Resumen
This document provides guidance on implementing authentication and the use of credentials therein, in particular it:
— describes complementary models for implementing user authentication with different operational aspects;
— specifies requirements for the control of identity information transfer in authentication;
— specifies formal descriptions of authentication methods;
— specifies requirements for authenticators as credentials
- managing the lifecycle,
- binding to a principal,
- use in a federated context.”
Informaciones generales
-
Estado: En desarrolloEtapa: Cierre del periodo de observaciones [20.60]
-
Edición: 1
-
Comité Técnico :ISO/IEC JTC 1/SC 27
- RSS actualizaciones