SAML Electronic Identity Category Code

Active / In Use
Description
None

ValueDefinition
AuthenticatedTelephonyPrincipal has authenticated via the means of the line number, a user suffix, and a password element.
InternetProtocolPrincipal has authenticated through the use of a provided IP address.
InternetProtocolPasswordPrincipal has authenticated through the use of a provided IP address, in addition to a username/password.
KerberosPrincipal has authenticated using a password to a local authentication authority, in order to acquire a Kerberos ticket. That Kerberos ticket is then used for subsequent network authentication.
MobileOneFactorContractReflects mobile contract customer registration procedures and a single factor authentication. For example, a digital signing device with tamper resistant memory for key storage, such as the mobile MSISDN, but no required PIN or biometric for real-time user authentication.
MobileOneFactorUnregisteredReflects no mobile customer registration procedures and an authentication of the mobile device without requiring explicit end-user interaction. This context class authenticates only the device and never the user; it is useful when services other than the mobile operator want to add a secure device authentication to their authentication process.
MobileTwoFactorContractReflects mobile contract customer registration procedures and a two-factor based authentication. For example, a digital signing device with tamper resistant memory for key storage, such as a GSM SIM, that requires explicit proof of user identity and intent, such as a PIN or biometric.
MobileTwoFactorUnregisteredReflects no mobile customer registration procedures and a two-factor based authentication, such as secure device and user PIN. This context class is useful when a service other than the mobile operator wants to link their customer ID to a mobile supplied two-factor authentication service by capturing mobile phone data at enrollment.
NomadTelephonyPrincipal is "roaming" (perhaps using a phone card) and has authenticated via the means of the line number, a user suffix, and a password element.
PasswordPrincipal has authenticated to an authentication authority through the presentation of a password over an unprotected HTTP session.
PasswordProtectedTransportPrincipal has authenticated to an authentication authority through the presentation of a password over a protected session.
PersonalizedTelephonyPrincipal has authenticated via the provision of a fixed-line telephone number and a user suffix, transported via a telephony protocol such as ADSL.
PGPPrincipal has authenticated by means of a digital signature where the key was validated as part of a PGP Public Key Infrastructure.
PreviousSessionApplicable when a principal had authenticated to an authentication authority at some point in the past using any authentication context supported by that authentication authority. Consequently, a subsequent authentication event that the authentication authority will assert to the relying party may be significantly separated in time from the principal's current resource access request. The context for the previously authenticated session is explicitly not included in this context class because the user has not authenticated during this session, and so the mechanism that the user employed to authenticate in a previous session should not be used as part of a decision on whether to now allow access to a resource.
SecureRemotePasswordPrincipal has authenticated by means of Secure Remote Password as specified in RFC 2945.
SmartcardPrincipal has authenticated to an authentication authority using a smartcard.
SmartcardPKIPrincipal has authenticated to an authentication authority through a two-factor authentication mechanism using a smartcard with enclosed private key and a PIN.
SoftwarePKIPrincipal has authenticated to an authentication authority using an X.509 certificate stored in software.
SPKIPrincipal has authenticated by means of a digital signature where the key was validated via an SPKI Infrastructure.
TelephonyPrincipal has authenticated via the provision of a fixed-line telephone number, transported via a telephony protocol such as ADSL.
TimeSyncTokenPrincipal has authenticated through a time synchronization token.
TLSClientPrincipal has authenticated by means of a client certificate, secured with the SSL/TLS transport.
UnspecifiedPrincipal has authenticated via unspecified means.
X509Principal authenticated by means of a digital signature where the key was validated as part of an X.509 Public Key Infrastructure.
XMLDSigPrincipal has authenticated by means of a digital signature according to the processing rules specified in the XML Digital Signature specification.