Wallet User Experience
- The context is giving user's control over the identifiers that they use
- The primary context is the user's mobile smartphone. A secondary context is the user on a laptop computer connected to the internet.
- The operating assumption is that the user has contacted the RP with a browser and that the identity security code is a separate native or web application.
The following are the required success criteria for both the user and the RP in establishing and maintaining an enduring relationship.