Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

token

Abbreviations / Acronyms / Synonyms:

Authenticator

Definitions:

  Something the cardholder possesses and controls (e.g., PIV Card or derived PIV credential) that is used to authenticate the cardholder’s identity.
Sources:
FIPS 201-3 under Authenticator

  The means used to confirm the identity of a user, process, or device (e.g., user password or token).
Sources:
CNSSI 4009-2015 under authenticator

  Something that the claimant possesses and controls (such as a key or password) that is used to authenticate a claim. See cryptographic token.
Sources:
CNSSI 4009-2015

  Something that the Claimant possesses and controls (typically a key or password) that is used to authenticate the Claimant’s identity.
Sources:
NIST SP 800-12 Rev. 1 under Token

  Something the claimant possesses and controls (typically a cryptographic module or password) that is used to authenticate the claimant’s identity. In previous editions of SP 800-63, this was referred to as atoken.
Sources:
NIST SP 800-63-3 under Authenticator

  See Authenticator.
Sources:
NIST SP 800-63-3 under Token

  A portable, user-controlled, physical device (e.g., smart card or memory stick) used to store cryptographic information and possibly also perform cryptographic functions.
Sources:
NIST SP 800-57 Part 2 Rev.1 under Token

  Something the claimant possesses and controls (typically a cryptographic module or password) that is used to authenticate the claimant’s identity.
Sources:
NIST SP 1800-17b under Authenticator
NIST SP 1800-17c under Authenticator

  See Authenticator
Sources:
NIST SP 1800-17b under Token
NIST SP 1800-17c under Token

  Something the claimant possesses and controls (typically a cryptographic module or password) that is used to authenticate the claimant’s identity. In previous editions of SP 800-63, this was referred to as a token.
Sources:
NIST SP 800-63-3 under Authenticator

  Something that the claimant possesses and controls (typically a cryptographic module or password) that is used to authenticate the claimant’s identity. This was previously referred to as a token.
Sources:
NIST SP 800-53 Rev. 5 under authenticator

  Either information that is only known to the person and the verifier, or a hardware device that can generate information that the verifier knows can only come from that device
Sources:
NISTIR 7682 under Tokens

  A physical object a user possesses and controls that is used to authenticate the user’s identity.
Sources:
NISTIR 7711 under Token

  A representation of a particular asset that typically relies on a blockchain or other types of distributed ledgers.
Sources:
NISTIR 8301 under Token from Taxonomic Approach to Blockchain IDMS