Digital Identity Guidelines
NIST SP 800-63 defines assurance levels for identity proofing (IAL), authentication (AAL), and federation (FAL). PTG deploys phishing-resistant MFA, modernizes password policies, and aligns authentication systems with the assurance levels your compliance framework demands.
Four Interrelated Publications
SP 800-63 is a suite covering identity proofing, authentication, and federation, each with its own assurance levels.
800-63 Base Document
Establishes the identity model and risk-based framework for selecting IAL, AAL, and FAL levels.
800-63A: Identity Proofing
Covers evidence collection and verification before issuing credentials. Defines IAL 1, IAL 2, and IAL 3.
800-63B: Authentication
Defines authenticator types and AAL levels. Contains the modern password guidance: no forced rotation, no complexity rules.
800-63C: Federation
Governs identity assertion protocols (SAML 2.0, OIDC) and defines FAL 1, FAL 2, and FAL 3 for SSO implementations.
What 800-63 Changed About Passwords
Forced Complexity Rules
Requiring uppercase, lowercase, numbers, and symbols that users circumvent with predictable patterns.
Mandatory Rotation
Forcing password changes every 60-90 days, leading to weaker passwords and sticky notes.
Length Over Complexity
Minimum 8 characters, support up to 64. No complexity rules. Screen against breached password lists.
Phishing-Resistant MFA
FIDO2/WebAuthn hardware keys and platform authenticators that eliminate credential phishing entirely.
Built For
Frequently Asked Questions
Should we still enforce password rotation?
No. NIST 800-63B explicitly recommends against mandatory periodic rotation. Change passwords only when there is evidence of compromise. Combine long passwords with phishing-resistant MFA instead.
What is phishing-resistant MFA?
FIDO2/WebAuthn authenticators (hardware security keys or platform authenticators) that cryptographically bind authentication to the legitimate website, making credential phishing impossible.
How does 800-63 relate to Zero Trust?
SP 800-207 Zero Trust relies on strong identity as its foundation. The Enhanced Identity Governance deployment model is a natural extension of 800-63 assurance levels.
What AAL level does CMMC require?
CMMC Level 2 requires multi-factor authentication aligned with at least AAL 2. Federal mandates increasingly push toward AAL 3 with phishing-resistant authenticators.
Is Revision 4 available yet?
Rev. 4 is in initial public draft. It introduces continuous evaluation, expanded privacy requirements, and syncable passkeys. Implement against Rev. 3 today while monitoring Rev. 4 developments.
Explore More
Ready to Modernize Your Identity Controls?
PTG deploys phishing-resistant MFA and aligns your authentication to NIST 800-63 assurance levels.