Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

credential

Abbreviation(s) and Synonym(s):

None

Definition(s):

  Evidence attesting to one’s right to credit or authority; in this standard, it is the PIV Card and data elements associated with an individual that authoritatively binds an identity (and, optionally, additional attributes) to that individual.
Source(s):
FIPS 201 under Credential [Withdrawn]

  An object or data structure that authoritatively binds an identity (and optionally, additional attributes) to a token possessed and controlled by a Subscriber. While common usage often assumes that the credential is maintained by the Subscriber, this document also uses the term to refer to electronic records maintained by the CSP which establish a binding between the Subscriber’s token and identity.
Source(s):
NIST SP 800-63-2 under Credential [Superseded]

  An object or data structure that authoritatively binds an identity (and optionally, additional attributes) to a card or token possessed and controlled by a cardholder or subscriber.
Source(s):
NIST SP 800-79-2 under Credential

  1. 1. Evidence or testimonials that support a claim of identity or assertion of an attribute and usually are intended to be used more than once.
Source(s):
CNSSI 4009-2015

  2. 2. Evidence attesting to one’s right to credit or authority.
Source(s):
CNSSI 4009-2015 (FIPS 201-1)

  3. 3. An object or data structure that authoritatively binds an identity (and optionally, additional attributes) to a token processed and controlled by a Subscriber.
Source(s):
CNSSI 4009-2015 (NIST SP 800-63-2)

  An object or data structure that authoritatively binds an identity - via an identifier or identifiers - and (optionally) additional attributes, to at least one authenticator possessed and controlled by a subscriber. While common usage often assumes that the subscriber maintains the credential, these guidelines also use the term to refer to electronic records maintained by the CSP that establish binding between the subscriber’s authenticator(s) and identity.
Source(s):
NIST SP 800-63-3 under Credential

  A set of attributes that uniquely identifies a system entity such as a person, an organization, a service, or a device.
Source(s):
NISTIR 7497 under Credential

  An object or data structure that authoritatively binds an identity (and optionally, additional attributes) to an authenticator possessed and controlled by a subscriber.
Source(s):
NISTIR 8149 under Credential (NIST SP 800-63-3)