Résumé
This document provides guidance on implementing authentication and the use of credentials therein, in particular it:
— describes complementary models for implementing user authentication with different operational aspects;
— specifies requirements for the control of identity information transfer in authentication;
— specifies formal descriptions of authentication methods;
— specifies requirements for authenticators as credentials
- managing the lifecycle,
- binding to a principal,
- use in a federated context.”
Informations générales
-
État actuel: ProjetStade: Clôture de la période des observations [20.60]
-
Edition: 1
-
Comité technique :ISO/IEC JTC 1/SC 27
- RSS mises à jour