Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

More secure authentication

Permission escalation

Remote vetting

Elements

  • Physical devices and tokens, other client devices (sensors or mere USB port)
  • Infrastructure and software
    • Vetting, issuance, management, revocation
    • Actual authentication
  • Applications, services, authorisation (sometimes also in infrastructure)

...