20.60 Close of comment period Aug 25, 2024
ISO/IEC
ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection
International Standard
This document provides guidance on implementing authentication and the use of credentials therein, in particular it:
— describes complementary models for implementing user authentication with different operational aspects;
— specifies requirements for the control of identity information transfer in authentication;
— specifies formal descriptions of authentication methods;
— specifies requirements for authenticators as credentials
managing the lifecycle,
binding to a principal,
use in a federated context.”
IN_DEVELOPMENT
ISO/IEC WD 24760-4.4
20.60
Close of comment period
Aug 25, 2024