|   Code  |   Brief description  |   Note  | 
	
|   OK  |   Success  |   Normal → normal success  | 
	
|   KO  |   Failure  |   Normal → normal negative result  | 
	
|   NAU  |   Disagreement at user side  |   Rejected by user - real or artificial because PEIG is temporarily blocked → normal authentication failure  | 
	
|   PPNP  |   PEIG is not available  |   Functional problem - PEIG is not connected to PEIG-Proxy → Display to user (with instructions)  | 
	
|   USP  |   Unknown service provider  |   Normal status - unknown user → management (initialization menu - init)  | 
	
|   USSP  |   Unknown secondary service provider  |   Normal status - unknown user for secondary provider → management (explanatory text - link with other SP)  | 
	
|   UU  |   Unknown user  |   Operating status or security problem - the identity obtained from PEIG does not exist in AIM → management - either it is an attack, or repair after AIM failure - reinit  | 
	
|   UUS  |   Unknown user for secondary provider  |   Operation status or security problem - the identity does not exist in a secondary AIM → management - it is either the operation status, attack or repair after failure of AIM - init, or reinit at secondary AIM  | 
	
|   UI  |   Invalid identification  |   Operation status - PEIG Operation status - PEIG or AIM determined that CyberID is violating terms of validity (time or number of uses) → management - e.g. rechange menu or change in access rights  | 
	
|   UPR  |   Unsupported security profile  |   AIM or PEIG cannot find (accept) the requested security profile → change of profile or denial of PEIG  | 
	
|   UIP  |   Unsupported IL security profile  |   AIM or PEIG cannot find (accept) the requested IL (identity link) security profile → change in IL profile or request denial  | 
	
|   UOP  |   Unsupported extension object profile  |   PEIG cannot accept the required security profile of the extension object → change of profile or request denial  | 
	
|   VI  |   Valid identity  |   Functional problem or security incident - CyberID is valid upon requirement for rechange → probable use of rechange  | 
	
|   NEO  |   Non-existing extension object  |   Functional problem - request for non-existing object → probable application error  | 
	
|   NTD  |   Nothing to do  |   Normal - nothing to apply the request to → normal behaviour - failure (e.g. reading an empty list of objects) - application error or normal operation status  | 
	
|   SPE  |   Error of second PEIG  |   Security of functional problem - attack or operation status or user error  | 
	
|   UTL  |   Unsupported transition between security levels  |   Cannot accept the required change in security profile → change of request or acceptance of unknown CyberID  | 
	
|   DLN  |   Requested login name is already used by another PEIG  |   Functional problem - duplicity of legacy login name → probable error of application or application user  | 
	
|   NER  |   Insufficient rights to process the request  |   Functional problem → application error or user problem  | 
	
|   DR  |   Duplicate replica  |   Functional problem → application error or user problem  | 
	
|   NS  |   Non-existing session  |   Functional problem → application error or user problem  | 
	
|   CTO  |   Exceeded max. communication time  |   Functional problem → configuration error or operation problem  | 
	
|   ERR  |   Unspecified error  |   Security of functional problem: attack or implementation error, standard, general error message instead of specific ones  | 
	
|   UV  |   Unsupported version  |   Functional problem (incompatibility) → management - change of request  | 
	
|   DI  |   Repeated initialization  |   Functional problem or security incident - PEIG identified an attempt at repeated origin of a CyberID for the same AIM → either an error in the application that did not check the existence of the CyberID, or a security attack or configuration error - another AIM exists with the same SPID  | 
	
|   CR  |   Applying a rejected change  |   Recovery from problem - consequence  | 
	
|   MI  |   Missing identity  |   Functional problem or security incident - CyberID does not exist upon request for reinit → probable incorrect use of reinit  | 
	
|   IE  |   Self-termination  |   PEIG security compromised→ management of the compromise, e.g. flagging an attribute and blocking access rights  | 
	
|   NAP  |   Not accepted by PEIG  |   Secondary error - use primary  | 
	
|   UCC  |   Incompatible keys  |   Functional problem - problem with keys in extension object → probable application error  | 
	
|   NOP  |   No operation requested  |   Functional problem or attack → probable application error  | 
	
|   UIL  |   Unknown ILID  |   Functional problem or attack → probable application error  | 
	
|   ILM  |   Missing ILID  |   Functional problem or attack → probable application error  | 
	
|   ISE  |   Identity Link electronic stamp error  |   Functional problem or attack → probable application error  | 
	
|   NSA  |   Missing address of secondary AIM  |   Functional problem or attack → probable application error  | 
	
|   NU  |   Not unique  |   Internal alarm or functional or security problem  | 
	
|   LI  |   Locked identity  |   Normal - identity removed from use by administrator or automatically → normal authentication failure  | 
	
|   DMR  |   Duplicated meeting room  |   Normal—meeting room name conflict, the attempt to create a second meeting room with the same name results in a normal failure  | 
	
|   UMR  |   Unknown meeting room  |   Normal—meeting room name conflict, the attempt to enter the non-existent meeting room results in a normal failure  | 
	
|   CMR  |   Closed meeting room  |   Normal—the attempt to enter into a closed meeting room results in a normal failure  | 
	
|   MET  |   Meeting room enter timeout  |   Normal—the second PEIG did not enter into the meeting room in time results in a normal failure  | 
	
|   MCT  |   Meeting room confirmation timeout  |   Normal—the first PEIG did not confirm the second PEIG in time results in a normal failure  | 
	
|   BIM  |   Binding item is missing  |   Security or functional problem—the required binding information is missing  | 
	
|   BEE  |   Binding evaluation error  |   Security or functional problem—an attack to a banded channel or target application integration error  | 
	
|   UBM  |   Unable binding mode  |   Security or functional problem—probably a target application integration error  | 
	
|   MAD  |   MITM attacker detected  |   Security problem—the MITM attacker is recognised  | 
	
|   BTO  |   Binding timeout  |   Normal—timeout in binding communication  | 
	
|   PCD  |   PEIG copy detected  |   Security problem—the PEIG copy is recognised  | 
	
|   ADM  |   Anti-copy data missing  |   Security or functional problem—probably an attack or internal error or HW error  | 
	
|   AAF  |   AIM anti-copy failure  |   Normal—AIM tolerated storage failure has been recognised by anti-copy detection  | 
	
|   PAF  |   PEIG anti-copy failure  |   Normal—PEIG tolerated storage failure has been recognised by anti-copy detection  | 
	
|   ACI  |   Anti-copy check impossible  |   Security or functional problem—probably an attack or internal error  | 
	
|   LLF  |   Locked local factor  |   Normal or Security problem— Local Factor is locked by time lock  | 
	
|   ALF  |   Absent local factor  |   Normal – requested Local factor does not exist → normal behaviour - failure - application error or normal operation status  | 
	
|   ULT  |   Unsupported local factor technology  |   Normal – the PEIG HW does not support requested Local factor → normal behaviour, user issue  | 
	
|   DLI  |   Duplicated local factor init  |   Normal – repeated initialization of the Local factor → normal behaviour - failure - application error or normal operation status  | 
	
|   ULF  |   Unverified local factor  |   Internal status  | 
	
|   SLS  |   Successful local factor synchronization  |   Internal status  | 
	
|   ICF  |   Integrity check failed  |   Security or functional problem—probably an attack or internal error  | 
	
|   NTE  |   Network error  |   Normal—communication infrastructure error  | 
	
|   SCE  |   Secondary communication error  |   Normal—communication infrastructure error  | 
	
|   EOP  |   Empty original PEIG  |   Normal – the source (primary) PEIG in is empty → normal behaviour - failure - user or application error or normal operation status  | 
	
|   URM  |   Unsupported replica mode  |   Normal – requested replica is not possible → normal behaviour - failure - application error or normal operation status  | 
	
|   BLR  |   Blocked Replica  |   Normal or security problem – requested replica was blocked → normal behaviour - failure - user error or attack  | 
	
|   LFM  |   Local Factor merge  |   Internal status  | 
	
|   COR  |   Confirmed Replica  |   Internal status  | 
	
|   WFC  |   Waiting for confirmation  |   Internal status  | 
	
|   DLV  |   Do Local Factor verification  |   Internal status  | 
	
|   MRR  |   Meeting Room Ready  |   Internal status  | 
	
|   WBK  |   Waiting for Binding Key  |   Internal status  | 
	
|   HCM  |   HW Check item missing in auth vector  |   Security or functional problem—probably an attack or internal error or HW error  | 
	
|   HCD  |   PEIG HW change detected  |   Security problem—the PEIG hardware change is recognised  | 
	
|   SUV  |   Secondary (system) Unsupported Version  |   Normal – Secondary AIM version is old and it is not supported.  | 
	
|   OPV  |   Old Peig Version  |   Normal – the PEIG version is old and do not support requested functionality  | 
	
|   USF  |   Unsupported Feature  |   Normal – the requested features set is not supported  | 
	
|   INR  |   Insufficient rights  |   Administration/proofing – you have insufficient rights to access an operation  | 
	
|   DNF  |   Data not found  |   Administration/proofing – requested data not found on AIM  | 
	
|   DAE  |   Data already exists  |   Administration/proofing – requested data already exists on AIM  | 
	
|   CNF  |   Code not found  |   Administration/proofing – requested activation code not found on AIM  | 
	
|   FNF  |   Form not found  |   Administration/proofing – requested form identifier not found on AIM  |