Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

authenticator

Abbreviation(s) and Synonym(s):

Token

Definition(s):

  The means used to confirm the identity of a user, processor, or device (e.g., user password or token).
Source(s):
NIST SP 800-53 Rev. 4 under Authenticator

  Something that the Claimant possesses and controls (typically a cryptographic module or password) that is used to authenticate the Claimant’s identity.
Source(s):
NIST SP 800-63-2 under Token [Superseded]

  Something that the Claimant possesses and controls (typically a key or password) that is used to authenticate the Claimant’s identity.
Source(s):
NIST SP 800-12 Rev. 1 under Token (NIST SP 800-63-2)

  The means used to confirm the identity of a user, process, or device (e.g., user password or token).
Source(s):
CNSSI 4009-2015 (NIST SP 800-53 Rev. 4)

  Something the claimant possesses and controls (typically a cryptographic module or password) that is used to authenticate the claimant’s identity. In previous editions of SP 800-63, this was referred to as atoken.
Source(s):
NIST SP 800-63-3 under Authenticator

  See Authenticator.
Source(s):
NIST SP 800-63-3 under Token

  A physical object a user possesses and controls that is used to authenticate the user’s identity.
Source(s):
NISTIR 7711 under Token