Date Published: August 2013
Supersedes:
SP 800-63-1 (12/12/2011)
Planning Note (06/22/2017):
SP 800-63-2 is superseded by the SP 800-63 suite, as follows:
Author(s)
William Burr (NIST), Donna Dodson (NIST), Elaine Newton (NIST), Ray Perlner (NIST), W. Polk (NIST), Sarbari Gupta (Electrosoft Services), Emad Nabbus (Electrosoft Services)
This recommendation provides technical guidelines for Federal agencies implementing electronic authentication and is not intended to constrain the development or use of standards outside of this purpose. The recommendation covers remote authentication of users (such as employees, contractors, or private individuals) interacting with government IT systems over open networks. It defines technical requirements for each of four levels of assurance in the areas of identity proofing, registration, tokens, management processes, authentication protocols and related assertions. This publication supersedes NIST SP 800-63-1.
This recommendation provides technical guidelines for Federal agencies implementing electronic authentication and is not intended to constrain the development or use of standards outside of this purpose. The recommendation covers remote authentication of users (such as employees, contractors, or...
See full abstract
This recommendation provides technical guidelines for Federal agencies implementing electronic authentication and is not intended to constrain the development or use of standards outside of this purpose. The recommendation covers remote authentication of users (such as employees, contractors, or private individuals) interacting with government IT systems over open networks. It defines technical requirements for each of four levels of assurance in the areas of identity proofing, registration, tokens, management processes, authentication protocols and related assertions. This publication supersedes NIST SP 800-63-1.
Hide full abstract
Keywords
authentication; authentication assurance; credential service provider; electronic authentication; electronic credentials; identity proofing; passwords; PKI; tokens
Control Families
Identification and Authentication