U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

This is an archive
(replace .gov by .rip)
A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

authenticator

Abbreviation(s) and Synonym(s):

Token

Definition(s):

  The means used to confirm the identity of a user, process, or device (e.g., user password or token).
Source(s):
CNSSI 4009-2015 from NIST SP 800-53 Rev. 4

  Something that the Claimant possesses and controls (typically a key or password) that is used to authenticate the Claimant’s identity.
Source(s):
NIST SP 800-12 Rev. 1 under Token from NIST SP 800-63-2

  Something the claimant possesses and controls (typically a cryptographic module or password) that is used to authenticate the claimant’s identity. In previous editions of SP 800-63, this was referred to as atoken.
Source(s):
NIST SP 800-63-3 under Authenticator

  See Authenticator.
Source(s):
NIST SP 800-63-3 under Token

  A portable, user-controlled, physical device (e.g., smart card or memory stick) used to store cryptographic information and possibly also perform cryptographic functions.
Source(s):
NIST SP 800-57 Part 2 Rev.1 under Token

  Something the claimant possesses and controls (typically a cryptographic module or password) that is used to authenticate the claimant’s identity.
Source(s):
NIST SP 1800-17b under Authenticator
NIST SP 1800-17c under Authenticator

  See Authenticator
Source(s):
NIST SP 1800-17b under Token
NIST SP 1800-17c under Token

  Something the claimant possesses and controls (typically a cryptographic module or password) that is used to authenticate the claimant’s identity. In previous editions of SP 800-63, this was referred to as a token.
Source(s):
NIST SP 800-63-3 under Authenticator

  Something that the claimant possesses and controls (typically a cryptographic module or password) that is used to authenticate the claimant’s identity. This was previously referred to as a token.
Source(s):
NIST SP 800-53 Rev. 5

  A physical object a user possesses and controls that is used to authenticate the user’s identity.
Source(s):
NISTIR 7711 under Token

  A representation of a particular asset that typically relies on a blockchain or other types of distributed ledgers.
Source(s):
NISTIR 8301 under Token from Taxonomic Approach to Blockchain IDMS

  The means used to confirm the identity of a user, processor, or device (e.g., user password or token).
Source(s):
NIST SP 800-53 Rev. 4 [Superseded] under Authenticator

  Something that the Claimant possesses and controls (typically a cryptographic module or password) that is used to authenticate the Claimant’s identity.
Source(s):
NIST SP 800-63-2 [Superseded] under Token