User Authentication Systems (Implementation Guide 3)

Created:  20 Nov 2015
Updated:  08 Aug 2016
CESG Archive

Archive content originally produced by CESG that has not yet been absorbed into the new NCSC web pages.

This guidance provides advice on the expected characteristics of user authentication systems.

This guidance is for those responsible for the selection, implementation and administration of user authentication systems. It will also enable informed decisions to be made on the security related requirements by the system designer.

User Authentication Systems (Implementation Guide 3)_1.1.pdf

PDF, 1095.35KB

This file may not be suitable for users of assistive technology.

Was this guidance helpful?

We need your feedback to improve this content.

Yes No