<p>This document provides guidance on implementing authentication and the use of credentials therein, in particular it:</p>
<p>— describes complementary models for implementing user authentication with different operational aspects;</p>
<p>— specifies requirements for the control of identity information transfer in authentication;</p>
<p>— specifies formal descriptions of authentication methods;</p>
<p>— specifies requirements for authenticators as credentials </p>
<ul style="list-style-type: circle;">
<li>managing the lifecycle, </li>
<li>binding to a principal, </li>
<li>use in a federated context.”</li>
</ul>
Registration number (WIID)
85009
Scope
<p>This document provides guidance on implementing authentication and the use of credentials therein, in particular it:</p>
<p>— describes complementary models for implementing user authentication with different operational aspects;</p>
<p>— specifies requirements for the control of identity information transfer in authentication;</p>
<p>— specifies formal descriptions of authentication methods;</p>
<p>— specifies requirements for authenticators as credentials </p>
<ul style="list-style-type: circle;">
<li>managing the lifecycle, </li>
<li>binding to a principal, </li>
<li>use in a federated context.”</li>
</ul>