2013
DOI: 10.6028/nist.sp.800-63-2
|View full text |Cite
|
Sign up to set email alerts
|

Electronic Authentication Guideline

Abstract: This publication has been developed by NIST to further its statutory responsibilities under the Federal Information Security Management Act (FISMA), Public Law (P.L.) 107-347. NIST is responsible for developing information security standards and guidelines, including minimum requirements for Federal information systems, but such standards and guidelines shall not apply to national security systems without the express approval of appropriate Federal officials exercising policy authority over such systems. This … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
52
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 56 publications
(54 citation statements)
references
References 0 publications
0
52
0
Order By: Relevance
“…These methods are analyzed in Sections 5 and 6 for the public safety disciplines of Fire, EMS, and Law Enforcement. Although not an exhaustive list, the authentication methods in this section are an expanded set of those presented in NIST Special Publication (SP) 800-63-2 [11] and NISTIR 8014, Considerations for Identity Management in Public Safety Mobile Networks, [2]. Topics such as identity management, authentication factors, and user and device identity are all addressed in NISTIR 8014, and act as a foundation for the current effort.…”
Section: Authentication Methods Under Reviewmentioning
confidence: 99%
“…These methods are analyzed in Sections 5 and 6 for the public safety disciplines of Fire, EMS, and Law Enforcement. Although not an exhaustive list, the authentication methods in this section are an expanded set of those presented in NIST Special Publication (SP) 800-63-2 [11] and NISTIR 8014, Considerations for Identity Management in Public Safety Mobile Networks, [2]. Topics such as identity management, authentication factors, and user and device identity are all addressed in NISTIR 8014, and act as a foundation for the current effort.…”
Section: Authentication Methods Under Reviewmentioning
confidence: 99%
“…NIST SP 800-63-2 defines remote authentication as "An information exchange between networkconnected devices where the information cannot be reliably protected end-to-end by a single organization's security controls." [1] Assessing the strength of an authentication scheme is a difficult task and, as previously stated, the use of multi-factor tokens provides greater assurance. While tokens may support one, two, or three factors, it is possible that the chosen authentication scheme will not require all three factors at all times.…”
Section: Authenticationmentioning
confidence: 99%
“…NIST SP 800-63-2 was designed to supplement OMB M-04-04 by providing guidelines for implementing the third step of OMB's process for agencies to meet their e-authentication assurance requirementsselecting a technology based on e-authentication technical guidance [1]. It is important to note that NIST SP 800-63-2 solely provides guidance for remote authentication -local authentication is not considered.…”
Section: Nist Special Publication 800-63-2: Electronic Authenticationmentioning
confidence: 99%
See 2 more Smart Citations