About 49,400 results
Open links in new tab
  1. The result of the authentication process may be used locally by the system performing the authentication or asserted elsewhere in a federated identity system. This document defines …

  2. Instead, regardless of the RMF risk level, the following rules apply for authentication to DoD unclassified and Secret Fabric networks, systems, applications, devices, information, or cloud...

  3. Sep 12, 2024 · For self-service password/passphrase reset systems, requiring users to validate their identity through designated, previously established verification methods, such as multi-factor …

  4. Going from the basic obser-vation to a working, reliable authentication system is far from easy. But it can be made to work, to much the same extent as the other authentication mechanisms. We can …

  5. Electronic authentication (e-authentication) is the process of establishing confidence in user identities electronically presented to an information system.

  6. Oct 29, 2024 · Implement mechanisms for authentication to a cryptographic module that meet the requirements of applicable laws, executive orders, directives, policies, regulations, standards, and …

  7. Establishes policy and prescribes procedures for establishing credentials and performing identity authentication of all entities accessing DoD information systems that authenticate themselves to …