IA — Identification and Authentication
25 requirements in the Identification and Authentication policy area
IA-0ORI Use and Validation
IA-1Policy and Procedures
IA-2Identification and Authentication (Organizational Users)
IA-2(1)Identification and Authentication (Organizational Users) (1)
IA-2(2)Identification and Authentication (Organizational Users) (2)
IA-2(8)Identification and Authentication (Organizational Users) (8)
IA-2(12)Identification and Authentication (Organizational Users) (12)
IA-3Device Identification and Authentication
IA-4Identifier Management
IA-4(4)Identifier Management (4)
IA-5Authenticator Management
IA-5(1)Authenticator Management (1)
IA-5(2)Authenticator Management (2)
IA-5(6)Authenticator Management (6)
IA-6Authentication Feedback
IA-7Cryptographic Module Authentication
IA-8Identification and Authentication (Non-Organizational Users)
IA-8(1)Identification and Authentication (Non-Organizational Users) (1)
IA-8(2)Identification and Authentication (Non-Organizational Users) (2)
IA-8(4)Identification and Authentication (Non-Organizational Users) (4)
IA-11Re-Authentication
IA-12Identity Proofing
IA-12(2)Identity Proofing (2)
IA-12(3)Identity Proofing (3)
IA-12(5)Identity Proofing (5)