Get Email UpdatesSign up below to receive free Trusted Identities Group blog updates.
- From public preview to public draft: SP 800-63 is open for comment!
- Making Privacy Concrete (Three Words Not Usually Found Together)
- 2016 Year in Review: (TIG-ing stock of) Innovation in the Identity Ecosystem
- SOFA Talk: Strength of Function for Authenticators Framework Now Open for Comment!
- Got trust? Seeking public comment on new NIST publication for developing trust frameworks to support identity federation
February 2017 M T W T F S S « Jan 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28
Tag Archives: security
Some communities and organizations that share common user bases and transaction types are addressing challenges to users’ privacy and security by allowing users to access multiple services through common login processes. This approach – known as federated identity management – enables users to access multiple online organizations and services through shared authentication processes, instead of authenticating separately with each service provider. Continue reading
Multi-factor authentication (MFA) is near and dear to our hearts at NSTIC. We understand how important it is to the security and privacy of online transactions and we get excited about any opportunity to increase the awareness of—and encourage the adoption of—MFA. This is why we jumped at the opportunity to submit a challenge about MFA for the National Day of Civic Hacking earlier this summer. Continue reading
The Identity Ecosystem Steering Group (IDESG) has been hard at work delivering on version 1 of the Identity Ecosystem Framework (IDEF). This week, the steering group hit a major milestone: meeting a March 16th deadline for developing baseline requirements for the IDEF. While this is a big milestone for the IDESG, it also marks an important moment for private sector stakeholders interested in participating in the Identity Ecosystem (IE), since the upcoming IDEF – due out this summer – will enable individuals and organizations to start using a new generation of more secure, convenient, privacy-enhancing credentials that are interoperable across the internet. Continue reading