|“||[i]nformation that includes identification and proof of identification that is used to gain access to local and network resources. Examples of credentials are user names, passwords, smart cards, and certificates.||”|
In an information system, credentials are widely used to control access to information or other resources. The classic combination of a user account number or name and a secret password is a widely-used example of IT credentials.
- ↑ Privacy Technology Focus Group Final Report, App. B, at 52.
- ↑ ITU, "Compendium of Approved ITU-T Security Definitizons," at 14 (Feb. 2003 ed.) (full-text).
|This page uses Creative Commons Licensed content from Wikipedia (view authors).|