Date Published: December 2011
Withdrawn: August 29, 2013
Superseded By: SP 800-63-2 (August 2013)
Supersedes: SP 800-63 Ver. 1.0.2 (April 2006)
Author(s)
William Burr (NIST), Donna Dodson (NIST), Elaine Newton (NIST), Ray Perlner (NIST), W. Polk (NIST), Sarbari Gupta (Electrosoft Services), Emad Nabbus (Electrosoft Services)
This recommendation provides technical guidelines for Federal agencies implementing electronic authentication and is not intended to constrain the development or use of standards outside of this purpose. The recommendation covers remote authentication of users (such as employees, contractors, or private individuals) interacting with government IT systems over open networks. It defines technical requirements for each of four levels of assurance in the areas of identity proofing, registration, tokens, management processes, authentication protocols and related assertions. This publication supersedes NIST SP 800-63.
This recommendation provides technical guidelines for Federal agencies implementing electronic authentication and is not intended to constrain the development or use of standards outside of this purpose. The recommendation covers remote authentication of users (such as employees, contractors, or...
See full abstract
This recommendation provides technical guidelines for Federal agencies implementing electronic authentication and is not intended to constrain the development or use of standards outside of this purpose. The recommendation covers remote authentication of users (such as employees, contractors, or private individuals) interacting with government IT systems over open networks. It defines technical requirements for each of four levels of assurance in the areas of identity proofing, registration, tokens, management processes, authentication protocols and related assertions. This publication supersedes NIST SP 800-63.
Hide full abstract
Keywords
authentication; authentication assurance; credentials service provider; cryptography; electronic authentication; electronic credentials; electronic transactions; electronic government; identity proofing; passwords; PKI; Public Key Infrastructure; tokens
Control Families
None selected