Detailed information, acquired during authentication, that describes the user, any group associations, and other security-related identity attributes. Credentials can be used to perform a multitude of services, such as authorization, auditing, and delegation.
Evidence or testimonials concerning the user's right to access certain systems (e.g. username, password, etc)
A username/password, public key, or some other information used for authentication.
Information that is required to prove that the potential users of both ends of an ASDSP connection are who they claim to be before ASDSP can establish an authenticated session between the two ends. This information includes the session key, the initiator's identity, and an intermediary, if one is used.
refer to user names, passwords, certificates and any other information that is required for authentication. An authentication factor can serve as a credential. Credentials are stored and secured in the Encentuate identity wallet.
Credentials are data associated with a user or resource that indicates identity and authority level. In network computing environments, the most common type of credential is a certificate that has been created and "signed" by a trusted Certificate Authority (CA).
A term used within the Oracle Security Server Manager to refer to an X.509 certificate associated with a particular entity.
Previously authenticated logon data used by a security principal to establish its own identity, such as a password, or a Kerberos protocol ticket.
The information describing the security attributes of a principal. Credentials can be acquired only through authentication or delegation.
A temporary set of electronic credentials that verify the identity of a client for a particular service. Also called a ticket.
Data that is transferred to establish the claimed identity of an entity. source: ITU-T X.800 domain: Security usage
username, password, or certificate used to gain access to the database.
Information that includes identification and proof of identification that is used to gain access to local and network resources. Examples of credentials are user names and passwords, smart cards, and certificates.
Data that is transferred to establish a claimed principal identity. [X.800
A ticket plus the secret session key necessary to successfully use that ticket in an authentication exchange.
A ticket for the server and a session key which is used to authenticate the principal.
A protocol message, or part thereof, containing a ticket and an authenticator supplied by a client and used by a server to verify the client's identity. The message can contain additional information used by the server to verify its identity to the client.
The combination of a certificate and the matching private key.