Hardening Authentication Update

Abstract: On many networks, in order for users to be granted
access to network resources, a user must prove that he or she is an authorized user. This is the process of user authentication. A user can be authenticated by what he has (e.g. an ID card or token), what he knows (e.g. a PIN or password), or what he is (e.g. biometric data). More robust authentication processes use two or more of these factors, called multi-factor authentication.

Date Published:

Last Reviewed: 02 November 2016

Dissemination Control: N/A

Length: 4 page(s)

Format: pdf

Type: Reference/Overview; Factsheet

Tags: Authentication; Network; Privileges