Search results

Jump to navigation Jump to search
  • '''Title''': Security and Privacy Considerations for the OASIS Security Assertion Markup Language (SAML) V2.0 '''Category''': Authentication Procotol Specification
    1 KB (171 words) - 04:02, 28 June 2018
  • '''Title''': Identity Assurance Framework: Assessor Qualifications Requirements '''Category''': Trust Framework Provider Specification
    681 bytes (65 words) - 04:02, 28 June 2018
  • '''Title''': Specification for Asset Identification 1.1 '''Category''': Security Requirements Specification
    2 KB (204 words) - 04:02, 28 June 2018
  • '''Category''': Credential Requirements Specification '''Description''': Describes requirements for PIV client-application programming interface, PIV Card application, and
    1,002 bytes (102 words) - 04:02, 28 June 2018
  • '''Category''': Credential Requirements Specification '''Description''': Describes requirements for PIV client application programming interface including information proc
    1 KB (120 words) - 04:02, 28 June 2018
  • '''Category''': Credential Requirements Specification '''Security''':
    1 KB (109 words) - 04:02, 28 June 2018
  • Specification '''Category''': Credential Requirements Specification
    864 bytes (94 words) - 04:02, 28 June 2018
  • '''Title''': Biometric Data Specification for Personal Identity Verification '''Category''': Credential Requirements Specification
    774 bytes (87 words) - 04:02, 28 June 2018
  • '''Title''': Conformance Requirements for the OASIS Security Assertion Markup Language (SAML) V2.0 '''Category''': Authentication Protocol Specification
    654 bytes (69 words) - 16:30, 27 May 2020
  • '''Category''': Trust Framework Provider Specification '''Description''': Consists of a set of requirements which assessors must fulfill in order to become 'Kantara-Accredited', a
    1 KB (119 words) - 04:02, 28 June 2018
  • '''Category''': Credential Requirements Standard '''Description''': Requirements for non-Federal issuers of cards designed to interoperate with the Federal
    1,023 bytes (117 words) - 23:30, 12 January 2021
  • ...n certain assertions by other actors to fulfill their information security requirements." In this document the objective is simply to allow two digital entities (a ...e proven before an entry is accepted into the federation. That is good for security, but somewhat at odds with interoperability. On the other hand it does make
    21 KB (3,285 words) - 23:37, 15 January 2020
  • ...ticipant Member, or Individual User such as by means of burdensome testing requirements that are applied in a discriminatory manner or other means that limit the a ...rements which are more restrictive than any general state mandated privacy requirements.
    19 KB (3,008 words) - 20:23, 20 March 2021
  • ...ipt and authorization in response to this message which meets the security requirements of the intended purpose. * This specification applies only to service providers that have determined that they need to ac
    14 KB (2,250 words) - 01:29, 23 December 2020
  • Ensure the security of a stand-alone Token to provide high assurance of (1) Identity, (2) Authe ...fied. The value "0" indicates the End-User authentication did not meet the requirements of ISO/IEC 29115 [ISO29115] level 1. Authentication using a long-lived brow
    16 KB (2,576 words) - 19:23, 24 July 2020
  • ...ttestation provides the evidence need for meeting the requirements of that specification at the highest levels of assurance. ...oftware and the user had achieved. This would satisfy the TEFCA IAL2, AAL2 requirements at that same time.
    5 KB (771 words) - 19:07, 22 January 2021
  • There are three sources of requirements for [[Native Apps for US Healthcare]]: ...0] is a specification under development in Kantara.for apps to prove their security to the relying party.
    7 KB (971 words) - 16:33, 30 April 2021
  • * National security has always been a leader in assuring the people are who they say they are f ...have been offered to the general public, but none of the industrial grade security measures have been acceptable to the population. The one exception has been
    5 KB (834 words) - 00:18, 24 August 2020
  • ...le process. It defines the lifecycle stages for the Baseline process, the requirements for moving a document between stages and the types of documents used during '''Use Case Category''': IDESG approved baseline process requirements
    23 KB (3,525 words) - 04:00, 28 June 2018
  • ...ish an integrity (aka health) claim for a device that, together with other security measures, is good evidence of the integrity of the information exchanged wi Integrity has two meanings in computer security. The first relates to the device not having been changed in any way since i
    12 KB (1,835 words) - 20:44, 5 November 2020
  • '''Category''': Security Requirements Specification participants are complying with FICAM privacy requirements.
    1 KB (123 words) - 00:49, 31 May 2020
  • '''Title''': SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES '''Category''': Security Requirements Standard
    3 KB (379 words) - 03:58, 28 June 2018
  • '''Category''': Credential Requirements Specification '''Description''': Specifies the architectural and technical requirements for the Personal Identity Verification (PIV) card
    1 KB (173 words) - 03:58, 28 June 2018
  • '''Category''': Credential Requirements Specification '''Description''': Specifies the architectural and technical requirements for the Personal Identity Verification (PIV) card
    3 KB (374 words) - 00:25, 24 August 2020
  • <center>'''National Security Telecom Advisory Comm.(NSTAC) Report to the President on Identity Managemen <center>'''Oasis: Glossary for the OASIS Security Assertion Markup Language (SAML) V2.0'''</center>
    845 KB (86,833 words) - 04:00, 28 June 2018
  • <center>'''National Security Telecom Advisory Comm.(NSTAC) Report to the President on Identity Managemen <center>'''Oasis: Glossary for the OASIS Security Assertion Markup Language (SAML) V2.0'''</center>
    135 KB (15,051 words) - 04:00, 28 June 2018
  • ==== SECURITY CONTROL ==== ...rds employed within an entity to ensure compliance with applicable privacy requirements and manage privacy risks.
    11 KB (1,496 words) - 23:48, 5 September 2020
  • https://kantarainitiative.org/confluence/display/infosharing/Consent+Receipt+Specification Consent Receipt Specification
    3 KB (380 words) - 17:28, 25 July 2020
  • International Standards, Technical Specification, Publicly Available Specifications, Technical Reports or introduction, scope, references, terms and definitions, and (optionally) requirements. Attention is paid to
    2 KB (217 words) - 04:00, 28 June 2018
  • ...f abstraction of the IDESG functions has been proposed in the [[Functional Requirements]]. This page describes the use of design patterns for user experiences in p ...ific types of roles they use, as long as the role adheres to the interface specification
    12 KB (1,958 words) - 17:45, 25 May 2019
  • .../index.php?title=Baseline_Functional_Requirements_v1.0 Baseline Functional Requirements v1.0 (BFR)]. The [https://en.wikipedia.org/wiki/Security_Assertion_Markup_Language Security Assertion Markup Language (SAML)] based on XML was introduced in 2003 and w
    56 KB (9,154 words) - 00:16, 30 October 2020
  • '''Category''': Trust Framework Provider Specification consent for sharing PII. No requirements though.
    2 KB (203 words) - 21:48, 10 January 2020
  • '''Category''': Trust Framework Provider Specification '''Description''': Defines requirements for InCommon Silver and Bronze identity assurance certification. These prof
    1 KB (156 words) - 04:01, 28 June 2018
  • '''Title''': Identity Assurance Framework: Additional Requirements for Credential Service Providers: US Federal '''Category''': Trust Framework Provider Specification
    848 bytes (97 words) - 00:51, 31 May 2020
  • '''Category''': Trust Framework Provider Specification ...defines a set of assurance levels involving increasing levels of security requirements for both
    785 bytes (85 words) - 04:02, 28 June 2018