Difference between revisions of "Authentication"
Jump to navigation
Jump to search
(→See also) |
|||
Line 18: | Line 18: | ||
<references /> | <references /> | ||
− | |||
==References== | ==References== | ||
[[Category:Information]][[Category:Security]] | [[Category:Information]][[Category:Security]] | ||
{{#set:defined by=ISO|defined by=United States|defined by=NIST|defined by=IETF}} | {{#set:defined by=ISO|defined by=United States|defined by=NIST|defined by=IETF}} |
Revision as of 01:59, 25 December 2016
Contents
Definition
National Definitions
United States
NIST
Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system. [1]
International Standard
IETF
Authentication: The process of verifying an identity claimed by or for a system entity. [2]
ISO/IEC
Authentication is a process that is used to confirm that a claimed characteristic of an entity is actually correct. To authenticate is to verify that a characteristic or attribute that appears to be true is in fact true. [3]