Skip to main content

๐Ÿ’ผ IA-5 (2) PKI-BASED AUTHENTICATION

  • Contextual name: ๐Ÿ’ผ IA-5 (2) PKI-BASED AUTHENTICATION
  • ID: /frameworks/nist-sp-800-53-r4/ia/05/02
  • Located in: ๐Ÿ’ผ IA-5 AUTHENTICATOR MANAGEMENT

Descriptionโ€‹

The information system, for PKI-based authentication: IA-5 (2)(a) Validates certifications by constructing and verifying a certification path to an accepted trust anchor including checking certificate status information; IA-5 (2)(b) Enforces authorized access to the corresponding private key; IA-5 (2)(c) Maps the authenticated identity to the account of the individual or group; and IA-5 (2)(d) Implements a local cache of revocation data to support path discovery and validation in case of inability to access revocation information via the network.

Similarโ€‹

  • Internal
    • ID: dec-c-3ea77aee

Sub Sectionsโ€‹

SectionSub SectionsInternal RulesPoliciesFlags