Skip to main content
ADOA-ASET Logo
  • Home
  • About
    • Careers
    • Leadership Team
    • Statutes and Rules
    • Meeting Requests
  • Services
    • Current Rates
  • Strategy
    • ACT Recommendations
    • Digital Government
    • Enterprise Architecture
    • Enterprise Project Management Office
    • Strategic Oversight
    • Statewide Strategic IT Plans
  • Governance
    • IT Authorization Committee (ITAC)
    • Chief Information Officer (CIO) Council
    • Change Advisory Board (CAB)
    • Enterprise Security Program Advisory Council (ESPAC)
  • Programs
    • AZNET II - Arizona Network
    • Archived Programs
  • Resources
    • ASET Billing
    • Glossary
    • Policies, Standards and Procedures
    • Security
      • Incident Reporting
    • Cyber Resources - Local/Tribal Governments
    • Service Desk
    • Training
    • Agency Engagement Manager List
  • Home
  • Strategy

Authentication (NIST)

View Definition

Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system. 

SOURCE: SP 800-53; SP 800-53A; SP 800-27; FIPS 200; SP 800-30 

The process of establishing confidence of authenticity. 

SOURCE: FIPS 201 

Encompasses identity verification, message origin authentication, and message content authentication. 

SOURCE: FIPS 190 

A process that establishes the origin of information or determines an entity’s identity. 

SOURCE: SP 800-21 

The process of verifying the identity or other attributes claimed by or assumed of an entity (user, process, or device), or to verify the source and integrity of data. 

SOURCE: CNSSI-4009 

The process of establishing confidence in the identity of users or information systems. 

SOURCE: SP 800-63 

LinkedIn Twitter YouTube This site (RSS)
Arizona State Seal
Contact Us
ADOA-ASET
100 N. 15th Avenue, Suite 400
Phoenix, AZ 85007
Find in Google Maps
Phone: 602.542.2250
Map Image

Footer Utility

  • Statewide Website Policies
  • Site Map
  • Meeting Requests