Credentialing (information security)/Related Articles
Jump to navigation
Jump to search
Credentialing (information security): Mechanisms and processes used to grant privileges, in a secure information system, to an actor who has been identified and authenticated; ideally follows the Principle of Least Privilege [e]
This article contains just a definition and optionally other subpages (such as a list of related articles), but no metadata. Create the metadata page if you want to expand this into a full article.
Parent topics
- Information security [r]: The set of policies and protective measures used to ensure appropriate confidentiality, integrity and availability to information; usually assumed to be information in a computer or telecommunications network but the principles extend to people and the physical world [e]
- Identification, authentication and credentialing [r]: Add brief definition or description
Subtopics
- Principle of Least Privilege [r]: A security principle that gives individuals only the special privileges needed to carry out a specific function; the default condition is that individuals do not have any privileges that were not explicitly granted. [e]
- Mandatory Access Control [r]: Add brief definition or description
- Identification (information security) [r]: Add brief definition or description
- Authentication (information security) [r]: Technologies and procedures used to confirm one's identification to a secure information system [e]
- Kerberos [r]: A protocol using a central server to provide two clients with a shared session key, without either client having to publish a public key. [e]
- System administration [r]: Add brief definition or description