Authentication

From CIPedia
Jump to: navigation, search

Definition

International Definitions

IAEA

Authentication is the provision of assurance that a claimed characteristic of an entity is correct. [1]


National Definitions

Australia

Authentication: The process of verifying the identity of a user, process or device as a prerequisite to allowing access to resources in a system. [2]


Brazil

Auteneticacão: Medida de segurança destinada a proteger as comunicações contra a transmissão/recepção de mensagens falsas. [3]


Burkina-Faso

Authentification: Identification d’un utilisateur et vérification de ses droits d’accès aux services d’un système informatique. Deux niveaux sont possibles : authentification simple utilisant une seule méthode d’identification généralement basée sur une preuve mentale (mot de passe par exemple) et authentification forte utilisant au moins deux méthodes d’identification: une preuve mentale et une preuve dynamique (carte à puce par exemple). [4]


Egypt

Authentication: [Any] Security measure designed to establish the validity of a transmission, message, or originator, or a means of verifying an individual’s eligibility to receive specific categories of information. [5]


France

L’authentification a pour but de vérifier l’identité dont une entité se réclame. [6]
Généralement l’authentification est précédée d’une identification qui permet à cette entité de se faire reconnaître du système par un élément dont on l’a doté. En résumé, s’identifier c’est communiquer son identité, s’authentifier c’est apporter la preuve de son identité.

Georgia

Authentication is the process of verifying and securing the identity of a user or a program when accessing electronically secured data and systems or when performing communication processes. [7]
In the authentication process, a certain attribute of a user or system certifies authorized access to such systems or data, for example, a key (see public key cryptography), a smart card, a password, the user name or even biometrical traits (fingerprint). A higher security level can be achieved by the combination of different traits used for authentication.

Hong Kong

認證  : 用以辨識及證明嘗試發出信息或接達數據的用戶╱一方身份的 程序或方法。信息認證指用以證明特定資訊的完整性的程序。

Authentication: A process or method to identify and to prove the identity of a user/party who attempts to send message or access data. [8]


Italy

Autenticazione: Verifica dell’identità o di altre caratteristiche di un utente, di un dispositivo o di una procedura ovvero dell’originatore e dell’integrità dei dati. [9]
Costituisce spesso una condizione per accedere ai sistemi informativi e di comunicazione. A tal fine vengono frequentemente impiegati metodi che associano vari strumenti di riconoscimento, quali dati biometrici, tesserini identificativi, password, etc.

Liberia

Authentication: A security measure designed to verify an individual's authorization to access computer or security information. [10]


Netherlands

Authenticatie: Het vaststellen van de identiteit van een gebruiker, computer of applicatie. [11]

Authenticatie: Het proces waarbij wordt nagegaan of een persoon, een (andere) computer of applicatie daadwerkelijk is wie hij beweert te zijn. [12]

Authenticatie is het nagaan of een bewijs van identiteit van een gebruiker, computer of applicatie overeenkomt met vooraf vastgelegde echtheidskenmerken. [13]

Het bewijzen en controleren van de geclaimde identiteit van een HANDELENDE PERSOON via een (set van) authenticatiemiddel(len) op een bepaald betrouwbaarheidsniveau. [14]


Oman

Authentication is the process of confirming the correctness of the claimed identity. [15]


Romania

Autentificare: Dovadă prin care se confirmă veridicitatea unui atac, document, înscris. [16]


Senegal

Authentification: L'authentification pour un système informatique est un processus permettant au système de s'assurer de la légitimité de la demande d'accès faite par une entité (être humain ou un autre système) afin d'autoriser l'accès de cette entité à des ressources du système (systèmes, réseaux, applications) conformément au paramétrage du contrôle d'accès. [17]


United States

NIST
Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system. [18]


Other definitions

OWASP

Authentication is the process of verifying that someone or something is the actual entity that they claim to be. [19]
Authentication is what happens when you log into a system. It compares your credentials (often user name and password) with a previously established known value such that the system can know that you are who you say you are. For sensitive systems, there is a trend toward using two factor authentication (2FA) which essentially means that users must supply two different secrets, usually one is a password (something they know) and the other is a pin supplied via text (verifying something they have).

International Standard

ISA-62443-*

Authentication: Provision of assurance that a claimed characteristic of an identity is correct. [20]


IETF
Authentication: The process of verifying an identity claimed by or for a system entity. [21]


ISO/IEC - ISO/IEC 27000:2014

Authentication is a process that is used to confirm that a claimed characteristic of an entity is actually correct. To authenticate is to verify that a characteristic or attribute that appears to be true is in fact true. [22]

See also

Notes

  1. IAEA - Nuclear Security Series Glossary Version 1.3 (November 2015)
  2. on-line glossary Stay Safe On-line
  3. GLOSSÁRIO DE DEFESA CIVIL ESTUDOS DE RISCOS E MEDICINA DE DESASTRES, Ministério da Integração Nacional, Brazil
  4. CIRT-BF Glossary
  5. Glossary of the National Telecom Authority (NTA), Egypt
  6. ANSSI Glossaire
  7. A Digital Georgia e-Georgia strategy and action plan 2014-2018
  8. Glossary for Information Security Terms/資訊保安詞彙表
  9. IL LINGUAGGIO DEGLI ORGANISMI INFORMATIVI Glossario (2013)
  10. Government of Liberia’s Policy for the Telecommunications and Information Communications Technology (ICT) sectors
  11. Cyber Security Beeld Nederland 2018
  12. ABDO 2017
  13. Cyber Security Beeld Nederland 2016
  14. Begrippenlijst eID Afsprakenstelsel, 2014
  15. Oman CERT Glossary
  16. GLOSAR de termeni din domeniul ordinii şi siguranţei publice, MINISTERUL ADMINISTRAŢIEI ŞI INTERNELOR DIRECŢIA GENERALĂ ORGANIZARE, PLANIFICARE MISIUNI ŞI RESURSE
  17. STRATÉGIE NATIONALE DE CYBERSÉCURITÉ DU SÉNÉGAL (SNC2022)
  18. NIST SOURCE: SP 800-53; SP 800-53A; SP 800-27; FIPS 200; SP 800-30
  19. OWASP Glossary
  20. ISA-62443 series
  21. RFC2828 glossary
  22. ISO/IEC 27000:2014, Information technology -- Security techniques -- Information security management systems -- Overview and vocabulary

References