A temporary secret, issued by the Verifier to a successfully authenticated Subscriber as part of an assertion protocol. This secret is subsequently used, by the Subscriber, to authenticate to the RP.
Examples of secondary authenticators include bearer assertions, assertion references, and Kerberos session keys.
Source(s):
NIST SP 800-63-2
[Superseded]