demonstrate how its Privacy
Champion approves its Privacy Management Plan,
and reviews of the Applicant’s progress against the
Privacy Management Plan.
# A80000OFFICIAL
A80000OFFICIAL #
PRIV PRIV-03-02-03a 4.3.2 The Applicant MUST have a separate Privacy Policy
in relation to its identity system to that of its other
business, organisation functions or Accredited
Roles.
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
PRIV PRIV-03-03-01 4.3.3 The Applicant MUST maintain a register of the PIAs
it conducts.
PRIV PRIV-03-04-02 4.3.4 The Applicant MUST develop and maintain a Data
Breach Response Plan that includes a description
of the actions to be taken if a breach is suspected,
discovered, or reported by Personnel or external
party, including a clear communication plan and
information about when it is to be escalated to the
data breach response team or third party.
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
PRIV PRIV-03-06-04 4.3.6 The Applicant MUST NOT use Personal information
for direct marketing purposes as defined in APP 7.
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
PRIV PRIV-03-06-06 4.3.6 The Applicant MUST NOT retain Users’ Attributes
once they are passed from an Identity Service
Provider to a Relying Party with the exception of
securely storing the attributes for the duration of
an authenticated session.
PRIV PRIV-03-07-01 4.3.7 The Applicant MUST only collect, use and disclose
an Individual’s Behavioural Information to:
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
PRIV PRIV-03-09-03 4.3.9 The Applicant MUST maintain Audit Logs that
demonstrate how Express Consent was obtained
from the Individual.
# A80000OFFICIAL
A80000OFFICIAL #
PRIV PRIV-03-09-03a 4.3.9 The Audit Logs MUST NOT contain Biometric
information.
PRIV PRIV-03-09-04 4.3.9 The Applicant MUST inform Individuals of other
channels available to verify Identity and make clear
to the User what the consequences are of
declining to provide Express Consent or the
required information.
# A80000OFFICIAL
A80000OFFICIAL #
PRIV PRIV-03-12-03 4.3.12 The Applicant MUST give the Individual access to
their Personal information in the manner
requested by the Individual, if it is reasonable,
secure and practicable to do so.
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
PROT PROT-04-01-06 4.4.1 The Applicant MUST develop and use procedures
that ensure:
PROT PROT-04-01-07 4.4.1 The Applicant MUST provide all Personnel with
security awareness training at engagement and
annually thereafter. A copy of these training
materials will be requested by the DTA as part of
initial accreditation and annually thereafter as part
of the Annual Assessment.
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
PROT PROT-04-01-13 4.4.1 The System Security Plan (and supporting System
Security Plans) MUST be reviewed annually by the
Applicant’s Accountable Authority and when there
is a change in the ownership, structure, functions
or activities of the Applicant which may impact the
operation of the protective security components of
their identity system.
# A80000OFFICIAL
A80000OFFICIAL #
PROT PROT-04-01-15 4.4.1 The Applicant MUST identify a risk steward (or
manager) who is responsible for each security risk
or category of security risk, including for shared
risks.
PROT PROT-04-01-17 4.4.1 The System Security Plan (and supporting System
Security Plans) MUST include scalable measures to
meet variations in threat levels and accommodate
changes in the National Terrorism Threat Level.
PROT PROT-04-01-18 4.4.1 Where the CSO (or security advisor on behalf of
the CSO) implements an alternative mitigation
measure or control to a TDIF requirement, they
MUST document the decision and adjust the
maturity level for the related TDIF requirement.
These decisions will be requested by the DTA
during Annual Assessments.
PROT PROT-04-01-19 4.4.1 The Applicant MUST assess the maturity of its
security capability and risk culture by considering
its progress against goals and strategic objectives
identified in its System Security Plan.
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
PROT PROT-04-02-06 4.4.2 The Applicant MUST NOT expose the public to
unnecessary security risks when transacting online.
PROT PROT-04-02-08a 4.4.2 The Applicant MUST compare all new registrations
and updates to existing records against the control
mechanism used to flag Cyber security incidents.
PROT PROT-04-02-08b 4.4.2 The Applicant MUST NOT allow a new registration
or update to be completed if the control
mechanism indicates the registration or update
will create a Cyber security incident.
# A80000OFFICIAL
A80000OFFICIAL #
PROT PROT-04-02-12 4.4.2 The Applicant MUST refer all instances of potential
or serious or complex security offences to the AFP
in accordance with the AGIS and AFP referral
process, except in the following circumstances:
# A80000OFFICIAL
A80000OFFICIAL #
PROT PROT-04-02-14 4.4.2 The Applicant MUST take all reasonable measures
to recover financial losses caused by illegal activity
through proceeds of crime and civil recovery
processes or administrative remedies.
PROT PROT-04-02-15 4.4.2 The Applicant MUST develop and use procedures
to report Cyber security incidents to the DTA.
PROT PROT-04-02-16 4.4.2 The Applicant MUST develop and use procedures
to report significant Cyber security incidents to the
relevant authority or affected entity as described
in the PSPF.
# A80000OFFICIAL
A80000OFFICIAL #
PROT PROT-04-02-19 4.4.2 The Applicant MUST have in place processes such
as appropriate identification of an Individual
whose Attributes, Digital Identity or Credential has
been subject to a Cyber Security Incident and
appropriate technologies to enable the Applicant
to flag the Attributes, Digital Identity or Credential
as compromised.
PROT PROT-04-02-20 4.4.2 The Applicant MUST prevent the continued use of
a User’s Attributes, Digital Identity or Credentials
once the Applicant suspects or it becomes aware it
has been subject to a Cyber Security Incident.
# A80000OFFICIAL
A80000OFFICIAL #
PROT PROT-04-02-24 4.4.2 The Applicant MUST ensure their ICT systems
(including software) incorporate processes for
generating Audit Logs.
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
PROT PROT-04-02-24f 4.4.2 Audit Logs MUST include the following events:
# A80000OFFICIAL
A80000OFFICIAL #
PROT PROT-04-02-27 4.4.2 The Applicant MUST test their Disaster Recovery
and Business Continuity Plan annually. The DTA
will request evidence of as part of accreditation
and during Annual Assessments.
# A80000OFFICIAL
A80000OFFICIAL #
PROT PROT-04-03-03 4.4.3 The Applicant MUST assess and manage the
ongoing suitability of its Personnel.
PROT PROT-04-03-04 4.4.3 The Applicant MUST ensure that separating
Personnel have their access to the Applicant’s
resources withdrawn, including:
PROT PROT-04-04-03 4.4.4 The Applicant MUST assess security risks and
select appropriate containers, cabinets, secure
rooms and strong rooms to protect information
and assets.
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
UX UX-05-02-05 4.5.2 The Applicant MUST advise the User whether the
identity verification process has been successfully
completed.
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
UX UX-05-04-01a 4.5.4
UX UX-05-04-01a 4.5.4
UX UX-05-04-01a 4.5.4
# A80000OFFICIAL
A80000OFFICIAL #
UX UX-05-04-01a 4.5.4
UX UX-05-04-01a 4.5.4
UX UX-05-04-01b 4.5.4
UX UX-05-04-01b 4.5.4
UX UX-05-04-01b 4.5.4
UX UX-05-04-01b 4.5.4
UX UX-05-04-01b 4.5.4
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
TEST TEST-06-01-01 4.6.1 The Applicant MUST develop at least one Technical
Test Plan which covers the testing of all applicable
TDIF requirements (i.e. at a minimum the TDIF
requirements set out at TEST-06-01-04).
TEST TEST-06-01-02 4.6.1 The Applicant MUST include the content described
in Table 1 in Technical Test Plan and provide a copy
of the Technical Test Plan to the DTA as part of
initial accreditation.
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
TEST TEST-06-02-02 4.6.2 The Applicant MUST assess and report execution
coverage for each test case during the testing
process.
TEST TEST-06-03-01 4.6.3 For test completion the Applicant MUST complete
a Technical Test Report and provide this to the
DTA as part of initial accreditation.
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
ASSESS ASSESS-07-04-02 4.7.4 The Applicant MUST define the scope , objectives
and criteria for each Functional Assessment.
# A80000OFFICIAL
A80000OFFICIAL #
ASSESS ASSESS-07-05-01 4.7.5 The Applicant MUST demonstrate to the DTA how
the Assessors have relevant, reasonable and
adequate experience, training and qualifications to
conduct the Functional Assessment.
ASSESS ASSESS-07-05-02 4.7.5 The Applicant MUST demonstrate to the DTA how
the Assessors:
• Are independent from the development and
operational teams of the Applicant’s identity
system.
• Do not possess a conflict of interest in
performing the Functional Assessment on the
Applicant’s identity system.
ASSESS ASSESS-07-06-01 4.7.6 The Applicant MUST ensure Assessors have access
to and consider all relevant evidence provided by
the Applicant to the DTA. This includes any
responses by the DTA to questions which may have
been asked.
ASSESS ASSESS-07-06-02 4.7.6 The Applicant MUST ensure Assessors conduct the
Functional Assessments.
ASSESS ASSESS-07-06-03 4.7.6 The Applicant MUST use the compliance ratings
listed in ‘Appendix A: Compliance ratings’ when
determining areas of compliance and non-
compliance with the requirements of the TDIF.
# A80000OFFICIAL
A80000OFFICIAL #
ASSESS ASSESS-07-06-05 4.7.6 The Functional Assessment MAY include a site visit
to the Applicant’s premises or other location
where it provides services in connection with its
identity system.
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
ROLE ROLE-02-01-02 5.2.1 The Applicant MUST have user terms, including:
# A80000OFFICIAL
A80000OFFICIAL #
ROLE ROLE-02-01-03 5.2.1 The Applicant MUST have user terms, including:
ROLE ROLE-02-01-04 5.2.1 The Applicant MUST have user terms, including:
# A80000OFFICIAL
A80000OFFICIAL #
ROLE ROLE-02-01-05 5.2.1 The Applicant MUST have user terms, including:
# A80000OFFICIAL
A80000OFFICIAL #
IDP IDP-03-02-02 5.3.2 For each supported Identity Proofing Level, the
Applicant MUST implement it as described in Table
1 below. [Table 1 of TDIF: 05 Role Requirements]
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
IDP IDP-03-04-02a 5.3.4 The Applicant MUST confirm the legitimacy of any
request by a User to prevent the continued use of
their Digital Identity in accordance with IDP-03-04-
02, prior to preventing the continued use of that
Digital Identity.
IDP IDP-03-04-02b 5.3.4 The Applicant MUST notify the User that a Digital
Identity can no longer be used in accordance with
IDP-03-04-02 and the reason why it can no longer
be used (e.g. deactivated, suspended, etc).
# A80000OFFICIAL
A80000OFFICIAL #
IDP IDP-03-05-01 5.3.5 The Applicant MUST achieve all the requirements
of the higher Identity Proofing Level.
# A80000OFFICIAL
A80000OFFICIAL #
IDP IDP-03-05-02 5.3.5 The Applicant MUST ensure that an Individual can
prove ownership of their existing Identity by
authenticating with their Credential to their
account prior to commencing the Identity Proofing
Step-Up process.
IDP IDP-03-06-01 5.3.6 The Applicant MUST NOT collect, verify or validate
Attributes beyond those listed in Table 2 and Table
3. [Table 2 and 3 of TDIF: 05 Role Requirements]
# A80000OFFICIAL
A80000OFFICIAL #
IDP IDP-03-07-03 5.3.7 The Applicant MUST seek permission from the DTA
to disclose Attributes beyond those listed in IDP-
03-07-02.
5.3.8.1
3.8.1 Requirements for online Biometric Binding
5.3.8.1
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
IDP IDP-03-08-01 5.3.8.1 The Applicant MUST restrict access to the control
of any aspects of the Biometric Capability
exclusively to Assessing Officers that have
completed the appropriate training pertaining to
the exercise of such control.
# A80000OFFICIAL
A80000OFFICIAL #
IDP IDP-03-08-04 5.3.8.1 The Applicant MUST complete the image capture
and presentation attack detection processes as
part of the same process before submission to
Online Biometric binding. This is to prevent attacks
that would exploit the separation of the
presentation attack detection and the image
acquisition.
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
IDP IDP-03-08-08 5.3.8.2 The Applicant MUST ensure that the presentation
attack detection technology meets the
requirements of at least Evaluation Assurance
Level 1 as described by ISO 30107-3.
IDP IDP-03-08-09 5.3.8.2 The Applicant capability MUST have been tested
by a qualified third-party testing entity with
experience in biometric testing and ISO 30107 to
determine that the presentation attack detection
technology meets the requirements for at least
Evaluation Assurance Level 1 of ISO 30107-3.
IDP IDP-03-08-09b 5.3.8.2 All testing performed MUST have been performed
on a solution that incorporates all hardware and
software involved in the biometric binding process
including the presentation attack detection
technology and biometric matching.
IDP IDP-03-08-10 5.3.8.2 The Applicant MUST provide a report to the DTA as
part of initial accreditation from the qualified third-
party testing entity outlining that the Applicant’s
presentation attack detection technology has been
suitably tested to the specifications of at least
Evaluation Assurance Level 1 of ISO 30107-3.
# A80000OFFICIAL
A80000OFFICIAL #
IDP IDP-03-08-11 5.3.8.3 The Applicant MUST verify the authenticity of the
image read from the Photo ID RFID chip according
to the Photo ID Issuing Authority instructions.
IDP IDP-03-08-12 5.3.8.3 The Applicant MUST only process Claimed Photo ID
through document biometric matching that
contain a government issued and cryptographically
signed image, such as an ePassport.
# A80000OFFICIAL
A80000OFFICIAL #
IDP IDP-03-08-14 5.3.8.3 The Applicant MUST NOT use a biometric matching
algorithm to perform one-to-many matching
against a database of reference images as part of
the biometric binding process.
IDP IDP-03-08-16 5.3.8.3 The Applicant MUST achieve a false match rate
equivalent to or lower than FIDO Biometric
Requirements. This requires a false match rate of
not more than 0.01% and a false non-match rate of
not more than 3%.
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
IDP IDP-03-08-17 5.3.8.4 Where the Photo ID used has an RFID chip that is
available and functional, the Applicant MUST
perform a biometric match of the Acquired image
only against the image read directly from the
Photo ID RFID chip.
IDP IDP-03-08-17a 5.3.8.4 Where an RFID chip is not available, the Photo ID
image used for biometric matching MUST NOT be
from a scan of a physical document.
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
5.3.8.6
3.8.6 Requirements for Local Biometric Binding
# A80000OFFICIAL
A80000OFFICIAL #
IDP IDP-03-08-22 5.3.8.6 The Applicant MUST perform a DVS check as part
of the Local Biometric binding process to confirm
the authenticity of a Photo ID.
5.3.8.7
3.8.7 Requirements for logging and data retention
# A80000OFFICIAL
A80000OFFICIAL #
IDP IDP-03-08-24a 5.3.8.7 This log MUST NOT include Biometric Samples.
IDP IDP-03-08-25 5.3.8.7 The Applicant MUST have in place audit or random
checking procedures to help detect fraud or
inadequate Manual Face Comparison and
verification by Assessing Officers.
IDP IDP-03-08-26 5.3.8.7 The Applicant MUST NOT retain any Personally
Identifiable Information captured in biometric
binding processes.
IDP IDP-03-08-30 5.3.8.8 The Acquired image MUST NOT be retained after
completion of the Local Biometric Binding or
Online Biometric binding processes by the
Assessing Officer.
# A80000OFFICIAL
A80000OFFICIAL #
IDP IDP-03-08-33 5.3.8.8 The Applicant MUST only perform remote Manual
Face Comparison for Online Biometric binding
after attempting a Biometric Match.
CSP CSP-04-01-02 5.4.1 For each supported Credential Level, the Applicant
MUST implement it to meet all requirements as
described in Table 4. [Table 4 of TDIF: 05 Role
Requirements]
CSP CSP-04-01-05a 5.4.1 The Applicant MUST confirm the legitimacy of the
request in accordance with CSP-04-01-05, prior to
preventing the continued use of a Credential.
# A80000OFFICIAL
A80000OFFICIAL #
CSP CSP-04-01-05b 5.4.1 The Applicant MUST notify the Individual that a
Credential can no longer be used in accordance
with CSP-04-01-05 and the reason why it can no
longer be used (e.g. deactivated, expired, revoked,
etc).
# A80000OFFICIAL
A80000OFFICIAL #
CSP CSP-04-02-01e 5.4.2.1 If the chosen secret is found in the list, the
Applicant MUST:
• advise the Individual that they need to select a
different secret,
• provide the reason for rejection, and
• require the Individual to choose a different
value.
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
ASP ASP-05-02-05a 5.5.2 The Applicant MUST confirm the legitimacy of the
request from an authorised Individual or
Authoritative Source in accordance with ASP-05-
02-05, prior to actioning the request.
# A80000OFFICIAL
A80000OFFICIAL #
IDX IDX-06-01-02 5.6.1 The Applicant MUST log all related interactions
between Relying Parties and Identity Service
Providers using this unique audit id (this includes
Attribute Service Providers acting as Relying
Parties).
# A80000OFFICIAL
A80000OFFICIAL #
IDX IDX-06-03-02 5.6.3 The Applicant MUST support the ability for a
Relying Party to request that a User authenticates
regardless of whether a pre-existing session exists.
IDX IDX-06-03-02a 5.6.3 The Applicant MUST implement a single log out
mechanism according to the Federation Protocol
that it supports.
IDX IDX-06-03-03 5.6.3 The Applicant MAY securely cache Attributes from
an Identity Service Provider for the duration of an
authenticated session to support single sign on.
IDX IDX-06-03-04 5.6.3 The Applicant MAY restrict the expiration period
for an authentication session to manage security
risks.
IDX IDX-06-04-02 5.6.4 The Applicant MUST display to the Individual their
Consumer History and enable the Individual to
view the Express Consent they have provided to
share attributes with a Relying Party or any third
party.
IDX IDX-06-04-03 5.6.4 The Applicant MUST NOT store Attributes of the
Individual beyond the Individual’s presence at the
User Dashboard.
# A80000OFFICIAL
A80000OFFICIAL #
IDX IDX-06-05-03b 5.6.5 The Individual MUST have the ability to opt out of
using the mechanism described in IDX-06-05-02.
FED FED-02-01-03 6.2.1 The Applicant MUST implement the Relying Party
to Identity Exchange profile specified in either the:
a) TDIF: 06B - OpenID Connect 1.0 Profile; or
b) The TDIF: 06C - SAML 2.0 Profile.
# A80000OFFICIAL
A80000OFFICIAL #
FED FED-02-01-08 6.2.1 The Applicant’s Audit logs MUST store a record of
all federated identity interactions that relate to an
Individual, including any requests and responses
between a Relying Party and an Identity Exchange,
or an Identity Service Provider and an Identity
Exchange.
FED FED-02-01-09 6.2.1 The Applicant MUST develop and use procedures
to report incidents of fraud or suspected fraud to
the Oversight Authority (this replaces FRAUD-02-
05-10).
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
FED FED-02-01-14 6.2.1 The Applicant MUST develop and use procedures
that ensure:
a) All elements of the Applicant’s System
Security Plan are achieved.
b) Cyber security incidents are investigated,
responded to and reported to the Oversight
Authority.
c) Relevant security policy or legislative
obligations are met.
(This replaces PROT-04-01-06).
FED FED-02-01-15 6.2.1 The Applicant MUST develop and use procedures
to report Cyber security incidents to the Oversight
Authority (this replaces PROT-04-02-15).
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
FED FED-02-03-07 6.2.3 The process for the registration of OIDC clients by
the Applicant MUST ensure that only valid and
authorised clients for the Relying Party can use the
same configured sector_identifier_uri.
# A80000OFFICIAL
A80000OFFICIAL #
FED FED-02-03-14 6.2.3 The Applicant MUST ensure that the documents
and attributes used to construct an EDI reflect the
most up to date documents and attributes bound
to the current authentication context.
FED FED-02-03-15a 6.2.3 If the User has not verified any of the documents
in Table 1 (as updated by DTA from time to time),
the Applicant MUST construct an EDI by
concatenating the IP Link for the User and a
suitable globally-unique identifier for the Applicant
(e.g. OIDC Issuer URI).
FED FED-02-03-15b 6.2.3 The string resulting from either TDIF Req FED-02-
03-15 or TDIF Req FED-02-03-15a MUST then be
encoded using UTF-8, before being hashed using
the SHA-256 algorithm.
FED FED-02-03-16 6.2.3 The Applicant MUST NOT provide access to an EDI
to any party other than an Identity Exchange.
FED FED-02-03-17 6.2.3 The Applicant MUST NOT store an EDI received
from an Identity Service Provider or use it as their
Pairwise Identifier for the User being
authenticated.
FED FED-02-03-18 6.2.3 The Applicant MUST NOT provide access to an EDI
to any other party in the Identity Federation.
# A80000OFFICIAL
A80000OFFICIAL #
FED FED-02-03-21 6.2.3 If the Applicant supports single sign on, it MUST
support the ability for a Relying Party to request
Authentication for a particular User using the
method specified in the Federation Protocol being
used. See section 4.2 for more detail on how an
Identity Exchange can support this.
# A80000OFFICIAL
A80000OFFICIAL #
FED FED-03-01-01 6.3.1 The Applicant MUST publish a schema for any
Attributes it provides. This schema must
enumerate the valid values for any Attributes that
have a defined set of values, and be done in a
format which complies with the platform through
which it provides access to an Identity Exchange,
and the Federation Protocols which a Relying Party
may use to request the Attributes from an Identity
Exchange.
FED FED-03-01-02 6.3.1 The Applicant MUST use the Pairwise Identifiers
generated by an Identity Exchange for it as a
Relying Party to associate the attributes that it
provides with the Digital Identity brokered by an
Identity Exchange.
FED FED-03-01-03 6.3.1 The Applicant MUST provide an API that enables
the attributes it provides to be shared with Relying
Parties.
FED FED-03-01-05 6.3.1 The Applicant MAY implement the API as a REST
API.
FED FED-03-01-06 6.3.1 Where the Applicant provides a REST API, the
Applicant MAY authorise access in accordance with
the JSON Web Token Profile for OAuth 2.0 Client
Authentication and Authorization Grants [RFC
7523].
FED FED-03-02-01 6.3.2 The Applicant’s Audit Log MUST include any User
Consent managed by the Applicant that enables
the sharing of attributes with a Relying Party.
# A80000OFFICIAL
A80000OFFICIAL #
FED FED-03-02-02 6.3.2 The Applicant’s Audit Log MUST include the value
of the RP Audit Id Attribute received from an
Identity Exchange for the following events:
• The retrieval of Attributes by an Identity
Exchange.
• The binding of any Attributes to a Digital
Identity brokered by an Identity Exchange.
FED FED-04-01-03 6.4.1 The Applicant MUST provide the unique audit id
described in IDX-06-01-01 to the Relying Party
using the RP_audit_id Attribute in response to
every logical interaction between a Relying Party
(including an Attribute Service Provider) and an
Identity Exchange
FED FED-04-01-05 6.4.1 The Applicant MUST NOT send the unique audit id
that has been generated by the Identity Exchange
for the Relying Party that requested the Attributes
to an Identity Service Provider.
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
FED FED-04-02-03 6.4.2 Scopes and claims that are received from the
Relying Party MUST be included by the Applicant in
the Authentication Request to the Identity Service
Provider in accordance with the following
processing rules:
# A80000OFFICIAL
A80000OFFICIAL #
FED FED-04-02-03c 6.4.2 If the sub (subject) claim is specified then it MUST
be processed as per the requirements in section
4.2.2.2
FED FED-04-02-04 6.4.2 Scopes and claims not in the TDIF: 06D – Attribute
Profile MUST be ignored by the Applicant.
FED FED-04-02-04a 6.4.2 Where scopes or claims are ignored, the Applicant
MUST NOT raise an error.
FED FED-04-02-05 6.4.2 The Applicant MUST resolve a Pairwise Identifier
included in the sub (subject) claim in the
Authentication Request from a Relying Party to an
existing Pairwise Identifier for the User at the
required Identity Service Provider.
FED FED-04-02-06 6.4.2 If no Pairwise Identifier for the User at the Identity
Service Provider can be resolved then the
Applicant MAY return an error.
FED FED-04-02-07 6.4.2 The Applicant MAY support the sub (subject) claim.
FED FED-04-02-08 6.4.2 Where the acr_values or acr claim received from
the Relying Party is a single value the Applicant
MUST pass the set of ACR values that meet or
exceed the value of the requested ACR value to
the Identity Service Provider in the generated
Authentication Request according to the ranking in
Table 4.
FED FED-04-02-09 6.4.2 Where the acr claim is marked as essential within
the Authentication Request from the Relying Party
it MUST be marked as essential when the
Applicant sends the request to an Identity Service
Provider.
# A80000OFFICIAL
A80000OFFICIAL #
FED FED-04-02-10 6.4.2 The Applicant MUST evaluate the ACR returned
from the Identity Service Provider and if the ACR
meets or exceeds the originally requested value(s),
return one of the originally requested values
# A80000OFFICIAL
A80000OFFICIAL #
FED FED-04-02-16 6.4.2 Scopes and claims that are received from the
Relying Party MUST be included by the Applicant in
the Authentication Request to the Identity Service
Provider in accordance with the following
processing rules:
FED FED-04-02-16c 6.4.2 If the sub (subject) claim is specified then it MUST
be processed as per section 4.2.2.2. Once it is
resolved to a sub claim, then it should include the
resolved subject identifier in the Authentication
Request to the Identity Service Provider by
including it in a <saml:Subject> element in the
SAML <AuthnRequest> message.
FED FED-04-02-16d 6.4.2 Scopes and claims not in the TDIF: 06D – Attribute
Profile MUST be ignored. Where scopes or claims
are ignored, the Identity Exchange MUST NOT raise
an error.
FED FED-04-02-17 6.4.2 Where the acr_values or acr claim received from
the Relying Party is a single value the Applicant
MUST pass the set of
<saml:AuthnContextClassRef> values that meet or
exceed the value of the requested ACR to the
Identity Service Provider in the generated
Authentication Request according to the ranking
described in Table 4.
FED FED-04-02-18 6.4.2 Where the acr claim is marked as essential within
the request from the Relying Party the
<samlp:RequestedAuthnContext> comparison
Attribute MUST be set to minimum when sent to
the Identity Service Provider.
# A80000OFFICIAL
A80000OFFICIAL #
FED FED-04-02-22 6.4.2 This specification does not require support for this
mechanism by an Identity Exchange, but where it
is supported the following processing rules MUST
apply:
a. Where the Identity Exchange receives an
id_token_hint within an Authentication Request
from a Relying Party the Identity Exchange is
required to validate the token and extract the
subject. The Identity Exchange must resolve this to
an IP Link at the Identity Service Provider as per
4.2.2.2.
b. The Identity Exchange should include the
resolved subject identifier in the authentication
request to the Identity Service Provider by
including it in a <saml:Subject> element in the
SAML 2.0 <AuthnRequest> message.
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
FED FED-04-02-28 6.4.2 The Relying Party MAY include a SAML Subject in
the Authentication Request.
FED FED-04-02-28a 6.4.2 As the subject identifier is the Pairwise Identifier
for the User at the Relying Party, the Identity
Exchange MUST resolve this Pairwise Identifier in
any Authentication Request to an existing Pairwise
Identifier for the User at the required Identity
Service Provider. If no Pairwise Identifier for the
User at the Identity Service Provider can be
resolved then the Identity Exchange should return
an error.
FED FED-04-02-28b 6.4.2 The Applicant MAY include the resolved Pairwise
Identifier in the Authentication Request to the
Identity Service Provider.
# A80000OFFICIAL
A80000OFFICIAL #
FED FED-04-02-32 6.4.2 When the isPassive Attribute is set to true within
the Authentication Request from the Relying Party
the Applicant MUST pass this Attribute through in
the Authentication Request sent by the Applicant
to the Identity Service Provider.
# A80000OFFICIAL
A80000OFFICIAL #
FED FED-04-02-34b 6.4.2 Where the Attributes can be mapped fully into an
available scope an Identity Exchange MAY request
those scopes from an Identity Service Provider.
FED FED-04-02-34c 6.4.2 Where the Attributes do not map fully into a scope
the Identity Exchange MUST request those
Attributes as claims from the Identity Service
Provider.
FED FED-04-02-36 6.4.2 The Applicant MAY use the acr claim or the
acr_values parameter.
FED FED-04-02-37 6.4.2 The Comparison attribute for the
<RequestedAuthnContext> MUST be set to exact
or minimum.
FED FED-04-02-40 6.4.2 The Applicant MUST resolve the value of the
subject to a subject identifier at the Identity
Service Provider as per 4.2.2.2.
# A80000OFFICIAL
A80000OFFICIAL #
FED FED-04-02-40a 6.4.2 The Applicant MAY include the resolved subject
identifier in the Authentication Request to the
Identity Service Provider using the sub (subject)
claim.
FED FED-05-01-01 6.5.1 The Applicant MUST support the disclosure of all
Attributes described in section 3.1 of the TDIF: 06D
- Attribute Profile using one of the federation
protocols specified in section 2.1.1 of the TDIF 06 –
Federation Onboarding Requirements
FED FED-05-01-02 6.5.1 The Applicant MUST support the disclosure of all
Attributes listed as mandatory in section 3.1 of the
TDIF: 06D - Attribute Profile using one of the
federation protocols specified in section 2.1.1 of
the TDIF 06 – Federation Onboarding
Requirements
FED FED-05-01-04 6.5.1 The Applicant MUST support the disclosure of all
Attributes listed as mandatory in section 3.2 of the
TDIF: 06D - Attribute Profile using one of the
federation protocols specified in section 2.1.1 of
the TDIF 06 – Federation Onboarding
Requirements.
FED FED-05-01-05 6.5.1 The Applicant MUST be able to include any of the
Attributes described in section 3.2 of TDIF: 06D -
Attribute Profile in an Authentication Request to
an Identity Service Provider.
FED FED-05-01-06 6.5.1 The Applicant MUST support the disclosure of all
Attributes described in section 3.3 of TDIF: 06D -
Attribute Profile using one of the federation
protocols specified in section 2.1.1 of the TDIF 06 –
Federation Onboarding Requirements
FED FED-05-01-07 6.5.1 The Applicant MUST support the disclosure of all
Attributes described in section 3.5 of TDIF: 06D -
Attribute Profile using one of the federation
protocols specified in section 2.1.1 of the TDIF 06 –
Federation Onboarding Requirements
# A80000OFFICIAL
A80000OFFICIAL #
FED FED-05-02-01 6.5.2 The Applicant MAY define support for additional
computed Attributes derived from the Attributes in
an Attribute Set. The DTA will add any computed
attributes to the TDIF: 06D - Attribute Profile.
FED FED-05-03-02 6.5.3 The Applicant MUST ensure that it only disclosure,
or provides to an Identity Exchange to be shared,
Attributes that are relevant to the Relying Party
requesting the Attributes
FED FED-05-04-01 6.5.4 The Applicant MUST only disclose Attributes with
Relying Parties in accordance with the Attribute
Sharing Policy specified for the Attribute Set which
an Attribute is part of as described in section 2.2 of
the TDIF: 06D - Attribute Profile.
OIDC OIDC-02-01-02 6B.2.1 These clients MUST use the authorisation code
flow of OAuth 2.0 by sending the resource owner
to the authorisation endpoint to obtain
authorisation.
# A80000OFFICIAL
A80000OFFICIAL #
OIDC OIDC-02-01-03 6B.2.1 The Applicant MUST ensure that the user
authenticates to the authorisation endpoint.
The user’s web browser is then redirected back to
a URI hosted by the client service, from which the
client can obtain an authorisation code passed as a
query parameter. The client then presents that
authorisation code along with its own credentials
(private_key_jwt) to the authorisation server’s
token endpoint to obtain an access token.
OIDC OIDC-02-01-04 6B.2.1 The Applicant MUST associate these clients with a
unique public key as described in section 2.4 of this
document.
OIDC OIDC-02-01-05 6B.2.1 The Applicant MAY issue a refresh token to this
type of client if they are satisfied that there are no
security issues precluding them from doing so.
OIDC OIDC-02-01-06 6B.2.1 These clients MUST use the authorization code
flow of OAuth 2.0 by sending the resource owner
to the authorisation endpoint to obtain
authorisation.
# A80000OFFICIAL
A80000OFFICIAL #
OIDC OIDC-02-01-15 6B.2.1 The Applicant MAY issue a refresh token to this
type of client if they are satisfied that there are no
security issues precluding them from doing so.
OIDC OIDC-02-02-01 6B.2.2 All clients MUST register with the authorisation
server. For client software that may be installed on
multiple client instances, each client instance
MUST receive a unique client identifier from the
authorisation server.
OIDC OIDC-02-03-01 6B.2.3 Clients using the authorisation code grant type
MUST register their full redirect URIs.
OIDC OIDC-02-03-02 6B.2.3 The authorisation server MUST validate the
redirect URI given by the client at the authorisation
endpoint using strict string comparison.
# A80000OFFICIAL
A80000OFFICIAL #
OIDC OIDC-02-03-03 6B.2.3 The Applicant MUST ensure that the redirect URI
used by a client is one of the following:
• Hosted on a website with TLS protection
(HTTPS).
• Hosted on a local domain of the client (e.g.
http://localhost/).
• Hosted on a client specific non-remote
protocol URI scheme (e.g. myapp:// or
au.gov.app://).
OIDC OIDC-02-03-05 6B.2.3 Clients MUST NOT have URIs in more than one
category and should not have multiple redirect
URIs on different domains.
OIDC OIDC-02-03-06 6B.2.3 Clients MUST NOT forward values passed back to
their redirect URIs to other arbitrary or user-
provided URIs (i.e. no open redirects).
OIDC OIDC-02-04-01 6B.2.4 Clients using the authorisation code grant type
MUST have a public and private key pair type for
use in authentication to the token endpoint.
OIDC OIDC-02-04-02 6B.2.4 The client MUST register their public keys in their
client registration metadata by either sending the
public key directly in the jwks field or by registering
a jwks_uri that MUST be reachable by the
authorisation server. It is recommended that
clients use a jwks_uri as it allows for easier key
rotation.
# A80000OFFICIAL
A80000OFFICIAL #
OIDC OIDC-02-04-03 6B.2.4 The jwks field or the content available from the
jwks_uri of a client MUST contain a public key in
JSON Web Key Set (JWK Set) format.
OIDC OIDC-02-04-05 6B.2.4 Native Client applications MAY omit their key
during registration if they are a public client using
PKCE.
OIDC OIDC-02-06-02 6B.2.6 Clients MUST validate the value of the state
parameter upon return to the redirect URI and
MUST ensure that the state value is securely tied
to the user’s current session e.g. by relating the
state value to a session identifier issued by the
client software to the browser.
OIDC OIDC-02-06-03 6B.2.6 Clients MUST include their full redirect URIs in the
authorisation request.
OIDC OIDC-02-06-04 6B.2.6 To prevent open redirection and other injection
attacks, the Applicant MUST match the entire
redirect URI using a direct string comparison
against registered values and MUST reject requests
with invalid or missing redirect URIs.
# A80000OFFICIAL
A80000OFFICIAL #
OIDC OIDC-02-06-07 6B.2.6 For clients that are required to use PKCE as
described in section 2.1.2 and section 2.3, the
following claims MUST be included in the request
to the token endpoint.
• code_verifier.
o Code verifier generated by client to use PKCE
with the S256 code challenge mechanism.
OIDC OIDC-02-06-08 6B.2.6 The Applicant MUST include the following claims in
the request to the token endpoint: [Refer to list of
parameters]
OIDC OIDC-02-06-11 6B.2.6 The client MAY send a UserInfo Request using
either a HTTP GET or HTTP POST.
OIDC OIDC-02-06-12 6B.2.6 The Applicant MUST send the access token
obtained from an OpenID Connect Authentication
Request as a bearer token as per section 2 of
OAuth Bearer Token Usage [RFC 6750].
# A80000OFFICIAL
A80000OFFICIAL #
OIDC OIDC-02-07-01 6B.2.7 The authorisation server MUST validate all redirect
URIs for the authorization_code grant type.
OIDC OIDC-02-07-03 6B.2.7 The JWT must expire and MAY have a lifetime no
longer than five minutes. Short expiration times
are recommended wherever practicable. The
following guidance is provided in [RFC 7523]
regarding expiration times: the JWT MUST contain
an "exp" (expiration time) claim that limits the
time window during which the JWT can be used.
OIDC OIDC-02-07-04 6B.2.7 The authorization server MUST reject any JWT with
an expiration time that has passed, subject to
allowable clock skew between systems. Note that
the authorization server may reject JWTs with an
"exp" claim value that is unreasonably far in the
future.
OIDC OIDC-02-07-05 6B.2.7 The JWT MUST contain the following REQUIRED
claims and MAY contain the following OPTIONAL
Claim values: [Refer to list of parameters]
# A80000OFFICIAL
A80000OFFICIAL #
OIDC OIDC-02-07-11 6B.2.7 The Authorisation Server MUST NOT allow a client
to use the plain code challenge method.
# A80000OFFICIAL
A80000OFFICIAL #
OIDC OIDC-02-07-23 6B.2.7 Identity Exchanges MUST support the use of the
UserInfo endpoint for claims and scopes which are
stated as described in the TDIF: 06 - Federation
Onboarding Requirements.
OIDC OIDC-02-07-24 6B.2.7 The UserInfo endpoint MUST only return claims
that are authorised within the authentication
request that issued the access token that is being
used to access the endpoint.
OIDC OIDC-02-07-25 6B.2.7 For privacy reasons, the Exchange MAY elect to not
return values for some of the requested claims; it
shouldn’t present with a null or empty string value.
OIDC OIDC-02-07-26 6B.2.7 The sub claim MUST always be returned in the
UserInfo Response.
OIDC OIDC-02-07-27 6B.2.7 The Identity Exchange operating as an OP MUST
accept requests containing a request object signed
by the client’s private key.
OIDC OIDC-02-07-28 6B.2.7 The Identity Exchange MUST validate the signature
on such requests against the Clients public key.
# A80000OFFICIAL
A80000OFFICIAL #
OIDC OIDC-02-07-31 6B.2.7 The Identity Exchange MUST return the ACR value
used for the authentication even if the acr claim
was not marked essential or the acr_values
parameter was used.
OIDC OIDC-02-08-04 6B.2.8 A Relying Party MAY use either acr_values or the
acr claim to request an ACR.
OIDC OIDC-02-08-05 6B.2.8 The Identity Exchange MUST reject any requests
that include both the acr_values parameter and
the acr claim to request an ACR.
OIDC OIDC-02-08-06 6B.2.8 Where the ACR is requested using the acr claim,
this acr claim MAY be marked as essential claim
[see example for further details]
OIDC OIDC-02-08-07 6B.2.8 When the acr values are marked as an essential
claim, the Identity Provider MUST return a value
that matches the requested values.
OIDC OIDC-02-08-09 6B.2.8 When the acr claim is not marked as essential, i.e.
they are a voluntary claim, the Applicant MAY
return the level of assurance that the End-User
was able to achieve.
OIDC OIDC-02-08-10 6B.2.8 The Relying Party MUST determine if the returned
ACR meets the minimum requirement for the
authentication context that was requested.
# A80000OFFICIAL
A80000OFFICIAL #
OIDC OIDC-03-01-02 6B.3.1 These clients MUST use the authorisation code
flow of OAuth 2.0 by sending the resource owner
to the authorisation endpoint to obtain
authorisation.
# A80000OFFICIAL
A80000OFFICIAL #
OIDC OIDC-03-03-03 6B.3.3 The Applicant MUST NOT have multiple redirect
URIs on different domains.
OIDC OIDC-03-03-04 6B.3.3 The Applicant MUST NOT forward values passed
back to their redirect URIs to other arbitrary or
user-provided URIs (i.e. no open redirectors).
OIDC OIDC-03-04-01 6B.3.4 As Clients using the authorisation code grant type,
Identity Exchanges MUST have a public and private
key pair type for use in authentication to the token
endpoint.
OIDC OIDC-03-04-03 6B.3.4 The jwks field or the content available from the
jwks_uri of a client MUST contain a public key in
JSON Web Key Set (JWK Set) format.
OIDC OIDC-03-06-01 6B.3.6 The Exchange MUST log all the related interactions
with Identity Providers using the unique audit id it
has generated for an authentication request from
a Relying Party as per the TDIF: 06 - Federation
Onboarding Requirements.
OIDC OIDC-03-06-02 6B.3.6 To enable a traceable audit trail for requests sent
to an Identity Provider, an Exchange MUST
implement a scheme to ensure that each request
be uniquely identifiable at the Identity Provider.
# A80000OFFICIAL
A80000OFFICIAL #
OIDC OIDC-03-06-04 6B.3.6 Clients MUST validate the value of the state
parameter upon return to the redirect URI and
MUST ensure that the state value is securely tied
to the user’s current session e.g. by relating the
state value to a session identifier issued by the
client software to the browser.
OIDC OIDC-03-06-05 6B.3.6 Clients MUST include their full redirect URIs in the
authorisation request. To prevent open redirection
and other injection attacks, the authorisation
server MUST match the entire redirect URI using a
direct string comparison against registered values
and MUST reject requests with invalid or missing
redirect URIs.
OIDC OIDC-03-06-08 6B.3.6 The JWT assertion MUST be signed by the client
using the client’s private key. See section 3.4 for
the mechanisms by the client can make its public
key known to the authorization server.
# A80000OFFICIAL
A80000OFFICIAL #
OIDC OIDC-03-06-15 6B.3.6 The Identity Exchange MAY cache OpenID Provider
(OP) metadata once an OP has been discovered
and used by the Identity Exchange.
OIDC OIDC-03-07-01 6B.3.7 The Identity Provider MUST always log all
authentication requests and responses, including
the values of client_id and the state parameters
associated with the request.
OIDC OIDC-03-07-02 6B.3.7 The authorisation server MUST validate all redirect
URIs for the authorization_code grant type.
OIDC OIDC-03-07-04 6B.3.7 The JWT must expire and MAY have a lifetime no
longer than five minutes. Short expiration times
are recommended wherever practicable. The
following guidance is provided in [RFC 7523]
regarding expiration times: the JWT MUST contain
an "exp" (expiration time) claim that limits the
time window during which the JWT can be used.
The authorization server MUST reject any JWT with
an expiration time that has passed, subject to
allowable clock skew between systems. Note that
the authorization server may reject JWTs with an
"exp" claim value that is unreasonably far in the
future.
OIDC OIDC-03-07-05 6B.3.7 The JWT MUST contain the following REQUIRED
claims and MAY contain the following OPTIONAL
Claim values: [Refer to list of parameters]
# A80000OFFICIAL
A80000OFFICIAL #
OIDC OIDC-03-07-10 6B.3.7 The IdP MUST support ALL of the mechanisms for
requesting a Level of assurance as described in
section 3.8.3 of this document.
OIDC OIDC-03-07-12 6B.3.7 All tokens MUST be signed by the issuer IdP’s
private key.
OIDC OIDC-03-07-13 6B.3.7 ID Tokens MAY be encrypted using the appropriate
key of the requesting client.
OIDC OIDC-03-07-14 6B.3.7 The ID Token MUST expire and MAY have a
lifetime no longer than five minutes. Short
expiration times are recommended as the ID token
is consumed by the client and not presented to
remote systems.
# A80000OFFICIAL
A80000OFFICIAL #
OIDC OIDC-03-07-18 6B.3.7 The UserInfo endpoint MUST only return claims
that are authorised within the authentication
request that issued the access token that is being
used to access the endpoint.
OIDC OIDC-03-07-19 6B.3.7 For privacy reasons, the Identity Provider MAY
elect to not return values for some of the
requested claims; it should not present with a null
or empty string value.
OIDC OIDC-03-07-20 6B.3.7 The sub claim MUST always be returned in the
UserInfo Response.
OIDC OIDC-03-07-21 6B.3.7 The Identity Provider MUST accept requests
containing a request object signed by the Identity
Exchange’s private key.
OIDC OIDC-03-07-22 6B.3.7 The Identity Provider MUST validate the signature
on such requests against the Identity Exchange’s
public key
OIDC OIDC-03-07-23 6B.3.7 The Identity Provider MUST accept request objects
encrypted with the Identity Providers Public key.
OIDC OIDC-03-07-24 6B.3.7 The Identity Provider MUST return the ACR value
used for the authentication even if the acr claim
was not marked as essential or the acr_values
parameter was used.
OIDC OIDC-03-08-01 6B.3.8 Servers MUST return claims on a best effort basis.
OIDC OIDC-03-08-04 6B.3.8 The Identity Exchange MAY use either acr_values
or the acr claim to request an ACR.
OIDC OIDC-03-08-05 6B.3.8 The Identity Exchange MUST NOT specify both the
acr claim and acr_values.
# A80000OFFICIAL
A80000OFFICIAL #
OIDC OIDC-03-08-06 6B.3.8 The Identity Exchange (acting as the Relying Party
in this profile) MUST request the full set of ACR
values that will meet the original Relying Party’s
minimum assurance requirements.
OIDC OIDC-03-08-07 6B.3.8 When the ACR values are marked as an essential
claim, the Identity Provider MUST return a value
that matches the requested values.
OIDC OIDC-03-08-09 6B.3.8 When the acr claim is not marked as essential, i.e.
they are a voluntary claim, the Identity Provider
MAY return the level of assurance that the End-
User was able to achieve.
OIDC OIDC-04-01-02 6B.4.1 The Applicant MUST support all the scopes and
claims defined in section 4.1.2 of the [TDIF.Attr].
OIDC OIDC-04-01-03 6B.4.1 The Applicant MUST support all the scopes and
claims defined in section 4.1.3 of the [TDIF.Attr].
# A80000OFFICIAL
A80000OFFICIAL #
SAML SAML-02-02-02 6C.2.2 Where specific constraints are absent in the SAML
standards or profile documents, Applicant’s
implementations MUST be able to accept without
error or truncation, element and attribute values
of type xs:string that are comprised of any
combination of valid XML characters and
containing up to 256 characters. This requirement
applies to both user defined types and the types
defined within the SAML standards such as
transient and persistent NameIDs.
SAML SAML-02-02-03 6C.2.2 Implementations MUST NOT send and MUST have
the ability to reject SAML protocol messages
containing a Document Type Definition (DTD).
SAML SAML-02-03-02 6C.2.3 HTTP/1.1 redirects (status codes 301, 302, and
307) MUST be honoured by the Applicant.
SAML SAML-02-03-03 6C.2.3 The Applicants implementation MUST support the
consumption of SAML metadata rooted in both
<md:EntityDescriptor> and
<md:EntitiesDescriptor> elements by this
mechanism. Any number of child elements must
be allowed for <md:EntitiesDescriptor>.
# A80000OFFICIAL
A80000OFFICIAL #
SAML SAML-02-03-06 6C.2.3 The Applicant MUST validate the authenticity and
integrity of SAML metadata by verifying an
enveloped XML signature attached to the root
element of the metadata.
SAML SAML-02-03-07 6C.2.3 Public keys used for signature verification of the
metadata MUST be configured out of band by the
Applicant.
SAML SAML-02-03-09 6C.2.3 It MUST be possible for the Applicant to limit the
use of a trusted key to a single metadata source.
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
SAML SAML-02-04-02 6C.2.4 SAML Identity Providers MUST support both the
HTTP-Redirect and HTTP-POST bindings for
authentication requests.
SAML SAML-02-04-03 6C.2.4 SAML Service Providers MUST support either the
HTTP-Redirect and HTTP-POST bindings for
authentication requests.
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
SAML SAML-03-01-07 6C.3.1 Service providers MUST support deep linking and
maintain the direct accessibility of protected
resources in the presence of Web Browser SSO.
SAML SAML-03-01-08 6C.3.1 Service Providers MUST NOT require the presence
of the xsi:type XML attribute.
SAML SAML-03-01-09 6C.3.1 Service Providers MAY support the acceptance or
rejection of assertion based on the content of the
<saml:AuthnContext> element.
SAML SAML-03-01-14 6C.3.1 Service Providers MUST NOT require that the
name identifiers with a format of
urn:oasis:names:tc:SAML:2.0:nameid-
format:persistent to be overloaded with semantics
or content beyond what is outlined in
[SAML2Core] section 8.3.7.
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
SAML SAML-04-01-13 6C.4.1 Service Providers MUST NOT require that the
name identifiers with a format of
urn:oasis:names:tc:SAML:2.0:nameid-
format:persistent be overloaded with semantics or
content beyond what is outlined in [SAML2Core]
section 8.3.7.
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
SAML SAML-05-01-02 6C.5.1 The Sender and the Recipient of the request MAY
agree to the semantics of data sent this way.
SAML SAML-05-01-04 6C.5.1 The following approach MUST be used for complex
objects that have nested elements:
• Where there is at most one instance of the
complex object, then the contents of the complex
object may be flattened into separate SAML
attributes where the name of the attribute is
qualified with xml namespace that is the extension
namespace for TDIF attributes. See an example of
this approach at
http://www.simplecloud.info/specs/draft-scim-
saml2-binding-02.html#anchor5
• Where there is one or more instances of the
complex object then the JSON representation of
the component object as defined by this
specification may be included as the
<AttributeValue> element as a XML string.
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
ANNUAL ANNUAL-02-02-01 2.2 The Accredited Provider MUST ensure that all
Annual Assessment requirements are completed
by the anniversary of its initial accreditation date.
Failure by an Accredited Provider to complete the
Annual Assessment in accordance with the TDIF is
a breach of the Accredited Provider’s obligations
under the TDIF and may result in the termination
of accreditation.
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
ANNUAL ANNUAL-02-04-04 2.4.1 The Accredited Provider MUST use the compliance
ratings listed in ‘Appendix A: Compliance ratings’
when determining areas of compliance and non-
compliance with the requirements of the TDIF.
# A80000OFFICIAL
A80000OFFICIAL #
ANNUAL ANNUAL-02-05-01 2.5 The Accredited Provider MUST ensure that the
Assessor prepares Annual Assessment Reports
which cover:
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
ANNUAL ANNUAL-02-05-04 2.5 The Annual Assessment Reports MUST include the fo
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
Sub-Requirement A C I X Category
A C I X Unchanged
A C I X Unchanged
A C I X Restructured/Changed
New
A C I X Restructured/Changed
C I Unchanged
# A80000OFFICIAL
A80000OFFICIAL #
C I Restructured/Changed
A C I X Restructured/Changed
New
A C I X Unchanged
# A80000OFFICIAL
A80000OFFICIAL #
A C I X Archived
A C I X Restructured/Changed
A C I X Unchanged
# A80000OFFICIAL
A80000OFFICIAL #
A C I X Restructured/Changed
A C I X Restructured/Changed
Restructured/Changed
Restructured/Changed
A C I X Restructured/Changed
# A80000OFFICIAL
A80000OFFICIAL #
New
New
New
New
New
# A80000OFFICIAL
A80000OFFICIAL #
New
New
New
New
New
New
Restructured/Changed
A C I X Restructured/Changed
New
New
# A80000OFFICIAL
A80000OFFICIAL #
New
A C I X Restructured/Changed
# A80000OFFICIAL
A80000OFFICIAL #
New
# A80000OFFICIAL
A80000OFFICIAL #
New
New
New
A C I X Restructured/Changed
New
# A80000OFFICIAL
A80000OFFICIAL #
A C I X Restructured/Changed
A C I X Archived
A C I X Restructured/Changed
A C I X Restructured/Changed
A C I X Archived
A C I Restructured/Changed
A C I Restructured/Changed
Restructured/Changed
Restructured/Changed
Restructured/Changed
# A80000OFFICIAL
A80000OFFICIAL #
Restructured/Changed
Restructured/Changed
New
A C I X Restructured/Changed
New
A C I X Restructured/Changed
A C I Restructured/Changed
A C I Restructured/Changed
New
# A80000OFFICIAL
A80000OFFICIAL #
A C I X Restructured/Changed
New
New
New
A C I X Restructured/Changed
A C I X Archived
A C I X Restructured/Changed
New
A C I X Restructured/Changed
A C I X Restructured/Changed
# A80000OFFICIAL
A80000OFFICIAL #
A C I X Restructured/Changed
A C I X Archived
A C I X Archived
A C I X Restructured/Changed
# A80000OFFICIAL
A80000OFFICIAL #
New
New
A C I Restructured/Changed
# A80000OFFICIAL
A80000OFFICIAL #
A C I Restructured/Changed
A C I Archived
A C I Restructured/Changed
A C I Restructured/Changed
A C I X Restructured/Changed
A C I X Restructured/Changed
# A80000OFFICIAL
A80000OFFICIAL #
New
New
A C I X Archived
A C I X Restructured/Changed
# A80000OFFICIAL
A80000OFFICIAL #
A C I X Restructured/Changed
A C I X Unchanged
A C I X Restructured/Changed
New
New
New
# A80000OFFICIAL
A80000OFFICIAL #
I X Restructured/Changed
I X Restructured/Changed
I X Restructured/Changed
# A80000OFFICIAL
A80000OFFICIAL #
A C I X Restructured/Changed
A C I X Restructured/Changed
A C I X Restructured/Changed
A C I X Restructured/Changed
New
A C I X Restructured/Changed
New
# A80000OFFICIAL
A80000OFFICIAL #
A C I X Restructured/Changed
A C I X Restructured/Changed
A C I X Restructured/Changed
New
A C I X Restructured/Changed
New
A C I X Restructured/Changed
New
# A80000OFFICIAL
A80000OFFICIAL #
New
New
A C I X Unchanged
A C I X Restructured/Changed
A C I X Restructured/Changed
A C I X Unchanged
A C I X Unchanged
# A80000OFFICIAL
A80000OFFICIAL #
A C I X Restructured/Changed
# A80000OFFICIAL
A80000OFFICIAL #
New
X Restructured/Changed
New
New
New
New
# A80000OFFICIAL
A80000OFFICIAL #
X Restructured/Changed
A C I X Unchanged
New
New
Restructured/Changed
# A80000OFFICIAL
A80000OFFICIAL #
I Archived
New
New
New
# A80000OFFICIAL
A80000OFFICIAL #
New
Restructured/Changed
A C I X Restructured/Changed
# A80000OFFICIAL
A80000OFFICIAL #
A C I X
New
A C I X Restructured/Changed
A C I X Restructured/Changed
New
A C I X Restructured/Changed
A C I X Restructured/Changed
# A80000OFFICIAL
A80000OFFICIAL #
A C I X Restructured/Changed
A I Restructured/Changed
A I Archived
A C I X Unchanged
A C I X Unchanged
A C I X Unchanged
X Restructured/Changed
# A80000OFFICIAL
A80000OFFICIAL #
A C I X Unchanged
A C I X Unchanged
A C I X Unchanged
A C I X Unchanged
A C I X Unchanged
A C I X Unchanged
A C I Unchanged
A C I Restructured/Changed
X Archived
A C I X Unchanged
# A80000OFFICIAL
A80000OFFICIAL #
A C I Unchanged
A C I Unchanged
A C I X Unchanged
A C I X Archived
# A80000OFFICIAL
A80000OFFICIAL #
New
New
# A80000OFFICIAL
A80000OFFICIAL #
A C I X Restructured/Changed
New
A C I X Restructured/Changed
Restructured/Changed
Restructured/Changed
A C I X Archived
# A80000OFFICIAL
A80000OFFICIAL #
A C I X Restructured/Changed
A C I X Restructured/Changed
A C I X Restructured/Changed
A C I X Restructured/Changed
New
A C I Restructured/Changed
A C I X Restructured/Changed
# A80000OFFICIAL
A80000OFFICIAL #
New
New
# A80000OFFICIAL
A80000OFFICIAL #
New
New
New
A C I X Restructured/Changed
Restructured/Changed
# A80000OFFICIAL
A80000OFFICIAL #
A C I X Unchanged
A C I X Archived
A C I X Archived
A C I X Archived
A C I X Archived
A C I X Restructured/Changed
A C I X Restructured/Changed
A C I X Restructured/Changed
a) Identify information holdings.
# A80000OFFICIAL
A80000OFFICIAL #
A C I X Restructured/Changed
b) Assess the sensitivity of
information holdings.
A C I X Restructured/Changed
c) Implement operational
controls for these information
holdings proportional to their
value, importance and
sensitivity.
A C I X Restructured/Changed
A C I X Restructured/Changed
New
# A80000OFFICIAL
A80000OFFICIAL #
A C I X Restructured/Changed
New
New
New
A C I X Restructured/Changed
A C I X Archived
A C I X Restructured/Changed
New
A C I X Restructured/Changed
A C I X Restructured/Changed
A C I X Restructured/Changed
Restructured/Changed
# A80000OFFICIAL
A80000OFFICIAL #
A C I X Restructured/Changed
A C I X Restructured/Changed
A C I X Unchanged
A C I X Archived
New
# A80000OFFICIAL
A80000OFFICIAL #
New
A C I X Archived
A C I X Restructured/Changed
A C I X Archived
A C I X Restructured/Changed
# A80000OFFICIAL
A80000OFFICIAL #
A C I X Restructured/Changed
A C I X Restructured/Changed
A C I X Restructured/Changed
A C I X Archived
I Restructured/Changed
C Archived
A Archived
# A80000OFFICIAL
A80000OFFICIAL #
A C I X Restructured/Changed
A C I X Restructured/Changed
A C I X Restructured/Changed
A C I X Restructured/Changed
A C I X Restructured/Changed
• Successful and failed elevation
of privileges by Personnel.
A C I X Unchanged
• User and group additions,
deletions and modification to
permissions.
A C I X Unchanged
# A80000OFFICIAL
A80000OFFICIAL #
New
New
A C I X Restructured/Changed
# A80000OFFICIAL
A80000OFFICIAL #
I Restructured/Changed
• Identity Proofing Level
achieved.
I Archived
• The binding of any Attributes
to a Digital Identity.
X Restructured/Changed
• Interaction type. (e.g. OIDC
Authentication Request and
response)
X Restructured/Changed
• Unique interaction identifier.
(in accordance with IDX-06-01-
01).
• Entity. An Identity Service X Restructured/Changed
Provider or a Relying Party.
X Restructured/Changed
• Entity link. Any identity link
used in the interaction, such as
the RP Link or IdP Link.
• Names of any Attributes X Restructured/Changed
requested and returned.
X Restructured/Changed
• Any Identity Proofing Level or
Credential Level requested and
returned.
A Archived
• The binding of any Attributes
to a Digital Identity.
• The retrieval of any Attributes A Archived
by a Third Party.
A C I X Restructured/Changed
A C I X Restructured/Changed
a) Business continuity
governance.
# A80000OFFICIAL
A80000OFFICIAL #
A C I X Restructured/Changed
A C I X Restructured/Changed
A C I X Unchanged
A C I X Restructured/Changed
# A80000OFFICIAL
A80000OFFICIAL #
A C I X Unchanged
a) Physical facilities.
b) ICT systems. A C I X Unchanged
A C I X Unchanged
A C I X Restructured/Changed
A C I X Unchanged
a) Harm to Individuals
A C I X Unchanged
A C I X Unchanged
A C I X Restructured/Changed
# A80000OFFICIAL
A80000OFFICIAL #
A C I Unchanged
A C I Unchanged
A C I X Unchanged
A C I X Unchanged
A C I X Unchanged
I Restructured/Changed
A C I X Unchanged
A C I X Unchanged
I Unchanged
# A80000OFFICIAL
A80000OFFICIAL #
I Unchanged
I Restructured/Changed
Restructured/Changed
Restructured/Changed
I Restructured/Changed
I Restructured/Changed
I Restructured/Changed
I Restructured/Changed
New
New
# A80000OFFICIAL
A80000OFFICIAL #
I Restructured/Changed
New
I Unchanged
I Unchanged
I Unchanged
C Unchanged
C Archived
# A80000OFFICIAL
A80000OFFICIAL #
New
New
A C I X Restructured/Changed
A C I X Unchanged
# A80000OFFICIAL
A80000OFFICIAL #
A C I X Unchanged
e) Describe how findings from
usability testing will be
implemented.
A C I X Unchanged
f) Identify a range of
representative Individuals of the
identity system.
A C I X Restructured/Changed
a) Individuals with disability.
b) Older Individuals A C I X Restructured/Changed
c) Individuals who use assistive A C I X
technologies.
A C I X
d) Individuals with low literacy.
A C I X
e) Individuals from culturally and
linguistically diverse backgrounds
A C I X
f) Individuals who are Aboriginal
or Torres Strait Islander.
g) Individuals from regional and A C I X
remote areas.
A C I X
h) Individuals with older
technology and low bandwidth
connections.
A C I X Restructured/Changed
A C I X Restructured/Changed
A C I X Restructured/Changed
# A80000OFFICIAL
A80000OFFICIAL #
A C I X Restructured/Changed
A C I X Restructured/Changed
New
New
A C I X Restructured/Changed
A C I X Restructured/Changed
New
New
New
# A80000OFFICIAL
A80000OFFICIAL #
Restructured/Changed
New
New
New
A C I X Archived
A C I X Restructured/Changed
• Its fraud control mechanism for
detecting incidents of fraud or
suspected fraud (as per FRAUD-
02-04-01).
A C I X Restructured/Changed
• Its fraud control mechanism to
flag incidents of fraud or
suspected fraud (as per FRAUD-
02-04-02).
A C I X Restructured/Changed
# A80000OFFICIAL
A80000OFFICIAL #
A C I X Restructured/Changed
• The activities and events
logged (as per PROT-04-02-24a)
A C I X Restructured/Changed
• The content included in activity
logs (as per PROT-04-02-24b)
A C I Restructured/Changed
C Restructured/Changed
A C I X Restructured/Changed
# A80000OFFICIAL
A80000OFFICIAL #
A C I X Archived
a) The test plan is approved and
released.
b) All requirements are included A C I X Archived
in the RTM.
A C I X Archived
c) All requirements are covered
by one or more test cases.
d) All test cases are appropriately A C I X Archived
documented.
e) All test resources are A C I X Archived
identified and available.
A C I X Archived
A C I X Archived
A C I X Archived
a) Demonstration testing has
been executed in accordance
with the approved Technical Test
Plan.
A C I X Archived
b) Status of all test cases,
including the execution coverage
and defects.
A C I X Archived
c) Test completion criteria has
been met, where the criteria
have not been met a risk-
assessment must be included for
approval to deviate and exit
testing.
New
New
New
New
# A80000OFFICIAL
A80000OFFICIAL #
New
New
New
New
New
A C I X Restructured/Changed
A C I X Restructured/Changed
A C I X Restructured/Changed
# A80000OFFICIAL
A80000OFFICIAL #
Restructured/Changed
Restructured/Changed
Restructured/Changed
Restructured/Changed
Restructured/Changed
A C I X Restructured/Changed
A C I X Restructured/Changed
A C I X Archived
Restructured/Changed
New
Restructured/Changed
Restructured/Changed
Restructured/Changed
# A80000OFFICIAL
A80000OFFICIAL #
Restructured/Changed
Restructured/Changed
New
New
New
New
A C I X Restructured/Changed
Archived
Restructured/Changed
Restructured/Changed
Restructured/Changed
Restructured/Changed
Restructured/Changed
Restructured/Changed
# A80000OFFICIAL
A80000OFFICIAL #
Restructured/Changed
Restructured/Changed
Restructured/Changed
Restructured/Changed
Restructured/Changed
Restructured/Changed
New
New
New
New
# A80000OFFICIAL
A80000OFFICIAL #
New
New
New
New
New
New
A C I X Archived
# A80000OFFICIAL
A80000OFFICIAL #
A C I X Archived
Restructured/Changed
Restructured/Changed
Restructured/Changed
Restructured/Changed
Restructured/Changed
Restructured/Changed
Restructured/Changed
Restructured/Changed
Restructured/Changed
Restructured/Changed
Restructured/Changed
Restructured/Changed
Restructured/Changed
Restructured/Changed
# A80000OFFICIAL
A80000OFFICIAL #
A C I X Restructured/Changed
A C I X Restructured/Changed
Restructured/Changed
Restructured/Changed
Restructured/Changed
Restructured/Changed
Restructured/Changed
Restructured/Changed
A C I X Restructured/Changed
A C I X Restructured/Changed
A C I X Archived
# A80000OFFICIAL
A80000OFFICIAL #
A C I X Restructured/Changed
b) Interviews with key personnel.
c) A run through of the A C I X Restructured/Changed
Applicant’s identity system.
A C I X Restructured/Changed
Restructured/Changed
Restructured/Changed
A C I X Restructured/Changed
A C I X Archived
A C I X Restructured/Changed
a) A summary of the activities
performed during the Functional
Assessment.
A C I X Restructured/Changed
b) The date of and period
covered by the Functional
Assessment Report.
A C I X Restructured/Changed
# A80000OFFICIAL
A80000OFFICIAL #
A C I X Restructured/Changed
d) Qualifications and basis of
independence for all Assessors
used.
A C I X Restructured/Changed
e) Names and versions of all
documents used by the
Applicant.
A C I X Restructured/Changed
# A80000OFFICIAL
A80000OFFICIAL #
A C I X Archived
A C I X
A C I X Archived
b) A general acknowledgment by
the User that their use of the
Identity System provided by the
Applicant is governed by the
User terms.
A C I X Archived
c) The Applicant’s Identity
System is provided on an ‘as is’
and ‘as available’ basis.
A C I X Restructured/Changed
d) The scope of the User’s right
to access and use the Identity
System must be consistent with
the TDIF.
A C I X Restructured/Changed
# A80000OFFICIAL
A80000OFFICIAL #
A C I X Archived
g) The Applicant does not share
Attributes, Personal Information
or sensitive information, or
Credentials with third parties
without the Consent of the
Individual.
A C I X Restructured/Changed
# A80000OFFICIAL
A80000OFFICIAL #
A C I X Archived
# A80000OFFICIAL
A80000OFFICIAL #
A C I X Archived
c) The User must not use,
reproduce, amend or alter
intellectual property rights in the
service.
A C I X Restructured/Changed
d) The User must comply with
security requirements or
instructions provided to it by the
Applicant.
A C I X Archived
A C I X
A C I X
A C I X
# A80000OFFICIAL
A80000OFFICIAL #
Restructured/Changed
Restructured/Changed
New
I Restructured/Changed
# A80000OFFICIAL
A80000OFFICIAL #
I Unchanged
I Restructured/Changed
New
Restructured/Changed
# A80000OFFICIAL
A80000OFFICIAL #
New
I Restructured/Changed
I Restructured/Changed
I Restructured/Changed
I Restructured/Changed
I Restructured/Changed
I Restructured/Changed
# A80000OFFICIAL
A80000OFFICIAL #
I New
New
New
New
New
New
New
I Restructured/Changed
# A80000OFFICIAL
A80000OFFICIAL #
New
I Restructured/Changed
New
I Restructured/Changed
# A80000OFFICIAL
A80000OFFICIAL #
I Restructured/Changed
I Unchanged
I Archived
Restructured/Changed
Restructured/Changed
New
New
New
New
# A80000OFFICIAL
A80000OFFICIAL #
New
New
New
New
New
New
New
New
New
# A80000OFFICIAL
A80000OFFICIAL #
New
New
New
New
New
New
I Restructured/Changed
# A80000OFFICIAL
A80000OFFICIAL #
I Restructured/Changed
• capture and send the Acquired
image to the Photo ID
Authoritative Source (or proxy)
in the case of Source Biometric
Matching; or,
I Restructured/Changed
I Restructured/Changed
Archived
New
New
New
New
New
Restructured/Changed
New
# A80000OFFICIAL
A80000OFFICIAL #
New
Restructured/Changed
Restructured/Changed
New
Restructured/Changed
New
New
New
# A80000OFFICIAL
A80000OFFICIAL #
Restructured/Changed
New
New
New
New
New
New
I Restructured/Changed
I Restructured/Changed
I Restructured/Changed
# A80000OFFICIAL
A80000OFFICIAL #
I Archived
I Restructured/Changed
I Archived
I Archived
I Restructured/Changed
I Archived
I Archived
I Archived
# A80000OFFICIAL
A80000OFFICIAL #
I Archived
Restructured/Changed
New
New
New
New
Restructured/Changed
New
New
I Archived
I Archived
# A80000OFFICIAL
A80000OFFICIAL #
I Restructured/Changed
I Restructured/Changed
I Restructured/Changed
I Restructured/Changed
I Archived
I Archived
I Archived
I Archived
Archived
New
New
# A80000OFFICIAL
A80000OFFICIAL #
New
New
Restructured/Changed
New
Restructured/Changed
New
New
# A80000OFFICIAL
A80000OFFICIAL #
New
I Archived
I Archived
I Archived
I Archived
I Restructured/Changed
I Archived
# A80000OFFICIAL
A80000OFFICIAL #
I Archived
Archived
New
New
New
New
I Archived
# A80000OFFICIAL
A80000OFFICIAL #
I Restructured/Changed
Restructured/Changed
Restructured/Changed
New
New
New
New
New
# A80000OFFICIAL
A80000OFFICIAL #
Restructured/Changed
New
New
I Archived
I Restructured/Changed
I Archived
Archived
# A80000OFFICIAL
A80000OFFICIAL #
I Restructured/Changed
I Archived
I Restructured/Changed
I Archived
I Restructured/Changed
I Archived
I Restructured/Changed
Restructured/Changed
I Archived
I Archived
I Archived
I Restructured/Changed
# A80000OFFICIAL
A80000OFFICIAL #
I Archived
I Archived
I Archived
C Restructured/Changed
# A80000OFFICIAL
A80000OFFICIAL #
C
C
C Restructured/Changed
C Restructured/Changed
Restructured/Changed
Restructured/Changed
# A80000OFFICIAL
A80000OFFICIAL #
C Archived
C Restructured/Changed
C Restructured/Changed
C Restructured/Changed
C Restructured/Changed
C Restructured/Changed
# A80000OFFICIAL
A80000OFFICIAL #
C Restructured/Changed
C Restructured/Changed
C Restructured/Changed
C Restructured/Changed
C
C
C Restructured/Changed
C Restructured/Changed
Restructured/Changed
C Archived
C Archived
C Restructured/Changed
# A80000OFFICIAL
A80000OFFICIAL #
C
C
C Restructured/Changed
C Restructured/Changed
# A80000OFFICIAL
A80000OFFICIAL #
C Restructured/Changed
# A80000OFFICIAL
A80000OFFICIAL #
1.
Transfer of secret to primary
channel: o The Applicant MUST
signal the device containing the
Individual’s Credential to
indicate readiness to
authenticate
o It MUST then transmit a
random secret to the out-of-
band device
o The Applicant MUST then wait
for the secret to be returned on
the primary communication
channel.
C
2.
Transfer of secret to secondary
channel:
o The Applicant MUST display a
random Authentication secret to
the Individual via the primary
channel
o It MUST then wait for the
secret to be returned on the
secondary channel from the
Individual’s out-of-band device.
C
3.
Verification of secrets by the
Individual:
o The Applicant MUST display a
random Authentication secret to
the Individual via the primary
channel and MUST send the
same secret to the out-of-band
device via the secondary channel
for presentation to the
Individual.
o It MUST then wait for an
approval (or disapproval)
message via the secondary
channel.
# A80000OFFICIAL
A80000OFFICIAL #
C Restructured/Changed
C Archived
# A80000OFFICIAL
A80000OFFICIAL #
C
C
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
C
C
C
C
# A80000OFFICIAL
A80000OFFICIAL #
C
C
# A80000OFFICIAL
A80000OFFICIAL #
C
C
C
C
C
C
C
# A80000OFFICIAL
A80000OFFICIAL #
C
C
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
C Archived
C
C
# A80000OFFICIAL
A80000OFFICIAL #
C Archived
C
C
C Restructured/Changed
C Restructured/Changed
# A80000OFFICIAL
A80000OFFICIAL #
C
C
C
C
C Archived
C Archived
C Restructured/Changed
C Restructured/Changed
# A80000OFFICIAL
A80000OFFICIAL #
C Restructured/Changed
C Restructured/Changed
C Restructured/Changed
C Restructured/Changed
# A80000OFFICIAL
A80000OFFICIAL #
C Archived
C Restructured/Changed
C Restructured/Changed
C Restructured/Changed
C Restructured/Changed
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
C Archived
C Archived
C Archived
C
C Restructured/Changed
New
C
C Restructured/Changed
# A80000OFFICIAL
A80000OFFICIAL #
C Archived
C Restructured/Changed
C
C
# A80000OFFICIAL
A80000OFFICIAL #
C
C
C Restructured/Changed
# A80000OFFICIAL
A80000OFFICIAL #
C
C
C
C
C
C Restructured/Changed
C Restructured/Changed
C Restructured/Changed
Restructured/Changed
Restructured/Changed
# A80000OFFICIAL
A80000OFFICIAL #
C Restructured/Changed
C
C
a. Certification Practice
Statements (CPS) and Certificate
Policies (CP) conform to Request
for Comment (RFC) 3647
C
b. Digital Certificates conform to
the (RFC) 5280 format
C
c. Certificate Revocation Lists
(CRLs) conform to the X.509
version 2 profile as described in
RFC 5280
C
d. Online Certificate Status
Protocol (OCSP) responses
conform to RFC 6960.
C
# A80000OFFICIAL
A80000OFFICIAL #
C
• The Individual notifies the
Applicant that a Digital
Certificate request was not
authorised by them.
C
A Archived
# A80000OFFICIAL
A80000OFFICIAL #
A Restructured/Changed
A Restructured/Changed
A Restructured/Changed
A Restructured/Changed
A Restructured/Changed
# A80000OFFICIAL
A80000OFFICIAL #
A Restructured/Changed
X
X
X
X
X Restructured/Changed
• Timestamp
X Restructured/Changed
• Duration of Consent. (including
any time limit on the consent)
X Restructured/Changed
• Relying Party. (i.e. The Relying
Party that requested to receive
the Attributes)
X Restructured/Changed
• The Identifier that identifies
the User at the Relying Party
authorised to receive the
Attributes
X Restructured/Changed
• Identity Service
Provider/Attribute Service
Provider from which the
Attributes were sourced
• The link to the Identity at the X Restructured/Changed
source of the Attributes
• Name of any Attribute or X Restructured/Changed
Attribute set authorised
X Restructured/Changed
• Consent decision. This may be
“grant”, “deny”, or “ongoing”
X
X
# A80000OFFICIAL
A80000OFFICIAL #
X
X
X Restructured/Changed
X
X
# A80000OFFICIAL
A80000OFFICIAL #
A C I X
A I X
# A80000OFFICIAL
A80000OFFICIAL #
A C I X
A C I X
A C I X
A C I X
# A80000OFFICIAL
A80000OFFICIAL #
A C I X
A C I X
A C I X
A C I X
# A80000OFFICIAL
A80000OFFICIAL #
A C I X Restructured/Changed
A C I X
A C I X
A C I X
A C I X
# A80000OFFICIAL
A80000OFFICIAL #
A C I X
A C I X
I X
I X
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
C I X
C I X
C I X
C I X
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
I X
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
A I X
A I X
A C I X
X
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
A X
I X
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
I X
A I X
I X
# A80000OFFICIAL
A80000OFFICIAL #
I X
A C I X
A I X
A I X
A I X
A I X
A I X
A I X
# A80000OFFICIAL
A80000OFFICIAL #
A I X
A I X
A I X
A I X
A I X
A I X
A I X
# A80000OFFICIAL
A80000OFFICIAL #
A I X
A I X
A I X
A I X
A I X
A I X
# A80000OFFICIAL
A80000OFFICIAL #
A I X
A I X
A I X
A I X
A I X
A I X
I X
A X
A I X
# A80000OFFICIAL
A80000OFFICIAL #
A I X
A I X
A I X
A I X
# A80000OFFICIAL
A80000OFFICIAL #
I X
A X
A X
A X
A X
A X
A X
# A80000OFFICIAL
A80000OFFICIAL #
A X
A X
A X
A X
A X
A X
A X
A X
A X
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
A X
# A80000OFFICIAL
A80000OFFICIAL #
I X
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
A I X
A I X
I X
A I X
Restructured/Changed
Restructured/Changed
# A80000OFFICIAL
A80000OFFICIAL #
New
New
New
New
New
# A80000OFFICIAL
A80000OFFICIAL #
New
New
New
New
New
# A80000OFFICIAL
A80000OFFICIAL #
New
New
New
New
New
New
Restructured/Changed
# A80000OFFICIAL
A80000OFFICIAL #
New
A C I X Restructured/Changed
New
New
New
# A80000OFFICIAL
A80000OFFICIAL #
New
New
New
New
New
New
New
New
New
New
New
Restructured/Changed
# A80000OFFICIAL
A80000OFFICIAL #
New
New
New
New
New
A C I X Restructured/Changed
# A80000OFFICIAL
A80000OFFICIAL #
A C I X Restructured/Changed
Restructured/Changed
New
Restructured/Changed
Restructured/Changed
Restructured/Changed
Restructured/Changed
New
New
# A80000OFFICIAL
A80000OFFICIAL #
New
New
New
A C I X Restructured/Changed
Restructured/Changed
A C I X Restructured/Changed
# A80000OFFICIAL
A80000OFFICIAL #
A C I X Restructured/Changed
A C I X Archived
A C I X Restructured/Changed
# A80000OFFICIAL
A80000OFFICIAL #
Restructured/Changed
Restructured/Changed
Restructured/Changed
Restructured/Changed
A C I X Restructured/Changed
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
Restructured/Changed
# A80000OFFICIAL
A80000OFFICIAL #
h) Findings. A C I X Restructured/Changed
# A80000OFFICIAL
A80000OFFICIAL #
Restructured/Changed
Restructured/Changed
Restructured/Changed
Restructured/Changed
A C I X Restructured/Changed
A C I X Restructured/Changed
A C I X Archived
Restructured/Changed
# A80000OFFICIAL
A80000OFFICIAL #
Restructured/Changed
Restructured/Changed
Restructured/Changed
Restructured/Changed
Restructured/Changed
New
New
New
New
Restructured/Changed
# A80000OFFICIAL
A80000OFFICIAL #
Restructured/Changed
Restructured/Changed
Restructured/Changed
Restructured/Changed
Restructured/Changed
Restructured/Changed
Restructured/Changed
Restructured/Changed
Restructured/Changed
Restructured/Changed
New
New
# A80000OFFICIAL
A80000OFFICIAL #
New
New
New
New
New
New
# A80000OFFICIAL
A80000OFFICIAL #
New
New
New
New
New
New
Restructured/Changed
Restructured/Changed
Restructured/Changed
Restructured/Changed
# A80000OFFICIAL
A80000OFFICIAL #
Restructured/Changed
Restructured/Changed
Restructured/Changed
Restructured/Changed
Restructured/Changed
Restructured/Changed
Restructured/Changed
Restructured/Changed
Restructured/Changed
Restructured/Changed
# A80000OFFICIAL
A80000OFFICIAL #
Restructured/Changed
New
New
New
New
New
New
# A80000OFFICIAL
A80000OFFICIAL #
New
New
New
New
New
New
New
New
# A80000OFFICIAL
A80000OFFICIAL #
Restructured/Changed
New
New
New
New
New
# A80000OFFICIAL
A80000OFFICIAL #
New
New
New
New
New
New
New
# A80000OFFICIAL
A80000OFFICIAL #
New
New
New
New
New
Restructured/Changed
Restructured/Changed
Restructured/Changed
Restructured/Changed
Restructured/Changed
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
4.2.2
Changed to align with changes to FRAUD FRAUD-02-02-01 4.2.2
Accountable Authority responsibilities and
terminology.
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
4.2.3
Moved to guidance
Moved to FRAUD-02-03-03
Moved to FRAUD-02-03-04
# A80000OFFICIAL
A80000OFFICIAL #
4.2.4
language changed for clarity. ` FRAUD-02-04-01 4.2.4
4.2.5
# A80000OFFICIAL
A80000OFFICIAL #
Moved to FRAUD-02-05-01
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
4.2.6
# A80000OFFICIAL
A80000OFFICIAL #
Moved to FRAUD-02-04-02b
4.3.1
language updated for clarity PRIV PRIV-03-01-01 4.3.1
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
4.3.3
PRIV PRIV-03-03-01 4.3.3
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
Moved to PRIV-03-04-02
Moved to PRIV-03-04-02
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
4.3.8
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
4.3.9
language updated for clarity PRIV PRIV-03-09-01 4.3.9
# A80000OFFICIAL
A80000OFFICIAL #
Moved to PRIV-03-09-02d
# A80000OFFICIAL
A80000OFFICIAL #
Moved to PROT-04-02-23a
Covered by PRIV-03-09-01
4.3.10
4.3.10
Expanded applicability to other roles and PRIV PRIV-03-11-01 4.3.11
non-government systems.
4.3.12
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
4.4.1
Archived to enable support for non-
Commonwealth entities.
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
Covered by PROT-04-01-03
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
Called out four in particular, and have split PROT PROT-04-02-05 4.4.2
into sub requirements
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
Moved to PROT-04-02-22a
# A80000OFFICIAL
A80000OFFICIAL #
4.4.3
PROT PROT-04-03-01 4.4.3.1
# A80000OFFICIAL
A80000OFFICIAL #
4.5.1
# A80000OFFICIAL
A80000OFFICIAL #
UX UX-05-01-01 4.5.1
UX UX-05-01-02 4.5.1
UX UX-05-01-03 4.5.1
UX UX-05-01-04 4.5.1
UX UX-05-01-05 4.5.1
UX UX-05-01-06 4.5.1
UX UX-05-01-07 4.5.1
4.5.2
UX UX-05-02-01 4.5.2
# A80000OFFICIAL
A80000OFFICIAL #
UX UX-05-02-02 4.5.2
UX UX-05-02-03 4.5.2
UX UX-05-02-03 4.5.2
UX UX-05-02-05b 4.5.2
UX UX-05-02-05b 4.5.2
# A80000OFFICIAL
A80000OFFICIAL #
UX UX-05-02-05c 4.5.2
UX UX-05-02-05c 4.5.2
UX UX-05-02-06 4.5.2
UX UX-05-02-07 4.5.2
UX UX-05-02-08 4.5.2
UX UX-05-03-01 4.5.3
4.5.4
# A80000OFFICIAL
A80000OFFICIAL #
UX UX-05-04-01 4.5.4.1
UX UX-05-04-02a 4.5.4.2
UX UX-05-04-02a 4.5.4.2
UX UX-05-04-02a 4.5.4.2
UX UX-05-04-02a 4.5.4.2
# A80000OFFICIAL
A80000OFFICIAL #
UX UX-05-04-02a 4.5.4.2
UX UX-05-04-02a 4.5.4.2
UX UX-05-04-02b 4.5.4.2
UX UX-05-04-02b 4.5.4.2
UX UX-05-04-02b 4.5.4.2
UX UX-05-04-02b 4.5.4.2
UX UX-05-04-02b 4.5.4.2
UX UX-05-04-02b 4.5.4.2
UX UX-05-04-02b 4.5.4.2
4.5.4.3
Moved to UX-05-04-03 UX UX-05-04-03 4.5.4.3
# A80000OFFICIAL
A80000OFFICIAL #
UX UX-05-04-06a 4.5.4.3
UX UX-05-04-06a 4.5.4.3
4.5.5
Moved to UX-05-05-01 UX UX-05-05-01 4.5.5
# A80000OFFICIAL
A80000OFFICIAL #
TEST-06-01-04 4.6.1
TEST-06-01-04 4.6.1
TEST-06-01-04 4.6.1
TEST-06-01-04 4.6.1
TEST-06-01-04 4.6.1
# A80000OFFICIAL
A80000OFFICIAL #
TEST-06-01-04 4.6.1
TEST-06-01-04 4.6.1
TEST-06-01-05 4.6.1
TEST-06-01-05 4.6.1
TEST-06-01-06 4.6.1
TEST-06-01-07 4.6.1
Moved to TEST-06-01-02
# A80000OFFICIAL
A80000OFFICIAL #
4.7.1
Restructure of section and requirements ASSESS ASSESS-07-01-01 4.7.1
# A80000OFFICIAL
A80000OFFICIAL #
Moved to ASSESS-07-05-01
Moved to PRIV-03-03-01
Moved to ASSESS-07-05-02
Moved to ASSESS-07-05-02
Moved to ASSESS-07-05-02
Moved to ASSESS-07-05-02
Moved to ASSESS-07-05-02
Moved to ASSESS-07-05-02
Moved to ASSESS-07-05-02
Moved to ASSESS-07-05-02
# A80000OFFICIAL
A80000OFFICIAL #
Moved to ASSESS-07-05-02
Incorporated into ASSESS-07-05-03
4.7.2
Moved to ASSESS-07-06-01
Moved to ASSESS-07-06-02
4.7.3
Moved from ASSESS-07-06-01 ASSESS-07-03-01
# A80000OFFICIAL
A80000OFFICIAL #
incorporated ASSESS-07-07-01
incorporated ASSESS-07-07-01
incorporated ASSESS-07-07-01
Moved to ASSESS-07-07-01
4.7.4
Moved from ASSESS-07-07-02 ASSESS ASSESS-07-04-01 4.7.4
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
4.7.5
Moved from ASSESS-07-01-01 ASSESS ASSESS-07-05-01 4.7.5
# A80000OFFICIAL
A80000OFFICIAL #
4.7.6
Moved to ASSESS-07-03-01
Moved to ASSESS-07-03-02
# A80000OFFICIAL
A80000OFFICIAL #
Moved to ASSESS-07-03-02
Moved to ASSESS-07-03-02
Moved to ASSESS-07-03-03
4.7.4
Moved from ASSESS-07-03-01 ASSESS ASSESS-07-07-01 4.7.7
Moved to ASSESS-07-04-01
Moved to ASSESS-07-04-01
Moved to ASSESS-07-04-01
# A80000OFFICIAL
A80000OFFICIAL #
Moved to ASSESS-07-04-01
Moved to ASSESS-07-04-01
Moved to ASSESS-07-04-01
Moved to ASSESS-07-04-01
Moved to ASSESS-07-04-01
Moved to ASSESS-07-04-01
Moved to ASSESS-07-04-01
Moved to ASSESS-07-04-01
Moved to ASSESS-07-04-01
# A80000OFFICIAL
A80000OFFICIAL #
Moved to ROLE-02-01-01
ROLE ROLE-02-01-01 5.2.1
Moved to ROLE-02-01-01
ROLE ROLE-02-01-01 5.2.1
Moved to ROLE-02-01-01
ROLE ROLE-02-01-01 5.2.1
# A80000OFFICIAL
A80000OFFICIAL #
Moved to ROLE-02-01-01
ROLE ROLE-02-01-01 5.2.1
Moved to ROLE-02-01-01
ROLE ROLE-02-01-01 5.2.1
Moved to ROLE-02-01-01
# A80000OFFICIAL
A80000OFFICIAL #
Moved to ROLE-02-01-01
# A80000OFFICIAL
A80000OFFICIAL #
Moved to ROLE-02-01-01
Moved to ROLE-02-01-01
Moved to ROLE-02-01-01
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
5.3.4.1
IDP IDP-03-04-03 5.3.4.1
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
Clarified wording
5.3.8.1
IDP-03-08-01 5.3.8.1
IDP
IDP-03-08-02 5.3.8.1
IDP
IDP IDP-03-08-02 5.3.8.1
# A80000OFFICIAL
A80000OFFICIAL #
IDP-03-08-03 5.3.8.1
IDP
IDP-03-08-03 5.3.8.1
IDP
IDP-03-08-03 5.3.8.1
IDP
Adapted from IDP-03-08-31 IDP-03-08-03 5.3.8.1
IDP
IDP-03-08-03 5.3.8.1
IDP
IDP-03-08-03a 5.3.8.1
IDP
IDP-03-08-04 5.3.8.1
IDP
IDP-03-08-05 5.3.8.1
IDP
IDP-03-08-06 5.3.8.1
IDP
# A80000OFFICIAL
A80000OFFICIAL #
IDP-03-08-07 5.3.8.1
IDP
IDP-03-08-07 5.3.8.1
IDP
IDP-03-08-07 5.3.8.1
IDP
IDP-03-08-07 5.3.8.1
IDP
IDP-03-08-07 5.3.8.1
IDP
IDP-03-08-07 5.3.8.1
IDP
Moved to IDP-03-08-14a
# A80000OFFICIAL
A80000OFFICIAL #
Moved to IDP-03-08-09
Moved to IDP-03-08-09
Moved to IDP-03-08-11
Moved to IDP-03-08-11a
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
Moved to IDP-03-08-11
Moved to IDP-03-08-11c
Moved to IDP-03-08-11a
# A80000OFFICIAL
A80000OFFICIAL #
Moved to IDP-03-08-12b
Moved to IDP-03-08-12c
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
Moved to IDP-03-08-18
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
Moved to IDP-03-08-10c
5.3.8.6
IDP IDP-03-08-22 5.3.8.6
# A80000OFFICIAL
A80000OFFICIAL #
Covered by IDP-03-08-04
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
Wording adjusted
Wording adjusted
# A80000OFFICIAL
A80000OFFICIAL #
5.4.3.8
Restructured req numbers due to deleted CSP CSP-04-03-08 5.4.3.8
section above
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
Duplicate requirement
Duplicate requirement
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
ANNUAL 7.2.1
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
ANNUAL 7.2.1
ANNUAL 7.2.1
7.2.1.1
# A80000OFFICIAL
A80000OFFICIAL #
7.2.1.2
ANNUAL ANNUAL-02-01-04 7.2.1.2
7.2.2
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
7.2.2.1
ANNUAL ANNUAL-02-02-04 7.2.2.1
7.2.3
# A80000OFFICIAL
A80000OFFICIAL #
Moved to ANNUAL-02-05-01
# A80000OFFICIAL
A80000OFFICIAL #
Moved to ANNUAL-02-05-01a
7.2.4
# A80000OFFICIAL
A80000OFFICIAL #
Moved to ANNUAL-02-06-01
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
7.2.5
Moved to ANNUAL-02-04-01
Moved to ANNUAL-02-04-01
Moved to ANNUAL-02-04-01
Moved to ANNUAL-02-04-01
Moved to ANNUAL-02-04-01
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
Moved to ANNUAL-02-10-06
Moved to ANNUAL-02-08-01
# A80000OFFICIAL
A80000OFFICIAL #
Moved to ANNUAL-02-08-01
Moved to ANNUAL-02-08-01
Moved to ANNUAL-02-08-01
Moved to ANNUAL-02-08-01
Moved to ANNUAL-02-08-01
Moved to ANNUAL-02-08-01
Moved to ANNUAL-02-08-01
Moved to ANNUAL-02-08-01
Moved to ANNUAL-02-08-01
# A80000OFFICIAL
A80000OFFICIAL #
Moved to ANNUAL-02-08-01
Moved to ANNUAL-02-08-01
7.2.6
7.2.7
# A80000OFFICIAL
A80000OFFICIAL #
7.2.8
Adapted from ANNUAL-02-05-04 ANNUAL ANNUAL-02-08-01 7.2.8
# A80000OFFICIAL
A80000OFFICIAL #
7.2.8
ANNUAL ANNUAL-02-08-02 7.2.8
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
7.2.9
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
7.2.9.1
ANNUAL ANNUAL-02-09-05 7.2.9.1
# A80000OFFICIAL
A80000OFFICIAL #
7.2.10
# A80000OFFICIAL
A80000OFFICIAL #
7.2.10.1
ANNUAL ANNUAL-02-10-02 7.2.10.1
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
7.2.10.2
ANNUAL ANNUAL-02-10-06 7.2.10.2
7.2.11
Adapted from ANNUAL-02-05-02 ANNUAL ANNUAL-02-11-01 7.2.10.2
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
The TDIF Application Letter MUST specify • web responsive design (e.g. can be accessed A
whether the Identity Facility supports: through an internet browser)
• a mobile application (e.g. the Identity Facility is a
[A white-label product is a product or service mobile application)
produced by one organisation that other • a component of either of the above (e.g. a white
organisations can rebrand to make it appear as label service
if they had made it.]
# A80000OFFICIAL
A80000OFFICIAL #
The TDIF Application Letter MUST include an a. Estimated dates when Functional Assessments and
accreditation schedule which includes: any other required testing will be undertaken
# A80000OFFICIAL
A80000OFFICIAL #
Each TDIF Exemption Request MUST include all • A filled out TDIF Exemption Request Form signed by
information as described in Appendix A: TDIF the Applicant’s Accountable Executive
exemption process and, at a minimum:
Any request made to the DTA to consider a) Which Functional Assessment or TDIF requirements
Alternative Assessment Reports MUST include: it is provided as evidence for
# A80000OFFICIAL
A80000OFFICIAL #
Once the applicant has achieved all applicable • The name, role/position and contact details of the
requirements, the Applicant MUST submit a Accountable Executive
Qualifying Attestation Letter signed by the
Applicant’s Accountable Executive that contains
the following information to support its claim
that its operations are in accordance with TDIF
requirements:
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
The Digital Identity Fraud Control Plan MUST a) Fraud control goals and strategic objectives of the A
detail the Applicant, including how the management of Digital
Identity Fraud Risks intersects with and supports broader
business objectives and priorities
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
The Applicant MUST provide appropriate Digital a) before such Personnel start work on those duties A
Identity Fraud Risk information and training to
Personnel whose duties relate to the services
for which the Applicant is accredited:
# A80000OFFICIAL
A80000OFFICIAL #
If the Applicant reasonably suspects that a MUST NOT allow a new registration or update of that A
Digital Identity is fraudulent or its use may result Digital Identity to be completed
in a Digital Identity Fraud Incident, the
Applicant:
# A80000OFFICIAL
A80000OFFICIAL #
The Applicant MUST either: a) investigate actual and suspected Digital Identity A
Fraud Incidents, unless the incident or suspected
incident has been referred to, and been accepted by, an
Enforcement Body; o
In the event of a Digital Identity Fraud Incident, a) mitigate the adverse effects of the incident; and A
the Applicant MUST take reasonable steps to
The Applicant MUST keep records of: a) decisions to use civil, administrative or disciplinary A
procedures, or to take no further action in response to a
suspected Digital Identity Ffraud Iincident; and
# A80000OFFICIAL
A80000OFFICIAL #
The Applicant MUST: a) provide the DTA with a report on Digital Identity Fraud A
Incidents at least once every quarter; or
# A80000OFFICIAL
A80000OFFICIAL #
The Applicant MUST include, at a minimum, the a) the number of Digital Identity Fraud Incidents related A
following information when reporting on Digital to the Applicant in the period since the last report. The
Identity Fraud Incidents: number of such incidents may be zero
# A80000OFFICIAL
A80000OFFICIAL #
If the Applicant is not an APP Entity, the a) the Privacy Act applies to that action or practice as if A
Applicant MUST NOT take any action or engage the Applicant were an organisation within the meaning
in a practice with respect to Personal of that Act; or
Information when providing services using its
Identity System unless:
# A80000OFFICIAL
A80000OFFICIAL #
neither (a) nor (b) apply and the Applicant has entered A
an agreement with the DTA, and the agreement requires
the Applicant to comply with the Privacy Act and the
APPs in relation to that action or practice as if the
Applicant were an APP Entity.
The Applicant MUST demonstrate how the a) Handling of internal and external privacy enquiries A
following Privacy Officer functions are carried and complaints.
out:
# A80000OFFICIAL
A80000OFFICIAL #
The Applicant MUST demonstrate how its a) approves its Privacy Management Plan; A
Privacy Champion:
# A80000OFFICIAL
A80000OFFICIAL #
The Applicant’s Privacy Policy MUST include a) The kinds of Personal information that the Applicant
information on: collects and holds
# A80000OFFICIAL
A80000OFFICIAL #
The Applicant MUST provide appropriate a) before such Personnel start work on those duties; and A
privacy awareness training to Personnel whose
duties relate to the services for which the
Applicant is accredited:
# A80000OFFICIAL
A80000OFFICIAL #
If the Applicant is an APP Entity, the Applicant a) report eligible data breaches to affected Individuals A
MUST: and the Information Commissioner as required under
the Privacy Act ; and
If the Applicant is not an APP Entity, the a) if the Applicant is a department or authority of a A
Applicant MUST: State or Territory and the Applicant is covered by a law
of State or Territory that provides a scheme for
notification of data breaches that is comparable to the
scheme provided for in Part IIIC of the Privacy Act, the
Applicant MUST:
(i) comply with its notification obligations under the
relevant State or Territory Scheme; and
(ii) if required to notify another entity—provide the
DTA with a copy of any statement provided to the
notified entity under such scheme at the same time as it
is provided to the notified entity; or
The Applicant MUST develop and maintain a a) includes a description of the actions to be taken if a A
Data Breach Response Plan that: data breach is suspected, discovered, or reported by
Personnel or external party
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
Unless prohibited by law, the Annual a) the name of each Enforcement Body that has
Transparency Report MUST disclose: requested Digital Identity Information from the
Applicant since the previous report;
# A80000OFFICIAL
A80000OFFICIAL #
The Applicant MUST only collect, use and a) provide the services for which the Applicant is A
disclose an Individual’s Behavioural Information seeking accreditation
to:
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
The Applicant MUST ensure Express Consent is 5 If the Attribute Service Provider connects directly with A
obtained from an Individual prior to disclosing a Relying Party, it is required to obtain Express Consent
that individual’s Attributes to a Relying Party or prior to the disclosure. If the connection to the Relying
any third party. Party is brokered by an Identity Exchange, Express
Consent may be obtained by the Identity Exchange on
behalf of the Attribute Service Provider.
The Applicant MUST ensure Express Consent is 6 If the Identity Service Provider connects directly with a
obtained from an Individual prior to disclosing Relying Party, it is required to obtain Express Consent
that individual’s Attributes to a Relying Party or prior to the disclosure. If the connection to the Relying
any third party. Party is brokered by an Identity Exchange, Express
Consent may be obtained by the Identity Exchange on
behalf of the Identity Service Provider.
# A80000OFFICIAL
A80000OFFICIAL #
The Applicant MUST ensure Express Consent is 7 If the connection to the Relying Party is brokered by an
obtained from an Individual prior to disclosing Identity Exchange, the Identity Exchange may delegate
that individual’s Attributes to a Relying Party or the collection of Express Consent to the Identity Service
any third party. Provider or Attribute Service Provider.
The Applicant MUST, at the time of obtaining a) that providing enduring Express Consent is optional A
enduring consent, notify Individuals
The Applicant MUST maintain Audit Logs that a) the date and method by which Express Consent was A
demonstrate how Express Consent was obtained from the Individual;
obtained from the Individual, including:
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
The Applicant MUST provide a complaints a) is readily accessible, including prominent contact A
service for handling privacy complaints which: information about the service.
# A80000OFFICIAL
A80000OFFICIAL #
The Applicant MUST a) Determine and record the Applicant’s tolerance for A
Cyber Security Risks
Where exceptional circumstances prevent or a) MUST, as soon as practicable notify the DTA of the A
affect the Applicant’s capability to implement a circumstances and the non-compliance, including details
TDIF requirement, the Applicant of the remedial action (if any) taken or to be taken to
reduce the risk to the Applicant’s Identity System
# A80000OFFICIAL
A80000OFFICIAL #
The Applicant MUST have an officer or senior a) managing Cyber Security Risks within their A
employee of the Applicant as the designated organisation; and
Chief Security Officer (CSO) or equivalent role
who is responsible for:
The Applicant MUST empower the CSO or a) Appointing security advisors within the Applicant’s A
equivalent role to make and implement organisation to support the CSO in the day-to-day
decisions about delivery of protective security services
The Applicant MUST provide appropriate a) before such Personnel start work on those duties ; and A
information and training in relation to the
prevention and management of Cyber Security
Risks to Personnel whose duties relate to the
services for which the Applicant is accredited:
# A80000OFFICIAL
A80000OFFICIAL #
The Applicant MUST develop and use a) All elements of the Applicant’s System Security Plan A
procedures that ensure: are achieved.
# A80000OFFICIAL
A80000OFFICIAL #
The System Security Plan MUST include a) The Cyber security goals and strategic objectives of A
the Applicant, including how Cyber Security Risk
management intersects with and supports broader
business objectives and priorities.
# A80000OFFICIAL
A80000OFFICIAL #
The Applicant MUST review and update its a)at least annually; and A
System Security Plan
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
The Applicant MUST enable appropriate access a) Ensuring that access to Sensitive information, Digital A
to Digital Identity Information. This includes Identity Information or components of the Identity
System on which such information is stored is only
provided to people with a Need to know that
information
# A80000OFFICIAL
A80000OFFICIAL #
b) patching applications A
c) restricting administrative privileges; and A
d)patching operating systems; A
The Applicant MAY consider implementing A
additional ASD Strategies to Mitigate Cyber
Security Incidents
A
The Applicant MUST implement and maintain a
control mechanism to flag Cyber Security
Incidents or suspected Cyber Security Incidents
which occur in connection with its Identity
System.
The Applicant MUST compare all new A
registrations and updates to existing records
against the control mechanism used to flag
actual or suspected Cyber Security Incidents
If the Applicant reasonably suspects that the a) MUST NOT allow a new registration or update of A
registration or update of a Digital Identity is that Digital Identity to be completed;
likely to create a Cyber Security Incident, the
Applicant:
# A80000OFFICIAL
A80000OFFICIAL #
In the event of a Cyber Security Incident which a) mitigate the adverse effects of the incident; and A
impacts the Applicants Identity System, the
Applicant MUST take reasonable steps to:
# A80000OFFICIAL
A80000OFFICIAL #
The Applicant MUST include the following a) the number of Cyber Security Incidents which A
information when reporting Cyber Security occurred in connection with the Applicant’s Identity
Incidents System in the period since the last report. The number
of such incidents may be zero;
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
Audit logs MUST include for each event: • Credential type used.
• Credential Level achieved.
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
A
b) Training requirements for recovery team members.
A
c) Recovery objectives and priorities.
d) Continuity strategies. A
A
e) Testing requirements and restoration procedures.
The Applicant MUST test their Disaster Recovery A
and Business Continuity Plan as part of initial
accreditation and at least once every 12 months
thereafter
The Applicant MUST maintain a Cryptographic a) Cryptographic key lifecycle management over the A
Key Management Plan for their identity system lifecycle of the key (generation, delivery, renewal,
which covers: revocation, etc).
# A80000OFFICIAL
A80000OFFICIAL #
a) Physical facilities.
b) ICT systems. A
Prior to Personnel separation or transfer, the A
Applicant MUST ensure the CSO, or relevant
security advisor is advised of any proposed
cessation of employment resulting from
misconduct or other adverse reasons.
The Applicant MUST dispose of physical assets a) resetting combination locks to factory settings; A
securely, including by;
Chapter 5 Usability Requirements
5.1 Usability requirements
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
The Applicant MUST provide Users with a) the required Identity documents;
information on
If proofing is partially complete[1], the Applicant a) information and documents that will be deleted by
MUST inform the User of: the Applicant;
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
The Applicant MUST meet the requirements in 1) no interaction with a user when providing the services A
Section 5.4.2 (Usability Test Plans) and Section for which the Applicant is seeking accreditation; or
5.4.35 (Conduct Usability Testing) unless it can
demonstrate to the DTA that the Applicant has
The Applicant’s Usability Test Plan MUST: a) Describe the test objectives, usability goals, and A
usability metrics that will be captured.
# A80000OFFICIAL
A80000OFFICIAL #
A
a) Individuals with disability.
b) Individuals over the age of 65. A
A
c) Individuals who use assistive technologies.
A
d) Individuals with low literacy.
A
e) Individuals from culturally and linguistically diverse
backgrounds
A
# A80000OFFICIAL
A80000OFFICIAL #
The Applicant’s Accountable Executive must a) for each recommendation in the report that is A
respond in writing to any recommendation accepted by the Applicant, the timeframe for
identified in the usability testing report implementation of the recommendation; and
including
For the Technical Testing that the Applicant is a)The exit criteria used when testing; A
required to complete under this section, it
MUST provide the DTA with the following:
# A80000OFFICIAL
A80000OFFICIAL #
The Applicant MUST provide the DTA with a a) Confirmation that the testing has been undertaken A
technical test report detailing the outcomes of and completed
the Technical Testing done under this section,
including:
The Applicant MUST demonstrate through • Its fraud control mechanism for detecting Digital A
Technical Testing how its Identity System meets Identity Fraud Incidents (as per FRAUD-02-04-01).
the following TDIF requirements:
# A80000OFFICIAL
A80000OFFICIAL #
The Applicant MUST demonstrate through • Its fraud control mechanism, which prevents new A
testing how its Identity System meets the registrations or updates to existing records from
following TDIF requirements: occurring if the fraud control mechanism indicates the
registration or update is fraudulent or suspected of
being fraudulent (as per FRAUD-02-04-02b).
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
The Applicant MUST demonstrate to the DTA • Are independent from the development and A
how the Assessors: operational teams of the Applicant’s Identity System
# A80000OFFICIAL
A80000OFFICIAL #
The Applicant MUST ensure that each Assessor a)test results where applicable; A
prepares a report on the outcomes of the
relevant Functional Assessment that includes:
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
The Applicant’s Accountable Executive MUST a) for each recommendation, risk and non-compliance A
respond in writing to each recommendation, that is accepted by the Applicant, the timeframe and
risk and non-compliance outlined in the details of the actions that the Applicant will take for
Functional Assessment Report including: implementation ; and
If the risk rating meets or exceeds that outlined • it has implemented mitigations to address the A
above in ASSESS-07-04-03a, the Accredited recommendation, risk or non-compliance; and
Provider MUST confirm:
# A80000OFFICIAL
A80000OFFICIAL #
The Privacy Impact Assessment conducted a) Be undertaken early enough to influence the design A
under ASSESS-07-05-01 MUST: of the Identity System.
b)Reflect consultation with relevant stakeholders. A
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
The Applicant MUST have user terms in place a) A general acknowledgment by the User that their A
between the Applicant and each user that use of the Identity System provided by the Applicant is
include: governed by the User terms.
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
Before implementing an alternative identity a) perform an assessment of the risk associated with
proofing process under IDP-03-03-01, the implementing the alternative process and provide the
Applicant MUST: risk assessment to the DTA
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
To verify the link between the User and their • Require the User to complete the Identity Proofing
Digital Identity, the Applicant MUST either: process for the Identity Proofing level of the Digital
Identity and ensure that the Attributes presented can be
linked to the Attributes which comprise the Digital
Identity.
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
The Applicant MUST complete Biometric Binding •Online Biometric Binding as per Section 3.9.2, or
by performing either:
•Local Biometric Binding as per Section 3.9.3
# A80000OFFICIAL
A80000OFFICIAL #
The Applicant MUST consider fraud and security • Risks related to using Biometric Matching
risks, and the associated mitigation strategies algorithms and Presentation Attack Detection (PAD)
and treatments, related to performing Biometric systems to complete Biometric Verification and PAD
Binding when developing their Fraud Control
Plan and System Security Plan, including the
following risks (where applicable):
# A80000OFFICIAL
A80000OFFICIAL #
If the Applicant is required to have a Biometric a) it has engaged a Biometric Testing Entity to conduct
Testing Entity test their Biometric Capability by the biometric testing
either IDP-03-08-12 or IDP-03-08-18, then the
Applicant MUST provide evidence that:
# A80000OFFICIAL
A80000OFFICIAL #
To complete Online Biometric Binding the •Technical Biometric Matching as per Section 3.9.4
Applicant MUST capture an Acquired Image and
perform at least one of the following:
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
Local Biometric Binding is performed when an • Capturing an Acquired Image and performing
Individual is in the physical presence of an either:
Assessing Officer, and MUST be achieved by the o Technical Biometric Matching as per Section 3.9.4
Assessing Officer performing one or more of the o Source Biometric Matching as per section 3.9.5
following biometric matching processes:
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
If the Applicant disallows a chosen Memorised a) advise the Individual that they need to select a
Secret based on its appearance on the list different secret
described in CSP-04-02-01d , the Applicant
MUST:
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
The Applicant MUST store Look-up Secrets in a a)Look-Up Secrets are hashed using an AACA; and
form that is resistant to offline attacks by
ensuring that:
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
If the out-of-band device sends an approval • The device MUST accept transfer of the secret from
message over the secondary communication the primary channel, which it MUST send to the
channel — rather than by the Individual Applicant over the secondary channel to associate the
transferring a received secret to the primary approval with the Authentication transaction. The
communication channel — it MUST do one of Individual MAY perform the transfer manually or use a
the following: technology such as a barcode or QR code to effect the
transfer .
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
Accredited Providers MUST meet any new or NOTE: If an Accredited Provider does not provide the
amended requirements in the newest version of information required by ANNUAL-02-01-01 or ANNUAL-
the TDIF, published on the TDIF website, within 02-01-01a by their Annual Assessment date, the DTA will
12 months of that version being published. then assess whether the Accredited Provider has failed
These requirements will be assessed as part of to meet one or more of their ongoing obligations. If the
the Accredited Provider’s Annual Assessment DTA finds that the Accredited Provider has failed to
meet their obligations, this will result in a finding of non-
compliance with the TDIF. A finding of non-compliance
may result in a failed Annual Assessment. A failed
Annual Assessment may result in suspension or
termination of accreditation.
If the DTA makes a finding that the Accredited a) a risk rating assigned to each instance of non-
Provider has failed to comply with ANNUAL-02- compliance as set out in Appendix A; and
01-01 and ANNUAL-02-01-01a, the DTA will
advise the Accredited Provider of the non-
compliance in writing and direct it to submit
evidence to meet the relevant requirements.
The Accredited Provider MUST provide to the
DTA in writing:
# A80000OFFICIAL
A80000OFFICIAL #
If the risk rating meets or exceeds that outlined a) it has implemented mitigations to address the
above in ANNUAL-02-01-02a, the Accredited recommendation, risk or non-compliance
Provider MUST confirm:
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
The Accredited Provider MUST ensure that all In order for the DTA to review an Accredited Provider’s
Annual Assessment requirements are Annual Assessment materials, the Accredited Provider
completed by the anniversary of its initial should submit its Annual Assessment evidence at least
accreditation date. two months prior to the anniversary of its initial
accreditation date
[NOTE: If the Accredited Provider cannot meet
ANNUAL-02-02-01 and ANNUAL-02-02-02, then
this will result in a failed Annual Assessment.
Where the DTA makes a finding that an
Accredited Provider has failed an Annual
Assessment, the DTA will make a decision
whether the Accredited Provider’s accreditation
will be suspended or terminated]
Before the anniversary of the Accredited a) each Functional Assessment report prepared under
Provider’s initial accreditation date, the ANNUAL-02-07-04.
Accredited Provider MUST provide the DTA with
a full and unredacted copy of:
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
Any request made to the DTA to consider a) Which Functional Assessment or TDIF requirements
Alternative Assessment Reports MUST include: it is provided as evidence for
# A80000OFFICIAL
A80000OFFICIAL #
The Accredited Provider must ensure an a) a Privacy Assessment in accordance with ANNUAL-
Assessor conducts the following Functional 02-09-05;
Assessments by the anniversary of the
Accredited Provider’s accreditation date each
year:
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
The Accredited Provider MUST demonstrate to a) Are independent from the development and
the DTA how the Assessors : operational teams of the Accredited Provider’s Identity
System.
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
Annual Assessments that occur during: a) Even calendar years (i.e. 2022, 2024, 2026 etc)
require that Functional Assessments MUST be
undertaken by Assessors who are external to the
Accredited Provider’s organisation.
# A80000OFFICIAL
A80000OFFICIAL #
The Accredited Provider MUST ensure that each a)test results where applicable;
Assessor prepares a report on the outcomes of
the relevant Functional Assessment that
includes:
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
The Accredited Provider’s Accountable a) for each recommendation, risk and non-compliance
Executive MUST respond in writing to each that is accepted by the Accredited Provider, the
recommendation, risk and non-compliance timeframe and details of the actions that the Accredited
outlined in the Annual Assessment Reports Provider will take for implementation ; and
including:
If the Accredited Provider does not implement a a)A revaluation of the risk
mitigation or recommendation by the
timeframe set out in ANNUAL-02-08-02a, then
its Accountable Executive MUST provide to the
DTA in writing:
# A80000OFFICIAL
A80000OFFICIAL #
If the risk rating meets or exceeds that outlined a) it has implemented mitigations to address the
above in ANNUAL-02-08-04, the Accredited recommendation, risk or non-compliance
Provider MUST confirm:
As part of the Annual Assessment the a) The annual assessment of the Digital Identity Fraud
Accredited Provider MUST review following Risk associated with the services for which the
FRAUD requirements in TDIF 04 Functional Accredited Provider is accredited and the Accredited
Requirements and provide the DTA with: Provider’s Identity System as per FRAUD-02-01-02
# A80000OFFICIAL
A80000OFFICIAL #
As part of the Annual Assessment the a) Evidence the Accredited Provider has reviewed its
Accredited Provider MUST review the following Privacy Policy and where relevant updated during the
PRIV requirements in TDIF 04 Functional year (as per PRIV-03-02-05).
Requirements and provide the DTA with:
As part of the Annual Assessment the a) The annual assessment of the Cyber Security Risk
Accredited Provider MUST review the following associated with the services for which the Accredited
PROT requirements in TDIF 04 Functional Provider is accredited and the Accredited Provider’s
Requirements and provide the DTA with: Identity System as per PROT-04-01-01
# A80000OFFICIAL
A80000OFFICIAL #
The Accredited Provider MUST commission an a) address the findings and recommendations (if any)
Assessor to conduct a security assessment from the penetration testing of the Accredited Provider’s
which MUST, at a minimum: Identity System conducted under ANNUAL-02-09-07
# A80000OFFICIAL
A80000OFFICIAL #
The Accredited Provider MUST commission an a) WCAG version 2.0 to the AA standard for web-based
Assessor to conduct an accessibility assessment Identity Systems; and
which must, at a minimum, assess whether the
Accredited Provider’s Identity System meets:
# A80000OFFICIAL
A80000OFFICIAL #
The Applicant MUST consider the following risks a)Applicable risks in IDP-03-08-03
related to performing Biometric Binding when
reviewing their Fraud Control Plan and System
Security Plan as part of its Annual Assessment
requirements:
# A80000OFFICIAL
A80000OFFICIAL #
If the Accredited Provider supports Manual Face a) The tools and annual training for Personnel
Comparison, it MUST review and submit to the performing identity proofing processes to detect
DTA evidence of: fraudulent attributes and Evidence of Identity
Documents
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
C I X
# A80000OFFICIAL
A80000OFFICIAL #
C I X
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
C I X
C I X
C I X
# A80000OFFICIAL
A80000OFFICIAL #
C I X
C I X
C I X
C I X
C I X
C I X
C I X
C I X
C I X
# A80000OFFICIAL
A80000OFFICIAL #
C I X
C I X
C I X
C I X
C I X
C I X
C I X
C I X
C I X
C I X
# A80000OFFICIAL
A80000OFFICIAL #
C I X
C I X
C I X
C I X
C I X
C I X
C I X
# A80000OFFICIAL
A80000OFFICIAL #
C I X
C I X
C I X
# A80000OFFICIAL
A80000OFFICIAL #
C I
C I
C I
C I X
C I X
C I X
C I
C I
C I
# A80000OFFICIAL
A80000OFFICIAL #
C I X
C I X
C I X
C I X
C I X
C I X
C I X
C I X
# A80000OFFICIAL
A80000OFFICIAL #
C I X
C I X
# A80000OFFICIAL
A80000OFFICIAL #
C I X
C I X
C I X
C I X
C I
# A80000OFFICIAL
A80000OFFICIAL #
C I
C I
C I X
C I X
# A80000OFFICIAL
A80000OFFICIAL #
C I X
C I X
C I X
C I X
# A80000OFFICIAL
A80000OFFICIAL #
C I X
C I X
C I X
C I X
C I X
C I X
C I X
C I X
C I X
C I X
# A80000OFFICIAL
A80000OFFICIAL #
C I X
C I X
C I X
C I X
C I X
C I X
# A80000OFFICIAL
A80000OFFICIAL #
C I X
C I X
C I X
C I X
C I X
C I X
C I X
C I X
# A80000OFFICIAL
A80000OFFICIAL #
C I X
C I X
C I X
C I X
C I X
C I X
C I X
C I X
# A80000OFFICIAL
A80000OFFICIAL #
C I X
C I X
C I X
C I X
C I X
C I X
C I X
# A80000OFFICIAL
A80000OFFICIAL #
C I X
# A80000OFFICIAL
A80000OFFICIAL #
C I X
# A80000OFFICIAL
A80000OFFICIAL #
C I X
C I X
C I X
C I X
C I X
C I
C I X
C I X
# A80000OFFICIAL
A80000OFFICIAL #
C I
C I
C I
C I X
# A80000OFFICIAL
A80000OFFICIAL #
C I X
C I
C I X
# A80000OFFICIAL
A80000OFFICIAL #
C I X
C I X
C I X
C I X
C I X
C I X
C I X
C I X
C I X
C I X
# A80000OFFICIAL
A80000OFFICIAL #
C I X
C I X
C I X
C I X
C I X
C I X
# A80000OFFICIAL
A80000OFFICIAL #
C I X
C I X
C I X
C I X
C I X
C I X
C I
C I
C I X
# A80000OFFICIAL
A80000OFFICIAL #
C I
C I
C I X
C I X
C I X
C I X
C I X
C I X
# A80000OFFICIAL
A80000OFFICIAL #
C I X
C I X
C I X
C I X
C I X
C I X
C I X
C I X
# A80000OFFICIAL
A80000OFFICIAL #
C I X
C I X
C I X
C I X
C I X
C I X
C I X
C I X
C I X
# A80000OFFICIAL
A80000OFFICIAL #
C I X
C I X
C I X
C I X
C I X
C I X
C I X
C I
C I X
# A80000OFFICIAL
A80000OFFICIAL #
C I X
C I X
C I X
C I X
C I X
C I X
C I X
C I X
C I X
C I X
C I X
# A80000OFFICIAL
A80000OFFICIAL #
C I X
C I X
C I X
C I X
C I X
C I X
C I X
# A80000OFFICIAL
A80000OFFICIAL #
C I X
C I X
C I X
C I X
C I X
# A80000OFFICIAL
A80000OFFICIAL #
C I X
C I X
C I X
C I X
C I X
C I X
C I X
# A80000OFFICIAL
A80000OFFICIAL #
C I X
C I X
C I X
C I X
C I X
C I X
C I X
C I X
C I X
C I
C I
# A80000OFFICIAL
A80000OFFICIAL #
C I X
C I X
C I X
C I X
# A80000OFFICIAL
A80000OFFICIAL #
C I X
C I X
C I X
C I X
C I X
# A80000OFFICIAL
A80000OFFICIAL #
C I X
C I X
C I X
C I
# A80000OFFICIAL
A80000OFFICIAL #
C I X
C I X
C I X
C I X
C I X
C I X
C I X
C I X
# A80000OFFICIAL
A80000OFFICIAL #
C I X
C I X
C I X
C I X
C I X
C I X
C I X
C I X
C I X
C I X
C
C
# A80000OFFICIAL
A80000OFFICIAL #
C I X
C I X
C I X
C I X
C I X
# A80000OFFICIAL
A80000OFFICIAL #
C I X
C I X
C I X
C I X
C I X
C I X
C I X
C I X
C I X
C I X
C I X
C I X
C I X
# A80000OFFICIAL
A80000OFFICIAL #
C I X
C I X
C I X
C I X
C I X
C I X
C I X
C I X
C I X
C I X
C I X
# A80000OFFICIAL
A80000OFFICIAL #
C I
C I
C I X
C I X
C I X
C I X
C I X
# A80000OFFICIAL
A80000OFFICIAL #
I
I
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
C I X
C I X
C I X
C I X
C I X
C I X
C I X
# A80000OFFICIAL
A80000OFFICIAL #
C I X
C I X
C I X
C I X
C I X
C I X
C I X
C I X
C I X
C I X
C I X
C I X
C I X
# A80000OFFICIAL
A80000OFFICIAL #
C I X
C I X
C I X
C I X
C I X
C I X
C I X
C I X
C I X
# A80000OFFICIAL
A80000OFFICIAL #
C I X
C I X
C I X
C I X
C I X
C I X
C I X
C I X
C I X
# A80000OFFICIAL
A80000OFFICIAL #
C I X
C I X
C I
C I
# A80000OFFICIAL
A80000OFFICIAL #
C I X
C I X
C I X
C I X
# A80000OFFICIAL
A80000OFFICIAL #
C I X
C I X
C I X
C I X
C I X
# A80000OFFICIAL
A80000OFFICIAL #
C I X
C I X
C I X
C I X
C I X
C I X
# A80000OFFICIAL
A80000OFFICIAL #
C I X
C I X
C I X
C I X
C I X
C I X
C I X
C I X
C I X
C I X
C I X
# A80000OFFICIAL
A80000OFFICIAL #
C I X
C I X
C I X
C I X
C I X
C I X
C I X
C I X
C I X
C I X
# A80000OFFICIAL
A80000OFFICIAL #
C I X
C I X
C I X
C I X
C I X
C I X
# A80000OFFICIAL
A80000OFFICIAL #
C I X
C I X
C I X
C I X
C I X
C I X
C I X
C I X
C I X
C I X
C I X
C I X
# A80000OFFICIAL
A80000OFFICIAL #
C I X
C I X
C I X
C I X
# A80000OFFICIAL
A80000OFFICIAL #
C I X
C I X
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
C I X
C I X
C I X
C I X
C I X
C I X
# A80000OFFICIAL
A80000OFFICIAL #
C I X
C I X
C I X
C I X
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
C I X
C I X
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
# A80000OFFICIAL
A80000OFFICIAL #
Change log
The next scheduled review of TDIF will occur by July 2022. Any changes made to the policy framework pri
changes will be considered as part of the next scheduled review of TDIF.
With the exception of the Commonwealth Coat of Arms and where otherwise noted, this product is provided under a Creative
This licence lets you distribute, remix, tweak and build upon this work, even commercially, as long as they
reuse or distribution of part or all of this work must include the following attribution:
Trusted Digital Identity Framework (TDIF ™) Change log © Commonwealth of Australia (Digital Transform
Use of the Coat of Arms
The terms under which the Commonwealth Coat of Arms can be used are detailed on the It’s an Honour website (http://www
Contact us
The DTA is committed to providing accessible web content wherever possible. This document has undergone an accessibility c
# A80000OFFICIAL
A80000OFFICIAL #
Emergency
Routine
Material
TDIF 01 Glossary
TDIF 02 Overview
TDIF 03 Accreditation Process
TDIF 04 Functional Requirements
TDIF 04A Functional Guidance
TDIF 05 Role Requirements
TDIF 05A Role Guidance
TDIF 06 Federation Onboarding Requirements
TDIF 06A Federation Onboarding Guidance
TDIF 06B OpenID Connect 1.0 Profile
TDIF 06C SAML 2.0 Profile
TDIF 06D Attribute Profile
TDIF 07 Annual Assessment
TDIF Variation SOP
# A80000OFFICIAL