To access: Get File: Hardening Authentication Update
On many networks, in order for users to be granted
access to network resources, a user must prove that he or she is an authorized user. This is the process of user authentication. A user can be authenticated by what he has (e.g. an ID card or token), what he knows (e.g. a PIN or password), or what he is (e.g. biometric data). More robust authentication processes use two or more of these factors, called multi-factor authentication.
Date Published: 03 November 2016
Last Reviewed: 02 November 2016
Dissemination Control: N/A
Length: 4 page(s)