Main Nav

Apr 13th, 2010
10:45 AM - 11:45 AM
International C (6th floor)
Mountain Time
Session Type: Policy and Compliance
Many different types of credentials can be used for authentication. How do you pick? This presentation will describe the relationships between personal digital identities, identity proofing, credentials, authentication factors, and levels of assurance in digital identities. A methodology for selecting credentials that are appropriate for various applications will be outlined.