This is the job of identity management systems. This is where the aggregation of attributes is managed and assigned to specific identities. Identity attributes can be assigned when a person or system is not present as a rule.

Systems and applications that offer usage based on the presentation of attributes receive these directly from the identity management service. An authorized owner uses their NetKey/ IDKey to provide evidence that they are authorized to use an attribute.