Authentication - Acceptable Management of Authenticator Revocation and Termination, v1.0

Credential Service Providers must revoke authenticators in cases where the identity ceases to exist, on request, and when the subscriber is no longer eligible. This may require destroying or reclaiming a physical authenticator if it contained certified data.

Assessment Steps (2)

1
Revoke Authenticator (RevokeAuthenticator)
Does the CSP revoke the authenticator binding promptly when the online identity ceases to exist, when requested, or when the CSP determines the subscriber is no longer eligible?
Artifact
A1
Provide evidence (e.g. policies, operational details) that the CSP appropriately revoked authenticator bindings.
2
Reclaim or Destroy Authenticator (ReclaimorDestroyAuthenticator)
Does the CSP require subscribers to surrender or destroy any physical authenticator containing certified attributes?
Artifact
A1
Provide evidence (e.g. policies, operational details) that the CSP reclaims or verifies the destruction of any physical authenticators.

Conformance Criteria (2)

C1
CSPs SHALL revoke the binding of authenticators promptly when an online identity ceases to exist (e.g., subscriber's death, discovery of a fraudulent subscriber), when requested by the subscriber, or when the CSP determines that the subscriber no longer meets its eligibility requirements.
Citation
NIST SP 800-63B
Section 6.4, Paragraph 2
C2
The CSP SHALL require subscribers to surrender or certify destruction of any physical authenticator containing certified attributes signed by the CSP as soon as practical after revocation or termination takes place. This is necessary to block the use of the authenticator's certified attributes in offline situations between revocation/termination and expiration of the certification.
Citation
NIST SP 800-63B
Section 6.4, Paragraph 3