Table of Contents
Introduction
1Scope
2Normativereferences
2.1IdenticalRecommendations/InternationalStandards
2.2PairedRecommendations/InternationalStandards
equivalentintechnicalcontent
2.3Additionalreferences
3Definitions
4Abbreviations
5Generaldiscussionofauthentication
5.1Basicconceptsofauthentication
5.2Aspectsofauthenticationservice
5.3Principlesusedinauthentication
5.4Phasesofauthentication
5.5TrustedThirdPartyInvolvement
5.6Typesofprincipal
5.7Humanuserauthentication
5.8Typesofattackonauthentication
6Authenticationinformationandfacilities
6.1Authenticationinformation
6.2Facilities
7Characteristicsofauthenticationmechanisms
7.1Symmetry/Asymmetry
7.2Userofcryptographic/Non-cryptographictechniques
7.3Typesofauthentication
8Authenticationmechanisms
8.1Classificationbyvulnerabilities
8.2Initiationoftransfer
8.3Useofauthenticationcertificates
8.4Mutualauthentication
8.5Summaryofclasscharacteristics
8.6Classificationbyconfiguration
9Interactionswithothersecurityservices/mechanisms
9.1Accesscontrol
9.2Dataintegrity
9.3Dataconfidentiality
9.4Non-repudiation
9.5Audit
AnnexA-Humanuserauthentication
AnnexB-AuthenticationintheOSIModel
AnnexC-Counteringreplayusinguniquenumbersor
challenges
AnnexD-Protectionagainstsomeformsofattackon
authentication
AnnexE-Bibliography
AnnexF-Somespecificexamplesofauthentication
mechanisms
AnnexG-Authenticationfacilitiesoutline Abstract
This recommendation defines basic concepts for authentication, identifies the possible classes of authentication mechanisms, defines the services for these classes of authentication mechanism, identifies functional requirements for protocols to support these classes of authentication mechanism, and also identifies general management requirements for authentication.