Authentication Credential
(Redirected from authentication credential)
Jump to navigation
Jump to search
An Authentication Credential is a security artifact that establishes user identity through authentication verification processes.
- AKA: Authentication Token, Identity Credential, Access Credential, Security Credential.
- Context:
- It can typically enable Authentication Credential Verification through authentication credential protocols.
- It can typically provide Authentication Credential Identity Proof through authentication credential validation.
- It can typically support Authentication Credential Access Control through authentication credential authorization.
- It can typically maintain Authentication Credential Security through authentication credential protection mechanisms.
- It can typically facilitate Authentication Credential Portability through authentication credential standard formats.
- ...
- It can often implement Authentication Credential Encryption through authentication credential cryptographic methods.
- It can often enable Authentication Credential Revocation through authentication credential lifecycle management.
- It can often support Authentication Credential Federation through authentication credential trust relationships.
- It can often provide Authentication Credential Auditing through authentication credential activity logging.
- ...
- It can range from being a Weak Authentication Credential to being a Strong Authentication Credential, depending on its authentication credential security strength.
- It can range from being a Single-Factor Authentication Credential to being a Multi-Factor Authentication Credential, depending on its authentication credential factor count.
- It can range from being a Static Authentication Credential to being a Dynamic Authentication Credential, depending on its authentication credential variability.
- It can range from being a Short-Lived Authentication Credential to being a Long-Lived Authentication Credential, depending on its authentication credential lifetime.
- It can range from being a Knowledge-Based Authentication Credential to being a Possession-Based Authentication Credential to being an Inherence-Based Authentication Credential, depending on its authentication credential factor type.
- ...
- It can integrate with Authentication System for authentication credential verification.
- It can connect to Identity Provider for authentication credential issuance.
- It can interface with Authorization System for authentication credential permission mapping.
- It can communicate with Audit System for authentication credential activity tracking.
- It can synchronize with Credential Management System for authentication credential lifecycle control.
- ...
- Example(s):
- Password-Based Authentication Credentials, such as:
- Cryptographic Authentication Credentials, such as:
- Token-Based Authentication Credentials, such as:
- Biometric Authentication Credentials, such as:
- ...
- Counter-Example(s):
- Authorization Token, which grants permissions rather than establishing identity.
- Encryption Key, which protects data confidentiality rather than verifying user identity.
- Digital Signature, which proves message authenticity rather than user authentication.
- Access Control List, which defines permissions rather than serving as credentials.
- See: Authentication System, Security Protocol, Encryption Key, Public Key Cryptography, Password Manager System, Identity Management System, OAuth Access Delegation Standard, Multi-Factor Authentication, Biometric Authentication.