NIST SP 800-63

Digital Identity Guidelines

NIST SP 800-63 defines assurance levels for identity proofing (IAL), authentication (AAL), and federation (FAL). PTG deploys phishing-resistant MFA, modernizes password policies, and aligns authentication systems with the assurance levels your compliance framework demands.

CMMC Registered Practitioner Org | BBB A+ Since 2003 | 23+ Years Experience
Document Suite

Four Interrelated Publications

SP 800-63 is a suite covering identity proofing, authentication, and federation, each with its own assurance levels.

800-63 Base Document

Establishes the identity model and risk-based framework for selecting IAL, AAL, and FAL levels.

800-63A: Identity Proofing

Covers evidence collection and verification before issuing credentials. Defines IAL 1, IAL 2, and IAL 3.

800-63B: Authentication

Defines authenticator types and AAL levels. Contains the modern password guidance: no forced rotation, no complexity rules.

800-63C: Federation

Governs identity assertion protocols (SAML 2.0, OIDC) and defines FAL 1, FAL 2, and FAL 3 for SSO implementations.

Key Changes

What 800-63 Changed About Passwords

Legacy Practices

Forced Complexity Rules

Requiring uppercase, lowercase, numbers, and symbols that users circumvent with predictable patterns.

Mandatory Rotation

Forcing password changes every 60-90 days, leading to weaker passwords and sticky notes.

NIST 800-63B Guidance

Length Over Complexity

Minimum 8 characters, support up to 64. No complexity rules. Screen against breached password lists.

Phishing-Resistant MFA

FIDO2/WebAuthn hardware keys and platform authenticators that eliminate credential phishing entirely.

Who This Is For

Built For

Federal Agencies Defense Contractors Healthcare Organizations Financial Services Zero Trust Adopters
FAQ

Frequently Asked Questions

Should we still enforce password rotation?

No. NIST 800-63B explicitly recommends against mandatory periodic rotation. Change passwords only when there is evidence of compromise. Combine long passwords with phishing-resistant MFA instead.

What is phishing-resistant MFA?

FIDO2/WebAuthn authenticators (hardware security keys or platform authenticators) that cryptographically bind authentication to the legitimate website, making credential phishing impossible.

How does 800-63 relate to Zero Trust?

SP 800-207 Zero Trust relies on strong identity as its foundation. The Enhanced Identity Governance deployment model is a natural extension of 800-63 assurance levels.

What AAL level does CMMC require?

CMMC Level 2 requires multi-factor authentication aligned with at least AAL 2. Federal mandates increasingly push toward AAL 3 with phishing-resistant authenticators.

Is Revision 4 available yet?

Rev. 4 is in initial public draft. It introduces continuous evaluation, expanded privacy requirements, and syncable passkeys. Implement against Rev. 3 today while monitoring Rev. 4 developments.

Get Started

Ready to Modernize Your Identity Controls?

PTG deploys phishing-resistant MFA and aligns your authentication to NIST 800-63 assurance levels.