The means used to confirm the identity of a user, process, or device (e.g., user password or token).
Source(s):
CNSSI 4009-2015
from
NIST SP 800-53 Rev. 4
Something that the Claimant possesses and controls (typically a key or password) that is used to authenticate the Claimant’s identity.
Source(s):
NIST SP 800-12 Rev. 1
under Token
from
NIST SP 800-63-2
Something the claimant possesses and controls (typically a cryptographic module or password) that is used to authenticate the claimant’s identity. In previous editions of SP 800-63, this was referred to as atoken.
Source(s):
NIST SP 800-63-3
under Authenticator
See Authenticator.
Source(s):
NIST SP 800-63-3
under Token
A portable, user-controlled, physical device (e.g., smart card or memory stick) used to store cryptographic information and possibly also perform cryptographic functions.
Source(s):
NIST SP 800-57 Part 2 Rev.1
under Token
Something the claimant possesses and controls (typically a cryptographic module or password) that is used to authenticate the claimant’s identity.
Source(s):
NIST SP 1800-17b
under Authenticator
NIST SP 1800-17c
under Authenticator
See Authenticator
Source(s):
NIST SP 1800-17b
under Token
NIST SP 1800-17c
under Token
Something the claimant possesses and controls (typically a cryptographic module or password) that is used to authenticate the claimant’s identity. In previous editions of SP 800-63, this was referred to as a token.
Source(s):
NIST SP 800-63-3
under Authenticator
Something that the claimant possesses and controls (typically a cryptographic module or password) that is used to authenticate the claimant’s identity. This was previously referred to as a token.
Source(s):
NIST SP 800-53 Rev. 5
A physical object a user possesses and controls that is used to authenticate the user’s identity.
Source(s):
NISTIR 7711
under Token
A representation of a particular asset that typically relies on a blockchain or other types of distributed ledgers.
Source(s):
NISTIR 8301
under Token
from
Taxonomic Approach to Blockchain IDMS
The means used to confirm the identity of a user, processor, or device (e.g., user password or token).
Source(s):
NIST SP 800-53 Rev. 4
[Superseded]
under Authenticator
Something that the Claimant possesses and controls (typically a cryptographic module or password) that is used to authenticate the Claimant’s identity.
Source(s):
NIST SP 800-63-2
[Superseded]
under Token