Export (0) Print
Expand All

Trustworthy Identity: Strong Authentication and Credential Management

Published: December 29, 2005

Summary

One of the four main components of Access Control, Trustworthy Identification is the critical process of identifying and authenticating users, computers, and applications to confirm that they are who they claim to be.

This white paper outlines the challenges and solutions associated with establishing Trustworthy Identification, and helps enterprises weigh the importance of each technology so they can create an appropriate strategy for improving their security infrastructure.

Included in This Document

  • Introduction

  • How Do You Identify Users Accurately?

  • Technologies Supporting Trustworthy Identification

  • Conclusion

  • Next Steps

  • Additional Resources

Download
Trustworthy Identity: Strong Authentication and Credential Management

TrustworthyID.doc
392 KB
Microsoft Word file

Get Office File Viewers

Was this page helpful?
(1500 characters remaining)
Thank you for your feedback
Show:
© 2014 Microsoft