Estimated reading time: 7 minutes
By Jody Tracy, InCommon Academy Program Manager
If your institution collaborates with federal agencies on research or other initiatives, you’re familiar with the balance required between robust security and practical implementation.
After an extensive analysis and review, a clear and documented approach is now available for decision-makers to confidently evaluate their identity proofing needs.
On Sept. 24, you can get guidance on the REFEDS Assurance Framework by attending IAM Online. Learn how it meets federal security requirements and how it fits into your institutional operations.
In the September IAM Online webinar, join Tom Barton from Internet2 and Kyle Lewis from Research Data and Communication Technologies Corp (RDCT), authors of the REFEDS Assurance Framework 2.0: Risk Comparison to NIST SP 800-63-3 IAL2 document, for a presentation on identity proofing, the REFEDS Assurance Framework, and InCommon’s Interoperability expectations.
You’ll also have the opportunity to participate in a survey conducted by InCommon to understand what support and resources you need when it comes to higher-level identity assurance.
What you’ll learn:
- How REFEDS RAF2 delivers comparable risk mitigation to NIST IAL2
- Practical implementation guidance that’s been vetted at the federal level
- How to maintain collaborative partnerships while meeting security requirements
- Ways to contribute to future guidance through InCommon’s survey
Speakers

Senior Consultant, Internet2

VP of Cybersecurity Strategy, Research Data and Communication Technologies Corp
Q&A
Ahead of the September IAM Online session, we reached out to Tom and Kyle to hear about some of the valuable takeaways they have lined up.
Here is what they had to say:
Tom: RAF v2’s IAP High requires similar essential identity checks
as IAL2, but being adapted to an international context, it’s less prescriptive. It also recognizes as a
“trusted source” Principal Investigators and others already identity-proofed to vouch for the existence of a
claimed identity. If an organization implements a commercially available IAL2-certified remote identity
proofing service, many of the RAF v2 IAP High requirements will be automatically
satisfied.
Kyle: RAF is written to be a bit broader in interpretation than the
NIST standards.
It is an international framework, and different countries have different
approaches to solving the identity assurance problem. The U.S.’s NIST requires combinations of evidences and
different kinds of ID cards at different strengths of assurance. Other countries may have a national
register in place, so ID cards aren’t required.
RAF allows a common assurance language to
communicate intent across various frameworks. This becomes particularly useful for U.S. institutions when
service providers (SPs) want to increase their demand for identity assurance, but do not need to implement
every detail of the NIST guidance when reasonable equivalence suffices.
Tom: First, there’s no certification. RAF v2 does not require an
external audit by a recognized certification body.
Typically, a government-issued document with
a photo, such as a driver’s license or passport, is verified for authenticity by checking its physical
and/or cryptographic security features. Then, some outside “trusted source” is used to confirm the existence
of an identity with the same name, address, or birthdate. This can take several forms, like checking a bank
statement or official educational record, getting a vouch from a trusted person, or using an online service
designed to perform this function. Then, the person being proofed is visually checked against the photo on
the ID, which is done either by staff who perform identity proofing, looking at the person and their ID
photo face-to-face, or over a video session, or by using an unattended remote identity proofing
service.
That’s the essential identity-checking part. Appropriate records must be kept, the
processes and procedures must be documented, and care must be taken when a person’s name is formally changed
or when their assigned authentication credential is reissued or recovered to ensure the continued binding
between the vetted person and their credential.
Kyle: As Tom said, RAF is
self-asserted by the institution. Within InCommon, this doesn’t mean it’s blind trust on the SPs’ part,
since we participate in a community having signed agreements to meet Baseline Expectations. Implied
within Baseline Expectations is an agreement that if your identity provider (IdP) asserts a claim to the
federation, the IdP is doing the thing being claimed.
That being said, there is no
‘certification’ in the sense that there is no external assessor checking the IdP’s work, so to speak.
Tom: We’re hoping to learn about situations on campus where fraud
is an elevated concern and for which identity proofing would be a suitable mitigation.
For
example, the Department of Education has added a requirement for colleges to vet the identity of some
financial aid applicants, and some schools are reducing credential theft by using unattended remote identity
proofing as an initial step in recovering a lost or stolen credential.
Kyle: I’m
hoping we can get a better feel for how identity assurance is being implemented in the community or identify
the areas of concern. Having a better view would help InCommon tailor support for helping IdPs on the path
to identity assurance.
Tom: Increased identity-proofing is the natural path of escalation
in the never-ending cycle of attackers fielding new approaches and defenders trying to maintain the
integrity of our systems and data.
As consequences of fraud increase (and phishing is one means
of perpetrating fraud), the value of fraud mitigation also increases.
As evidenced by the
Department of Education’s efforts to reduce financial aid theft and a new identity proofing requirement to
access sensitive data at the National Institutes of Health, related organizations are now feeling that pain.
The higher education community is feeling similar pain, and the requirements of federal agencies often flow
down to us.
Kyle: If I’m taking a step back from RAF and SP risk mitigation
requirements, whether from the federal government or other campus SPs, I think we are collectively playing
catch-up. RAF is a first step, but the scam and phishing attacks are becoming increasingly
sophisticated.
I know this is a little outside the scope of RAF implementation, but I think
about artificial intelligence being used for malicious purposes, and large language models finding the right
language to manipulate action from more people. I foresee a need to use such tools in defense as well,
specifically for detecting indicators of identity fraud during the proofing process.
I’m not an
expert on this, but I foresee the need (and also challenges) to overcome in preserving individual privacy as
well. Without having a crystal ball, I can only say that the sphere of identity assurance is going to get
more stressed and more interesting in the years ahead.
Bringing the topic back to RAF, however,
I think universities need to implement RAF or something RAF-like as a minimum, but not stop there.
Tom: Read Recommendations for REFEDS Assurance
Framework 2.0 Implementation for InCommon Identity Providers! That’s why we wrote it.
Kyle: We have
written a resource to help organizations step through the framework to assess the claims they already
qualify for and determine a way to implement the claims they want to achieve. I suspect more institutions
are already doing more than they think, and there will be claims they can make today after having done a
self-assessment. This presentation, along with a session this year at TechEX, will dive directly into this
guide.
Join Us for IAM Online
Curious about how to keep up with the latest identity verification standards? Don’t miss our upcoming webinar, “Beyond Authentication: When Secure Access Demands Identity Assurance,” on Wednesday, September 24, at 1 p.m. ET.
You will also have the opportunity to participate in a survey to help us build better support and resources for higher-level identity assurance that actually work for organizations like yours.
Please note: We’ve introduced a new, improved registration process for our webinars. You’ll now register individually for each webinar, which allows us to deliver content that’s even more aligned with what you want to see. Get ready for more engaging, community-driven webinars designed with you in mind!
Do you have ideas for IAM Webinars you would like to attend? Fill out this form and let us know what you’d like to see.