Trustworthy Identity: Strong Authentication and Credential Management

Summary

One of the four main components of Access Control, Trustworthy Identification is the critical process of identifying and authenticating users, computers, and applications to confirm that they are who they claim to be.

This white paper outlines the challenges and solutions associated with establishing Trustworthy Identification, and helps enterprises weigh the importance of each technology so they can create an appropriate strategy for improving their security infrastructure.

Included in This Document

  • Introduction

  • How Do You Identify Users Accurately?

  • Technologies Supporting Trustworthy Identification

  • Conclusion

  • Next Steps

  • Additional Resources

Download

Trustworthy Identity: Strong Authentication and Credential Management

TrustworthyID.doc
392 KB
Microsoft Word file

Get Office File Viewers