Credentialing (information security)/Related Articles: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Howard C. Berkowitz
(New page: {{subpages}} {{TOC|right}} ==Parent topics== {{r|Information security}} {{r|Identification, authentication and credentialing}} ==Subtopics== {{r|Principle of Least Privilege}} {{r|Acc...)
 
imported>Howard C. Berkowitz
No edit summary
Line 13: Line 13:


==Other related topics==
==Other related topics==
{{r|Identification (information security)}}
{{r|Authentication (information security)}}
{{r|Kerberos}}
{{r|Kerberos}}
{{r|System administration}}
{{r|System administration}}

Revision as of 11:18, 6 May 2010

Credentialing (information security): Mechanisms and processes used to grant privileges, in a secure information system, to an actor who has been identified and authenticated; ideally follows the Principle of Least Privilege [e]

This article contains just a definition and optionally other subpages (such as a list of related articles), but no metadata. Create the metadata page if you want to expand this into a full article.

Parent topics

Subtopics

Other related topics