Comparative chart of EV authentication
EV authentication is much stronger than 3-factor one. it means the audit is more advanced and that we do a lot more vetting.CHECK POINTS | 3-FACTOR AUTHENTICATION | EV AUTHENTICATION |
---|---|---|
List of unauthorized countries | no | yes |
List of websites victim of phishing attacks | no | yes |
List of unauthorized websites | no | yes |
Existence (registration) of the organization | yes, via a qualified database | yes, via a governmental qualified database |
Trade name (optional) | yes, via a qualified database | yes, via a governmental qualified database |
Physical existence (address) | no | yes, via an independent qualified database |
Physical existence (phone) | yes, via a directory or a qualified database | yes, via a directory or an independent qualified database |
Operational existence (more than 3 years) | no | yes |
control of the domain | yes, via DCV | yes, via DCV |
Vetting of the corporate contact employment | no | yes |
Vetting of the Certification agreement signature (receive by mail, fax or PDF) | no | yes |
Phone call vetting of the request | yes | yes |
Inclusion of the organization's registration information in the certificate | no | yes |
Notes:
- An "independent qualified database" means we use a different base than the one we use for the organization name validation (governmental qualified database).
- A "qualified database" without further specification means it can be either a governmental or an independent one.
Last edited on 10/09/2018 07:58:37 --- [search]