More

    Electronic Authentication Guidelines

    Electronic Authentication Guidelines

    Remote commerce and personally identifiable data (PID) management requires a level of e-authentication that often goes well beyond the simple password. This research note looks at approaches that rely on users knowing “secrets.”



    1.1 MB | 3 files | null DOC,null PDF

    Electronic authentication (E-authentication) is the process of establishing confidence in user identities electronically presented to an information system. E-authentication presents a technical challenge when this process involves the remote authentication of individual people over a network for the purposes of electronic government and commerce. This recommendation provides technical guidelines to agencies to allow an individual to remotely authenticate his or her identity to a Federal IT system. These guidelines address only traditional, widely implemented methods for remote authentication based on secrets. With these methods, the individual to be authenticated proves that he or she knows or possesses some secret information.

    The attached Zip file includes:

    • Intro Page.doc
    • Terms and Conditions.doc
    • EAuthenticationGuidelines.pdf

    Get the Free Newsletter!

    Subscribe to Daily Tech Insider for top news, trends, and analysis.

    Latest Articles