The corroboration that a person is the one claimed.
Source(s):
NIST SP 800-66 Rev. 1
under Authentication
from
45 C.F.R., Sec. 164.304
Security measures designed to establish the validity of a transmission, message, or originator, or a means of verifying an individual’s authorization to receive specific categories of
information.
Source(s):
NIST SP 800-59
under Authentication
from
CNSSI 4009
Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in a system.
Source(s):
NIST SP 800-12 Rev. 1
under Authentication
from
FIPS 200
NISTIR 7316
under Authentication
Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system.
Source(s):
NIST SP 800-128
under Authentication
from
FIPS 200
NIST SP 800-137
under Authentication
from
FIPS 200
NIST SP 800-18 Rev. 1
under Authentication
NIST SP 800-30 Rev. 1
under Authentication
from
FIPS 200
NIST SP 800-39
under Authentication
from
FIPS 200
NIST SP 800-53A Rev. 4
under Authentication
from
FIPS 200
NIST SP 800-60 Vol. 1 Rev. 1
under Authentication
from
FIPS 200
NIST SP 800-60 Vol. 2 Rev. 1
under Authentication
from
FIPS 200
NIST SP 800-82 Rev. 2
under Authentication
from
NIST SP 800-53
NIST SP 1800-21C
under Authenticate
NIST SP 800-53 Rev. 4
[Superseded]
under Authentication
from
FIPS 200
To confirm the identity of an entity when that identity is presented.
Source(s):
CNSSI 4009-2015
from
NIST SP 800-32
NIST SP 800-32
[Withdrawn]
under Authenticate
The process a VPN uses to limit access to protected services by forcing users to identify themselves.
Source(s):
NIST SP 800-113
under Authentication
See Authentication.
Source(s):
NIST SP 800-63-3
under Authenticate
Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to a system’s resources.
Source(s):
NIST SP 1800-17c
under Authentication
NIST SP 800-63-3
under Authentication
NIST SP 1800-16B
under Authentication
from
NIST SP 800-63-3
NIST SP 1800-16C
under Authentication
from
NIST SP 800-63-3
NIST SP 1800-16D
under Authentication
from
NIST SP 800-63-3
Provides assurance of the authenticity and, therefore, the integrity of data.
Source(s):
NIST SP 800-67 Rev. 2
under Authentication
NIST SP 800-67 Rev. 1
[Superseded]
under Authentication
A process that provides assurance of the source and integrity of information in communications sessions, messages, documents or stored data or that provides assurance of the identity of an entity interacting with a system.
Source(s):
NIST SP 800-57 Part 2 Rev.1
under Authentication
Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to a system’s resources
Source(s):
NIST SP 1800-17b
under Authentication
A process that provides assurance of the source and integrity of information that is communicated or stored or the identity of an entity interacting with a system.
Source(s):
NIST SP 800-175B Rev. 1
under Authentication
Note that in common practice, the term "authentication" is used to mean either source or identity authentication only. This document will differentiate the multiple uses of the word by the terms source authentication, identity authentication, or integrity authentication, where appropriate.
Source(s):
NIST SP 800-175B Rev. 1
under Authentication
A process that provides assurance of the source and integrity of information in communications sessions, messages, documents or stored data or that provides assurance of the identity of an entity interacting with a system. See Source authentication, Identity authentication, and Integrity authentication.
Source(s):
NIST SP 800-57 Part 1 Rev. 5
under Authentication
The process of verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system.
Source(s):
NIST SP 1800-27B
under Authentication
from
FIPS 200
NIST SP 1800-27C
under Authentication
from
FIPS 200
The process of establishing confidence in the identity of users or information systems.
Source(s):
NISTIR 8149
under Authentication
from
NIST SP 800-63-3
NIST SP 800-63-2
[Superseded]
under Authentication
The process of verifying a claimed identity of a user, device, or other entity in a computer system
Source(s):
NISTIR 4734
under Authentication
the process of verifying the integrity of data that has been stored, transmitted, or otherwise exposed to possible unauthorized access.
Source(s):
NISTIR 4734
under Authentication
The process of proving the claimed identity of an individual user, machine, software component or any other entity. Typical authentication mechanisms include conventional password schemes, biometrics devices, cryptographic methods, and onetime passwords (usually implemented with token based cards.)
Source(s):
NISTIR 5153
under Authentication
The process of establishing confidence in the claimed identity of a user or system
Source(s):
NISTIR 7682
under Authentication
Verifying the identity of a user, process, or device, often as a prerequisite for allowing access to resources in an information system.
Source(s):
NISTIR 8301
under Authentication
from
FIPS 200
Security measure designed to establish the validity of a transmission, message, or originator, or a means of verifying an individual's authorization to receive specific categories of information.
Source(s):
NIST SP 800-32
[Withdrawn]
under Authentication
from
NSTISSI 4009
The process of establishing confidence of authenticity; in this case, in the validity of a person’s identity and the PIV Card.
Source(s):
FIPS 201
[version unknown]
under Authentication
For the purposes of this guide, the process of verifying the identity claimed by a WiMAX device. User authentication is also an option supported by IEEE 802.16e-2005.
Source(s):
NIST SP 800-127
[Withdrawn]
under Authentication
Authentication is the process of verifying the claimed identity of a session requestor.
Source(s):
NIST SP 800-13
[Withdrawn]
under Authentication
The process of verifying the authorization of a user, process, or device, usually as a prerequisite for granting access to resources in an IT system.
Source(s):
NIST SP 800-47
[Superseded]
under Authentication
A process that establishes the source of information, provides assurance of an entity’s identity or provides assurance of the integrity of communications sessions, messages, documents or stored data.
Source(s):
NIST SP 800-57 Part 1 Rev. 3
[Superseded]
under Authentication
A process that provides assurance of the source and integrity of information in communications sessions, messages, documents or stored data.
Source(s):
NIST SP 800-57 Part 1 Rev. 4
[Superseded]
under Authentication
A process that establishes the origin of information, or determines an entity’s identity. In a general information security context: Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system.
Source(s):
NIST SP 800-57 Part 2
[Superseded]
under Authentication