Trustworthy Identity: Strong Authentication and Credential Management
Summary
One of the four main components of Access Control, Trustworthy Identification is the critical process of identifying and authenticating users, computers, and applications to confirm that they are who they claim to be.
This white paper outlines the challenges and solutions associated with establishing Trustworthy Identification, and helps enterprises weigh the importance of each technology so they can create an appropriate strategy for improving their security infrastructure.
Included in This Document
Introduction
How Do You Identify Users Accurately?
Technologies Supporting Trustworthy Identification
Conclusion
Next Steps
Additional Resources
Download
Trustworthy Identity: Strong Authentication and Credential Management
TrustworthyID.doc
392 KB
Microsoft Word file