Identifier: Difference between revisions
Jump to navigation
Jump to search
m (→Definition) |
No edit summary |
||
Line 5: | Line 5: | ||
By definition identifier can be one or more than one attributes, if the identifier is one attribute then that attribute must be unique, and is thus a unique-identifier. When multiple attributes are used, they are referred to as identifying-attribute. | By definition identifier can be one or more than one attributes, if the identifier is one attribute then that attribute must be unique, and is thus a unique-identifier. When multiple attributes are used, they are referred to as identifying-attribute. | ||
== Sources == | == Sources == | ||
Line 11: | Line 10: | ||
== Status == | == Status == | ||
<span style="background:green">MC Approved</span> | <span style="background:green">MC Approved</span> The current definition was added to the glossary on 12/10 following consensus approval at the AHG Meeting on 2013-12-05. | ||
==Problems== | |||
* Many identifiers include a pointer to an [[Authentication]] servers, for example bill@gmail.com. | |||
* Other identifiers are just random numbers, like GUIDs. | |||
* In all cases, if the identifier is known to an attacker, they can attempt to take ownership of that identifier, which is (unfortunately) known as '''Identity Theft'''. | |||
Line 24: | Line 26: | ||
[[Category:Glossary]] | [[Category:Glossary]] | ||
[[Category:Identifier]] |
Latest revision as of 19:31, 28 May 2020
Definition
Attribute that can be used to distinguish a Digital Identity.
Notes
By definition identifier can be one or more than one attributes, if the identifier is one attribute then that attribute must be unique, and is thus a unique-identifier. When multiple attributes are used, they are referred to as identifying-attribute.
Sources
ITU-T X.1252
Status
MC Approved The current definition was added to the glossary on 12/10 following consensus approval at the AHG Meeting on 2013-12-05.
Problems
- Many identifiers include a pointer to an Authentication servers, for example bill@gmail.com.
- Other identifiers are just random numbers, like GUIDs.
- In all cases, if the identifier is known to an attacker, they can attempt to take ownership of that identifier, which is (unfortunately) known as Identity Theft.
Quick Links: Taxonomy | Taxonomy Project Management | Taxonomy AHG Catalog | Taxonomy AHG Glossary |