Abstract
This document provides guidance on implementing authentication and the use of credentials therein, in particular it:
— describes complementary models for implementing user authentication with different operational aspects;
— specifies requirements for the control of identity information transfer in authentication;
— specifies formal descriptions of authentication methods;
— specifies requirements for authenticators as credentials
- managing the lifecycle,
- binding to a principal,
- use in a federated context.”
General information
-
Status: Under developmentStage: Close of comment period [20.60]
-
Edition: 1
-
Technical Committee :ISO/IEC JTC 1/SC 27
- RSS updates