Code | Brief description | Note |
OK | Success | Normal → normal success |
KO | Failure | Normal → normal negative result |
NAU | Disagreement at user side | Rejected by user - real or artificial because PEIG is temporarily blocked → normal authentication failure |
PPNP | PEIG is not available | Functional problem - PEIG is not connected to PEIG-Proxy → Display to user (with instructions) |
USP | Unknown service provider | Normal status - unknown user → management (initialization menu - init) |
USSP | Unknown secondary service provider | Normal status - unknown user for secondary provider → management (explanatory text - link with other SP) |
UU | Unknown user | Operating status or security problem - the identity obtained from PEIG does not exist in AIM → management - either it is an attack, or repair after AIM failure - reinit |
UUS | Unknown user for secondary provider | Operation status or security problem - the identity does not exist in a secondary AIM → management - it is either the operation status, attack or repair after failure of AIM - init, or reinit at secondary AIM |
UI | Invalid identification | Operation status - PEIG Operation status - PEIG or AIM determined that CyberID is violating terms of validity (time or number of uses) → management - e.g. rechange menu or change in access rights |
UPR | Unsupported security profile | AIM or PEIG cannot find (accept) the requested security profile → change of profile or denial of PEIG |
UIP | Unsupported IL security profile | AIM or PEIG cannot find (accept) the requested IL (identity link) security profile → change in IL profile or request denial |
UOP | Unsupported extension object profile | PEIG cannot accept the required security profile of the extension object → change of profile or request denial |
VI | Valid identity | Functional problem or security incident - CyberID is valid upon requirement for rechange → probable use of rechange |
NEO | Non-existing extension object | Functional problem - request for non-existing object → probable application error |
NTD | Nothing to do | Normal - nothing to apply the request to → normal behaviour - failure (e.g. reading an empty list of objects) - application error or normal operation status |
SPE | Error of second PEIG | Security of functional problem - attack or operation status or user error |
UTL | Unsupported transition between security levels | Cannot accept the required change in security profile → change of request or acceptance of unknown CyberID |
DLN | Requested login name is already used by another PEIG | Functional problem - duplicity of legacy login name → probable error of application or application user |
NER | Insufficient rights to process the request | Functional problem → application error or user problem |
DR | Duplicate replica | Functional problem → application error or user problem |
NS | Non-existing session | Functional problem → application error or user problem |
CTO | Exceeded max. communication time | Functional problem → configuration error or operation problem |
ERR | Unspecified error | Security of functional problem: attack or implementation error, standard, general error message instead of specific ones |
UV | Unsupported version | Functional problem (incompatibility) → management - change of request |
DI | Repeated initialization | Functional problem or security incident - PEIG identified an attempt at repeated origin of a CyberID for the same AIM → either an error in the application that did not check the existence of the CyberID, or a security attack or configuration error - another AIM exists with the same SPID |
CR | Applying a rejected change | Recovery from problem - consequence |
MI | Missing identity | Functional problem or security incident - CyberID does not exist upon request for reinit → probable incorrect use of reinit |
IE | Self-termination | PEIG security compromised→ management of the compromise, e.g. flagging an attribute and blocking access rights |
NAP | Not accepted by PEIG | Secondary error - use primary |
UCC | Incompatible keys | Functional problem - problem with keys in extension object → probable application error |
NOP | No operation requested | Functional problem or attack → probable application error |
UIL | Unknown ILID | Functional problem or attack → probable application error |
ILM | Missing ILID | Functional problem or attack → probable application error |
ISE | Identity Link electronic stamp error | Functional problem or attack → probable application error |
NSA | Missing address of secondary AIM | Functional problem or attack → probable application error |
NU | Not unique | Internal alarm or functional or security problem |
LI | Locked identity | Normal - identity removed from use by administrator or automatically → normal authentication failure |
DMR | Duplicated meeting room | Normal—meeting room name conflict, the attempt to create a second meeting room with the same name results in a normal failure |
UMR | Unknown meeting room | Normal—meeting room name conflict, the attempt to enter the non-existent meeting room results in a normal failure |
CMR | Closed meeting room | Normal—the attempt to enter into a closed meeting room results in a normal failure |
MET | Meeting room enter timeout | Normal—the second PEIG did not enter into the meeting room in time results in a normal failure |
MCT | Meeting room confirmation timeout | Normal—the first PEIG did not confirm the second PEIG in time results in a normal failure |
BIM | Binding item is missing | Security or functional problem—the required binding information is missing |
BEE | Binding evaluation error | Security or functional problem—an attack to a banded channel or target application integration error |
UBM | Unable binding mode | Security or functional problem—probably a target application integration error |
MAD | MITM attacker detected | Security problem—the MITM attacker is recognised |
BTO | Binding timeout | Normal—timeout in binding communication |
PCD | PEIG copy detected | Security problem—the PEIG copy is recognised |
ADM | Anti-copy data missing | Security or functional problem—probably an attack or internal error or HW error |
AAF | AIM anti-copy failure | Normal—AIM tolerated storage failure has been recognised by anti-copy detection |
PAF | PEIG anti-copy failure | Normal—PEIG tolerated storage failure has been recognised by anti-copy detection |
ACI | Anti-copy check impossible | Security or functional problem—probably an attack or internal error |
LLF | Locked local factor | Normal or Security problem— Local Factor is locked by time lock |
ALF | Absent local factor | Normal – requested Local factor does not exist → normal behaviour - failure - application error or normal operation status |
ULT | Unsupported local factor technology | Normal – the PEIG HW does not support requested Local factor → normal behaviour, user issue |
DLI | Duplicated local factor init | Normal – repeated initialization of the Local factor → normal behaviour - failure - application error or normal operation status |
ULF | Unverified local factor | Internal status |
SLS | Successful local factor synchronization | Internal status |
ICF | Integrity check failed | Security or functional problem—probably an attack or internal error |
NTE | Network error | Normal—communication infrastructure error |
SCE | Secondary communication error | Normal—communication infrastructure error |
EOP | Empty original PEIG | Normal – the source (primary) PEIG in is empty → normal behaviour - failure - user or application error or normal operation status |
URM | Unsupported replica mode | Normal – requested replica is not possible → normal behaviour - failure - application error or normal operation status |
BLR | Blocked Replica | Normal or security problem – requested replica was blocked → normal behaviour - failure - user error or attack |
LFM | Local Factor merge | Internal status |
COR | Confirmed Replica | Internal status |
WFC | Waiting for confirmation | Internal status |
DLV | Do Local Factor verification | Internal status |
MRR | Meeting Room Ready | Internal status |
WBK | Waiting for Binding Key | Internal status |
HCM | HW Check item missing in auth vector | Security or functional problem—probably an attack or internal error or HW error |
HCD | PEIG HW change detected | Security problem—the PEIG hardware change is recognised |
SUV | Secondary (system) Unsupported Version | Normal – Secondary AIM version is old and it is not supported. |
OPV | Old Peig Version | Normal – the PEIG version is old and do not support requested functionality |
USF | Unsupported Feature | Normal – the requested features set is not supported |
INR | Insufficient rights | Administration/proofing – you have insufficient rights to access an operation |
DNF | Data not found | Administration/proofing – requested data not found on AIM |
DAE | Data already exists | Administration/proofing – requested data already exists on AIM |
CNF | Code not found | Administration/proofing – requested activation code not found on AIM |
FNF | Form not found | Administration/proofing – requested form identifier not found on AIM |