dcsimg

Find an IT Download

Electronic Authentication Guidelines

Remote commerce and personally identifiable data (PID) management requires a level of e-authentication that often goes well beyond the simple password. This research note looks at approaches that rely on users knowing "secrets."


1.1 MB | 3 files | null DOC,null PDF

Electronic authentication (E-authentication) is the process of establishing confidence in user identities electronically presented to an information system. E-authentication presents a technical challenge when this process involves the remote authentication of individual people over a network for the purposes of electronic government and commerce. This recommendation provides technical guidelines to agencies to allow an individual to remotely authenticate his or her identity to a Federal IT system. These guidelines address only traditional, widely implemented methods for remote authentication based on secrets. With these methods, the individual to be authenticated proves that he or she knows or possesses some secret information.

The attached Zip file includes:

  • Intro Page.doc
  • Terms and Conditions.doc
  • EAuthenticationGuidelines.pdf

Related IT DOWNLOADS

Recent IT Downloads
Building a GRC Program: Assessing Stakeholder Needs and Readiness

This table outlines the top needs of each stakeholder group that can help guide your conversat...Read More

Recent IT Downloads
Guide to Cyber Threat Information Sharing

This publication provides guidelines for establishing and participating in cyber threat inform...Read More

Recent IT Downloads
Trustworthy Email

This document provides recommendations and guidelines for enhancing trust in email, including ...Read More