All
All

Considerations for Identity Management in Public Safety Networks

1.14 MB | 3 files | null PDF

This document analyzes approaches to identity management for public safety networks in an effort to assist individuals developing technical and policy requirements for public safety use.

IT Download image

This document analyzes approaches to identity management for public safety networks in an effort to assist individuals developing technical and policy requirements for public safety use. These considerations are scoped into the context of their applicability to public safety communications networks with a particular focus on the nationwide public safety broadband network (NPSBN) based on the Long Term Evolution (LTE) family of standards. A short background on identity management is provided alongside a review of applicable federal and industry guidance. Considerations are provided for identity proofing, selecting tokens, and the authentication process. While specific identity management technologies are analyzed, the document does not preclude other identity management technologies from being used in public safety communications networks.

This document is intended for those wishing to understand possible approaches to identity management in next-generation public safety networks. Local public safety networks, private sector communities, and public safety applications leveraging identity management services (such as criminal justice information and records management systems) may also find the guidance useful.

The attached zip file includes:

  • Intro Page.pdf
  • Terms and Conditions.pdf
  • NIST.IR.8014.pdf
IT Downloads help you save time and money while executing essential IT management tasks. Download this useful resource now and put it to work for your business.
Related IT Downloads

email9 Trustworthy Email

This document provides recommendations and guidelines for enhancing trust in email, including transmission and content security recommendations. ...  More >>

Analytics7 Big Data: Storage, Sharing, and Security

Chapter 2 focuses on answering questions faced by individuals interested in using storage or database technologies to solve their Big Data problems. ...  More >>

Misc64 Microsoft PowerPoint 2016 Quick Reference

This Microsoft PowerPoint 2016 Quick Reference covers the basics screen layout, fundamentals of using the program and working with slides, keyboard shortcuts, formatting, transitions and working with images and multimedia files. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.