<--- Back to Details
First PageDocument Content
Computer access control / Identity management / Federated identity / Identity documents / Electronic authentication / Public administration / Multi-factor authentication / FIPS 201 / Authentication / Password / Privileged identity management / Security token
Date: 2016-04-21 07:36:03
Computer access control
Identity management
Federated identity
Identity documents
Electronic authentication
Public administration
Multi-factor authentication
FIPS 201
Authentication
Password
Privileged identity management
Security token

Best Practices for Privileged User PIV Authentication

Add to Reading List

Source URL: csrc.nist.gov

Download Document from Source Website

File Size: 319,68 KB

Share Document on Facebook

Similar Documents

Promoting confi dence in electronic commerce: legal issues on international use of electronic authentication and signature methods

DocID: 1tV2t - View Document

IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE 1 Tailored Reversible Watermarking Schemes for Authentication of Electronic Clinical Atlas

DocID: 1rMdy - View Document

Computer access control / Computer security / Computing / Single sign-on / Multi-factor authentication / Authentication / OAuth / Mobile app / Electronic authentication / Accounts & SSO

PROJECT DESCRIPTION MOBILE APPLICATION SINGLE SIGN-ON For Public Safety and First Responders

DocID: 1rqtN - View Document

Government / Forgery / Military-industrial complex / Defense Logistics Agency / Counterfeit / Government procurement in the United States / Economy / Business / Defense Contract Management Agency / Government Accountability Office / Authentication / Counterfeit electronic components

GAO; Counterfeit Parts: DOD Needs to Improve Reporting and Oversight to Reduce Supply Chain Risk

DocID: 1rpsj - View Document

Cryptography / Security / Computer access control / Civil law common law) / Sierre / Authentication / Electronic signature

An Electronic-signature Based Circular Resolution Database System Thomas Zefferer and Thomas Knall Institute for Applied Information Processing and Communications (IAIK)

DocID: 1roee - View Document