Architecture | Look at the basic scheme, main components and interfaces |
Identity Proofing | Connect cyber identity with real world |
Multifactor Authentization | Use several authentization factors |
Binding | Meet new ways of data channel protection |
ADUCID standard operations | Get to know elements of ADUCID operation |