For government organisations needing support to maintain critical digital services during COVID-19, email email@example.com
Understand how to conduct an identification risk assessment for your service or transaction. Use this to calculate the right strength of identification processes to protect against information fabrication and identity theft.
This guide describes various authenticator types and provides examples and considerations for their use. It does not prescribe the use of any specific authenticator.
Page last updated: 06 May 2020
Crown Copyright 2020
Date printed: 11/08/2020