Abstract
Specifies three types of sign-on authentication between entities requesting access and entities capable of granting access: via Personal Authentication Information (PAI) such as a password, via a user-unique key, via a node-unique key. Is designed for use with symmetric algorithms, where requestor and grantor use the same key. Annex A identifies the limitations of the standard.
-
Status: WithdrawnPublication date: 1992-09
-
Edition: 1Number of pages: 10
-
- ICS :
- 03.060 Finances. Banking. Monetary systems. Insurance
Life cycle
Got a question?
Check out our FAQs
Customer care
+41 22 749 08 88
Opening hours:
Monday to Friday - 09:00-12:00, 14:00-17:00 (UTC+1)