Résumé
This document provides guidance on implementing authentication and the use of credentials therein, in particular it:
— describes complementary models for implementing user authentication with different operational aspects;
— specifies requirements for the control of identity information transfer in authentication;
— specifies formal descriptions of authentication methods;
— specifies requirements for authenticators as credentials
- managing the lifecycle,
- binding to a principal,
- use in a federated context.”
Informations générales
-
État actuel: ProjetStade: Mise à l'étude du projet de travail (WD) [20.20]
-
Edition: 1
-
Comité technique :ISO/IEC JTC 1/SC 27
- RSS mises à jour
Cycle de vie
Vous avez une question?
Consulter notre Aide et assistance
Service à la clientèle
+41 22 749 08 88
Horaires d’ouverture:
De lundi à vendredi - 09:00-12:00, 14:00-17:00 (UTC+1)