![]() Using the terminology of the NIST Digital Identity Guidelines, the party to be authenticated is called the claimant while the party verifying the identity of the claimant is called the verifier. ![]() In the simplest case, the authenticator is a common password. A person authenticates to a computer system or application by demonstrating that he or she has possession and control of an authenticator. For the role of the authenticator in the 802.1X authentication protocol, see IEEE 802.1X.Īn authenticator is a means used to confirm a user's identity, that is, to perform digital authentication.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |