authentication

(redirected from Identity management)
Also found in: Dictionary, Thesaurus, Legal, Financial, Acronyms, Encyclopedia, Wikipedia.

authentication

Biometrics
The use of a personal feature—e.g., face, hand, fingerprint, signature, voice, iris, or other highly specific indicator—to verify a person’s identity, and restrict access to private information to authorised persons.

Informatics
Confirmation of a user's identity, generally through a user name and password.

authentication

Biometrics The use of a personal feature, eg, face, hand, fingerprint, signature, voice, iris, or other highly specific indicator to verify a person's identity, and restrict access to information to authorized persons; confirmation of a user's identity, generally through user name and password or biometric characteristics. See Biometrics. Cf Authorization.

au·then·ti·ca·tion

(aw-thenti-kāshŭn)
Protocol to confirm the identify someone logged onto a computer.

authentication

(o-then″ti-kā′shŏn)
In an electronic health record or other computer system, a security mechanism (such as a digital signature) that provides for a unique means of identifying a system user.
References in periodicals archive ?
"Today's identity management challenges are complex and are driven primarily by compliance and governance needs.
definitions of identity management in the literature that seem worthy of
Both Bussey and Ingram realize identity management won't eliminate all of their data security threats, especially as their networks expand and new technologies come along.
"Identity Management is important for organizational efficiency and security, especially in larger organizations.
The chapter summarised the FIDIS perspectives on mobility and identity through exploring technological, legal, sociological and economic aspects of mobile identity management. It also lays out futuristic requirements for mobile identity management systems.
According to Gartner analyst Earl Perkins, each of the two halves of identity and access management can be further subdivided into two sections under Gartner's preferred taxonomy: Identity administration, such as user provisioning and credential management, and identity intelligence, such as compliance reporting and auditing, are parts of identity management. On the IAM side, Perkins continues, "It really consists of verification and authorization.
IMAG consolidates the most desirable aspects of identity management and related business processes into a single box identifing a sweet spot that brings both domains together in a highly provocative way.
One working group will address the issue of identity management in a digital networked world by investigating how current users, such as the financial services industry, have tackled the issue on a global scale in a cost effective manner.
CA Identity Manager supports improved compliance and security through the automation of identity management processes.
Over the past five years, such issues have spurred the rise of numerous specialists in single sign-on (SSO) and related authentication software, but more recently the major infrastructure technology providers (largely through acquisition) have made identity management a core part of their software portfolios.
Written to educate enterprise executives about essential compliance challenges, the title include strategies, tactics and case studies on "what's working and what's not." Each issue will include information on such topics as: corporate compliance, accounting and auditing, HR practices, worker management, identity management, customer and employee privacy, digital risk management, employee training, governance, management oversight, trading partner compliance, USA Patriot Act, reporting, Sarbanes-Oxley Act, security management, records retention, government regulations, financial compliance and litigation preparedness.
Strategic implementation of a secure, flexible, and highly scalable identity management and access control solution provides the additional benefits of cost reductions involved through streamlined and centralized user provisioning, data synchronization, user authentication, and single-sign on capabilities.