Skip to main content

💼 IA-5 (2) PKI-BASED AUTHENTICATION

  • Contextual name: 💼 IA-5 (2) PKI-BASED AUTHENTICATION
  • ID: /frameworks/nist-sp-800-53-r4/ia/05/02
  • Located in: 💼 IA-5 AUTHENTICATOR MANAGEMENT

Description​

The information system, for PKI-based authentication: IA-5 (2)(a) Validates certifications by constructing and verifying a certification path to an accepted trust anchor including checking certificate status information; IA-5 (2)(b) Enforces authorized access to the corresponding private key; IA-5 (2)(c) Maps the authenticated identity to the account of the individual or group; and IA-5 (2)(d) Implements a local cache of revocation data to support path discovery and validation in case of inability to access revocation information via the network.

Similar​

  • Internal
    • ID: dec-c-3ea77aee

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags