Credentialing (information security)/Related Articles
Credentialing (information security): Mechanisms and processes used to grant privileges, in a secure information system, to an actor who has been identified and authenticated; ideally follows the Principle of Least Privilege
This article contains just a definition and optionally other subpages (such as a list of related articles), but no metadata. if you want to expand this into a full article.
- Information security : The set of policies and protective measures used to ensure appropriate confidentiality, integrity and availability to information; usually assumed to be information in a computer or telecommunications network but the principles extend to people and the physical world
- Identification, authentication and credentialing : Add brief definition or description
- Principle of Least Privilege : A security principle that gives individuals only the special privileges needed to carry out a specific function; the default condition is that individuals do not have any privileges that were not explicitly granted.
- Access control list : Used in computers and security to specify if an input value is permitted to perform a particular action.
- Mandatory Access Control : Add brief definition or description
- Identification (information security) : The technology and act of claiming to have a given identity, such the user ID with which one logs in; it is untrusted until authenticated
- Authentication (information security) : Technologies and procedures used to confirm one's identification to a secure information system
- Kerberos : A protocol using a central server to provide two clients with a shared session key, without either client having to publish a public key.
- System administration : Add brief definition or description