Credentialing (information security)/Related Articles: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Howard C. Berkowitz
(New page: {{subpages}} {{TOC|right}} ==Parent topics== {{r|Information security}} {{r|Identification, authentication and credentialing}} ==Subtopics== {{r|Principle of Least Privilege}} {{r|Acc...)
 
m (Text replacement - "{{r|Access control list}}↵" to "")
 
(One intermediate revision by one other user not shown)
Line 9: Line 9:
==Subtopics==
==Subtopics==
{{r|Principle of Least Privilege}}
{{r|Principle of Least Privilege}}
{{r|Access control list}}
{{r|Mandatory Access Control}}
{{r|Mandatory Access Control}}


==Other related topics==
==Other related topics==
{{r|Identification (information security)}}
{{r|Authentication (information security)}}
{{r|Kerberos}}
{{r|Kerberos}}
{{r|System administration}}
{{r|System administration}}

Latest revision as of 05:38, 15 March 2024

Credentialing (information security): Mechanisms and processes used to grant privileges, in a secure information system, to an actor who has been identified and authenticated; ideally follows the Principle of Least Privilege [e]

This article contains just a definition and optionally other subpages (such as a list of related articles), but no metadata. Create the metadata page if you want to expand this into a full article.

Parent topics

Subtopics

Other related topics