August 1, 2025
      
                  
        
  Author(s)
  David  Temoshok,   Yee-Yin  Choong,   Ryan  Galluzzo,   Marie  LaSalle,   Andrew  Regenscheid,   Diana  Proud-Madruga,   Sarbari  Gupta,   Naomi  Lefkovitz
 
       
            
    
    
        These guidelines cover identity proofing, authentication, and federation of users (such as employees, contractors, or private individuals) interacting with government information systems over networks. They define technical requirements in each of the