Chapter 9 Identification

foundation for all aspects of security
unique identifier per user. Also SW, HW, networks
what a user presents to show who he is
Must be unique, universal (same type for all users), verifiable, unforgeable (eg. holograms, cryptography), transportable, easy to use

Issued: privately by organization
publicly by trusted third party

Scope of use: how widely identifier used, how widely accepted
single sign-on: based on a scope that encompasses everything that a user may need to do

Administration: creation, revocation, distribution. Integration into authentication & authorization systems.
Centralized vs. distributed admin.

Naming standards: X.500 OSI directory service: process used to manage the unique names that are required to be able to have unique IDs of systems, users, resources.

Smart cards: chip readable with PIN. physical ID, electronic ID.

PKI public key infrastructure: certificates with public key

Identity errors: accidental or malicious (identity theft).