Authentication: Difference between revisions

From IDESG Wiki
Jump to navigation Jump to search
 
Line 7: Line 7:
Example: Username/password or public-key cryptography are traditional forms of authentication, as is a conversation with a customer service representative over the phone in which information is exchanged to establish identity.
Example: Username/password or public-key cryptography are traditional forms of authentication, as is a conversation with a customer service representative over the phone in which information is exchanged to establish identity.


Current definition was finalized and approved by those in attendance at the AHG meeting of [[Taxonomy AHG Meeting 12/12/2013|12/12/2013]].
Approved definition was finalized and approved by those in attendance at the AHG meeting of [[Taxonomy AHG Meeting 12/12/2013|12/12/2013]].
 
This page has been updated to track the changes introduced in NIST 800-63-3 in June of 2017. The biggest difference is the introduction of the word authenticators ,
 
== Sources ==
== Sources ==
[https://pages.nist.gov/800-63-3/sp800-63b.html NIST 800-63-3B] June 2017
[https://pages.nist.gov/800-63-3/sp800-63b.html NIST 800-63-3B] June 2017

Latest revision as of 01:52, 4 January 2020

Definition

Digital authentication is the process of determining the validity of one or more authenticators used to claim a digital identifier.

Notes

The related term identity-proofing is different from authentication. In identity solutions requiring identity-proofing, that function occurs prior to credential issuance. Specifically related to e-authentication

Example: Username/password or public-key cryptography are traditional forms of authentication, as is a conversation with a customer service representative over the phone in which information is exchanged to establish identity.

Approved definition was finalized and approved by those in attendance at the AHG meeting of 12/12/2013.

This page has been updated to track the changes introduced in NIST 800-63-3 in June of 2017. The biggest difference is the introduction of the word authenticators ,

Sources

NIST 800-63-3B June 2017

OASIS SAML Glossary 2.0: To confirm a system entity’s asserted Principal Identity with a specified, or understood, level of confidence.

Status

MC Approved

Currently in final approval with the AHG.

Template:Comment




Quick Links: Taxonomy | Taxonomy Project Management | Taxonomy AHG Catalog | Taxonomy AHG Glossary |