When the claimant successfully demonstrates possession and control of one or more authenticators to the verifier through an established authentication protocol, the verifier is able to infer the claimant's identity.Īuthenticators may be characterized in terms of secrets, factors, and physical forms.Įvery authenticator is associated with at least one secret that the claimant uses to demonstrate possession and control of the authenticator. Using the terminology of the NIST Digital Identity Guidelines, the party to be authenticated is called the claimant while the party verifying the identity of the claimant is called the verifier. In the simplest case, the authenticator is a common password. A person authenticates to a computer system or application by demonstrating that he or she has possession and control of an authenticator. For the role of the authenticator in the 802.1X authentication protocol, see IEEE 802.1X.Īn authenticator is a means used to confirm a user's identity, that is, to perform digital authentication.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |