...
More secure authentication
Permission escalation
Remote vetting
Elements
- Physical devices and tokens, other client devices (sensors or mere USB port)
- Infrastructure and software
- Vetting, issuance, management, revocation
- Actual authentication
- Applications, services, authorisation (sometimes also in infrastructure)
...