Trustworthy Identity: Strong Authentication and Credential Management
One of the four main components of Access Control, Trustworthy Identification is the critical process of identifying and authenticating users, computers, and applications to confirm that they are who they claim to be.
This white paper outlines the challenges and solutions associated with establishing Trustworthy Identification, and helps enterprises weigh the importance of each technology so they can create an appropriate strategy for improving their security infrastructure.
Included in This Document
How Do You Identify Users Accurately?
Technologies Supporting Trustworthy Identification
DownloadTrustworthy Identity: Strong Authentication and Credential Management
Microsoft Word file