Abstract
This international standard provides guidance on implementing user authentication and the use of credentials therein, in particular it: -- describes complementary models for implementing authentication with different operational aspects. -- specifies formal descriptions of authentication methods. -- specifies requirements for authenticators as credentials -- managing the lifecycle, -- binding to a principal, -- use in a federated context.
-
Status: Under development
-
Edition: 1
-
Technical Committee: ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection
-
- ICS :
Life cycle
Got a question?
Check out our FAQs
Customer care
+41 22 749 08 88
Opening hours:
Monday to Friday - 09:00-12:00, 14:00-17:00 (UTC+1)
Keep up to date with ISO
Sign up to our newsletter for the latest news, views and product information.