AuthenticationProcess of Establishing Confidence to Generate an Assurance |
Token, possessed and controlled by an individual, is used to authenticate the individual using one or more of the traditional authentication factors (something you know, have, or are). Credential authoritatively links an identity to a token
Standard protocols are the technical format and rules by which identity information is exchanged. Profiles constrain protocols to specific choices to ensure interoperability between the sender and the receiver.
A multi-party arrangement in which there is agreement on the adherence to standards and practices that ensure confidence, enable interoperability, realize efficiencies and reduce risk
Did you find this interesting? Don't miss any new posts. Sign up to automatically receive them now! |